You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The health technology has become a hot topic in academic research. It employs the theory of social networks into the different levels of the prediction and analysis and has brought new possibilities for the development of technology. This book is a descriptive summary of challenges and methods using disease identification with various case studies from diverse authors across the globe. One of the new buzzwords in healthcare sector that has become popular over years is health informatics. Healthcare professionals must deal with an increasing number of computers and computer programs in their daily work. With rapid growth of digital data, the role of analytics in healthcare has created a signi...
In today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation. Social engineering attacks have emerged as a formidable and often underestimated threat to information security. The primary aim of this textbook is to provide a comprehensive and in-depth exploration of social engineering attacks. The book seeks to equip cybersecurity professionals, IT practitioners, students, and anyone concerned with information security with the knowledge and tools needed to recognize, prevent, and mitigate the risks posed by social engineering. The scope of this textbook is broad and multifaceted. It c...
None
This book is a compilation of research papers and presentations from the Fourth Annual International Conference on Data Science, Machine Learning and Blockchain Technology (AICDMB 2023, Mysuru, India, 16-17 March 2023). The book covers a wide range of topics, including data mining, natural language processing, deep learning, computer vision, big data analytics, cryptography, smart contracts, decentralized applications, and blockchain-based solutions for various industries such as healthcare, finance, and supply chain management. The research papers presented in this book highlight the latest advancements and practical applications in data science, machine learning, and blockchain technology, and provide insights into the future direction of these fields. The book serves as a valuable resource for researchers, students, and professionals in the areas of data science, machine learning, and blockchain technology.
The Social Internet of Things (SIoT) has become a hot topic in academic research. It employs the theory of social networks into the different levels of the Internet of Things (IoTs) and has brought new possibilities for the development of IoTs. Essentially, the SIoT is a subset of IoTs. It uses intelligent hardware and humans as the node, a social network as the organization type, the social relationship between things, things and humans, and between humans, formatting research methods and models with social network characteristics to realize the connection, service, and application of the IoTs. Moreover, SIoT is a form of realization of technology, architecture, and application of the IoTs ...
Cyber security is a key focus in the modern world as more private information is stored and saved online. In order to ensure vital information is protected from various cyber threats, it is essential to develop a thorough understanding of technologies that can address cyber security challenges. Artificial intelligence has been recognized as an important technology that can be employed successfully in the cyber security sector. Due to this, further study on the potential uses of artificial intelligence is required. Methods, Implementation, and Application of Cyber Security Intelligence and Analytics discusses critical artificial intelligence technologies that are utilized in cyber security and considers various cyber security issues and their optimal solutions supported by artificial intelligence. Covering a range of topics such as malware, smart grid, data breachers, and machine learning, this major reference work is ideal for security analysts, cyber security specialists, data analysts, security professionals, computer scientists, government officials, researchers, scholars, academicians, practitioners, instructors, and students.
In today's context of intricate global challenges, encompassing climate crises, resource scarcity, and social disparities, the imperative for sustainable development has never been more pressing. While academic scholars and researchers are instrumental in crafting solutions, they often grapple with the intricate balance between theoretical concepts and practical implementation. This gap impedes the transformation of innovative ideas into tangible societal progress, leaving a void where effective real-world strategies for cross-industry sustainability should flourish. "Fostering Cross-Industry Sustainability With Intelligent Technologies" seeks to bridge this divide. This book is more than ju...
This proceedings volume covers the proceedings of ERCICA 2015. ERCICA provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate and promote research and technology in the upcoming areas of Computing, Information, Communication and their Applications. The contents of this book cover emerging research areas in fields of Computing, Information, Communication and Applications. This will prove useful to both researchers and practicing engineers.