New methods and tools for intelligent data processing and information security systems:
"This book examines theoretical developments and practical applications in the field of information protection and intellectual data processing"--
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2020]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book examines theoretical developments and practical applications in the field of information protection and intellectual data processing"-- |
Beschreibung: | 23 PDFs (434 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781799812920 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00232290 | ||
003 | IGIG | ||
005 | 20191127152854.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 191128s2020 pau fob 001 0 eng d | ||
010 | |z 2019027736 | ||
020 | |a 9781799812920 |q eISBN | ||
020 | |z 1799812901 | ||
020 | |z 179981291X | ||
020 | |z 9781799812906 |q h/c | ||
020 | |z 9781799812913 |q s/c | ||
024 | 7 | |a 10.4018/978-1-7998-1290-6 |2 doi | |
035 | |a (CaBNVSL)slc00000136 | ||
035 | |a (OCoLC)1129579670 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.9.A25 |b N4856 2020e | |
082 | 7 | |a 005.8 |2 23 | |
245 | 0 | 0 | |a New methods and tools for intelligent data processing and information security systems |c Stepan Mykolayovych Bilan and Saleem Issa Al-Zoubi, editors. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2020] | |
300 | |a 23 PDFs (434 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Section 1. Information security. Chapter 1. Association rule-mining based intrusion detection system with entropy-based feature selection: intrusion detection system ; Chapter 2. Implementation of encryption and data hiding in e-health application ; Chapter 3. Influence of neighborhood forms on the quality of pseudorandom number generators' work based on cellular automata ; Chapter 4. Research of methods of steganographic protection of audio information based on video containers ; Chapter 5. A secure iris biometric recognition system: recent trends and solutions -- Section 2. Intellectual data processing and information security in various aspects of human activity. Chapter 6. Image processing and post-data mining processing for security in industrial applications: security in industry ; Chapter 7. Towards intelligent data processing for automated determination of information system assets ; Chapter 8. Modified methods for image processing of laser beam profiles ; Chapter 9. A secured predictive analytics using genetic algorithm and evolution strategies ; Chapter 10. Protection of information from the influence of noise on the transmission of video data in a geoinformation system -- Section 3. Image processing and recognition. Chapter 11. Reproduction of images of convex figures by a set of stored reference surfaces ; Chapter 12. Methods for extracting the skeleton of an image based on cellular automata with a hexagonal coating form and radon transform ; Chapter 13. The moving object detection and research effects of noise on images based on cellular automata with a hexagonal coating form and radon transform ; Chapter 14. Image processing and pattern recognition based on artificial models of the structure and function of the retina ; Chapter 15. Identification system for moving objects based on parallel shift technology ; Chapter 16. SOFM for image compression based on spatial frequency band-pass filter and vector quantization. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book examines theoretical developments and practical applications in the field of information protection and intellectual data processing"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 11/28/2019). | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Data protection. | |
650 | 0 | |a Electronic data processing. | |
700 | 1 | |a Al-Zoubi, Saleem Issa |d 1975- |e editor. | |
700 | 1 | |a Bilan, Stepan Mykolayovych |d 1962- |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2019027736 | |
776 | 0 | 8 | |i Print version: |z 1799812901 |z 9781799812906 |w (DLC) 2019027736 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-1290-6 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00232290 |
---|---|
_version_ | 1816797082559709184 |
adam_text | |
any_adam_object | |
author2 | Al-Zoubi, Saleem Issa 1975- Bilan, Stepan Mykolayovych 1962- |
author2_role | edt edt |
author2_variant | s i a z sia siaz s m b sm smb |
author_facet | Al-Zoubi, Saleem Issa 1975- Bilan, Stepan Mykolayovych 1962- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 N4856 2020e |
callnumber-search | QA76.9.A25 N4856 2020e |
callnumber-sort | QA 276.9 A25 N4856 42020E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Section 1. Information security. Chapter 1. Association rule-mining based intrusion detection system with entropy-based feature selection: intrusion detection system ; Chapter 2. Implementation of encryption and data hiding in e-health application ; Chapter 3. Influence of neighborhood forms on the quality of pseudorandom number generators' work based on cellular automata ; Chapter 4. Research of methods of steganographic protection of audio information based on video containers ; Chapter 5. A secure iris biometric recognition system: recent trends and solutions -- Section 2. Intellectual data processing and information security in various aspects of human activity. Chapter 6. Image processing and post-data mining processing for security in industrial applications: security in industry ; Chapter 7. Towards intelligent data processing for automated determination of information system assets ; Chapter 8. Modified methods for image processing of laser beam profiles ; Chapter 9. A secured predictive analytics using genetic algorithm and evolution strategies ; Chapter 10. Protection of information from the influence of noise on the transmission of video data in a geoinformation system -- Section 3. Image processing and recognition. Chapter 11. Reproduction of images of convex figures by a set of stored reference surfaces ; Chapter 12. Methods for extracting the skeleton of an image based on cellular automata with a hexagonal coating form and radon transform ; Chapter 13. The moving object detection and research effects of noise on images based on cellular automata with a hexagonal coating form and radon transform ; Chapter 14. Image processing and pattern recognition based on artificial models of the structure and function of the retina ; Chapter 15. Identification system for moving objects based on parallel shift technology ; Chapter 16. SOFM for image compression based on spatial frequency band-pass filter and vector quantization. |
