You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
Deep learning algorithms have brought a revolution to the computer vision community by introducing non-traditional and efficient solutions to several image-related problems that had long remained unsolved or partially addressed. This book presents a collection of eleven chapters where each individual chapter explains the deep learning principles of a specific topic, introduces reviews of up-to-date techniques, and presents research findings to the computer vision community. The book covers a broad scope of topics in deep learning concepts and applications such as accelerating the convolutional neural network inference on field-programmable gate arrays, fire detection in surveillance applicat...
SECURITY AND PRIVACY IN THE INTERNET OF THINGS Provides the authoritative and up-to-date information required for securing IoT architecture and applications The vast amount of data generated by the Internet of Things (IoT) has made information and cyber security vital for not only personal privacy, but also for the sustainability of the IoT itself. Security and Privacy in the Internet of Things brings together high-quality research on IoT security models, architectures, techniques, and application domains. This concise yet comprehensive volume explores state-of-the-art mitigations in IoT security while addressing important security and privacy challenges across different IoT layers. The book...
The book has two parts and contains fifteen chapters. First part discussed the theories and foundations of information security. Second part covers the technologies and application of security.
This Three-Volume-Set constitutes the refereed proceedings of the Second International Conference on Software Engineering and Computer Systems, ICSECS 2011, held in Kuantan, Malaysia, in June 2011. The 190 revised full papers presented together with invited papers in the three volumes were carefully reviewed and selected from numerous submissions. The papers are organized in topical sections on software engineering; network; bioinformatics and e-health; biometrics technologies; Web engineering; neural network; parallel and distributed; e-learning; ontology; image processing; information and data management; engineering; software security; graphics and multimedia; databases; algorithms; signal processing; software design/testing; e- technology; ad hoc networks; social networks; software process modeling; miscellaneous topics in software engineering and computer systems.
This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, Sec Net 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on networking security; data and information security; authentication and privacy; security applications.
This book provides readers with a selection of high-quality chapters that cover both theoretical concepts and practical applications of image feature detectors and descriptors. It serves as reference for researchers and practitioners by featuring survey chapters and research contributions on image feature detectors and descriptors. Additionally, it emphasizes several keywords in both theoretical and practical aspects of image feature extraction. The keywords include acceleration of feature detection and extraction, hardware implantations, image segmentation, evolutionary algorithm, ordinal measures, as well as visual speech recognition.
This book is a relevant reference for any readers interested in the security aspects of Cyber-Physical Systems and particularly useful for those looking to keep informed on the latest advances in this dynamic area. Cyber-Physical Systems (CPSs) are characterized by the intrinsic combination of software and physical components. Inherent elements often include wired or wireless data communication, sensor devices, real-time operation and automated control of physical elements. Typical examples of associated application areas include industrial control systems, smart grids, autonomous vehicles and avionics, medial monitoring and robotics. The incarnation of the CPSs can therefore range from cons...
This book constitutes the thoroughly refereed post-conference proceedings of the First International Joint Conference on Advances in Signal Processing and Information Technology (SPIT 2011) and Recent Trends in Information Processing and Computing (IPC 2011) held in Amsterdam, The Netherlands, in December 2011. The 50 revised full papers presented were carefully selected from 298 submissions. Conference papers promote research and development activities in computer science, information technology, computational engineering, image and signal processing, and communication.
These volumes constitute the Proceedings of the 6th International Workshop on Soft Computing Applications, or SOFA 2014, held on 24-26 July 2014 in Timisoara, Romania. This edition was organized by the University of Belgrade, Serbia in conjunction with Romanian Society of Control Engineering and Technical Informatics (SRAIT) - Arad Section, The General Association of Engineers in Romania - Arad Section, Institute of Computer Science, Iasi Branch of the Romanian Academy and IEEE Romanian Section. The Soft Computing concept was introduced by Lotfi Zadeh in 1991 and serves to highlight the emergence of computing methodologies in which the accent is on exploiting the tolerance for imprecision an...
This book constitutes the refereed proceedings of the 6th International Workshop on Artificial Intelligence and Pattern Recognition, IWAIPR 2018, held in Havana, Cuba, in September 2018. The 42 full papers presented were carefully reviewed and selected from 101 submissions. The papers promote and disseminate ongoing research on mathematical methods and computing techniques for artificial intelligence and pattern recognition, in particular in bioinformatics, cognitive and humanoid vision, computer vision, image analysis and intelligent data analysis, as well as their application in a number of diverse areas such as industry, health, robotics, data mining, opinion mining and sentiment analysis, telecommunications, document analysis, and natural language processing and recognition.