You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Fuzzy sets and fuzzy logics are used to model events with imprecise, incomplete, and uncertain information. Researchers have developed numerous methods and techniques to cope with fuzziness or uncertainty. This research intends to introduce the novel concepts of complex neutrosophic relations (CNRs) and its types based on the idea of complex neutrosophic sets (CNSs).
This book presents the state-of-the-art in various aspects of analysis and mining of online social networks. Within the broader context of online social networks, it focuses on important and upcoming topics of social network analysis and mining such as the latest in sentiment trends research and a variety of techniques for community detection and analysis. The book collects chapters that are expanded versions of the best papers presented at the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM’2015), which was held in Paris, France in August 2015. All papers have been peer reviewed and checked carefully for overlap with the literature. The book will appeal to students and researchers in social network analysis/mining and machine learning.
In today’s digitally interconnected world, the threat landscape has evolved to include not just sophisticated technical exploits but also the art of human manipulation. Social engineering attacks have emerged as a formidable and often underestimated threat to information security. The primary aim of this textbook is to provide a comprehensive and in-depth exploration of social engineering attacks. The book seeks to equip cybersecurity professionals, IT practitioners, students, and anyone concerned with information security with the knowledge and tools needed to recognize, prevent, and mitigate the risks posed by social engineering. The scope of this textbook is broad and multifaceted. It c...
The edge AI implementation technologies are fast maturing and stabilizing. Edge AI digitally transforms retail, manufacturing, healthcare, financial services, transportation, telecommunication, and energy. The transformative potential of Edge AI, a pivotal force in driving the evolution from Industry 4.0’s smart manufacturing and automation to Industry 5.0’s human-centric, sustainable innovation. The exploration of the cutting-edge technologies, tools, and applications that enable real-time data processing and intelligent decision-making at the network’s edge, addressing the increasing demand for efficiency, resilience, and personalization in industrial systems. Our book aims to provide readers with a comprehensive understanding of how Edge AI integrates with existing infrastructures, enhances operational capabilities, and fosters a symbiotic relationship between human expertise and machine intelligence. Through detailed case studies, technical insights, and practical guidelines, this book serves as an essential resource for professionals, researchers, and enthusiasts poised to harness the full potential of Edge AI in the rapidly advancing industrial landscape.
Originating from Facebook, LinkedIn, Twitter, Instagram, YouTube, and many other networking sites, the social media shared by users and the associated metadata are collectively known as user generated content (UGC). To analyze UGC and glean insight about user behavior, robust techniques are needed to tackle the huge amount of real-time, multimedia, and multilingual data. Researchers must also know how to assess the social aspects of UGC, such as user relations and influential users. Mining User Generated Content is the first focused effort to compile state-of-the-art research and address future directions of UGC. It explains how to collect, index, and analyze UGC to uncover social trends and...
This book examines the extensive changes in markets, technologies and value chains that telecommunication companies are currently confronted with. It analyzes the crossroads they have reached and the choices that now need to be made – to be a bit pipe or a trendsetter of digitalization. Based on an analysis of the key challenges for telcos, the book derives future market scenarios and puts forward recommendations for how they can successfully position themselves. It proposes a framework based on seven “levers,” which addresses concrete measures in each step of the value chain, ranging from technology, IT and processes, to innovation, marketing and sales issues. The book discusses the c...
In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement. When used in coordination with other tools for ensuring information security, cryptography in all of its applications, including data confidentiality, data integrity, and user authentication, is a most powerful tool for protecting information. This book presents a collection of research work in the field of cryptography. It discusses some of the critical challenges that are being faced by the current computing world and also describes some mechanisms to defend against these challenges. It is a valuable source of knowledge for researchers, engineers, graduate and doctoral students working in the field of cryptography. It will also be useful for faculty members of graduate schools and universities.