Listing 1 - 10 of 26 | << page >> |
Sort by
|
Choose an application
Mathematics --- Fuzzy algorithms --- Mathematical optimization
Choose an application
Cluster analysis. --- Fuzzy algorithms. --- Pattern perception.
Choose an application
Fuzzy algorithms. --- Image processing --- Digital techniques.
Choose an application
"The use of metaheuristic algorithms (MA) has been increasing in recent years, and the image processing field is not the exempted of their application. In the last two years a big amount of MA have been introduced as alternatives for solving complex optimization problems. This book collects the most prominent MA of the 2019 and 2020 and verifies its use in image processing tasks. In addition, literature review of both MA and digital image processing is presented as part of the introductory information. Each algorithm is detailed explained with special focus in the tuning parameters and the proper implementation for the image processing tasks. Besides several examples permits to the reader explore and confirm the use of this kind of intelligent methods. Since image processing is widely used in different domains, this book considers different kinds of datasets that includes, magnetic resonance images, thermal images, agriculture images, among others. The reader then can have some ideas of implementation that complement the theory exposed of each optimization mechanism. Regarding the image processing problems this book consider the segmentation by using different metrics based on entropies or variances. In the same way, the identification of different shapes and the detection of objects are also covered in the corresponding chapters. Each chapter is complemented with a wide range of experiments and statistical analysis that permits the reader to judge about the performance of the MA. Finally, there is included a section that includes some discussion and conclusions. This section also provides some open questions and research opportunities for the audience"--
Fuzzy algorithms. --- Metaheuristics. --- Image processing --- Digital techniques.
Choose an application
Fuzzy algorithms. --- Fuzzy logic. --- Fuzzy systems. --- Mathematical optimization. --- Fuzzy logic --- Mathematical optimization --- Fuzzy algorithms --- Fuzzy systems
Choose an application
Fuzzy algorithms. --- Image processing --- Pattern recognition systems. --- Digital techniques.
Choose an application
"Wireless Sensor Networks have a wide range of applications in different areas. Their main constraint is the limited and irreplaceable power source of the sensor nodes. In many applications, energy conservation of the sensor nodes and their replacement or replenishment due to the hostile nature of the environment is the most challenging issue. Energy efficient clustering and routing are the two main important topics studied extensively for this purpose. This book focuses on the energy efficient clustering and routing with a great emphasis on the evolutionary approaches. It provides a comprehensive and systematic introduction of the fundamentals of WSNs, major issues and effective solutions."--Provided by publisher.
Routing (Computer network management) --- Wireless sensor networks. --- Fuzzy algorithms. --- Mathematics.
Choose an application
Find security flaws in any architecture effectively through emulation and fuzzing with QEMU and AFL Purchase of the print or Kindle book includes a free PDF eBook Key Features Understand the vulnerability landscape and useful tools such as QEMU and AFL Explore use cases to find vulnerabilities and execute unknown firmware Create your own firmware emulation and fuzzing environment to discover vulnerabilities Book Description Emulation and fuzzing are among the many techniques that can be used to improve cybersecurity; however, utilizing these efficiently can be tricky. Fuzzing Against the Machine is your hands-on guide to understanding how these powerful tools and techniques work. Using a variety of real-world use cases and practical examples, this book helps you grasp the fundamental concepts of fuzzing and emulation along with advanced vulnerability research, providing you with the tools and skills needed to find security flaws in your software. The book begins by introducing you to two open source fuzzer engines: QEMU, which allows you to run software for whatever architecture you can think of, and American fuzzy lop (AFL) and its improved version AFL++. You'll learn to combine these powerful tools to create your own emulation and fuzzing environment and then use it to discover vulnerabilities in various systems, such as iOS, Android, and Samsung's Mobile Baseband software, Shannon. After reading the introductions and setting up your environment, you'll be able to dive into whichever chapter you want, although the topics gradually become more advanced as the book progresses. By the end of this book, you'll have gained the skills, knowledge, and practice required to find flaws in any firmware by emulating and fuzzing it with QEMU and several fuzzing engines. What you will learn Understand the difference between emulation and virtualization Discover the importance of emulation and fuzzing in cybersecurity Get to grips with fuzzing an entire operating system Discover how to inject a fuzzer into proprietary firmware Know the difference between static and dynamic fuzzing Look into combining QEMU with AFL and AFL++ Explore Fuzz peripherals such as modems Find out how to identify vulnerabilities in OpenWrt Who this book is for This book is for security researchers, security professionals, embedded firmware engineers, and embedded software professionals. Learners interested in emulation, as well as software engineers interested in vulnerability research and exploitation, software testing, and embedded software development will also find it useful. The book assumes basic knowledge of programming (C and Python); operating systems (Linux and macOS); and the use of Linux shell, compilation, and debugging.
Internet of things --- Fuzzy algorithms. --- Security measures --- Research --- Methodology.
Choose an application
Fuzzy Models and Algorithms for Pattern Recognition and Image Processing presents a comprehensive introduction of the use of fuzzy models in pattern recognition and selected topics in image processing and computer vision. Unique to this volume in the Kluwer Handbooks of Fuzzy Sets Series is the fact that this book was written in its entirety by its four authors. A single notation, presentation style, and purpose are used throughout. The result is an extensive unified treatment of many fuzzy models for pattern recognition. The main topics are clustering and classifier design, with extensive material on feature analysis relational clustering, image processing and computer vision. Also included are numerous figures, images and numerical examples that illustrate the use of various models involving applications in medicine, character and word recognition, remote sensing, military image analysis, and industrial engineering.
Cluster analysis. --- Computer vision. --- Fuzzy algorithms. --- Image processing. --- Optical pattern recognition.
Choose an application
Intelligent control systems. --- Fuzzy algorithms. --- Artificial intelligence. --- Commande intelligente --- Intelligence artificielle
Listing 1 - 10 of 26 | << page >> |
Sort by
|