ctrlnum | (CaBNVSL)slc00000136 (OCoLC)1129579670 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04040nam a2200505 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00232290</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20191127152854.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">191128s2020 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2019027736</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781799812920</subfield><subfield code="q">eISBN</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1799812901</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">179981291X</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799812906</subfield><subfield code="q">h/c</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781799812913</subfield><subfield code="q">s/c</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-7998-1290-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc00000136</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1129579670</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">N4856 2020e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">New methods and tools for intelligent data processing and information security systems </subfield><subfield code="c">Stepan Mykolayovych Bilan and Saleem Issa Al-Zoubi, editors.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2020]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">23 PDFs (434 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Section 1. Information security. Chapter 1. Association rule-mining based intrusion detection system with entropy-based feature selection: intrusion detection system ; Chapter 2. Implementation of encryption and data hiding in e-health application ; Chapter 3. Influence of neighborhood forms on the quality of pseudorandom number generators' work based on cellular automata ; Chapter 4. Research of methods of steganographic protection of audio information based on video containers ; Chapter 5. A secure iris biometric recognition system: recent trends and solutions -- Section 2. Intellectual data processing and information security in various aspects of human activity. Chapter 6. Image processing and post-data mining processing for security in industrial applications: security in industry ; Chapter 7. Towards intelligent data processing for automated determination of information system assets ; Chapter 8. Modified methods for image processing of laser beam profiles ; Chapter 9. A secured predictive analytics using genetic algorithm and evolution strategies ; Chapter 10. Protection of information from the influence of noise on the transmission of video data in a geoinformation system -- Section 3. Image processing and recognition. Chapter 11. Reproduction of images of convex figures by a set of stored reference surfaces ; Chapter 12. Methods for extracting the skeleton of an image based on cellular automata with a hexagonal coating form and radon transform ; Chapter 13. The moving object detection and research effects of noise on images based on cellular automata with a hexagonal coating form and radon transform ; Chapter 14. Image processing and pattern recognition based on artificial models of the structure and function of the retina ; Chapter 15. Identification system for moving objects based on parallel shift technology ; Chapter 16. SOFM for image compression based on spatial frequency band-pass filter and vector quantization.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book examines theoretical developments and practical applications in the field of information protection and intellectual data processing"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 11/28/2019).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Electronic data processing.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Al-Zoubi, Saleem Issa</subfield><subfield code="d">1975-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bilan, Stepan Mykolayovych</subfield><subfield code="d">1962-</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2019027736</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1799812901</subfield><subfield code="z">9781799812906</subfield><subfield code="w">(DLC) 2019027736</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-1290-6</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00232290 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:55Z |
institution | BVB |
isbn | 9781799812920 |
language | English |
oclc_num | 1129579670 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 23 PDFs (434 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | IGI Global, |
record_format | marc |
