You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The book is a collection of peer-reviewed best selected research papers presented at the International Conference on Data Intelligence and Cognitive Informatics (ICDICI 2023), organized by SCAD College of Engineering and Technology, Tirunelveli, India, during June 27–28, 2023. This book discusses new cognitive informatics tools, algorithms and methods that mimic the mechanisms of the human brain which lead to an impending revolution in understating a large amount of data generated by various smart applications. The book includes novel work in data intelligence domain which combines with the increasing efforts of artificial intelligence, machine learning, deep learning and cognitive science to study and develop a deeper understanding of the information processing systems.
Data stealing is a major concern on the internet as hackers and criminals have begun using simple tricks to hack social networks and violate privacy. Cyber-attack methods are progressively modern, and obstructing the attack is increasingly troublesome, regardless of whether countermeasures are taken. The Dark Web especially presents challenges to information privacy and security due to anonymous behaviors and the unavailability of data. To better understand and prevent cyberattacks, it is vital to have a forecast of cyberattacks, proper safety measures, and viable use of cyber-intelligence that empowers these activities. Dark Web Pattern Recognition and Crime Analysis Using Machine Intellige...
This book consists of a collection of the high-quality research articles in the field of computer vision and robotics which are presented in the International Conference on Computer Vision and Robotics (CVR 2023), organized by BBD University Lucknow, India, during 24–25 February 2023. The book discusses applications of computer vision and robotics in the fields like medical science, defence, and smart city planning. The book presents recent works from researchers, academicians, industry, and policy makers.
COGNITIVE ANALYTICS AND REINFORCEMENT LEARNING The combination of cognitive analytics and reinforcement learning is a transformational force in the field of modern technological breakthroughs, reshaping the decision-making, problem-solving, and innovation landscape; this book offers an examination of the profound overlap between these two fields and illuminates its significant consequences for business, academia, and research. Cognitive analytics and reinforcement learning are pivotal branches of artificial intelligence. They have garnered increased attention in the research field and industry domain on how humans perceive, interpret, and respond to information. Cognitive science allows us t...
As cyber threats become increasingly sophisticated, the need for innovative defense strategies becomes urgent. Generative artificial intelligence (AI) offers a revolutionary approach to enhance cybersecurity. By utilizing advanced algorithms, data analysis, and machine learning, generative AI can simulate complex attack scenarios, identify vulnerabilities, and develop proactive defense mechanisms while adapting to modern-day cyber-attacks. AI strengthens current organizational security while offering quick, effective responses to emerging threats. Decisive strategies are needed to integrate generative AI into businesses defense strategies and protect organizations from attacks, secure digita...
This book discusses state-of-the-art reviews of the existing machine learning techniques and algorithms including hybridizations and optimizations. It covers applications of machine learning via artificial intelligence (AI) prediction tools, discovery of drugs, neuroscience, diagnosis in multiple imaging modalities, pattern recognition approaches to functional magnetic resonance imaging, image and speech recognition, automatic language translation, medical diagnostic, stock market prediction, traffic prediction, and product automation. Features: • Focuses on hybridization and optimization of machine learning techniques. • Reviews supervised, unsupervised, and reinforcement learning using...
This book presents the proceedings of the International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2022. The conference provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate, and promote research and technology in the upcoming areas of computing, information, communication, and their applications. The book discusses these emerging research areas, providing a valuable resource for researchers and practicing engineers alike.
Agri 4.0 and the Future of Cyber-Physical Agricultural Systems is the first book to explore the potential use of technology in agriculture with the focus on the technologies, enabling the reader to better comprehend the full range of CPS opportunities. From planning to distribution, CPS technologies are available to impact agricultural output, delivery and consumption. The impact for food security may be significant and this book explores ways to implement CPS effectively and appropriately. Technology, especially computing technology, can play a significant in the field of agriculture by processing digitized data to solve the complex agronomic, agricultural demand and supply issues that impa...
None
In recent years, industries have shifted into the digital domain, as businesses and organizations have used various forms of technology to aid information storage and efficient production methods. Because of these advances, the risk of cybercrime and data security breaches has skyrocketed. Fortunately, cyber security and data privacy research are thriving; however, industry experts must keep themselves updated in this field. Exploring Cyber Criminals and Data Privacy Measures collects cutting-edge research on information security, cybercriminals, and data privacy. It proposes unique strategies for safeguarding and preserving digital information using realistic examples and case studies. Covering key topics such as crime detection, surveillance technologies, and organizational privacy, this major reference work is ideal for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students.