You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Through the rise of big data and the internet of things, terrorist organizations have been freed from geographic and logistical confines and now have more power than ever before to strike the average citizen directly at home. This, coupled with the inherently asymmetrical nature of cyberwarfare, which grants great advantage to the attacker, has created an unprecedented national security risk that both governments and their citizens are woefully ill-prepared to face. Examining cyber warfare and terrorism through a critical and academic perspective can lead to a better understanding of its foundations and implications. Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applicatio...
This illuminating text/reference presents a review of the key aspects of the modeling and simulation (M&S) life cycle, and examines the challenges of M&S in different application areas. The authoritative work offers valuable perspectives on the future of research in M&S, and its role in engineering complex systems. Topics and features: reviews the challenges of M&S for urban infrastructure, healthcare delivery, automated vehicle manufacturing, deep space missions, and acquisitions enterprise; outlines research issues relating to conceptual modeling, covering the development of explicit and unambiguous models, communication and decision-making, and architecture and services; considers key com...
This book constitutes the refereed post-proceedings of the 13th International Conference on AI, Simulation, and Planning in High Autonomy Systems, AIS 2004, held in Jeju Island, Korea in October 2004. The 74 revised full papers presented together with 2 invited keynote papers were carefully reviewed and selected from 170 submissions; after the conference, the papers went through another round of revision. The papers are organized in topical sections on modeling and simulation methodologies, intelligent control, computer and network security, HLA and simulator interoperation, manufacturing, agent-based modeling, DEVS modeling and simulation, parallel and distributed modeling and simulation, mobile computer networks, Web-based simulation and natural systems, modeling and simulation environments, AI and simulation, component-based modeling, watermarking and semantics, graphics, visualization and animation, and business modeling.
The present book includes a set of selected extended papers from the sixth International Joint Conference on Computational Intelligence (IJCCI 2014), held in Rome, Italy, from 22 to 24 October 2014. The conference was composed by three co-located conferences: The International Conference on Evolutionary Computation Theory and Applications (ECTA), the International Conference on Fuzzy Computation Theory and Applications (FCTA), and the International Conference on Neural Computation Theory and Applications (NCTA). Recent progresses in scientific developments and applications in these three areas are reported in this book. IJCCI received 210 submissions, from 51 countries, in all continents. Af...
Intelligent Information Systems (IIS) can be defined as the next generation of Information Systems (IS) developed as a result of integration of AI and database (DB) technologies. IIS embody knowledge that allows them to exhibit intelligent behavior, allows them to cooperate with users and other systems in problem solving, discovery, retrieval, and manipulation of data and knowledge. For any IIS to serve its purpose, the information must be available when it is needed. This means that the computing systems used to store data and process the information, and the security controls used to protect it must be functioning correctly. This book covers some of the above topics and it is divided into four sections: Classification, Approximation and Data Security, Knowledge Management, and Application of IIS to medical and music domains.
Connected and automated vehicles have revolutionized the way we move, granting new services on roads. This Special Issue collects contributions that address reliable and ultra-low-latency vehicular applications that range from advancements at the access layer, such as using the visible light spectrum to accommodate ultra-low-latency applications, to data dissemination solutions. Further, articles discuss edge computing, neural network-based techniques, and the use of reconfigurable intelligent surfaces (RIS) to boost throughput and enhance coverage.