Muutke küpsiste eelistusi

E-raamat: Advances in Intelligent Systems and Applications - Volume 2: Proceedings of the International Computer Symposium ICS 2012 Held at Hualien, Taiwan, December 12-14, 2012

Edited by , Edited by , Edited by
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 308,13 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

 

The field of Intelligent Systems and Applications has expanded enormously during the last two decades. Theoretical and practical results in this area are growing rapidly due to many successful applications and new theories derived from many diverse problems. This book is dedicated to the Intelligent Systems and Applications in many different aspects. In particular, this book is to provide highlights of the current research in Intelligent Systems and Applications. It consists of research papers in the following specific topics:

 

l   Authentication, Identification, and Signature

l   Intrusion Detection

l   Steganography, Data Hiding, and Watermarking

l   Database, System, and Communication Security

l   Computer Vision, Object Tracking, and Pattern Recognition

l   Image Processing, Medical Image Processing, and Video Coding

l  Digital Content, Digital Life, and Human Computer Interaction

l   Parallel, Peer-to-peer, Distributed, and Cloud Computing

l   Software Engineering and Programming Language

 

This book provides a reference to theoretical problems as well as practical solutions and applications for the state-of-the-art results in Intelligent Systems and Applications on the aforementioned topics. In particular, both the academic community (graduate students, post-doctors and faculties) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staffs and managers, security managers) will find this book interesting.

 
Authentication, Identi cation, and Signature.- Intrusion Detection.- Steganography, Data Hiding, and Watermarking.- Database, System, and Communication Security.- Computer Vision, Object Tracking, and Pattern Recognition.- Image Processing, Medical Image Processing, and Video Coding.- Digital Content, Digital Life, and Human Computer Interaction.- Parallel, Peer-to-Peer, Distributed, and Cloud Computing.- Software Engineering and Programming Language.- Computer Architecture, Embedded Systems, SoC, and VLSI/EDA.