spelling | New methods and tools for intelligent data processing and information security systems Stepan Mykolayovych Bilan and Saleem Issa Al-Zoubi, editors. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2020] 23 PDFs (434 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Section 1. Information security. Chapter 1. Association rule-mining based intrusion detection system with entropy-based feature selection: intrusion detection system ; Chapter 2. Implementation of encryption and data hiding in e-health application ; Chapter 3. Influence of neighborhood forms on the quality of pseudorandom number generators' work based on cellular automata ; Chapter 4. Research of methods of steganographic protection of audio information based on video containers ; Chapter 5. A secure iris biometric recognition system: recent trends and solutions -- Section 2. Intellectual data processing and information security in various aspects of human activity. Chapter 6. Image processing and post-data mining processing for security in industrial applications: security in industry ; Chapter 7. Towards intelligent data processing for automated determination of information system assets ; Chapter 8. Modified methods for image processing of laser beam profiles ; Chapter 9. A secured predictive analytics using genetic algorithm and evolution strategies ; Chapter 10. Protection of information from the influence of noise on the transmission of video data in a geoinformation system -- Section 3. Image processing and recognition. Chapter 11. Reproduction of images of convex figures by a set of stored reference surfaces ; Chapter 12. Methods for extracting the skeleton of an image based on cellular automata with a hexagonal coating form and radon transform ; Chapter 13. The moving object detection and research effects of noise on images based on cellular automata with a hexagonal coating form and radon transform ; Chapter 14. Image processing and pattern recognition based on artificial models of the structure and function of the retina ; Chapter 15. Identification system for moving objects based on parallel shift technology ; Chapter 16. SOFM for image compression based on spatial frequency band-pass filter and vector quantization. Restricted to subscribers or individual electronic text purchasers. "This book examines theoretical developments and practical applications in the field of information protection and intellectual data processing"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 11/28/2019). Computer security. Data protection. Electronic data processing. Al-Zoubi, Saleem Issa 1975- editor. Bilan, Stepan Mykolayovych 1962- editor. IGI Global, publisher. (Original) (DLC)2019027736 Print version: 1799812901 9781799812906 (DLC) 2019027736 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-1290-6 Volltext |
spellingShingle | New methods and tools for intelligent data processing and information security systems Section 1. Information security. Chapter 1. Association rule-mining based intrusion detection system with entropy-based feature selection: intrusion detection system ; Chapter 2. Implementation of encryption and data hiding in e-health application ; Chapter 3. Influence of neighborhood forms on the quality of pseudorandom number generators' work based on cellular automata ; Chapter 4. Research of methods of steganographic protection of audio information based on video containers ; Chapter 5. A secure iris biometric recognition system: recent trends and solutions -- Section 2. Intellectual data processing and information security in various aspects of human activity. Chapter 6. Image processing and post-data mining processing for security in industrial applications: security in industry ; Chapter 7. Towards intelligent data processing for automated determination of information system assets ; Chapter 8. Modified methods for image processing of laser beam profiles ; Chapter 9. A secured predictive analytics using genetic algorithm and evolution strategies ; Chapter 10. Protection of information from the influence of noise on the transmission of video data in a geoinformation system -- Section 3. Image processing and recognition. Chapter 11. Reproduction of images of convex figures by a set of stored reference surfaces ; Chapter 12. Methods for extracting the skeleton of an image based on cellular automata with a hexagonal coating form and radon transform ; Chapter 13. The moving object detection and research effects of noise on images based on cellular automata with a hexagonal coating form and radon transform ; Chapter 14. Image processing and pattern recognition based on artificial models of the structure and function of the retina ; Chapter 15. Identification system for moving objects based on parallel shift technology ; Chapter 16. SOFM for image compression based on spatial frequency band-pass filter and vector quantization. Computer security. Data protection. Electronic data processing. |
title | New methods and tools for intelligent data processing and information security systems |
title_auth | New methods and tools for intelligent data processing and information security systems |
title_exact_search | New methods and tools for intelligent data processing and information security systems |
title_full | New methods and tools for intelligent data processing and information security systems Stepan Mykolayovych Bilan and Saleem Issa Al-Zoubi, editors. |
title_fullStr | New methods and tools for intelligent data processing and information security systems Stepan Mykolayovych Bilan and Saleem Issa Al-Zoubi, editors. |
title_full_unstemmed | New methods and tools for intelligent data processing and information security systems Stepan Mykolayovych Bilan and Saleem Issa Al-Zoubi, editors. |
title_short | New methods and tools for intelligent data processing and information security systems |
title_sort | new methods and tools for intelligent data processing and information security systems |
topic | Computer security. Data protection. Electronic data processing. |
topic_facet | Computer security. Data protection. Electronic data processing. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-7998-1290-6 |
work_keys_str_mv | AT alzoubisaleemissa newmethodsandtoolsforintelligentdataprocessingandinformationsecuritysystems AT bilanstepanmykolayovych newmethodsandtoolsforintelligentdataprocessingandinformationsecuritysystems AT igiglobal newmethodsandtoolsforintelligentdataprocessingandinformationsecuritysystems |