You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book explores and discusses various aspects of intelligent systems technologies and their applications. It constitutes the thoroughly refereed post-conference proceedings of the 4th International Symposium on Intelligent Systems Technologies and Applications (ISTA’18), September 19-22, 2018, Bangalore, India. All submissions were evaluated on the basis of their significance, novelty, and technical quality. This book contains 20 papers selected for presentation at the Symposium. The book is chiefly intended for, and offers a valuable resource for, researchers and scientists engaged in various fields involving intelligent systems.
This book constitutes the refereed post-conference proceedings of a Workshop focussing on Text Processing, held at the Forum for Information Retrieval Evaluation, FIRE 2016, in Kolkata, India, in December 2016. 16 full papers have been selected for inclusion in the book out of 19 submissions. The papers refer to the following seven tracks: Consumer Health Information Search (CHIS), Detecting Paraphrases in Indian Languages (DPIL), Information Extraction from Microblogs Posted during Disasters, Persian Plagiarism Detection (PersianPlagDet), Personality Recognition in SOurce COde (PR-SOCO), Shared Task on Mixed Script Information Retrieval (MSIR), and Shared Task on Code Mix Entity Extraction in Indian Languages (CMEE-IL).
Bangalore is capital of Karnataka State. This Book is one volume in the series of Directories on Cell - Phone users in JAYANAGAR, Bangalore. Users of Telephones, Cellular Phones are listed FREE in the Printed Directory, which is distributed free to every one listed in it. In addition same contents are available in THIS Digital Edition, which is updated every week.
This book constitutes the proceedings of the Second International Conference on Mining Intelligence and Knowledge Exploration, MIKE 2014, held in Cork, Ireland, in December 2014. The 40 papers presented were carefully reviewed and selected from 69 submissions. The papers cover topics such as information retrieval, feature selection, classification, clustering, image processing, network security, speech processing, machine learning, recommender systems, natural language processing, language, cognition and computation, and business intelligence.
The book includes research papers on current developments in the field of soft computing and signal processing, selected from papers presented at the International Conference on Soft Computing and Signal Processing (ICSCSP 2018). It features papers on current topics, such as soft sets, rough sets, fuzzy logic, neural networks, genetic algorithms and machine learning. It also discusses various aspects of these topics, like technologies, product implementation, and application issues.
This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application. It gathers contributions by both academic and industrial researchers, covering all aspects of cybersecurity and addressing issues in secure information systems as well as other emerging areas. The content comprises high-quality research articles and reviews that promote a multidisciplinary approach and reflect the latest advances, challenges, requirements and methodologies. Thus, the book investigates e.g. security vulnerabilities, cybercrime, and privacy issues related to big data analy...
Today, Artificial Intelligence (AI) and Machine Learning/ Deep Learning (ML/DL) have become the hottest areas in information technology. In our society, many intelligent devices rely on AI/ML/DL algorithms/tools for smart operations. Although AI/ML/DL algorithms and tools have been used in many internet applications and electronic devices, they are also vulnerable to various attacks and threats. AI parameters may be distorted by the internal attacker; the DL input samples may be polluted by adversaries; the ML model may be misled by changing the classification boundary, among many other attacks and threats. Such attacks can make AI products dangerous to use. While this discussion focuses on ...
This book features research papers presented at the 4th International Conference on Intelligent Sustainable Systems (ICISS 2021), held at SCAD College of Engineering and Technology, Tirunelveli, Tamil Nadu, India, during February 26–27, 2021. The book discusses the latest research works that discuss the tools, methodologies, practices, and applications of sustainable systems and computational intelligence methodologies. The book is beneficial for readers from both academia and industry.
This book constitutes the refereed post-conference proceedings of the 5th International Conference on Mining Intelligence and Knowledge Exploration, MIKE 2017, held in Hyderabad, India, in December 2017. The 40 full papers presented were carefully reviewed and selected from 139 submissions. The papers were grouped into various subtopics including arti ficial intelligence, machine learning, image processing, pattern recognition, speech processing, information retrieval, natural language processing, social network analysis, security, and fuzzy rough sets.