000 | 03489nam a22005775i 4500 | ||
---|---|---|---|
001 | 978-3-319-26450-9 | ||
003 | DE-He213 | ||
005 | 20220801221739.0 | ||
007 | cr nn 008mamaa | ||
008 | 151221s2016 sz | s |||| 0|eng d | ||
020 |
_a9783319264509 _9978-3-319-26450-9 |
||
024 | 7 |
_a10.1007/978-3-319-26450-9 _2doi |
|
050 | 4 | _aQ342 | |
072 | 7 |
_aUYQ _2bicssc |
|
072 | 7 |
_aTEC009000 _2bisacsh |
|
072 | 7 |
_aUYQ _2thema |
|
082 | 0 | 4 |
_a006.3 _223 |
245 | 1 | 0 |
_aRecent Advances in Computational Intelligence in Defense and Security _h[electronic resource] / _cedited by Rami Abielmona, Rafael Falcon, Nur Zincir-Heywood, Hussein A. Abbass. |
250 | _a1st ed. 2016. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2016. |
|
300 |
_aXI, 752 p. 236 illus., 72 illus. in color. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aStudies in Computational Intelligence, _x1860-9503 ; _v621 |
|
505 | 0 | _aPart I Physical Security and Surveillance -- Part II: Cyber Security and Intrusion Detection Systems -- Part III: Biometric Security and Authentication Systems -- Part IV: Situational Awareness and Threat Assessment -- Part V: Strategic/Mission Planning and Resource Management. | |
520 | _aThis volume is an initiative undertaken by the IEEE Computational Intelligence Society’s Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors. | ||
650 | 0 |
_aComputational intelligence. _97716 |
|
650 | 0 |
_aArtificial intelligence. _93407 |
|
650 | 0 |
_aSecurity systems. _931879 |
|
650 | 1 | 4 |
_aComputational Intelligence. _97716 |
650 | 2 | 4 |
_aArtificial Intelligence. _93407 |
650 | 2 | 4 |
_aSecurity Science and Technology. _931884 |
700 | 1 |
_aAbielmona, Rami. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _957752 |
|
700 | 1 |
_aFalcon, Rafael. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _957753 |
|
700 | 1 |
_aZincir-Heywood, Nur. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _957754 |
|
700 | 1 |
_aAbbass, Hussein A. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _94750 |
|
710 | 2 |
_aSpringerLink (Online service) _957755 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319264486 |
776 | 0 | 8 |
_iPrinted edition: _z9783319264493 |
776 | 0 | 8 |
_iPrinted edition: _z9783319799568 |
830 | 0 |
_aStudies in Computational Intelligence, _x1860-9503 ; _v621 _957756 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-26450-9 |
912 | _aZDB-2-ENG | ||
912 | _aZDB-2-SXE | ||
942 | _cEBK | ||
999 |
_c80009 _d80009 |