You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Collective Intelligence for Smart Cities begins with an overview of the fundamental issues and concepts of smart cities. Surveying the current state-of-the-art research in the field, the book delves deeply into key smart city developments such as health and well-being, transportation, safety, energy, environment and sustainability. In addition, the book focuses on the role of IoT cloud computing and big data, specifically in smart city development. Users will find a unique, overarching perspective that ties together these concepts based on collective intelligence, a concept for quantifying mass activity familiar to many social science and life science researchers.Sections explore how group d...
The rapid advance of Internet of Things (IoT) technologies has resulted in the number of IoT-connected devices growing exponentially, with billions of connected devices worldwide. While this development brings with it great opportunities for many fields of science, engineering, business and everyday life, it also presents challenges such as an architectural bottleneck – with a very large number of IoT devices connected to a rather small number of servers in Cloud data centers – and the problem of data deluge. Edge computing aims to alleviate the computational burden of the IoT for the Cloud by pushing some of the computations and logics of processing from the Cloud to the Edge of the Int...
Computational optimization is an important paradigm with a wide range of applications. In virtually all branches of engineering and industry, we almost always try to optimize something - whether to minimize the cost and energy consumption, or to maximize profits, outputs, performance and efficiency. In many cases, this search for optimality is challenging, either because of the high computational cost of evaluating objectives and constraints, or because of the nonlinearity, multimodality, discontinuity and uncertainty of the problem functions in the real-world systems. Another complication is that most problems are often NP-hard, that is, the solution time for finding the optimum increases e...
Self-organizing approaches inspired from biological systems, such as social insects, genetic, molecular and cellular systems under morphogenesis, and human mental development, has enjoyed great success in advanced robotic systems that need to work in dynamic and changing environments. Compared with classical control methods for robotic systems, the major advantages of bio-inspired self-organizing robotic systems include robustness, self-repair and self-healing in the presence of system failures and/or malfunctions, high adaptability to environmental changes, and autonomous self-organization and self-reconfiguration without a centralized control. “Bio-inspired Self-organizing Robotic Systems” provides a valuable reference for scientists, practitioners and research students working on developing control algorithms for self-organizing engineered collective systems, such as swarm robotic systems, self-reconfigurable modular robots, smart material based robotic devices, unmanned aerial vehicles, and satellite constellations.
The series "Studies in Computational Intelligence" (SCI) publishes new developments and advances in the various areas of computational intelligence – quickly and with a high quality. The intent is to cover the theory, applications, and design methods of computational intelligence, as embedded in the fields of engineering, computer science, physics and life science, as well as the methodologies behind them. The series contains monographs, lecture notes and edited volumes in computational intelligence spanning the areas of neural networks, connectionist systems, genetic algorithms, evolutionary computation, artificial intelligence, cellular automata, self-organizing systems, soft computing, ...
Intelligent Data Analysis for e-Learning: Enhancing Security and Trustworthiness in Online Learning Systems addresses information security within e-Learning based on trustworthiness assessment and prediction. Over the past decade, many learning management systems have appeared in the education market. Security in these systems is essential for protecting against unfair and dishonest conduct-most notably cheating-however, e-Learning services are often designed and implemented without considering security requirements. This book provides functional approaches of trustworthiness analysis, modeling, assessment, and prediction for stronger security and support in online learning, highlighting the...
As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privacy in big data, cloud computing, and their applications. Topics include cryptographic tools, SDN security, big data security in IoT, privacy preserving in big data, security architecture based on cyber kill chain, privacy-aware digital forensics, trustworthy computing, privacy verification based on machine learning, and chaos-based communication systems. This book is an essential reading for networking, computing, and communications professionals, researchers, students and engineers, working with big data and cloud computing.
This volume is the second part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 72 revised full papers presented in this volume were carefully reviewed and selected from a large number of submissions. The papers are organized in topical sections on database and information systems; distributed software development; human computer interaction and interface; ICT; internet and Web computing; mobile computing; multi agent systems; multimedia and video systems; parallel and distributed algorithms; security, trust and privacy.
The theme of surveillance has become an increasingly common element in movies and television shows, perhaps as a response to the sense that the world is now virtually under watch. But the recent surge of this filmic device calls for an explanation that transcends the basic assumption that media illustrates the changes of society. The persistent and growing presence of surveillance in cinematic productions is not merely a reflection of the advent of surveillance societies, but rather an aesthetic adaptation to the evolution of watching patterns. In Surveillance on Screen: Monitoring Contemporary Films and Television Programs, S bastien Lefait examines this ever-increasing phenomenon. Drawing ...
Medical imaging has transformed the ways in which various conditions, injuries, and diseases are identified, monitored, and treated. As various types of digital visual representations continue to advance and improve, new opportunities for their use in medical practice will likewise evolve. Medical Imaging: Concepts, Methodologies, Tools, and Applications presents a compendium of research on digital imaging technologies in a variety of healthcare settings. This multi-volume work contains practical examples of implementation, emerging trends, case studies, and technological innovations essential for using imaging technologies for making medical decisions. This comprehensive publication is an essential resource for medical practitioners, digital imaging technologists, researchers, and medical students.