![]() |
![]() |
Your cart is empty |
||
Showing 1 - 25 of 316 matches in All Departments
Ambient Intelligence (AmI) is an integrating technology for supporting a pervasive and transparent infrastructure for implementing smart environments. Such technology is used to enable environments for detecting events and behaviors of people and for responding in a contextually relevant fashion. AmI proposes a multi-disciplinary approach for enhancing human machine interaction. Ambient Intelligence: A Novel Paradigm is a compilation of edited chapters describing current state-of-the-art and new research techniques including those related to intelligent visual monitoring, face and speech recognition, innovative education methods, as well as smart and cognitive environments. The authors start with a description of the iDorm as an example of a smart environment conforming to the AmI paradigm, and introduces computer vision as an important component of the system. Other computer vision examples describe visual monitoring for the elderly, classic and novel surveillance techniques using clusters of cameras installed in indoor and outdoor application domains, and the monitoring of public spaces. Face and speech recognition systems are also covered as well as enhanced LEGO blocks for novel educational purposes. The book closes with a provocative chapter on how a cybernetic system can be designed as the backbone of a human machine interaction.
Monitoring of public and private sites is increasingly becoming a very important and critical issue, especially after the recent flurry of terrorist attacks including the one on the Word Trade Center in September 2001. It is, therefore, imperative that effective multisensor surveillance systems be developed to protect the society from similar attacks in the future. The new generation of surveillance systems to be developed have a specific requirement: they must be able to automatically identify criminal and terrorist activity without sacrificing individual privacy to the extent possible. Privacy laws concerning monitoring and surveillance systems vary from country to country but, in general, they try to protect the privacy of their citizens. Monitoring and visual surveillance has numerous other applications. It can be employed to help invalids or handicapped and to monitor the activities of elderly people. It can be used to monitor large events such as sporting events, as well. Nowadays, monitoring is employ d in several different contexts including transport applications, such as monitoring of railway stations and airports, dangerous environments like nuclear facilities or traffic flows on roads and bridges. The latest generation of surveillance systems mainly rely on hybrid analog-digital, or completely digital video communications and processing methods and take advantage of the greater of flexibility offered by video processing algorithms that are capable focusing a human operator's attention on a set of interesting situations.
Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release. Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book. Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.
Multimedia surveillance systems is an emerging field that includes signal and image processing, communications, and computer vision. Multimedia Video-Based Surveillance Systems: Requirements, Issues and Solutions, combines the most recent research results from these areas for use by engineers and end-users involved in the design of surveillance systems in the fields of transportation and services. The book covers emerging surveillance requirements, including new digital sensors for real-time acquisition of surveillance data, low-level image processing algorithms, and event detection methods. It also discusses problems related to knowledge representation in surveillance systems, wireless and wired multimedia networks, and a new generation of surveillance communication tools. Timely information is presented on digital watermarking, broadband multimedia transmission, legal use of surveillance systems, performance evaluation criteria, and other new and emerging topics, along with applications for transports and pedestrian monitoring. The information contained in Multimedia Video-Based Surveillance Systems: Requirements, Issues and Solutions, bridges the distance between present practice and research findings, and the book is an indispensable reference tool for professional engineers.
The Russian Revolution in Asia: From Baku to Batavia presents a unique and timely global history intervention into the historiography of the Russian Revolution of 1917, marking the centenary of one of the most significant modern revolutions. It explores the legacies of the Revolution across the Asian continent and maritime Southeast Asia, with a broad geographic sweep including Iran, the Caucasus, Central Asia, China, the Philippines, Vietnam, Indonesia, and India. It analyses how revolutionary communism intersected with a variety of Asian contexts, from the anti-colonial movement and ethnic tensions, to indigenous cultural frameworks and power structures. In so doing, this volume privileges Asian actors and perspectives, examining how Asian communities reinterpreted the Revolution to serve unexpected ends, including national liberation, regional autonomy, conflict with Russian imperial hegemony, Islamic practice and cultural nostalgia. Methodologically, this volume breaks new ground by incorporating research from a wide range of sources across multiple languages, many analysed for the first time in English-language scholarship. This book will be of use to historians of the Russian Revolution, especially those interested in understanding transnational and transregional perspectives of its impact in Central Asia and Southeast Asia, as well as historians of Asia more broadly. It will also appeal to those interested in the history of Islam.
The Russian Revolution in Asia: From Baku to Batavia presents a unique and timely global history intervention into the historiography of the Russian Revolution of 1917, marking the centenary of one of the most significant modern revolutions. It explores the legacies of the Revolution across the Asian continent and maritime Southeast Asia, with a broad geographic sweep including Iran, the Caucasus, Central Asia, China, the Philippines, Vietnam, Indonesia, and India. It analyses how revolutionary communism intersected with a variety of Asian contexts, from the anti-colonial movement and ethnic tensions, to indigenous cultural frameworks and power structures. In so doing, this volume privileges Asian actors and perspectives, examining how Asian communities reinterpreted the Revolution to serve unexpected ends, including national liberation, regional autonomy, conflict with Russian imperial hegemony, Islamic practice and cultural nostalgia. Methodologically, this volume breaks new ground by incorporating research from a wide range of sources across multiple languages, many analysed for the first time in English-language scholarship. This book will be of use to historians of the Russian Revolution, especially those interested in understanding transnational and transregional perspectives of its impact in Central Asia and Southeast Asia, as well as historians of Asia more broadly. It will also appeal to those interested in the history of Islam.
