You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Data mining techniques are commonly used to extract meaningful information from the web, such as data from web documents, website usage logs, and hyperlinks. Building on this, modern organizations are focusing on running and improving their business methods and returns by using opinion mining. Extracting Knowledge From Opinion Mining is an essential resource that presents detailed information on web mining, business intelligence through opinion mining, and how to effectively use knowledge retrieved through mining operations. While highlighting relevant topics, including the differences between ontology-based opinion mining and feature-based opinion mining, this book is an ideal reference source for information technology professionals within research or business settings, graduate and post-graduate students, as well as scholars.
Back in 1993, American Express launched its rupee cards in India. It was an operation similar to those it was running in other countries. Except for the curious fact that while the quality of the operations seemed to be better than elsewhere, the costs were much lower. Certain that something was wrong with the figures, the companys comptroller visited India, and found that the reports were indeed correct. That initial discovery would lead, shortly after, to the decision to locate the companys finance functions for the Asia-Pacific region in India. The centre was set up in the Mohan Cooperative Industrial Area, along Delhis busy Mathura Road, a beehive of corporate offices and factories that ...
EMERGING COMPUTING PARADIGMS A holistic overview of major new computing paradigms of the 21st Century In Emerging Computing Paradigms: Principles, Advances and Applications, international scholars offer a compendium of essential knowledge on new promising computing paradigms. The book examines the characteristics and features of emerging computing technologies and provides insight into recent technological developments and their potential real-world applications that promise to shape the future. This book is a useful resource for all those who wish to quickly grasp new concepts of, and insights on, emerging computer paradigms and pursue further research or innovate new novel applications har...
This book covers the growing convergence between Blockchain and Artificial Intelligence for Big Data, Multi-Agent systems, the Internet of Things and 5G technologies. Using real case studies and project outcomes, it illustrates the intricate details of blockchain in these real-life scenarios. The contributions from this volume bring a state-of-the-art assessment of these rapidly evolving trends in a creative way and provide a key resource for all those involved in the study and practice of AI and Blockchain.
The rise of internet and social media usage in the past couple of decades has presented a very useful tool for many different industries and fields to utilize. With much of the world’s population writing their opinions on various products and services in public online forums, industries can collect this data through various computational tools and methods. These tools and methods, however, are still being perfected in both collection and implementation. Sentiment analysis can be used for many different industries and for many different purposes, which could better business performance and even society. The Research Anthology on Implementing Sentiment Analysis Across Multiple Disciplines di...
FUZZY INTELLIGENT SYSTEMS A comprehensive guide to Expert Systems and Fuzzy Logic that is the backbone of artificial intelligence. The objective in writing the book is to foster advancements in the field and help disseminate results concerning recent applications and case studies in the areas of fuzzy logic, intelligent systems, and web-based applications among working professionals and those in education and research covering a broad cross section of technical disciplines. Fuzzy Intelligent Systems: Methodologies, Techniques, and Applications comprises state-of-the-art chapters detailing how expert systems are built and how the fuzzy logic resembling human reasoning, powers them. Engineers,...
This volume constitutes selected and revised papers presented at the First International Conference on Advancements in Interdisciplinary Research, AIR 2022, held in Allahabad, India, in May 2022. The 49 papers were thoroughly reviewed and selected from the 252 submissions. They are organized in topical sections on novel technologies enabled secured privacy models and optimized networking infrastructures toward secure industries; developments towards sustainable healthcare sector; machine learning and deep learning enabled applications in different sectors; robotics and computer vision for intelligent automation in industries; trending technologies: frameworks and applications focusing real life issues.
The book covers current developments in the field of expert applications and security, which employ advances of next-generation communication and computational technology to shape real-world applications. It gathers selected research papers presented at the ICETEAS 2018 conference, which was held at Jaipur Engineering College and Research Centre, Jaipur, India, on February 17–18, 2018. Key topics covered include expert applications and artificial intelligence; information and application security; advanced computing; multimedia applications in forensics, security and intelligence; and advances in web technologies: implementation and security issues.
In the ever-accelerating tapestry of our digital age, the symbiotic relationship between computational intelligence and cyber security has become the linchpin of progress. The relentless pace of technological evolution and the ceaseless emergence of cyber threats demand not only adaptation but also an exploration of the forefronts of innovation and defence. Recent Advances in Computational Intelligence and Cyber security is a testament to the exhilarating journey undertaken by researchers, practitioners, and visionaries in these pivotal fields. Within the confines of this book, we embark on a captivating exploration of the cutting-edge developments that define the current state of computational intelligence and the intricate dance with the ever-evolving landscape of cyber security.