Hasil Pencarian  ::  Simpan CSV :: Kembali

Hasil Pencarian

Ditemukan 19170 dokumen yang sesuai dengan query
cover
Yan, Wei Qi
"This concise textbook/reference examines the fundamental aspects of intelligent computing for surveillance systems, from camera calibration and data capturing, to secure data transmission. The text covers digital surveillance from the level of an individual object or biometric feature, to the full lifecycle of an event. This is followed by a detailed discussion on how an intelligent system can independently monitor and learn from an event, and invite human input when necessary. The book concludes with a presentation on how the computation speed of the system can be enhanced through the use of supercomputing technology."
Switzerland: Springer International Publishing, 2016
e20528405
eBooks  Universitas Indonesia Library
cover
Yung C. Shin
Boca Raton: CRC Press, Taylor & Francis Group, 2009
006.3 YUN i
Buku Teks SO  Universitas Indonesia Library
cover
Lin, Chin-Teng
New Jersey:: Prentice-Hall, 1996
629.89 LIN n
Buku Teks SO  Universitas Indonesia Library
cover
Zhang, Yingli
"The book introduces the current scientific and technical advances in the fields of artificial intelligence, machine learning, pattern recognition, data mining, information retrieval, knowledge-based systems, knowledge representation and reasoning, multi-agent systems, natural-language processing, etc. Furthermore, new computing methodologies are presented, including cloud computing, service computing and pervasive computing with traditional intelligent methods. "
Berlin: Springer, 2011
e20398301
eBooks  Universitas Indonesia Library
cover
Velastin, Sergio A. author
"Conventional video surveillance, where people sit in front of banks of TV monitors may soon become obsolete as key enabling technologies develop. This book details recent developments in machine vision algorithms capable of handling complex visual data acquired by camera systems. It also explores advances in distributed computing and distributed intelligence systems, capable of handling numerous devices and adapting to the evolution of the complex communication networks, thereby inferring a better interpretation of the dynamics of people and objects."
London: Institution of Engineering and Technology, 2008
e20452602
eBooks  Universitas Indonesia Library
cover
Black, W.J.
England: Van Nostrand Reinhold, 1986
006.3 BLA i
Buku Teks SO  Universitas Indonesia Library
cover
"A large international conference on Advances in Intelligent Control and Innovative Computing was held in Hong Kong, March March 16-18, 2011, under the auspices of the International MultiConference of Engineers and Computer Scientists (IMECS 2010). The IMECS is organized by the International Association of Engineers (IAENG). Intelligent Control and Computer Engineering contains 25 revised and extended research articles written by prominent researchers participating in the conference. Topics covered include artificial intelligence, control engineering, decision supporting systems, automated planning, automation systems, systems identification, modelling and simulation, communication systems, signal processing, and industrial applications. "
New York: Springer, 2012
e20418335
eBooks  Universitas Indonesia Library
cover
Jiang, Liangzhong
"The volume includes a set of selected papers extended and revised from the International conference on informatics, cybernetics, and computer engineering.
Intelligent control is a class of control techniques, that use various aI computing approaches like neural networks, bayesian probability, fuzzy logic, machine learning, evolutionary computation and genetic algorithms.
ICCE 2011 Volume 1 is to provide a forum for researchers, educators, engineers, and government officials involved in the general areas of Intelligent Control and Network Communication to disseminate their latest research results and exchange views on the future research directions of these fields. 90 high-quality papers are included in the volume. "
Berlin: Springer, 2011
e20399458
eBooks  Universitas Indonesia Library
cover
"The book consists of three parts. The first part is devoted to the foundational aspects of computational intelligence. It consists of 8 chapters that include studies in genetic algorithms, fuzzy logic connectives, enhanced intelligence in product models, nature-inspired optimization technologies, particle swarm optimization, evolution algorithms, model complexity of neural networks, and fitness landscape analysis. The second part contains contributions to intelligent computation in networks, presented in 5 chapters. The covered subjects include the application of self-organizing maps for early detection of denial of service attacks, combating security threats via immunity and adaptability in cognitive radio networks, novel modifications in WSN network design for improved SNR and reliability, a conceptual framework for the design of audio based cognitive infocommunication channels, and a case study on the advantages of fuzzy and anytime signal- and image processing techniques. Computational intelligence represents a widely spread interdisciplinary research area with many applications in various disciplines including engineering, medicine, technology, environment, among others. Therefore, third part of this book consists of 6 chapters on applications. This is a very important part of the volume because the reader can find in it a wide range of fields where computational intelligence plays a significant role."
Berlin: Springer, 2012
e20418142
eBooks  Universitas Indonesia Library
cover
Rowe, Neil C
"This book is an introduction to both offensive and defensive techniques of cyberdeception. Unlike most books on cyberdeception, this book focuses on methods rather than detection. It treats cyberdeception techniques that are current, novel, and practical, and that go well beyond traditional honeypots.  It contains features friendly for classroom use: (1) minimal use of programming details and mathematicsm (2) modular chapters that can be covered in many orders, (3) exercises with each chapter, and (4) an extensive reference list. Cyberattacks have grown serious enough that understanding and using deception is essential to safe operation in cyberspace. The deception techniques covered are impersonation, delays, fakes, camouflage, false excuses, and social engineering. Special attention is devoted to cyberdeception in industrial control systems and within operating systems. This material is supported by a detailed discussion of how to plan deceptions and calculate their detectability and effectiveness. Some of the chapters provide further technical details of specific deception techniques and their application.  Cyberdeception can be conducted ethically and efficiently when necessary by following a few basic principles. This book is intended for advanced undergraduate students and graduate students, as well as computer professionals learning on their own. It will be especially useful for anyone who helps run important and essential computer systems such as critical-infrastructure and military systems.  "
Switzerland: Springer International Publishing, 2016
e20528403
eBooks  Universitas Indonesia Library
<<   1 2 3 4 5 6 7 8 9 10   >>