Item added to cart
This volume is an initiative undertaken by the IEEE Computational Intelligence Societys Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors.
Part I Physical Security and Surveillance.- Part II: Cyber Security and Intrusion Detection Systems.- Part III: Biometric Security and Authentication Systems.- Part IV: Situational Awareness and Threat Assessment.- Part V: Strategic/Mission Planning and Resource Management.I found the chapters to be readable, at sufficient depth, and generally well referenced. & I recommend the book to readers in the security and defense field, as well as CI practitioners interested in these critical application areas. (Creed Jones, Computing Reviews, computingreviews.com, July, 2016)
This volume is an initiative undertaken by the IEEE Computational Intelligence Societys Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical l³.
Copyright © 2018 - 2024 ShopSpell