You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The use of artificial intelligence, especially in the field of optimization is increasing day by day. The purpose of this book is to explore the possibility of using different kinds of optimization algorithms to advance and enhance the tools used for computer and electrical engineering purposes.
This book presents the Proceedings of The 4th Brazilian Technology Symposium (BTSym'18). Part I of the book discusses current technological issues on Systems Engineering, Mathematics and Physical Sciences, such as the Transmission Line, Protein-modified mortars, Electromagnetic Properties, Clock Domains, Chebyshev Polynomials, Satellite Control Systems, Hough Transform, Watershed Transform, Blood Smear Images, Toxoplasma Gondi, Operation System Developments, MIMO Systems, Geothermal-Photovoltaic Energy Systems, Mineral Flotation Application, CMOS Techniques, Frameworks Developments, Physiological Parameters Applications, Brain Computer Interface, Artificial Neural Networks, Computational Vis...
INDUSTRIAL INTERNET OF THINGS (IIOT) This book discusses how the industrial internet will be augmented through increased network agility, integrated artificial intelligence (AI) and the capacity to deploy, automate, orchestrate, and secure diverse user cases at hyperscale. Since the internet of things (IoT) dominates all sectors of technology, from home to industry, automation through IoT devices is changing the processes of our daily lives. For example, more and more businesses are adopting and accepting industrial automation on a large scale, with the market for industrial robots expected to reach $73.5 billion in 2023. The primary reason for adopting IoT industrial automation in businesse...
Businesses in today’s world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.
This book addresses the topics related to artificial intelligence, the Internet of Things, blockchain technology, and machine learning. It brings together researchers, developers, practitioners, and users interested in cybersecurity and forensics. The first objective is to learn and understand the need for and impact of advanced cybersecurity and forensics and its implementation with multiple smart computational technologies. This objective answers why and how cybersecurity and forensics have evolved as one of the most promising and widely-accepted technologies globally and has widely-accepted applications. The second objective is to learn how to use advanced cybersecurity and forensics prac...
Modern education has increased its reach through ICT tools and techniques. To manage educational data with the help of modern artificial intelligence, data and web mining techniques on dedicated cloud or grid platforms for educational institutes can be used. By utilizing data science techniques to manage educational data, the safekeeping, delivery, and use of knowledge can be increased for better quality education. Utilizing Educational Data Mining Techniques for Improved Learning: Emerging Research and Opportunities is a critical scholarly resource that explores data mining and management techniques that promote the improvement and optimization of educational data systems. The book intends to provide new models, platforms, tools, and protocols in data science for educational data analysis and introduces innovative hybrid system models dedicated to data science. Including topics such as automatic assessment, educational analytics, and machine learning, this book is essential for IT specialists, data analysts, computer engineers, education professionals, administrators, policymakers, researchers, academicians, and technology experts.
This book explores new possibilities in the domain of abrasive waterjet machining (AWJM) of composites and polymers. AWJM is a sustainable and well industrialized process, but some parameters of AWJM process need to be optimized according to new composites materials and polymers to obtain the desired machining characteristics. This book presents the reader with the state of the art methodology to cut the advanced composite materials.
The demand for mobile broadband will continue to increase in upcoming years, largely driven by the need to deliver ultra-high definition video. 5G is not only evolutionary, it also provides higher bandwidth and lower latency than the current-generation technology. More importantly, 5G is revolutionary in that it is expected to enable fundamentally new applications with much more stringent requirements in latency and bandwidth. 5G should help solve the last-mile/last-kilometer problem and provide broadband access to the next billion users on earth at a much lower cost because of its use of new spectrum and its improvements in spectral efficiency. 5G wireless access networks will need to combi...
Semantic computing is critical for the development of semantic systems and applications that must utilize semantic analysis, semantic description, semantic interfaces, and semantic integration of data and services to deliver their objectives. Semantic computing has enormous capabilities to enhance the efficiency and throughput of systems that are based on key emerging concepts and technologies such as semantic web, internet of things, blockchain technology, and knowledge graphs. Thus, research that expounds advanced concepts, methods, technologies, and applications of semantic computing for solving challenges in real-world domains is vital. Advanced Concepts, Methods, and Applications in Sem...
COGNITIVE INTELLIGENCE AND BIG DATA IN HEALTHCARE Applications of cognitive intelligence, advanced communication, and computational methods can drive healthcare research and enhance existing traditional methods in disease detection and management and prevention. As health is the foremost factor affecting the quality of human life, it is necessary to understand how the human body is functioning by processing health data obtained from various sources more quickly. Since an enormous amount of data is generated during data processing, a cognitive computing system could be applied to respond to queries, thereby assisting in customizing intelligent recommendations. This decision-making process cou...