You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book gathers a collection of high-quality peer-reviewed research papers presented at International Conference on Cyber Intelligence and Information Retrieval (CIIR 2021), held at Institute of Engineering & Management, Kolkata, India during 20–21 May 2021. The book covers research papers in the field of privacy and security in the cloud, data loss prevention and recovery, high-performance networks, network security and cryptography, image and signal processing, artificial immune systems, information and network security, data science techniques and applications, data warehousing and data mining, data mining in dynamic environment, higher-order neural computing, rough set and fuzzy set theory, and nature-inspired computing techniques.
Two women of the same age, bearing uncannily similar names, hailed from different corners of their state. Fate brought them together in the bustling capital city, where they embarked on a peculiar journey of sharing an apartment. Despite their contrasting temperaments and divergent life aspirations, they discovered solace in one another's company. Through a series of trials and triumphs, they navigated the intricate tapestry of life, encountering various individuals along the way. The looming question remained: would they ultimately attain their respective goals? Could their friendship endure the relentless challenges that beset them?
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2020) held at the University of Engineering & Management, Kolkata, India, during July 2020. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers, and case studies related to all the areas of data mining, machine learning, Internet of things (IoT), and information security.
With the field of computational statistics growing rapidly, there is a need for capturing the advances and assessing their impact. Advances in simulation and graphical analysis also add to the pace of the statistical analytics field. Computational statistics play a key role in financial applications, particularly risk management and derivative pricing, biological applications including bioinformatics and computational biology, and computer network security applications that touch the lives of people. With high impacting areas such as these, it becomes important to dig deeper into the subject and explore the key areas and their progress in the recent past. Methodologies and Applications of Co...
This book offers the first social history of music in undivided Punjab (1800-1947), beginning at the Lahore court of Maharaja Ranjit Singh and concluding at the Patiala royal darbar. It unearths new evidence for the centrality of female performers and classical music in a region primarily viewed as a folk music centre, featuring a range of musicians and dancers -from 'mirasis' (bards) and 'kalawants' (elite musicians), to 'kanjris' (subaltern female performers) and 'tawaifs' (courtesans). A central theme is the rise of new musical publics shaped by the anglicized Punjabi middle classes, and British colonialists' response to Punjab's performing communities. The book reveals a diverse connoisseurship for music with insights from history, ethnomusicology, and geography on an activity that still unites a region now divided between India and Pakistan.
This volume constitutes the thoroughly refereed post-conference proceedings of the 5th International Conference on Swarm, Evolutionary, and Memetic Computing, SEMCCO 2014, held in Bhubaneswar, India, in December 2014. The total of 96 papers presented in this volume was carefully reviewed and selected from 250 submissions for inclusion in the proceedings. The papers cover a wide range of topics in swarm, evolutionary, memetic and other intelligent computing algorithms and their real world applications in problems selected from diverse domains of science and engineering.
This book gathers outstanding research papers presented at the 2nd International Conference on Frontiers in Computing and Systems (COMSYS 2021), organized by Department of Electronics and Communication Engineering and Department of Information Technology, North-Eastern Hill University, Shillong, Meghalaya, India held during September 29–October 1, 2021. The book presents the latest research and results in various fields of machine learning, computational intelligence, VLSI, networks and systems, computational biology, and security, making it a rich source of reference material for academia and industry alike.
Today, relevant data are typically delivered to cloud-based servers for storing and analysis in order to extract key features and enable enhanced applications beyond the basic transmission of raw data and to realize the possibilities associated with the impending Internet of Things (IoT). To allow for quicker, more efficient, and expanded privacy-preserving services, a new trend called Fog Computing has emerged: moving these responsibilities to the network's edge. Traditional centralized cloud computing paradigms confront new problems posed by IoT application growth, including high latency, limited storage, and outages due to a lack of available resources. Fog Computing puts the cloud and Io...
This book addresses a range of real-world issues including industrial activity, energy management, education, business and health. Today, technology is a part of virtually every human activity, and is used to support, monitor and manage equipment, facilities, commodities, industry, business, and individuals’ health, among others. As technology evolves, new applications, methods and techniques arise, while at the same time citizens’ expectations from technology continue to grow. In order to meet the nearly insatiable demand for new applications, better performance and higher reliability, trustworthiness, security, and power consumption efficiency, engineers must deliver smart innovations,...