You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The application of mathematical models in the analysis of learning data has a rich tradition in experimental psychology. Such modeling is not only of scientific interest from psychophysiological point of view but very important from clinical point of view because memory impairment is a common symptom that is frequently diagnosed in elder people, persons after traumatic brain injury, patients with type 2 diabetes mellitus, Parkinson disease, multiple sclerosis, and other neurological and psychiatric diseases. Mild memory impairment might be one of the most important symptoms of a future Alzheimer's disease. Thus, early diagnosis of initial signs of memory impairment is of importance. The book...
The evolution of soft computing applications has offered a multitude of methodologies and techniques that are useful in facilitating new ways to address practical and real scenarios in a variety of fields. In particular, these concepts have created significant developments in the engineering field. Soft Computing Techniques and Applications in Mechanical Engineering is a pivotal reference source for the latest research findings on a comprehensive range of soft computing techniques applied in various fields of mechanical engineering. Featuring extensive coverage on relevant areas such as thermodynamics, fuzzy computing, and computational intelligence, this publication is an ideal resource for students, engineers, research scientists, and academicians involved in soft computing techniques and applications in mechanical engineering areas.
With the rapid evolution of technology, identifying new risks is a constantly moving target. The metaverse is a virtual space that is interconnected with cloud computing and with companies, organizations, and even countries investing in virtual real estate. The questions of what new risks will become evident in these virtual worlds and in augmented reality and what real-world impacts they will have in an ever-expanding internet of things (IoT) need to be answered. Within continually connected societies that require uninterrupted functionality, cyber security is vital, and the ability to detect potential risks and ensure the security of computing systems is crucial to their effective use and ...
Recent developments in soft-computation techniques have paved the way for handling huge volumes of data, thereby bringing about significant changes and technological advancements. This book presents the proceedings of the 3rd International Conference on Emerging Current Trends in Computing & Expert Technology (COMET 2020), held at Panimalar Engineering College, Chennai, India on 6 and 7 March 2020. The aim of the book is to disseminate cutting-edge developments taking place in the technological fields of intelligent systems and computer technology, thereby assisting researchers and practitioners from both institutions and industry to upgrade their knowledge of the latest developments and eme...
The book provides comprehensive and cognitive approach to building and deploying sophisticated information systems. The book utilizes non-linear optimization techniques, fuzzy logic, and rough sets to model various real-world use cases for the digital era. The hybrid information system modeling handles both qualitative and quantitative data and can effectively handle uncertainty and imprecision in the data. The combination of non-linear optimization mechanisms, fuzzy logic, and rough sets provides a robust foundation for next-generation information systems that can fulfill the demands of adaptive, aware, and adroit software applications for the knowledge era. The book emphasizes the importan...
As cloud services become increasingly popular, safeguarding sensitive data has become paramount. Privacy Preservation and Secured Data Storage in Cloud Computing is a comprehensive book that addresses the critical concerns surrounding privacy and security in the realm of cloud computing. Beginning with an introduction to cloud computing and its underlying technologies, the book explores various models of cloud service delivery. It then delves into the challenges and risks associated with storing and processing data in the cloud, including data breaches, insider threats, and third-party access. The book thoroughly examines techniques and tools to enhance privacy and security in the cloud, cov...
In an era defined by the pervasive integration of digital systems across industries, the paramount concern is the safeguarding of sensitive information in the face of escalating cyber threats. Contemporary Challenges for Cyber Security and Data Privacy stands as an indispensable compendium of erudite research, meticulously curated to illuminate the multifaceted landscape of modern cybercrime and misconduct. As businesses and organizations pivot towards technological sophistication for enhanced efficiency, the specter of cybercrime looms larger than ever. In this scholarly research book, a consortium of distinguished experts and practitioners convene to dissect, analyze, and propose innovativ...
Many static and behavior-based malware detection methods have been developed to address malware and other cyber threats. Even though these cybersecurity systems offer good outcomes in a large dataset, they lack reliability and robustness in terms of detection. There is a critical need for relevant research on enhancing AI-based cybersecurity solutions such as malware detection and malicious behavior identification. Malware Analysis and Intrusion Detection in Cyber-Physical Systems focuses on dynamic malware analysis and its time sequence output of observed activity, including advanced machine learning and AI-based malware detection and categorization tasks in real time. Covering topics such as intrusion detection systems, low-cost manufacturing, and surveillance robots, this premier reference source is essential for cyber security professionals, computer scientists, students and educators of higher education, researchers, and academicians.
This book constitutes selected and revised papers from the First International Conference on Cybersecurity in Emerging Digital Era, ICCEDE 2020, held in Greater Noida, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 9 full papers and 2 short papers presented in this volume were thoroughly reviewed and selected from 193 submissions. The papers are organized in topical sections on cyber security issues and challenges in emerging digital era; security resilience in contemporary applications.
In today's digital age, the exponential growth of cloud computing services has brought significant opportunities for businesses and individuals alike. However, this surge in cloud adoption has also ushered in a host of critical concerns, with the paramount issues being data privacy and security. The goal of protecting sensitive information from cyber threats and ensuring confidentiality has become increasingly challenging for organizations across industries. Emerging Technologies and Security in Cloud Computing is a comprehensive guide designed to tackle these pressing concerns head-on. This authoritative book provides a robust framework for understanding and addressing the multifaceted issues surrounding data privacy and security in the cloud. It serves as a beacon of knowledge for academic scholars, researchers, and IT professionals seeking practical solutions to safeguard sensitive data.