Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Information Security
  • Language: en
  • Pages: 404

Information Security

  • Type: Book
  • -
  • Published: 2018
  • -
  • Publisher: Unknown

The book has two parts and contains fifteen chapters. First part discussed the theories and foundations of information security. Second part covers the technologies and application of security.

Security and Privacy in the Internet of Things
  • Language: en
  • Pages: 340

Security and Privacy in the Internet of Things

SECURITY AND PRIVACY IN THE INTERNET OF THINGS Provides the authoritative and up-to-date information required for securing IoT architecture and applications The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers. The book...

Software Engineering and Computer Systems, Part I
  • Language: en
  • Pages: 789

Software Engineering and Computer Systems, Part I

This Three-Volume-Set constitutes the refereed proceedings of the Second International Conference on Software Engineering and Computer Systems, ICSECS 2011, held in Kuantan, Malaysia, in June 2011. The 190 revised full papers presented together with invited papers in the three volumes were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on software engineering; network; bioinformatics and e-health; biometrics technologies; Web engineering; neural network; parallel and distributed; e-learning; ontology; image processing; information and data management; engineering; software security; graphics and multimedia; databases; algorithms; signal processing; software design/testing; e- technology; ad hoc networks; social networks; software process modeling; miscellaneous topics in software engineering and computer systems.

Deep Learning in Computer Vision
  • Language: en
  • Pages: 275

Deep Learning in Computer Vision

  • Type: Book
  • -
  • Published: 2020-03-23
  • -
  • Publisher: CRC Press

Deep learning algorithms have brought a revolution to the computer vision community by introducing non-traditional and efficient solutions to several image-related problems that had long remained unsolved or partially addressed. This book presents a collection of eleven chapters where each individual chapter explains the deep learning principles of a specific topic, introduces reviews of up-to-date techniques, and presents research findings to the computer vision community. The book covers a broad scope of topics in deep learning concepts and applications such as accelerating the convolutional neural network inference on field-programmable gate arrays, fire detection in surveillance applicat...

Advances in Security of Information and Communication Networks
  • Language: en
  • Pages: 260

Advances in Security of Information and Communication Networks

  • Type: Book
  • -
  • Published: 2013-08-15
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, Sec Net 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on networking security; data and information security; authentication and privacy; security applications.

Image Feature Detectors and Descriptors
  • Language: en
  • Pages: 437

Image Feature Detectors and Descriptors

  • Type: Book
  • -
  • Published: 2016-02-22
  • -
  • Publisher: Springer

This book provides readers with a selection of high-quality chapters that cover both theoretical concepts and practical applications of image feature detectors and descriptors. It serves as reference for researchers and practitioners by featuring survey chapters and research contributions on image feature detectors and descriptors. Additionally, it emphasizes several keywords in both theoretical and practical aspects of image feature extraction. The keywords include acceleration of feature detection and extraction, hardware implantations, image segmentation, evolutionary algorithm, ordinal measures, as well as visual speech recognition.

Security in Cyber-Physical Systems
  • Language: en
  • Pages: 323

Security in Cyber-Physical Systems

This book is a relevant reference for any readers interested in the security aspects of Cyber-Physical Systems and particularly useful for those looking to keep informed on the latest advances in this dynamic area. Cyber-Physical Systems (CPSs) are characterized by the intrinsic combination of software and physical components. Inherent elements often include wired or wireless data communication, sensor devices, real-time operation and automated control of physical elements. Typical examples of associated application areas include industrial control systems, smart grids, autonomous vehicles and avionics, medial monitoring and robotics. The incarnation of the CPSs can therefore range from cons...

Signal Processing and Information Technology
  • Language: en
  • Pages: 301

Signal Processing and Information Technology

  • Type: Book
  • -
  • Published: 2012-07-25
  • -
  • Publisher: Springer

This book constitutes the thoroughly refereed post-conference proceedings of the First International Joint Conference on Advances in Signal Processing and Information Technology (SPIT 2011) and Recent Trends in Information Processing and Computing (IPC 2011) held in Amsterdam, The Netherlands, in December 2011. The 50 revised full papers presented were carefully selected from 298 submissions. Conference papers promote research and development activities in computer science, information technology, computational engineering, image and signal processing, and communication.

Progress in Artificial Intelligence and Pattern Recognition
  • Language: en
  • Pages: 391

Progress in Artificial Intelligence and Pattern Recognition

  • Type: Book
  • -
  • Published: 2018-09-21
  • -
  • Publisher: Springer

This book constitutes the refereed proceedings of the 6th International Workshop on Artificial Intelligence and Pattern Recognition, IWAIPR 2018, held in Havana, Cuba, in September 2018. The 42 full papers presented were carefully reviewed and selected from 101 submissions. The papers promote and disseminate ongoing research on mathematical methods and computing techniques for artificial intelligence and pattern recognition, in particular in bioinformatics, cognitive and humanoid vision, computer vision, image analysis and intelligent data analysis, as well as their application in a number of diverse areas such as industry, health, robotics, data mining, opinion mining and sentiment analysis, telecommunications, document analysis, and natural language processing and recognition.

Implementing Computational Intelligence Techniques for Security Systems Design
  • Language: en
  • Pages: 332

Implementing Computational Intelligence Techniques for Security Systems Design

  • Type: Book
  • -
  • Published: 2020-02-14
  • -
  • Publisher: IGI Global

Recently, cryptology problems, such as designing good cryptographic systems and analyzing them, have been challenging researchers. Many algorithms that take advantage of approaches based on computational intelligence techniques, such as genetic algorithms, genetic programming, and so on, have been proposed to solve these issues. Implementing Computational Intelligence Techniques for Security Systems Design is an essential research book that explores the application of computational intelligence and other advanced techniques in information security, which will contribute to a better understanding of the factors that influence successful security systems design. Featuring a range of topics such as encryption, self-healing systems, and cyber fraud, this book is ideal for security analysts, IT specialists, computer engineers, software developers, technologists, academicians, researchers, practitioners, and students.