01321nam 2200469 450 991079816950332120230803214032.01-4744-6834-90-7486-9789-6(CKB)3710000000607478(SSID)ssj0001600588(PQKBManifestationID)16307940(PQKBTitleCode)TC0001600588(PQKBWorkID)14893472(PQKB)10277289(MiAaPQ)EBC6141495(UtSlPG)45697(EXLCZ)99371000000060747820200618h20142007 uy 1engurcnu||||||||txtccrWaverley /Walter Scott ; edited by P. D. GarsideEdinburgh :Edinburgh University Press,2014.©20071 online resource (374 pages)Bibliographic Level Mode of Issuance: Monograph0-7486-9787-X Jacobite Rebellion, 1745-1746FictionJacobite Rebellion, 1745-1746823.7Scott Walter1771-1832,163433Garside PeterMiAaPQMiAaPQMiAaPQBOOK9910798169503321Waverley181366UNINA03961nam 22007335 450 991025418670332120200701085721.09783319264509331926450810.1007/978-3-319-26450-9(CKB)3780000000094079(SSID)ssj0001599517(PQKBManifestationID)16305810(PQKBTitleCode)TC0001599517(PQKBWorkID)14892366(PQKB)10624543(DE-He213)978-3-319-26450-9(MiAaPQ)EBC6300986(MiAaPQ)EBC5578982(Au-PeEL)EBL5578982(OCoLC)1066184226(PPN)190885203(EXLCZ)99378000000009407920151221d2016 u| 0engurnn|008mamaatxtccrRecent Advances in Computational Intelligence in Defense and Security /edited by Rami Abielmona, Rafael Falcon, Nur Zincir-Heywood, Hussein A. Abbass1st ed. 2016.Cham :Springer International Publishing :Imprint: Springer,2016.1 online resource (XI, 752 p. 236 illus., 72 illus. in color.) Studies in Computational Intelligence,1860-949X ;621Bibliographic Level Mode of Issuance: Monograph9783319264486 3319264486 Part I Physical Security and Surveillance -- Part II: Cyber Security and Intrusion Detection Systems -- Part III: Biometric Security and Authentication Systems -- Part IV: Situational Awareness and Threat Assessment -- Part V: Strategic/Mission Planning and Resource Management.This volume is an initiative undertaken by the IEEE Computational Intelligence Society’s Task Force on Security, Surveillance and Defense to consolidate and disseminate the role of CI techniques in the design, development and deployment of security and defense solutions. Applications range from the detection of buried explosive hazards in a battlefield to the control of unmanned underwater vehicles, the delivery of superior video analytics for protecting critical infrastructures or the development of stronger intrusion detection systems and the design of military surveillance networks. Defense scientists, industry experts, academicians and practitioners alike will all benefit from the wide spectrum of successful applications compiled in this volume. Senior undergraduate or graduate students may also discover uncharted territory for their own research endeavors.Studies in Computational Intelligence,1860-949X ;621Computational intelligenceArtificial intelligenceSystem safetyComputational Intelligencehttps://scigraph.springernature.com/ontologies/product-market-codes/T11014Artificial Intelligencehttps://scigraph.springernature.com/ontologies/product-market-codes/I21000Security Science and Technologyhttps://scigraph.springernature.com/ontologies/product-market-codes/P31080Computational intelligence.Artificial intelligence.System safety.Computational Intelligence.Artificial Intelligence.Security Science and Technology.006.3Abielmona Ramiedthttp://id.loc.gov/vocabulary/relators/edtFalcon Rafaeledthttp://id.loc.gov/vocabulary/relators/edtZincir-Heywood Nuredthttp://id.loc.gov/vocabulary/relators/edtAbbass Hussein Aedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK9910254186703321Recent Advances in Computational Intelligence in Defense and Security1549373UNINA