You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book aims to present a viable alternative to the Hopfield Neural Network (HNN) model for analog computation. It is well known the standard HNN suffers from problems of convergence to local minima, and requirement of a large number of neurons and synaptic weights. Therefore, improved solutions are needed. The non-linear synapse neural network (NoSyNN) is one such possibility and is discussed in detail in this book. This book also discusses the applications in computationally intensive tasks like graph coloring, ranking, and linear as well as quadratic programming. The material in the book is useful to students, researchers and academician working in the area of analog computation.
This volume presents selected papers from the 2nd International Conference on Optical and Wireless Technologies, conducted from 10th to 11th February, 2018. It focuses on extending the limits of currently used systems encompassing optical and wireless domains, and explores novel research on wireless and optical techniques and systems, describing practical implementation activities, results and issues. The book will serve as a valuable reference resource for academics and researchers across the globe.
The book focuses on the integration of intelligent communication systems, control systems, and devices related to all aspects of engineering and sciences. It contains high-quality research papers presented at the 2nd international conference, ICICCD 2017, organized by the Department of Electronics, Instrumentation and Control Engineering of University of Petroleum and Energy Studies, Dehradun on 15 and 16 April, 2017. The volume broadly covers recent advances of intelligent communication, intelligent control and intelligent devices. The work presented in this book is original research work, findings and practical development experiences of researchers, academicians, scientists and industrial practitioners.
This book is dedicated to the issues of security, trust and privacy models, and architectures in IoT environments. The authors aim to capture the latest research and contributions from academy, industry, and other stakeholders on new security models, architectures, protocols, and standards for ensuring security, privacy, and trustworthiness to IoT systems. The authors discuss the convergence of IoT, software agents, and edge computing to introduce social features into IoT systems, combining trustworthiness and reputation information collected by agents at the edge with security and privacy mechanisms. They also cover experimental and simulated campaigns that evaluate strategies to improve the security and privacy of the IoT world, and at the same time the ability to prevent and deter deceptive behaviors. The book is relevant for researchers, professionals, academics, and students.
This book includes high-quality papers presented at 15th International Conference on Information Technology and Applications (ICITA 2021), held in Dubai, UAE during 13 – 14 November 2021. The book presents original research work of academics and industry professionals to exchange their knowledge of the state-of-the-art research and development in information technology and applications. The topics covered in the book are cloud computing, business process engineering, machine learning, evolutionary computing, big data analytics, internet of things and cyber-physical systems, information and knowledge management, computer vision and image processing, computer graphics and games programming, mobile computing, ontology engineering, software and systems modelling, human computer interaction, online learning / e-learning, computer networks, and web engineering.
This book covers the fundamentals, applications, algorithms, protocols, emerging trends, problems, and research findings in the field of AI and IoT in smart healthcare. It includes case studies, implementation and management of smart healthcare systems using AI. Chapters focus on AI applications in Internet of Healthcare Things, provide working examples on how different types of healthcare data can be used to develop models and predict diseases using machine learning and AI, with the real-world examples. This book is aimed at Researchers and graduate students in Computer Engineering, Artificial Intelligence and Machine Learning, Biomedical Engineering, and Bioinformatics. Features: Focus on ...
This book constitutes the refereed proceedings of the International Conference on Advances in Computing Communications and Control, ICAC3 2011, held in Mumbai, India, in January 2011. The 84 revised full papers presented were carefully reviewed and selected from 309 submissions. The papers address issues such as AI, artificial neural networks, computer graphics, data warehousing and mining, distributed computing, geo information and statistical computing, learning algorithms, system security, virtual reality, cloud computing, service oriented architecture, semantic web, coding techniques, modeling and simulation of communication systems, network architecture, network protocols, optical fiber/microwave communication, satellite communication, speech/image processing, wired and wireless communication, cooperative control, and nonlinear control, process control and instrumentation, industrial automation, controls in aerospace, robotics, and power systems.
This book delves into cutting-edge research in cyberspace and outer space security, encompassing both theoretical and experimental aspects. It provides mitigation measures and strategies to address the identified challenges within. It covers a spectrum of topics including techniques and strategies for enhancing cyberspace security, combating ransomware attacks, and securing autonomous vehicles. Additionally, it explores security and surveillance systems involving autonomous vehicles, resilience schemes against security attacks using blockchain for autonomous vehicles, security analysis of autonomous drones (UAVs), the cybersecurity kill chain, the internet of drones (IoD), and cyberspace sol...