EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book A Comparative Analysis of QADA KF with JPDAF for Multitarget Tracking in Clutter

Download or read book A Comparative Analysis of QADA KF with JPDAF for Multitarget Tracking in Clutter written by Jean Dezert and published by Infinite Study. This book was released on with total page 8 pages. Available in PDF, EPUB and Kindle. Book excerpt: This paper presents a comparative analysis of performances of two types of multi-target tracking algorithms: 1) the Joint Probabilistic Data Association Filter (JPDAF), and 2) classical Kalman Filter based algorithms for multi-target tracking improved with Quality Assessment of Data Association (QADA) method using optimal data association. The evaluation is based on Monte Carlo simulations for difficult maneuvering multiple-target tracking (MTT) problems in clutter.

Book Advances and Applications of DSmT for Information Fusion  Collected Works  Volume 5

Download or read book Advances and Applications of DSmT for Information Fusion Collected Works Volume 5 written by Florentin Smarandache and published by Infinite Study. This book was released on 2023-12-27 with total page 932 pages. Available in PDF, EPUB and Kindle. Book excerpt: This fifth volume on Advances and Applications of DSmT for Information Fusion collects theoretical and applied contributions of researchers working in different fields of applications and in mathematics, and is available in open-access. The collected contributions of this volume have either been published or presented after disseminating the fourth volume in 2015 (available at fs.unm.edu/DSmT-book4.pdf or www.onera.fr/sites/default/files/297/2015-DSmT-Book4.pdf) in international conferences, seminars, workshops and journals, or they are new. The contributions of each part of this volume are chronologically ordered. First Part of this book presents some theoretical advances on DSmT, dealing mainly with modified Proportional Conflict Redistribution Rules (PCR) of combination with degree of intersection, coarsening techniques, interval calculus for PCR thanks to set inversion via interval analysis (SIVIA), rough set classifiers, canonical decomposition of dichotomous belief functions, fast PCR fusion, fast inter-criteria analysis with PCR, and improved PCR5 and PCR6 rules preserving the (quasi-)neutrality of (quasi-)vacuous belief assignment in the fusion of sources of evidence with their Matlab codes. Because more applications of DSmT have emerged in the past years since the apparition of the fourth book of DSmT in 2015, the second part of this volume is about selected applications of DSmT mainly in building change detection, object recognition, quality of data association in tracking, perception in robotics, risk assessment for torrent protection and multi-criteria decision-making, multi-modal image fusion, coarsening techniques, recommender system, levee characterization and assessment, human heading perception, trust assessment, robotics, biometrics, failure detection, GPS systems, inter-criteria analysis, group decision, human activity recognition, storm prediction, data association for autonomous vehicles, identification of maritime vessels, fusion of support vector machines (SVM), Silx-Furtif RUST code library for information fusion including PCR rules, and network for ship classification. Finally, the third part presents interesting contributions related to belief functions in general published or presented along the years since 2015. These contributions are related with decision-making under uncertainty, belief approximations, probability transformations, new distances between belief functions, non-classical multi-criteria decision-making problems with belief functions, generalization of Bayes theorem, image processing, data association, entropy and cross-entropy measures, fuzzy evidence numbers, negator of belief mass, human activity recognition, information fusion for breast cancer therapy, imbalanced data classification, and hybrid techniques mixing deep learning with belief functions as well. We want to thank all the contributors of this fifth volume for their research works and their interests in the development of DSmT, and the belief functions. We are grateful as well to other colleagues for encouraging us to edit this fifth volume, and for sharing with us several ideas and for their questions and comments on DSmT through the years. We thank the International Society of Information Fusion (www.isif.org) for diffusing main research works related to information fusion (including DSmT) in the international fusion conferences series over the years. Florentin Smarandache is grateful to The University of New Mexico, U.S.A., that many times partially sponsored him to attend international conferences, workshops and seminars on Information Fusion. Jean Dezert is grateful to the Department of Information Processing and Systems (DTIS) of the French Aerospace Lab (Office National d’E´tudes et de Recherches Ae´rospatiales), Palaiseau, France, for encouraging him to carry on this research and for its financial support. Albena Tchamova is first of all grateful to Dr. Jean Dezert for the opportunity to be involved during more than 20 years to follow and share his smart and beautiful visions and ideas in the development of the powerful Dezert-Smarandache Theory for data fusion. She is also grateful to the Institute of Information and Communication Technologies, Bulgarian Academy of Sciences, for sponsoring her to attend international conferences on Information Fusion.

