You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Enterprises and organizations of any kind embedded in today's economic environment are deeply dependent on their ability to take part in collaborations. Consequently, it is strongly required for them to get actively involved for their own benefit in emerging, potentially opportunistic collaborative enterprise networks. The concept of “interoperability” has been defined by INTEROP-VLab as “The ability of an enterprise system or application to interact with others at a low cost in a flexible approach”. Consequently, interoperability of organizations appears as a major issue to succeed in building on the fly emerging enterprise networks. The International Conference on Interoperability ...
This book will highlight cutting-edge research with a particular emphasis on interdisciplinary approaches, novel techniques, and solutions to provide digital image security for applications in diverse areas. It further discusses important topics such as biometric imaging, big data security and privacy in healthcare, security and privacy in the internet of things, and security in cloud-based image processing. This book Presents new ideas, approaches, theories, and practices with a focus on digital image security and privacy solutions for real-world applications. Discusses security in cloud-based image processing for smart city applications. Provides an overview of innovative security techniqu...
This two-volume set of LNCS 12736-12737 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 93 full papers and 29 short papers presented in this two-volume proceedings was carefully reviewed and selected from 1013 submissions. Overall, a total of 224 full and 81 short papers were accepted for ICAIS 2021; the other accepted papers are presented in CCIS 1422-1424. The papers were organized in topical sections as follows: Part I: Artificial intelligence; and big data Part II: Big data; cloud computing and security; encryption and cybersecurity; information hiding; IoT security; and multimedia forensics
The three-volume set of LNCS 11953, 11954, and 11955 constitutes the proceedings of the 26th International Conference on Neural Information Processing, ICONIP 2019, held in Sydney, Australia, in December 2019. The 173 full papers presented were carefully reviewed and selected from 645 submissions. The papers address the emerging topics of theoretical research, empirical studies, and applications of neural information processing techniques across different domains. The third volume, LNCS 11955, is organized in topical sections on semantic and graph based approaches; spiking neuron and related models; text computing using neural techniques; time-series and related models; and unsupervised neural models.
The 3-volume set CCIS 1422, CCIS 1423 and CCIS 1424 constitutes the refereed proceedings of the 7th International Conference on Artificial Intelligence and Security, ICAIS 2021, which was held in Dublin, Ireland, in July 2021. The total of 131 full papers and 52 short papers presented in this 3-volume proceedings was carefully reviewed and selected from 1013 submissions. The papers were organized in topical sections as follows: Part I: artificial intelligence; Part II: artificial intelligence; big data; cloud computing and security; Part III: cloud computing and security; encryption and cybersecurity; information hiding; IoT security.
During the last decade, novel graphene related materials (GRMs), perovskites, as well as metal oxides and other metal nanostructures have received the interest of the scientific community. Due to their extraordinary physical, optical, thermal, and electrical properties, which are correlated with their 2D ultrathin atomic layer structure, large interlayer distance, ease of functionalization, and bandgap tunability, these nanomaterials have been applied in the development or the improvement of innovative optoelectronic applications, as well as the expansion of theoretical studies and simulations in the fast-growing fields of energy (photovoltaics, energy storage, fuel cells, hydrogen storage, ...
Data Mining is the process of posing queries and extracting useful information, patterns and trends previously unknown from large quantities of data [Thu, 00]. It is the process where intelligent tools are applied in order to extract data patterns [JM, 01]. This encompasses a number of different technical approaches, such as cluster analysis, learning classification and association rules, and finding dependencies. Agents are defined as software entities that perform some set of tasks on behalf of users with some degree of autonomy. This research work deals about developing a automated data mining system which encompasses the familiar data mining algorithms using intelligent agents in object ...
Seventeen-year-old Jiang Cheng is cast aside by his adoptive parents and sent to a desolate northern town to live with his gambling-obsessed, deadbeat father. Arriving with just a suitcase, a pack of cigarettes, and a looming sense of dread over his uncertain future, he steps off the train and into a bleak, rundown place far from everything he knows. There, he meets Gu Miao, a quiet, troubled girl, and her brother Gu Fei, a boy his age with musical notes shaved into his hair. Disenchanted with life, Jiang Cheng and Gu Fei are reluctant to connect, but fate--and Gu Miao--have other plans. In this frigid snow-covered town, hope seems frozen in time, yet the unexpected bond between Jiang Cheng and Gu Fei might prove to be the warmth they both desperately need.