Advancing Computational Intelligence Techniques for Security Systems Design
Security systems have become an integral part of the building and large complex setups, and intervention of the computational intelligence (CI) paradigm plays an important role in security system architecture. This book covers both theoretical contributions and practical applications in security system design by applying the Internet of Things (IoT) and CI. It further explains the application of IoT in the design of modern security systems and how IoT blended with computational intel- ligence can make any security system improved and realizable.
Focuses on the computational intelligence techniques of security system design
Covers applications and algorithms of discussed computational intelligence techniques
Includes convergence-based and enterprise integrated security systems with their applications
Explains emerging laws, policies, and tools affecting the landscape of cyber security
Discusses application of sensors toward the design of security systems
This book will be useful for graduate students and researchers in electrical, computer
engineering, security system design and engineering.
- प्रतिलिपि अधिकार:
- 2022 selection and editorial matter, Uzzal Sharma, Parmanand Astya, Anupam Baliyan, Salah-ddine Krit, Vishal Jain and Mohammad Zubair Khan
Choosing a Book Format
EPUB is the standard publishing format used by many e-book readers including iBooks, Easy Reader, VoiceDream Reader, etc. This is the most popular and widely used format.
DAISY format is used by GoRead, Read2Go and most Kurzweil devices.
Audio (MP3) format is used by audio only devices, such as iPod.
Braille format is used by Braille output devices.
DAISY Audio format works on DAISY compatible players such as Victor Reader Stream.
Accessible Word format can be unzipped and opened in any tool that supports .docx files.