Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.
You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.
After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.
Presents recent research Intelligent Systems and Applications
Results in the field of Intelligent Systems coming from the ICS 2012 symposium held December 12-14, 2012 in Hualien, Taiwan
Written by experts in the field
The field of Intelligent Systems and Applications has expanded enormously during the last two decades. Theoretical and practical results in this area are growing rapidly due to many successful applications and new theories derived from many diverse problems. This book is dedicated to the Intelligent Systems and Applications in many different aspects. In particular, this book is to provide highlights of the current research in Intelligent Systems and Applications. It consists of research papers in the following specific topics:
l Authentication, Identification, and Signature
l Intrusion Detection
l Steganography, Data Hiding, and Watermarking
l Database, System, and Communication Security
l Computer Vision, Object Tracking, and Pattern Recognition
l Image Processing, Medical Image Processing, and Video Coding
l Digital Content, Digital Life, and Human Computer Interaction
l Parallel, Peer-to-peer, Distributed, and Cloud Computing
l Software Engineering and Programming Language
This book provides a reference to theoretical problems as well as practical solutions and applications for the state-of-the-art results in Intelligent Systems and Applications on the aforementioned topics. In particular, both the academic community (graduate students, post-doctors and faculties) in Electrical Engineering, Computer Science, and Applied Mathematics; and the industrial community (engineers, engineering managers, programmers, research lab staffs and managers, security managers) will find this book interesting.
Content Level »Research
Keywords »Computational Intelligence - Intelligent Systems
Authentication, Identi cation, and Signature.- Intrusion Detection.- Steganography, Data Hiding, and Watermarking.- Database, System, and Communication Security.- Computer Vision, Object Tracking, and Pattern Recognition.- Image Processing, Medical Image Processing, and Video Coding.- Digital Content, Digital Life, and Human Computer Interaction.- Parallel, Peer-to-Peer, Distributed, and Cloud Computing.- Software Engineering and Programming Language.- Computer Architecture, Embedded Systems, SoC, and VLSI/EDA.