<p><p>This book comprehensively addresses computational intelligence, including the theories, methodologies and techniques underlying this evolving field, as well as its potential uses in various domains across the entire spectrum of the sciences (the natural sciences, health sciences, engineering,
Recent Advances in Computational Intelligence in Defense and Security
โ Scribed by Rami Abielmona, Rafael Falcon, Nur Zincir-Heywood, Hussein A. Abbass (eds.)
- Publisher
- Springer
- Year
- 2016
- Tongue
- English
- Leaves
- 743
- Series
- Studies in Computational Intelligence 621
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
This volume is an initiative undertaken by the IEEE Computational Intelligence Societyโs Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors.
โฆ Table of Contents
Front Matter....Pages i-xi
Recent Advances in Computational Intelligence in Defense and Security....Pages 1-9
Front Matter....Pages 11-11
Computational Intelligence Methods in Forward-Looking Explosive Hazard Detection....Pages 13-44
Classification-Driven Video Analytics for Critical Infrastructure Protection....Pages 45-69
Fuzzy Decision Fusion and Multiformalism Modelling in Physical Security Monitoring....Pages 71-100
Intelligent Radar Signal Recognition and Classification....Pages 101-135
Front Matter....Pages 137-137
An Improved Decision System for URL Accesses Based on a Rough Feature Selection Technique....Pages 139-167
A Granular Intrusion Detection System Using Rough Cognitive Networks....Pages 169-191
NNCS: Randomization and Informed Search for Novel Naval Cyber Strategies....Pages 193-223
Semi-Supervised Classification System for the Detection of Advanced Persistent Threats....Pages 225-248
A Benchmarking Study on Stream Network Traffic Analysis Using Active Learning....Pages 249-273
Front Matter....Pages 275-275
Visualization of Handwritten Signatures Based on Haptic Information....Pages 277-307
Extended Metacognitive Neuro-Fuzzy Inference System for Biometric Identification....Pages 309-338
Privacy, Security and Convenience: Biometric Encryption for Smartphone-Based Electronic Travel Documents....Pages 339-366
A Dual-Purpose Memory Approach for Dynamic Particle Swarm Optimization of Recurrent Problems....Pages 367-389
Risk Assessment in Authentication Machines....Pages 391-420
Front Matter....Pages 421-421
Game Theoretical Approach for Dynamic Active Patrolling in a Counter-Piracy Framework....Pages 423-444
mspMEA: The Microcones Separation Parallel Multiobjective Evolutionary Algorithm and Its Application to Fuzzy Rule-Based Ship Classification....Pages 445-465
Synthetic Aperture Radar (SAR) Automatic Target Recognition (ATR) Using Fuzzy Co-occurrence Matrix Texture Features....Pages 467-489
Text Mining in Social Media for Security Threats....Pages 491-517
DroidAnalyst: Synergic App Framework for Static and Dynamic App Analysis....Pages 519-552
Front Matter....Pages 553-553
Design and Development of Intelligent Military Training Systems and Wargames....Pages 555-603
Improving Load Signal and Fatigue Life Estimation for Helicopter Components Using Computational Intelligence Techniques....Pages 605-634
Evolving Narrations of Strategic Defence and Security Scenarios for Computational Scenario Planning....Pages 635-661
A Review of the Use of Computational Intelligence in the Design of Military Surveillance Networks....Pages 663-693
Sensor Resource Management: Intelligent Multi-objective Modularized Optimization Methodology and Models....Pages 695-726
Bio-Inspired Topology Control Mechanism for Unmanned Underwater Vehicles....Pages 727-752
โฆ Subjects
Computational Intelligence; Artificial Intelligence (incl. Robotics); Security Science and Technology
๐ SIMILAR VOLUMES
<p><p>This timely review volume summarizes the state-of-the-art developments in nature-inspired algorithms and applications with the emphasis on swarm intelligence and bio-inspired computation. Topics include the analysis and overview of swarm intelligence and evolutionary computation, hybrid metahe
<p><P>For the last decades Multimedia processing has emerged as an important technology to generate content based on images, video, audio, graphics, and text. Furthermore, the recent new development represented by High Definition Multimedia content and Interactive television will generate a huge vol
<p><span>This book contains extended version of selected works that have been discussed and presented in the fourth International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2017) held in Patna, India during March 17-19, 2017. The symposium was organized by the Departments o
<span>This book constitutes the proceedings of the 5th International Conference, ICC3 2021, held in Coimbatore, India, during December 16โ18, 2021. The 14 full papers included in this book were carefully reviewed and selected from 84 submissions. They were organized in topical sections as follows: c