Book Research in Computer Science in the Bulgarian Academy of Sciences

Download or read book Research in Computer Science in the Bulgarian Academy of Sciences written by Krassimir T. Atanassov and published by Springer Nature. This book was released on 2021-07-19 with total page 501 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book is a collection of papers devoted to the emergence and development in Bulgarian Academy of Sciences of some of the areas of informatics, including artificial intelligence. The papers are prepared by specialists from the Academy, some of whom are among the founders of these scientific and application areas in Bulgaria and in some cases – in the world. The book is interesting for specialists in informatics and computer science and researchers in history of sciences.

Book IoT Applications Computing

Download or read book IoT Applications Computing written by Ishwar Singh and published by BoD – Books on Demand. This book was released on 2022-01-07 with total page 235 pages. Available in PDF, EPUB and Kindle. Book excerpt: The evolution of emerging and innovative technologies based on Industry 4.0 concepts are transforming society and industry into a fully digitized and networked globe. Sensing, communications, and computing embedded with ambient intelligence are at the heart of the Internet of Things (IoT), the Industrial Internet of Things (IIoT), and Industry 4.0 technologies with expanding applications in manufacturing, transportation, health, building automation, agriculture, and the environment. It is expected that the emerging technology clusters of ambient intelligence computing will not only transform modern industry but also advance societal health and wellness, as well as and make the environment more sustainable. This book uses an interdisciplinary approach to explain the complex issue of scientific and technological innovations largely based on intelligent computing.

Book Multigenerational Online Behavior and Media Use  Concepts  Methodologies  Tools  and Applications

Download or read book Multigenerational Online Behavior and Media Use Concepts Methodologies Tools and Applications written by Management Association, Information Resources and published by IGI Global. This book was released on 2019-02-01 with total page 1765 pages. Available in PDF, EPUB and Kindle. Book excerpt: The rapid evolution of technology continuously changes the way people interact, work, and learn. By examining these advances from a sociological perspective, researchers can further understand the impact of cyberspace on human behavior, interaction, and cognition. Multigenerational Online Behavior and Media Use: Concepts, Methodologies, Tools, and Applications is a vital reference source covering the impact of social networking platforms on a variety of relationships, including those between individuals, governments, citizens, businesses, and consumers. The publication also highlights the negative behavioral, physical, and mental effects of increased online usage and screen time such as mental health issues, internet addiction, and body image. Showcasing a range of topics including online dating, smartphone dependency, and cyberbullying, this multi-volume book is ideally designed for sociologists, psychologists, computer scientists, engineers, communication specialists, academicians, researchers, and graduate-level students seeking current research on media usage and its behavioral effects.

Book Digital Transformation  Cyber Security and Resilience of Modern Societies

Download or read book Digital Transformation Cyber Security and Resilience of Modern Societies written by Todor Tagarev and published by Springer Nature. This book was released on 2021-03-23 with total page 495 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book presents the implementation of novel concepts and solutions, which allows to enhance the cyber security of administrative and industrial systems and the resilience of economies and societies to cyber and hybrid threats. This goal can be achieved by rigorous information sharing, enhanced situational awareness, advanced protection of industrial processes and critical infrastructures, and proper account of the human factor, as well as by adequate methods and tools for analysis of big data, including data from social networks, to find best ways to counter hybrid influence. The implementation of these methods and tools is examined here as part of the process of digital transformation through incorporation of advanced information technologies, knowledge management, training and testing environments, and organizational networking. The book is of benefit to practitioners and researchers in the field of cyber security and protection against hybrid threats, as well as to policymakers and senior managers with responsibilities in information and knowledge management, security policies, and human resource management and training.

