skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Recent advances in computational intelligence in defense and security Preview this item
ClosePreview this item
Checking...

Recent advances in computational intelligence in defense and security

Author: Rami Abielmona; Rafael Falcón; Nur Zincir-Heywood; Hussein A Abbass
Publisher: Cham : Springer, 2016
Series: Studies in computational intelligence, 621.
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
"This volume is an initiative undertaken by the IEEE Computational Intelligence Society?s Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Llibres electrònics
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Rami Abielmona; Rafael Falcón; Nur Zincir-Heywood; Hussein A Abbass
ISBN: 9783319264509 3319264508 3319264486 9783319264486
OCLC Number: 1151080974
Notes: Descripció del recurs: el 21 de març de 2017.
Description: 1 recurs en línia (1 recurs en línia (xi, 752 pàgines) :) il·lustracions (algunes color).
Contents: Part I Physical Security and Surveillance --
Part II: Cyber Security and Intrusion Detection Systems --
Part III: Biometric Security and Authentication Systems --
Part IV: Situational Awareness and Threat Assessment --
Part V: Strategic/Mission Planning and Resource Management
Series Title: Studies in computational intelligence, 621.
Responsibility: Rami Abielmona, Rafael Falcon, Nur Zincir-Heywood, Hussein A. Abbass, editors.

Abstract:

"This volume is an initiative undertaken by the IEEE Computational Intelligence Society?s Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors" -- OhioLink Library Catalog.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.

Similar Items

Related Subjects:(1)

Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/1151080974<\/a>> # Recent advances in computational intelligence in defense and security<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Book<\/a>, schema:MediaObject<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"1151080974<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/sz<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2893749210#Topic\/intel_ligencia_computacional<\/a>> ; # Intel\u00B7lig\u00E8ncia computacional<\/span>\n\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> schema:EBook<\/a> ;\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2016<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"Part I Physical Security and Surveillance -- Part II: Cyber Security and Intrusion Detection Systems -- Part III: Biometric Security and Authentication Systems -- Part IV: Situational Awareness and Threat Assessment -- Part V: Strategic\/Mission Planning and Resource Management<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"\"This volume is an initiative undertaken by the IEEE Computational Intelligence Society?s Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors\" -- OhioLink Library Catalog.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:editor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2893749210#Person\/abielmona_rami<\/a>> ; # Rami Abielmona<\/span>\n\u00A0\u00A0\u00A0\nschema:editor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2893749210#Person\/zincir_heywood_nur<\/a>> ; # Nur Zincir-Heywood<\/span>\n\u00A0\u00A0\u00A0\nschema:editor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2893749210#Person\/falcon_rafael<\/a>> ; # Rafael Falc\u00F3n<\/span>\n\u00A0\u00A0\u00A0\nschema:editor<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2893749210#Person\/abbass_hussein_a<\/a>> ; # Hussein A. Abbass<\/span>\n\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/2893749210<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"Llibres electr\u00F2nics<\/span>\" ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isPartOf<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2893749210#Series\/studies_in_computational_intelligence<\/a>> ; # Studies in computational intelligence ;<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Recent advances in computational intelligence in defense and security<\/span>\" ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"1151080974<\/span>\" ;\u00A0\u00A0\u00A0\nschema:url<\/a> <http:\/\/sfx.urv.cat\/urv?url_ver=Z39.88-2004&url_ctx_fmt=info:ofi\/fmt:kev:mtx:ctx&ctx_enc=info:ofi\/enc:UTF-8&ctx_ver=Z39.88-2004&rfr_id=info:sid\/sfxit.com:azbook&sfx.ignore_date_threshold=1&rft.object_id=3780000000094079<\/a>> ;\u00A0\u00A0\u00A0\nschema:url<\/a> <https:\/\/dx.doi.org\/10.1007\/978-3-319-26450-9<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9783319264509<\/a>> ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9783319264486<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/1151080974<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2893749210#Person\/abbass_hussein_a<\/a>> # Hussein A. Abbass<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Abbass<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Hussein A.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Hussein A. Abbass<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2893749210#Person\/abielmona_rami<\/a>> # Rami Abielmona<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Abielmona<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Rami<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Rami Abielmona<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2893749210#Person\/falcon_rafael<\/a>> # Rafael Falc\u00F3n<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Falc\u00F3n<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Rafael<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Rafael Falc\u00F3n<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2893749210#Person\/zincir_heywood_nur<\/a>> # Nur Zincir-Heywood<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Zincir-Heywood<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Nur<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Nur Zincir-Heywood<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2893749210#Series\/studies_in_computational_intelligence<\/a>> # Studies in computational intelligence ;<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nbgn:PublicationSeries<\/a> ;\u00A0\u00A0\u00A0\nschema:hasPart<\/a> <http:\/\/www.worldcat.org\/oclc\/1151080974<\/a>> ; # Recent advances in computational intelligence in defense and security<\/span>\n\u00A0\u00A0\u00A0\nschema:name<\/a> \"Studies in computational intelligence ;<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Studies in computational intelligence<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2893749210#Topic\/intel_ligencia_computacional<\/a>> # Intel\u00B7lig\u00E8ncia computacional<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Intel\u00B7lig\u00E8ncia computacional<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/sz<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"sz<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/sfx.urv.cat\/urv?url_ver=Z39.88-2004&url_ctx_fmt=info:ofi\/fmt:kev:mtx:ctx&ctx_enc=info:ofi\/enc:UTF-8&ctx_ver=Z39.88-2004&rfr_id=info:sid\/sfxit.com:azbook&sfx.ignore_date_threshold=1&rft.object_id=3780000000094079<\/a>>\u00A0\u00A0\u00A0\nrdfs:comment<\/a> \"Acc\u00E9s restringit als usuaris de la URV<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9783319264486<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"3319264486<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9783319264486<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9783319264509<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"3319264508<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9783319264509<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/www.worldcat.org\/title\/-\/oclc\/1151080974<\/a>>\u00A0\u00A0\u00A0\u00A0a \ngenont:InformationResource<\/a>, genont:ContentTypeGenericResource<\/a> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/www.worldcat.org\/oclc\/1151080974<\/a>> ; # Recent advances in computational intelligence in defense and security<\/span>\n\u00A0\u00A0\u00A0\nschema:dateModified<\/a> \"2020-05-08<\/span>\" ;\u00A0\u00A0\u00A0\nvoid:inDataset<\/a> <http:\/\/purl.oclc.org\/dataset\/WorldCat<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n