Handbook of Research on Intelligent Data Processing and Information Security Systems

Handbook of Research on Intelligent Data Processing and Information Security Systems

Stepan Mykolayovych Bilan (State University of Infrastructure and Technology, Ukraine) and Saleem Issa Al-Zoubi (Irbid National University, Jordan)
Release Date: November, 2019|Copyright: © 2020 |Pages: 434
ISBN13: 9781799812906|ISBN10: 1799812901|EISBN13: 9781799812920|DOI: 10.4018/978-1-7998-1290-6

Description

Intelligent technologies have emerged as imperative tools in computer science and information security. However, advanced computing practices have preceded new methods of attacks on the storage and transmission of data. Developing approaches such as image processing and pattern recognition are susceptible to breaches in security. Modern protection methods for these innovative techniques require additional research.

The Handbook of Research on Intelligent Data Processing and Information Security Systems provides emerging research exploring the theoretical and practical aspects of cyber protection and applications within computer science and telecommunications. Special attention is paid to data encryption, steganography, image processing, and recognition, and it targets professionals who want to improve their knowledge in order to increase strategic capabilities and organizational effectiveness. As such, this book is ideal for analysts, programmers, computer engineers, software engineers, mathematicians, data scientists, developers, IT specialists, academicians, researchers, and students within fields of information technology, information security, robotics, artificial intelligence, image processing, computer science, and telecommunications.

Topics Covered

The many academic areas covered in this publication include, but are not limited to:

  • Artificial Intelligence
  • Artificial Neural Networks
  • Biometric Identification
  • Cellular Automata
  • Coding Information
  • Computer Vision
  • Image Recognition
  • Random Sequence Analysis
  • Robotics
  • Steganography

Table of Contents and List of Contributors

Search this Book:
Reset