You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 6th International Conference on Big Data analytics, BDA 2018, held in Warangal, India, in December 2018. The 29 papers presented in this volume were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections named: big data analytics: vision and perspectives; financial data analytics and data streams; web and social media data; big data systems and frameworks; predictive analytics in healthcare and agricultural domains; and machine learning and pattern mining.
The proceedings features several key-note addresses in the areas of advanced information processing tools. This area has been recognized to be one of the key five technologies poised to shape the modern society in the next decade. It aptly focuses on the tools and techniques for the development of Information Systems. Emphasis is on pattern recognition and image processing, software engineering, mobile ad hoc networks, security aspects in computer networks, signal processing and hardware synthesis, optimization techniques, data mining and information processing.
The two-volume set LNAI 13725 and 13726 constitutes the proceedings of the 18th International Conference on Advanced Data Mining and Applications, ADMA 2022, which took place in Brisbane, Queensland, Australia, in November 2022. The 72 papers presented in the proceedings were carefully reviewed and selected from 198 submissions. The contributions were organized in topical sections as follows: Finance and Healthcare; Web and IoT Applications; On-device Application; Other Applications; Pattern Mining; Graph Mining; Text Mining; Image, Multimedia and Time Series Data Mining; Classification, Clustering and Recommendation; Multi-objective, Optimization, Augmentation, and Database; and Others.
The book covers current developments in the field of expert applications and security, which employ advances of next-generation communication and computational technology to shape real-world applications. It gathers selected research papers presented at the ICETEAS 2018 conference, which was held at Jaipur Engineering College and Research Centre, Jaipur, India, on February 17–18, 2018. Key topics covered include expert applications and artificial intelligence; information and application security; advanced computing; multimedia applications in forensics, security and intelligence; and advances in web technologies: implementation and security issues.
"Most users want their Twitter feed, Facebook page, and YouTube comments to be free of harassment and porn. Whether faced with 'fake news' or livestreamed violence, 'content moderators'--who censor or promote user-posted content--have never been more important. This is especially true when the tools that social media platforms use to curb trolling, ban hate speech, and censor pornography can also silence the speech you need to hear. [The author] provides an overview of current social media practices and explains the underlying rationales for how, when, and why these policies are enforced. In doing so, [the author] highlights that content moderation receives too little public scrutiny even as it is shapes social norms and creates consequences for public discourse, cultural production, and the fabric of society. Based on interviews with content moderators, creators, and consumers, this ... book is ... for anyone who's ever clicked 'like' or 'retweet.'"--
This book constitutes the refereed conference proceedings of the 5th International Conference on Big Data Analytics, BDA 2017, held in Hyderabad, India, in December 2017. The 21 revised full papers were carefully reviewed and selected from 80 submissions and cover topics on big data analytics, information and knowledge management, mining of massive datasets, computational modeling, data mining and analysis.
Second in the series of TERIs annual flagship publication on global sustainable development, People, Planet and Progress Beyond 2015 examines six critical issues of the Planet (climate change, ozone layer depletion, loss of biodiversity, desertification, unsustainable use of natural resources, and environmental pollution) and six crucial issues of the People (food security and safety, health and well-being, education and learning, sustainable habitat, energy for all, and social justice and equity), reviews the Progress made by various regions and countries of the world on each of these issues, and analyses the challenges and opportunities ahead, particularly in the contexts of post-2015 global development agendas, ushered by the Paris Climate Agreement, UN Sustainable Development Goals, and Sendai Framework for Disaster Risk Reduction. The analysis is supported by primary data from authentic sources on a wide range of indicators that make the volume an invaluable resource material on contemporary discourses on global development.
This book is associated with the cybersecurity issues and provides a wide view of the novel cyber attacks and the defense mechanisms, especially AI-based Intrusion Detection Systems (IDS). Features: A systematic overview of the state-of-the-art IDS Proper explanation of novel cyber attacks which are much different from classical cyber attacks Proper and in-depth discussion of AI in the field of cybersecurity Introduction to design and architecture of novel AI-based IDS with a trans- parent view of real-time implementations Covers a wide variety of AI-based cyber defense mechanisms, especially in the field of network-based attacks, IoT-based attacks, multimedia attacks, and blockchain attacks. This book serves as a reference book for scientific investigators who need to analyze IDS, as well as researchers developing methodologies in this field. It may also be used as a textbook for a graduate-level course on information security.