You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
From literature and film to advertisements, storytelling is an important aspect of daily life. To create an impactful story, it is important to analyze the creation and generation of a storyline. Content Generation Through Narrative Communication and Simulation is a critical research publication that explores story and the application of story in various forms of media as well as the challenges of automated story. Featuring coverage on a wide range of topics such as narrative or story generation systems, the film and movie narrative generation, and narrative evaluation, this book is geared toward researchers, students, and professionals seeking current and relevant research on the influence and creation of story in media.
While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of this information. Ensuring the trustworthiness and integrity is important in order for data to be used appropriately. Privacy Solutions and Security Frameworks in Information Protection explores the areas of concern in guaranteeing the security and privacy of data and related technologies. This reference source includes a range of topics in information security and privacy provided for a diverse readership ranging from academic and professional researchers to industry practitioners.
This Brief highlights Informatics and related techniques to Computer Science Professionals, Engineers, Medical Doctors, Bioinformatics researchers and other interdisciplinary researchers. Chapters include the Bioinformatics of Diabetes and several computational algorithms and statistical analysis approach to effectively study the disorders and possible causes along with medical applications.
This book gathers the refereed proceedings of the Intelligent Algorithms in Software Engineering Section of the 9th Computer Science On-line Conference 2020 (CSOC 2020), held on-line in April 2020. Software engineering research and its applications to intelligent algorithms have now assumed an essential role in computer science research. In this book, modern research methods, together with applications of machine and statistical learning in software engineering research, are presented.
This book presents refereed proceedings of the Second International Conference on Advances in Cyber Security, ACeS 2020, held in Penang, Malaysia, in September 2020. Due to the COVID-19 pandemic the conference was held online. The 46 full papers and 1 short paper were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on internet of things, industry 4.0 and blockchain, and cryptology; digital forensics and surveillance, botnet and malware, and intrusion detection/prevention; ambient cloud and edge computing, wireless and cellular communication; governance, social media, mobile and web, data privacy, data policy and fake news.
The book depicts the saga of a man who rose to a very high position of a Vice Chancellor, looked back into several decades of his life to be able to recollect experiences of varied nature and managed to put them together in the form of a memoir.
This volume presents 70 carefully selected papers from a major joint event: the 8th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2016) and the 8th International Conference on Computational Aspects of Social Networks (CASoN 2016). SoCPaR–CASoN 2016, which was organized by the Machine Intelligence Research Labs (MIR Labs), USA and Vellore Institute of Technology (VIT), India and held at the VIT on December 19–21, 2016. It brings together researchers and practitioners from academia and industry to share their experiences and exchange new ideas on all interdisciplinary areas of soft computing and pattern recognition, as well as intelligent methods applied to social networks. This book is a valuable resource for practicing engineers/scientists and researchers working in the field of soft computing, pattern recognition and social networks.
While information technology continues to play a vital role in every aspect of our lives, there is a greater need for the security and protection of this information. Ensuring the trustworthiness and integrity is important in order for data to be used appropriately. Privacy Solutions and Security Frameworks in Information Protection explores the areas of concern in guaranteeing the security and privacy of data and related technologies. This reference source includes a range of topics in information security and privacy provided for a diverse readership ranging from academic and professional researchers to industry practitioners.