Book Signal Processing  Sensor Information Fusion  and Target Recognition XXVI

Download or read book Signal Processing Sensor Information Fusion and Target Recognition XXVI written by Ivan Kadar and published by . This book was released on 2018-02-28 with total page 620 pages. Available in PDF, EPUB and Kindle. Book excerpt: Proceedings of SPIE present the original research papers presented at SPIE conferences and other high-quality conferences in the broad-ranging fields of optics and photonics. These books provide prompt access to the latest innovations in research and technology in their respective fields. Proceedings of SPIE are among the most cited references in patent literature.

Book Open Research Problems in Network Security

Download or read book Open Research Problems in Network Security written by Jan Camenisch and published by Springer. This book was released on 2011-02-10 with total page 172 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed post-conference proceedings of the IFIP WG 11.4 International Workshop, iNetSec 2010, held in Sofia, Bulgaria, in March 2010. The 14 revised full papers presented together with an invited talk were carefully reviewed and selected during two rounds of refereeing. The papers are organized in topical sections on scheduling, adversaries, protecting resources, secure processes, and security for clouds.

Book Neutrosophy

    Book Details:
  • Author : Florentin Smarandache
  • Publisher :
  • Release : 1998
  • ISBN :
  • Pages : 110 pages

Download or read book Neutrosophy written by Florentin Smarandache and published by . This book was released on 1998 with total page 110 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Scientific Support for the Decision Making in the Security Sector

Download or read book Scientific Support for the Decision Making in the Security Sector written by O. Kounchev and published by IOS Press. This book was released on 2007-07-19 with total page 360 pages. Available in PDF, EPUB and Kindle. Book excerpt: Today’s security environment is characterized by deep uncertainty. Threats are being posed not only by adversary (political) forces but may also come from natural challenges (be it energy, water, ecology or whatever). The types of operations that our civil security and military forces find themselves in today comprise a wide variety of tasks. The success criteria for these operations are a safe/secure environment for local population and stable conditions for state building rather than hit-kill ratio’s against adversaries – the criteria are soft and the many actors involved may have divergent if not opposing objectives. And where actors intentionally share common objectives, they come from different cultural and organizational backgrounds, and their systems and modus operandi (doctrine) have loose or no connectivity. Under these complex and uncertain conditions decision making is a challenging process. This publication reflect the initial state of a dialogue between specialists in security and specialists in mathematics, computer and information sciences on security topics. Papers included in this volume are naturally subdivided into four parts showing the wide future perspective for synthesis between science and security: Planning for Security; Mathematical, Computer and Information Sciences Methods for Security; Environmental Security; and Dynamic Optimization for Security.

Book Countering Hybrid Threats

Download or read book Countering Hybrid Threats written by Niculae Iancu and published by . This book was released on 2016 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Ukrainian conflict has come to be considered as the most serious geopolitical crisis in Central and Eastern Europe since the end of the Cold War. Its implications extend well beyond the borders of Ukraine, and its impact on the security of the wider Black Sea region is, as yet, neither contained nor fully understood.This book contains 28 articles on the topic of hybrid warfare and related threats, delivered at the NATO Advanced Research Workshop (ARW) 'Countering Hybrid Threats: Lessons Learned from Ukraine', held in Bucharest, Romania, in September 2015. This event brought together 50 experts from different fields and perspectives, including policymakers, security and intelligence practitioners, and academics. The presentations explored the nature of the Ukrainian conflict and the dynamic evolution of current security threats in Central and Eastern Europe and the Black Sea region with the aim of identifying the key drivers of the conflict and exploring the most efficient instruments and methods for conflict resolution. The book is divided into four sections entitled: challenges of hybrid warfare: multiple perspectives; hybrid war - an old concept with an extensive dimension; counteracting hybrid threats: lessons learned from Ukraine; and finally, the implications of the Ukrainian conflict for regional and Euro-Atlantic security.The book provides a timely reflection on recent events and will be of interest to all those wishing to improve their understanding of hybrid warfare and conflict resolution.

