You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The Hero of Italy examines a salient episode in Italy's Thirty Years' War with Spain and France, whereby the young duke Odoardo Farnese of Parma embraced the French alliance, only to experience defeat and occupation after two tumultuous years (1635-1637). Gregory Hanlon stresses the narrative of events unfolding in northern Italy, examining the participation of the little state in these epic European events. The first chapter describes the constitution of Cardinal Richelieu's anti-Habsburg alliance and Odoardo's eagerness to be part of it. A chapter on the Parman professional army, based on an extraordinary collection of company roster-books, sheds light on the identity of over 13,000 indivi...
This book deals with "crypto-biometrics", a relatively new and multi-disciplinary area of research (started in 1998). Combining biometrics and cryptography provides multiple advantages, such as, revocability, template diversity, better verification accuracy, and generation of cryptographically usable keys that are strongly linked to the user identity. In this text, a thorough review of the subject is provided and then some of the main categories are illustrated with recently proposed systems by the authors. Beginning with the basics, this text deals with various aspects of crypto-biometrics, including review, cancelable biometrics, cryptographic key generation from biometrics, and crypto-biometric key sharing protocols. Because of the thorough treatment of the topic, this text will be highly beneficial to researchers and industry professionals in information security and privacy. Table of Contents: Introduction / Cancelable Biometric System / Cryptographic Key Regeneration Using Biometrics / Biometrics-Based Secure Authentication Protocols / Concluding Remarks
This two-volume set LNICST 335 and 336 constitutes the post-conference proceedings of the 16th International Conference on Security and Privacy in Communication Networks, SecureComm 2020, held in Washington, DC, USA, in October 2020. The conference was held virtually due to COVID-19 pandemic. The 60 full papers were carefully reviewed and selected from 120 submissions. The papers focus on the latest scientific research results in security and privacy in wired, mobile, hybrid and ad hoc networks, in IoT technologies, in cyber-physical systems, in next-generation communication systems in web and systems security and in pervasive and ubiquitous computing.
Artificial Intelligence and Knowledge Processing play a vital role in various automation industries and their functioning in converting traditional industries to AI-based factories. This book acts as a guide and blends the basics of Artificial Intelligence in various domains, which include Machine Learning, Deep Learning, Artificial Neural Networks, and Expert Systems, and extends their application in all sectors. Artificial Intelligence and Knowledge Processing: Improved Decision-Making and Prediction, discusses the designing of new AI algorithms used to convert general applications to AI-based applications. It highlights different Machine Learning and Deep Learning models for various appli...
This two-volume book constitutes the post-conference proceedings of the 5th International Conference on Advances in Computing and Data Sciences, ICACDS 2021, held in Nashik, India, in April 2021.* The 103 full papers were carefully reviewed and selected from 781 submissions. The papers in Part I and II are centered around topics like distributed systems organizing principles, development frameworks and environments, software verification and validation, computational complexity and cryptography, machine learning theory, database theory, probabilistic representations database management system engines, data mining, information retrieval query processing, database and storage security, ubiquitous and mobile computing, parallel computing methodologies, and others. *The conference was held virtually due to the COVID-19 pandemic.
The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed chapters by leading experts in the areas of networking and systems security, information management, cyber wa...
The book is centrally focused on human computer Interaction and how sensors within small and wide groups of Nano-robots employ Deep Learning for applications in industry. It covers a wide array of topics that are useful for researchers and students to gain knowledge about AI and sensors in nanobots. Furthermore, the book explores Deep Learning approaches to enhance the accuracy of AI systems applied in medical robotics for surgical techniques. Secondly, we plan to explore bio-nano-robotics, which is a field in nano-robotics, that deals with automatic intelligence handling, self-assembly and replication, information processing and programmability.
This book highlights recent research on intelligent systems and nature-inspired computing. It presents 223 selected papers from the 22nd International Conference on Intelligent Systems Design and Applications (ISDA 2022), which was held online. The ISDA is a premier conference in the field of computational intelligence, and the latest installment brought together researchers, engineers, and practitioners whose work involves intelligent systems and their applications in industry. Including contributions by authors from 65 countries, the book offers a valuable reference guide for all researchers, students, and practitioners in the fields of computer science and engineering.
Cross disciplinary biometric systems help boost the performance of the conventional systems. Not only is the recognition accuracy significantly improved, but also the robustness of the systems is greatly enhanced in the challenging environments, such as varying illumination conditions. By leveraging the cross disciplinary technologies, face recognition systems, fingerprint recognition systems, iris recognition systems, as well as image search systems all benefit in terms of recognition performance. Take face recognition for an example, which is not only the most natural way human beings recognize the identity of each other, but also the least privacy-intrusive means because people show their...
This volume is part of the two-volume proceedings of the 19th International Conf- ence on Artificial Neural Networks (ICANN 2009), which was held in Cyprus during September 14–17, 2009. The ICANN conference is an annual meeting sp- sored by the European Neural Network Society (ENNS), in cooperation with the - ternational Neural Network Society (INNS) and the Japanese Neural Network Society (JNNS). ICANN 2009 was technically sponsored by the IEEE Computational Intel- gence Society. This series of conferences has been held annually since 1991 in various European countries and covers the field of neurocomputing, learning systems and related areas. Artificial neural networks provide an informa...