Advances in Intelligent Systems and Applications - Volume 2 e-bog
2921,57 DKK
(inkl. moms 3651,96 DKK)
The field of Intelligent Systems and Applications has expanded enormously during the last two decades. Theoretical and practical results in this area are growing rapidly due to many successful applications and new theories derived from many diverse problems. This book is dedicated to the Intelligent Systems and Applications in many different aspects. In particular, this book is to provide high...
E-bog
2921,57 DKK
Forlag
Springer
Udgivet
15 december 2012
Genrer
Artificial intelligence
Sprog
English
Format
pdf
Beskyttelse
LCP
ISBN
9783642354731
The field of Intelligent Systems and Applications has expanded enormously during the last two decades. Theoretical and practical results in this area are growing rapidly due to many successful applications and new theories derived from many diverse problems. This book is dedicated to the Intelligent Systems and Applications in many different aspects. In particular, this book is to provide highlights of the current research in Intelligent Systems and Applications. It consists of research papers in the following specific topics: l Authentication, Identification, and Signaturel Intrusion Detectionl Steganography, Data Hiding, and Watermarkingl Database, System, and Communication Securityl Computer Vision, Object Tracking, and Pattern Recognitionl Image Processing, Medical Image Processing, and Video Codingl Digital Content, Digital Life, and Human Computer Interactionl Parallel, Peer-to-peer, Distributed, and Cloud Computingl Software Engineering and Programming Language This book provides a reference to theoretical problems as well as practical solutions and applications for the state-of-the-art results in Intelligent Systems and Applications on the aforementioned topics. In particular, both the academic community (graduate students, post-doctors and faculties) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staffs and managers, security managers) will find this book interesting.