You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, that is composed of three different volumes.
The purpose of designing this book is to discuss and analyze security protocols available for communication. Objective is to discuss protocols across all layers of TCP/IP stack and also to discuss protocols independent to the stack. Authors will be aiming to identify the best set of security protocols for the similar applications and will also be identifying the drawbacks of existing protocols. The authors will be also suggesting new protocols if any.
Researchers, academicians and professionals expone in this book their research in the application of intelligent computing techniques to software engineering. As software systems are becoming larger and complex, software engineering tasks become increasingly costly and prone to errors. Evolutionary algorithms, machine learning approaches, meta-heuristic algorithms, and others techniques can help the effi ciency of software engineering.
Artificial intelligence (AI) is beginning to appear in everything from writing, social media, and business to wartime or intelligence strategy. With so many applications in our everyday lives and in the systems that run them, many are demanding that ethical implications are considered before any one application of AI goes too far and causes irreparable damage to the personal data or operations of individuals, governments, and organizations. For instance, AI that is fed data sets that are influenced by human data collection method biases may be perpetuating societal biases with implicit bias that can create serious consequences. Applications of AI with implicit bias on recidivism prediction m...
THIS IS VOLUME ONE OF THE ATTEMPTED TRANSLATION OF THE MADARIJUN NUBUWWAT OF SHAYKH ABDUL HAQ MUHADDITH DELHVI RADI ALLAHU ON THE DETAILED LIFE OF NABI KAREEM SALL ALLLAHU ALAIHI WA SALLAM
None
While doctors and physicians are more than capable of detecting diseases of the brain, the most agile human mind cannot compete with the processing power of modern technology. Utilizing algorithmic systems in healthcare in this way may provide a way to treat neurological diseases before they happen. Early Detection of Neurological Disorders Using Machine Learning Systems provides innovative insights into implementing smart systems to detect neurological diseases at a faster rate than by normal means. The topics included in this book are artificial intelligence, data analysis, and biomedical informatics. It is designed for clinicians, doctors, neurologists, physiotherapists, neurorehabilitation specialists, scholars, academics, and students interested in topics centered on biomedical engineering, bio-electronics, medical electronics, physiology, neurosciences, life sciences, and physics.
The early 2020s have been marked by a surge of interest in artificial intelligence (AI), and it has grown to be one of the hottest topics in computer science, business technology research, and educational technologies. Despite AI winters in the 1970s and 1990s, where interest and subsequently adequate funding for AI research ceased, and as the technology and its usefulness become more perceptible, often with brilliant results, society is once again ready to investigate this powerful technology and its potential. However, a challenge arises when AI is called into question in an ethical context. It is important that we explore how it can contribute to the resolution of ethical, social, and env...
Wireless network security research is multidisciplinary in nature, including data analysis, economics, mathematics, forensics, information technology, and computer science. This text covers cutting-edge research in computational intelligence systems from diverse fields on the complex subject of wireless communication security. It discusses important topics including computational intelligence in wireless network and communications, artificial intelligence and wireless communication security, security risk scenarios in communications, security/resilience metrics and their measurements, data analytics of cyber-crimes, modeling of wireless communication security risks, advances in cyber threats...
Cyberfeminism and Gender Violence in Social Media is a timely and essential book that addresses the increasing violence against women on social media platforms. With the rise of digitalization and the advent of social media, women have been subjected to various forms of violence such as cyberbullying, trolling, and body shaming. This volume compiles research works on the topic of how women fall prey to social networking sites and possible remedial actions to prevent such issues. The book provides an interdisciplinary approach, making it relevant to a wide range of fields such as social science, humanities, technology, and management. It creates awareness among people, especially women, about...