Psychoanalysis and Psychiatry: Partners and Competitors in the Mental Health Field offers a comprehensive overview of the many links between the two fields. There have long been connections between the two professions, but this is the first time the many points of contact have been set out clearly for practitioners from both fields. Covering social and cultural factors, clinical practice, including diagnosis and treatment, and looking at teaching and continuing professional development, this book features contributions and exchange of ideas from an international group of clinicians from across both professions. Psychoanalysis and Psychiatry: Partners and Competitors in the Mental Health Field will appeal to all practicing psychoanalysts and psychiatrists and anyone wanting to draw on the best of both fields in their theoretical understanding and clinical practice.
Recent advances in fish cytogenetics have enhanced the interest in chromosome analysis in both fundamental (systematics and comparative genomics among fishes and other vertebrate groups) and applied (aquaculture, conservation and response to pollutants, whole genome sequencing of model fish species) research. Although the genomic material, the chromosomes, is basically the same in the various organisms, experience has clearly shown that fish chromosomes have to be handled with specific protocols. In laboratories around the world, traditional cytogenetic techniques and molecular cytogenetics have seen a vast improvement but the technical details and protocols are often not published in scientific journals because of constraints in format and size and therefore they are not accessible to the whole scientific community. These shortcomings are very well known to fish cytogeneticists and the idea to prepare a specific manual was first discussed during the first "Workshop of Fish Cytogenetics" held in Concarneau (France), in 1992. Resulting from the above workshop, a draft compilation of the techniques and protocols in fish cytogenetics available at that time had been produced and distributed privately, but never published. There does not exist, at present, any published handbook or manual specifically dealing with fish cytogenetics. This book fills this void by bringing together and updating the main techniques so that the traditional methods can be standardized. Moreover, this book includes novel developments or improvements; some of the protocols provided here are practically unknown to the scientific community and even now unpublished.
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020. The conference was held virtually due to COVID-19 pandemic. The 60 full papers were carefully reviewed and selected from 120 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.
Foreword by Pierangela Samarati Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release. Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data; it allows the data owner to outsource not only the data but the security policy itself. The last section of this book investigates the problem of executing queries over possible data distributed at different servers. Case Studies will be provided. About this book: Exclusively focuses on addressing protection of confidential information in the emerging data outsourcing scenarios. Presents relevant and critical novel problems and novel techniques, a precious reference point to students, researchers, and developers in this field. Provides a comprehensive overview of the data protection problem in outsourcing scenarios, as well as a rigorous analysis and formalization of the problem and solutions to it. Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.
Multimedia surveillance systems is an emerging field that includes signal and image processing, communications, and computer vision. Multimedia Video-Based Surveillance Systems: Requirements, Issues and Solutions, combines the most recent research results from these areas for use by engineers and end-users involved in the design of surveillance systems in the fields of transportation and services. The book covers emerging surveillance requirements, including new digital sensors for real-time acquisition of surveillance data, low-level image processing algorithms, and event detection methods. It also discusses problems related to knowledge representation in surveillance systems, wireless and wired multimedia networks, and a new generation of surveillance communication tools. Timely information is presented on digital watermarking, broadband multimedia transmission, legal use of surveillance systems, performance evaluation criteria, and other new and emerging topics, along with applications for transports and pedestrian monitoring. The information contained in Multimedia Video-Based Surveillance Systems: Requirements, Issues and Solutions, bridges the distance between present practice and research findings, and the book is an indispensable reference tool for professional engineers.
Monitoring of public and private sites is increasingly becoming a very important and critical issue, especially after the recent flurry of terrorist attacks including the one on the Word Trade Center in September 2001. It is, therefore, imperative that effective multisensor surveillance systems be developed to protect the society from similar attacks in the future. The new generation of surveillance systems to be developed have a specific requirement: they must be able to automatically identify criminal and terrorist activity without sacrificing individual privacy to the extent possible. Privacy laws concerning monitoring and surveillance systems vary from country to country but, in general, they try to protect the privacy of their citizens. Monitoring and visual surveillance has numerous other applications. It can be employed to help invalids or handicapped and to monitor the activities of elderly people. It can be used to monitor large events such as sporting events, as well. Nowadays, monitoring is employ d in several different contexts including transport applications, such as monitoring of railway stations and airports, dangerous environments like nuclear facilities or traffic flows on roads and bridges. The latest generation of surveillance systems mainly rely on hybrid analog-digital, or completely digital video communications and processing methods and take advantage of the greater of flexibility offered by video processing algorithms that are capable focusing a human operator's attention on a set of interesting situations.
This book constitutes the refereed proceedings of the 17th European Symposium on Computer Security, ESORICS 2012, held in Pisa, Italy, in September 2012. The 50 papers included in the book were carefully reviewed and selected from 248 papers. The articles are organized in topical sections on security and data protection in real systems; formal models for cryptography and access control; security and privacy in mobile and wireless networks; counteracting man-in-the-middle attacks; network security; users privacy and anonymity; location privacy; voting protocols and anonymous communication; private computation in cloud systems; formal security models; identity based encryption and group signature; authentication; encryption key and password security; malware and phishing; and software security. |
![]() ![]() You may like...
Cattle Of The Ages - Stories And…
Cyril Ramaphosa
Hardcover
![]()
Nutraceutical Beverages - Chemistry…
Fereidoon Shahidi, Deepthi K. Weerasinghe
Hardcover
R2,985
Discovery Miles 29 850
Charles Dickens, A Tale of Two Cities…
C. Jones, J. McDonagh, …
Hardcover
R1,514
Discovery Miles 15 140
|