Book Terrorist Use of Cyberspace and Cyber Terrorism  New Challenges and Responses

Download or read book Terrorist Use of Cyberspace and Cyber Terrorism New Challenges and Responses written by M.N. Ogun and published by IOS Press. This book was released on 2015-10-08 with total page 223 pages. Available in PDF, EPUB and Kindle. Book excerpt: ICT plays a crucial role in the pursuit of modernization in the countries of Slovenia, Croatia, Albania and Bulgaria, which form the South Eastern European (SEE) region., The quest for Euro-Atlantic integration and the undeniable necessity for direct foreign investment have encouraged the SEE countries to invest in the development of cyber technology, and it has become the dominant area for social, economic and political interaction within the region. This has had both positive and negative consequences. This book presents the proceedings of the NATO Advanced Training Course (ATC), held in Ohrid, former Yugoslav Republic of Macedonia, in December 2014. The ATC addressed serious concerns about terrorist use of cyber technology in South Eastern Europe, which not only has the potential to destabilize regional efforts to create a platform for increased development by creating a breeding ground for the training of extremists and the launching of cyber attacks, but also represents a direct and indirect threat to the security and stability of other NATO partner countries. The book will be of interest to all those involved in countering the threat posed by terrorist use of the Internet worldwide.

Book A novel decision probability transformation method based on belief interval

Download or read book A novel decision probability transformation method based on belief interval written by Zhan Deng and published by Infinite Study. This book was released on with total page 11 pages. Available in PDF, EPUB and Kindle. Book excerpt: In Dempster–Shafer evidence theory, the basic probability assignment (BPA) can effectively represent and process uncertain information. How to transform the BPA of uncertain information into a decision probability remains a problem to be solved. In the light of this issue, we develop a novel decision probability transformation method to realize the transition from the belief decision to the probability decision in the framework of Dempster–Shafer evidence theory. The newly proposed method considers the transformation of BPA with multi-subset focal elements from the perspective of the belief interval, and applies the continuous interval argument ordered weighted average operator to quantify the data information contained in the belief interval for each singleton. Afterward, we present an approach to calculate the support degree of the singleton based on quantitative data information. According to the support degree of the singleton, the BPA of multi-subset focal elements is allocated reasonably. Furthermore, we introduce the concepts of probabilistic information content in this paper, which is utilized to evaluate the performance of the decision probability transformation method. Eventually, a few numerical examples and a practical application are given to demonstrate the rationality and accuracy of our proposed method.

Book Dual iris authentication system using Dezert Smarandache theory

Download or read book Dual iris authentication system using Dezert Smarandache theory written by Kamel Ghanem Ghalem and published by Infinite Study. This book was released on with total page 10 pages. Available in PDF, EPUB and Kindle. Book excerpt: In this paper, a dual iris authentication using Dezert-Smarandache theory is presented. The proposed method consists of three main steps: In the first one, the iris images are segmented in order to extract only half iris disc that contains relevant information and is less affected by noise. For that, a Hough transform is used. The segmented images are normalized by Daugman rubber sheet model. In the second step, the normalized images are analyzed by a bench of two 1D Log-Gabor filters to extract the texture characteristics. The encoding is realized with a phase of quantization developed by J. Daugman to generate the binary iris template. For the authentication and the similarity measurement between both binary irises templates, the hamming distances are used with a previously calculated threshold. The score fusion is applied using DSmC combination rule. The proposed method has been tested on a subset of iris database CASIA-IrisV3-Interval. The obtained results give a satisfactory performance with accuracy of 99.96%, FAR of 0%, FRR of 3.89%, EER of 2% and processing time for one iris image of 12.36 s.

Book Defence Management

Download or read book Defence Management written by Hari Bucur-Marcu and published by . This book was released on 2009 with total page 206 pages. Available in PDF, EPUB and Kindle. Book excerpt: his first volume in the Security and Defence Management Series focuses on practical aspects of democratic defence management through the eyes of practioners. Outlining in simple terms the key issues defence professionals must address to ensure good governance of the defence sector from within the defence establishment, the book provides an introduction to these issues for new defence professionals in transition democracies.