Listing 1 - 10 of 20 | << page >> |
Sort by
|
Choose an application
This book is a relevant reference for any readers interested in the security aspects of Cyber-Physical Systems and particularly useful for those looking to keep informed on the latest advances in this dynamic area. Cyber-Physical Systems (CPSs) are characterized by the intrinsic combination of software and physical components. Inherent elements often include wired or wireless data communication, sensor devices, real-time operation and automated control of physical elements. Typical examples of associated application areas include industrial control systems, smart grids, autonomous vehicles and avionics, medial monitoring and robotics. The incarnation of the CPSs can therefore range from considering individual Internet-of-Things devices through to large-scale infrastructures. Presented across ten chapters authored by international researchers in the field from both academia and industry, this book offers a series of high-quality contributions that collectively address and analyze the state of the art in the security of Cyber-Physical Systems and related technologies. The chapters themselves include an effective mix of theory and applied content, supporting an understanding of the underlying security issues in the CPSs domain, alongside related coverage of the technological advances and solutions proposed to address them. The chapters comprising the later portion of the book are specifically focused upon a series of case examples, evidencing how the protection concepts can translate into practical application. .
Computer engineering. --- Internet of things. --- Embedded computer systems. --- Computational intelligence. --- Cyber-physical systems, IoT. --- Computational Intelligence. --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Embedded systems (Computer systems) --- Computer systems --- Architecture Analysis and Design Language --- IoT (Computer networks) --- Things, Internet of --- Computer networks --- Embedded Internet devices --- Machine-to-machine communications --- Computers --- Design and construction --- Cooperating objects (Computer systems).
Choose an application
Choose an application
This book provides readers with a selection of high-quality chapters that cover both theoretical concepts and practical applications of image feature detectors and descriptors. It serves as reference for researchers and practitioners by featuring survey chapters and research contributions on image feature detectors and descriptors. Additionally, it emphasizes several keywords in both theoretical and practical aspects of image feature extraction. The keywords include acceleration of feature detection and extraction, hardware implantations, image segmentation, evolutionary algorithm, ordinal measures, as well as visual speech recognition. .
Computer Science --- Engineering & Applied Sciences --- Engineering. --- Computer graphics. --- Computational intelligence. --- Computational Intelligence. --- Computer Imaging, Vision, Pattern Recognition and Graphics. --- Signal, Image and Speech Processing. --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Automatic drafting --- Graphic data processing --- Graphics, Computer --- Computer art --- Graphic arts --- Electronic data processing --- Engineering graphics --- Image processing --- Construction --- Industrial arts --- Technology --- Digital techniques --- Computer vision. --- Machine vision --- Vision, Computer --- Pattern recognition systems --- Image processing. --- Optical data processing. --- Optical computing --- Visual data processing --- Bionics --- Integrated optics --- Photonics --- Computers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Optical equipment --- Signal processing. --- Speech processing systems. --- Computational linguistics --- Electronic systems --- Information theory --- Modulation theory --- Oral communication --- Speech --- Telecommunication --- Singing voice synthesizers --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication)
Choose an application
Computer security. --- Security systems. --- Data protection. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Security measures --- Burglary protection --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection
Choose an application
This book provides readers with a selection of high-quality chapters that cover both theoretical concepts and practical applications of image feature detectors and descriptors. It serves as reference for researchers and practitioners by featuring survey chapters and research contributions on image feature detectors and descriptors. Additionally, it emphasizes several keywords in both theoretical and practical aspects of image feature extraction. The keywords include acceleration of feature detection and extraction, hardware implantations, image segmentation, evolutionary algorithm, ordinal measures, as well as visual speech recognition. .
Applied physical engineering --- Artificial intelligence. Robotics. Simulation. Graphics --- Computer. Automation --- neuronale netwerken --- beeldverwerking --- fuzzy logic --- cybernetica --- spraaktechnologie --- grafische vormgeving --- KI (kunstmatige intelligentie) --- ingenieurswetenschappen --- signaalverwerking
Choose an application
"Deep learning algorithms have brought a revolution to the computer vision community by introducing non-traditional and efficient solutions to several image-related problems that had long remained unsolved or partially addressed. This book presents a collection of eleven chapters where each individual chapter explains the deep learning principles of a specific topic, introduces reviews of up-to-date techniques, and presents research findings to the computer vision community. The book covers a broad scope of topics in deep learning concepts and applications such as accelerating the convolutional neural network inference on field-programmable gate arrays, fire detection in surveillance applications, face recognition, action and activity recognition, semantic segmentation for autonomous driving, aerial imagery registration, robot vision, tumor detection, and skin lesion segmentation as well as skin melanoma classification. The content of this book has been organized such that each chapter can be read independently from the others. The book is a valuable companion for researchers, postgraduate and possibly senior undergraduate students who are taking an advanced course in related topics, and for those who are interested in deep learning with applications in computer vision, image processing, and pattern recognition"--
Choose an application
Choose an application
"The Internet of Things (IoT) is an emerging paradigm due to extensive developments in information and communication technology (ICT). The purpose of IoT is to expand the functions of the first version of the Internet by increasing the ability to connect numerous objects. The wide facilities offered by IoT and other sensing facilities, have led to a huge amount of data generated from versatile domains, thus, information security has become inevitable requirement not only for personal safety, but also for assuring the sustainability of the IoT paradigm itself"--
Choose an application
Choose an application
This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, Sec Net 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on networking security; data and information security; authentication and privacy; security applications. .
Engineering & Applied Sciences --- Computer Science --- Computer science. --- Computer communication systems. --- Computer security. --- Data mining. --- Computer Science. --- Systems and Data Security. --- Computer Communication Networks. --- Data Mining and Knowledge Discovery. --- Computer security --- Computer networks --- Security measures --- Algorithmic knowledge discovery --- Factual data analysis --- KDD (Information retrieval) --- Knowledge discovery in data --- Knowledge discovery in databases --- Mining, Data --- Database searching --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Distributed processing
Listing 1 - 10 of 20 | << page >> |
Sort by
|