Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Computational Intelligence Applications in Cyber Security
  • Language: en
  • Pages: 335

Computational Intelligence Applications in Cyber Security

  • Type: Book
  • -
  • Published: 2024-10-29
  • -
  • Publisher: CRC Press

The book provides a comprehensive overview of cyber security in Industry 5.0, data security in emerging technologies, block chain technology, cloud computing security, evolving IoT and OT threats, and considerable data integrity in healthcare. The impact of security risks on various sectors is explored including artificial intelligence in national security, quantum com-puting for security, and AI-driven cyber security techniques. It explores how cyber security is applied across different areas of human life through computational modeling. The book concludes by presenting a roadmap for securing computing environments, addressing the complex interplay between advanced technologies and emerging...

Advanced Computing and Communication Technologies
  • Language: en
  • Pages: 333

Advanced Computing and Communication Technologies

  • Type: Book
  • -
  • Published: 2017-10-24
  • -
  • Publisher: Springer

This volume contains selected papers presented at the 10th International Conference on Advanced Computing and Communication Technologies (10th ICACCT 2016), technically sponsored by Institution of Electronics and Telecommunication Engineers (India), held during 18 – 20 November 2016 at Asia Pacific Institute of Information Technology, Panipat, India. The volume reports latest research on a wide range of topics spanning theory, system, applications and case studies in the fields of computing and communication technologies. Topics covered are robotics, computational intelligence encompassing fuzzy logic, neural networks, GA and evolutionary computing, applications, knowledge representation, ...

Advanced Multimedia and Ubiquitous Engineering
  • Language: en
  • Pages: 840

Advanced Multimedia and Ubiquitous Engineering

  • Type: Book
  • -
  • Published: 2018-11-28
  • -
  • Publisher: Springer

This book presents the combined proceedings of the 12th International Conference on Multimedia and Ubiquitous Engineering (MUE 2018) and the 13th International Conference on Future Information Technology (Future Tech 2018), both held in Salerno, Italy, April 23 - 25, 2018. The aim of these two meetings was to promote discussion and interaction among academics, researchers and professionals in the field of ubiquitous computing technologies. These proceedings reflect the state of the art in the development of computational methods, involving theory, algorithms, numerical simulation, error and uncertainty analysis and novel applications of new processing techniques in engineering, science, and other disciplines related to ubiquitous computing.

Fog Computing for Healthcare 4.0 Environments
  • Language: en
  • Pages: 621

Fog Computing for Healthcare 4.0 Environments

This book provides an analysis of the role of fog computing, cloud computing, and Internet of Things in providing uninterrupted context-aware services as they relate to Healthcare 4.0. The book considers a three-layer patient-driven healthcare architecture for real-time data collection, processing, and transmission. It gives insight to the readers for the applicability of fog devices and gateways in Healthcare 4.0 environments for current and future applications. It also considers aspects required to manage the complexity of fog computing for Healthcare 4.0 and also develops a comprehensive taxonomy.

The AFC Asian Cup 2015
  • Language: en
  • Pages: 172

The AFC Asian Cup 2015

  • Type: Book
  • -
  • Published: 2015-01-31
  • -
  • Publisher: Lulu.com

Australia's extra-time victory over South Korea in the final of the 2015 Asian Cup was the thrilling climax to a competition lasting over two years and 92 matches. This book covers the whole of the qualification process and then the glorious Finals tournament in detail. 170 pages of statistics include full match records and post-match reactions from key individuals and the coaches.

Jihad in Saudi Arabia
  • Language: en
  • Pages: 303

Jihad in Saudi Arabia

Saudi Arabia, homeland of Osama bin Laden and many 9/11 hijackers, is widely considered to be the heartland of radical Islamism. For decades, the conservative and oil-rich kingdom contributed recruits, ideologues and money to jihadi groups worldwide. Yet Islamism within Saudi Arabia itself remains poorly understood. Why has Saudi Arabia produced so many militants? Has the Saudi government supported violent groups? How strong is al-Qaida's foothold in the kingdom and does it threaten the regime? Why did Bin Laden not launch a campaign there until 2003? This 2010 book presents the first ever history of Saudi jihadism based on extensive fieldwork in the kingdom and primary sources in Arabic. It offers a powerful explanation for the rise of Islamist militancy in Saudi Arabia and sheds crucial new light on the history of the global jihadist movement.

Proceedings of International Conference on Data Science and Applications
  • Language: en
  • Pages: 792

Proceedings of International Conference on Data Science and Applications

This book gathers outstanding papers presented at the International Conference on Data Science and Applications (ICDSA 2021), organized by Soft Computing Research Society (SCRS) and Jadavpur University, Kolkata, India, from April 10 to 11, 2021. It covers theoretical and empirical developments in various areas of big data analytics, big data technologies, decision tree learning, wireless communication, wireless sensor networking, bioinformatics and systems, artificial neural networks, deep learning, genetic algorithms, data mining, fuzzy logic, optimization algorithms, image processing, computational intelligence in civil engineering, and creative computing.

Critical Phishing Defense Strategies and Digital Asset Protection
  • Language: en
  • Pages: 434

Critical Phishing Defense Strategies and Digital Asset Protection

  • Type: Book
  • -
  • Published: 2025-02-14
  • -
  • Publisher: IGI Global

As phishing attacks become more sophisticated, organizations must use a multi-layered approach to detect and prevent these threats, combining advanced technologies like AI-powered threat detection, user training, and authentication systems. Protecting digital assets requires strong encryption, secure access controls, and continuous monitoring to minimize vulnerabilities. With the growing reliance on digital platforms, strengthening defenses against phishing and ensuring the security of digital assets are integral to preventing financial loss, reputational damage, and unauthorized access. Further research into effective strategies may help prevent cybercrime while building trust and resilienc...

Finance and Law in the Metaverse World
  • Language: en
  • Pages: 667

Finance and Law in the Metaverse World

None

Machine Learning and Knowledge Discovery in Databases: Applied Data Science Track
  • Language: en
  • Pages: 612

Machine Learning and Knowledge Discovery in Databases: Applied Data Science Track

The 5-volume proceedings, LNAI 12457 until 12461 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2020, which was held during September 14-18, 2020. The conference was planned to take place in Ghent, Belgium, but had to change to an online format due to the COVID-19 pandemic. The 232 full papers and 10 demo papers presented in this volume were carefully reviewed and selected for inclusion in the proceedings. The volumes are organized in topical sections as follows: Part I: Pattern Mining; clustering; privacy and fairness; (social) network analysis and computational social science; dimensionality reduction and ...