Research Developments in Computer Vision and Image Processing

Research Developments in Computer Vision and Image Processing

Author: Rajeev Srivastava

Publisher:

Published: 2014

Total Pages: 0

ISBN-13: 9781466645585

DOWNLOAD EBOOK

"This book brings together various research methodologies and trends in emerging areas of application of computer vision and image processing for those interested in the research developments of this rapidly growing field"--


Human-Computer Interaction: Concepts, Methodologies, Tools, and Applications

Human-Computer Interaction: Concepts, Methodologies, Tools, and Applications

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2015-10-02

Total Pages: 2249

ISBN-13: 1466687908

DOWNLOAD EBOOK

As modern technologies continue to develop and evolve, the ability of users to interface with new systems becomes a paramount concern. Research into new ways for humans to make use of advanced computers and other such technologies is necessary to fully realize the potential of 21st century tools. Human-Computer Interaction: Concepts, Methodologies, Tools, and Applications gathers research on user interfaces for advanced technologies and how these interfaces can facilitate new developments in the fields of robotics, assistive technologies, and computational intelligence. This four-volume reference contains cutting-edge research for computer scientists; faculty and students of robotics, digital science, and networked communications; and clinicians invested in assistive technologies. This seminal reference work includes chapters on topics pertaining to system usability, interactive design, mobile interfaces, virtual worlds, and more.


Advances in Secure Computing, Internet Services, and Applications

Advances in Secure Computing, Internet Services, and Applications

Author: Tripathy, B.K.

Publisher: IGI Global

Published: 2013-12-31

Total Pages: 405

ISBN-13: 1466649410

DOWNLOAD EBOOK

Technological advancements have extracted a vast amount of useful knowledge and information for applications and services. These developments have evoked intelligent solutions that have been utilized in efforts to secure this data and avoid potential complex problems. Advances in Secure Computing, Internet Services, and Applications presents current research on the applications of computational intelligence in order to focus on the challenge humans face when securing knowledge and data. This book is a vital reference source for researchers, lecturers, professors, students, and developers, who have interest in secure computing and recent advanced in real life applications.


Cases on Research and Knowledge Discovery: Homeland Security Centers of Excellence

Cases on Research and Knowledge Discovery: Homeland Security Centers of Excellence

Author: Brown, Cecelia Wright

Publisher: IGI Global

Published: 2014-04-30

Total Pages: 357

ISBN-13: 1466659475

DOWNLOAD EBOOK

To ensure its protection from enemies both foreign and domestic, a government must invest resources and personnel toward the goal of homeland security. It is through these endeavors that citizens are able to live out their lives in peace. Cases on Research and Knowledge Discovery: Homeland Security Centers of Excellence presents a series of studies and descriptive examples on the US Department of Homeland Security and related research. Through its investigation of interesting challenges and thought-provoking ideas, this volume offers professionals, researchers, and academics in the fields of security science, engineering, technology, and mathematics an in-depth discussion of some of the issues that directly affect the safety, security, and prosperity of the nation.


Network Security Technologies: Design and Applications

Network Security Technologies: Design and Applications

Author: Amine, Abdelmalek

Publisher: IGI Global

Published: 2013-11-30

Total Pages: 348

ISBN-13: 1466647906

DOWNLOAD EBOOK

Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested in improving their understanding of the strategic role of trust at different levels of information and knowledge society.


Health and Wellness Measurement Approaches for Mobile Healthcare

Health and Wellness Measurement Approaches for Mobile Healthcare

Author: Gita Khalili Moghaddam

Publisher: Springer

Published: 2018-09-22

Total Pages: 112

ISBN-13: 3030015572

DOWNLOAD EBOOK

This book reviews existing sensor technologies that are now being coupled with computational intelligence for the remote monitoring of physical activity and ex vivo biosignatures. In today’s frenetic world, consumers are becoming ever more demanding: they want to control every aspect of their lives and look for options specifically tailored to their individual needs. In many cases, suppliers are catering to these new demands; as a result, clothing, food, social media, fitness and banking services are all being democratised to the individual. Healthcare provision has finally caught up to this trend and is currently being rebooted to offer personalised solutions, while simultaneously creating a more effective, scalable and cost-effective system for all. The desire for personalisation, home monitoring and treatment, and provision of care in remote locations or in emerging and impoverished nations that lack a fixed infrastructure, is leading to the realisation that mobile technology might be the best candidate for achieving these goals. A combination of several technological, healthcare and financial factors are driving this trend to create a new healthcare model that stresses preventative ‘health-care’ rather than ‘sick-care’, and a shift from volume to value. Mobile healthcare (mhealth), which could also be termed the “internet of people”, refers to the integration of sensors and smartphones to gather and interpret clinical data from patients in real-time. Most importantly, with an ageing population suffering multiple morbidities, mhealth could provide healthcare solutions to enhance chronically ill patients’ quality of life.


Multidisciplinary Perspectives in Cryptology and Information Security

Multidisciplinary Perspectives in Cryptology and Information Security

Author: Sadkhan Al Maliky, Sattar B.

Publisher: IGI Global

Published: 2014-03-31

Total Pages: 463

ISBN-13: 1466658096

DOWNLOAD EBOOK

With the prevalence of digital information, IT professionals have encountered new challenges regarding data security. In an effort to address these challenges and offer solutions for securing digital information, new research on cryptology methods is essential. Multidisciplinary Perspectives in Cryptology and Information Security considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security. This publication offers a comprehensive, in-depth analysis of encryption solutions and will be of particular interest to IT professionals, cryptologists, and researchers in the field.


Network Topology in Command and Control: Organization, Operation, and Evolution

Network Topology in Command and Control: Organization, Operation, and Evolution

Author: Grant, T. J.

Publisher: IGI Global

Published: 2014-05-31

Total Pages: 350

ISBN-13: 1466660597

DOWNLOAD EBOOK

Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory. Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining to the C2 network evolution, security, and modeling, this publication is ideal for reference use by students, academicians, and security professionals in the fields of C2 and network science.