You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Digital evolution, whether through Internet advances or the development of connected objects, has triggered a veritable societal revolution. Thanks to technological advances, e-health services enable healthcare professionals to monitor patients in real time. However, new challenges have also arisen in the field of e-health, concerning the security of medical data, as well as the protection of patient privacy. After presenting e-health architectures and explaining the proliferation of cyber attacks, e-Health Security Management focuses on proposing solutions designed to meet these security imperatives and respect patient privacy, such as the use of blockchain, "biometrics", new encryption methods or artificial intelligence. Implementing these solutions is crucial to guarantee the acceptance and effectiveness of e-health services.
L’évolution numérique, que ce soit les progrès de l’internet ou le développement des objets connectés, a provoqué une véritable révolution sociétale. Le domaine de la médecine en bénéficie pleinement, grâce aux avancées technologiques, les services de e-santé permettent d’assurer un suivi en temps réel des patients par les professionnels de la santé. Cependant, de nouveaux défis sont alors apparus, auxquels le domaine de la e-santé est confronté. Ils concernent la sécurité des données médicales, ainsi que la protection de la vie privée des patients. Après avoir présenté les architectures de e-santé et expliqué la multiplication des cyberattaques, Gestion de la sécurité en e-santé se concentre sur la proposition de solutions visant à répondre à ces impératifs de sécurité et au respect de la vie privée des patients comme l’utilisation de la blockchain, de « la biométrie », de nouvelles méthodes de chiffrement ou encore de l’intelligence artificielle. La mise en place de ces solutions est cruciale pour garantir l’acceptation et l’efficacité des services de e-santé.
The management and control of networks can no longer be envisaged without the introduction of artificial intelligence at all stages. Intelligent Network Management and Control deals with topical issues related mainly to intelligent security of computer networks, deployment of security services in SDN (software-defined networking), optimization of networks using artificial intelligence techniques and multi-criteria optimization methods for selecting networks in a heterogeneous environment. This book also focuses on selecting cloud computing services, intelligent unloading of calculations in the context of mobile cloud computing, intelligent resource management in a smart grid-cloud system for better energy efficiency, new architectures for the Internet of Vehicles (IoV), the application of artificial intelligence in cognitive radio networks and intelligent radio input to meet the on-road communication needs of autonomous vehicles.
The Internet of Things (IoT) has contributed greatly to the growth of data traffic on the Internet. Access technologies and object constraints associated with the IoT can cause performance and security problems. This relates to important challenges such as the control of radio communications and network access, the management of service quality and energy consumption, and the implementation of security mechanisms dedicated to the IoT. In response to these issues, this book presents new solutions for the management and control of performance and security in the IoT. The originality of these proposals lies mainly in the use of intelligent techniques. This notion of intelligence allows, among other things, the support of object heterogeneity and limited capacities as well as the vast dynamics characterizing the IoT.
Artificial Intelligence (AI) in general and machine learning (ML) and deep learning (DL) in particular and related digital technologies are a couple of fledging paradigms that next-generation healthcare services are sprinting towards. These digital technologies can transform various aspects of healthcare, leveraging advances in computing and communication power. With a new spectrum of business opportunities, AI-powered healthcare services will improve the lives of patients, their families, and societies. However, the application of AI in the healthcare field requires special attention given the direct implication with human life and well-being. Rapid progress in AI leads to the possibility o...
This book constitutes the refereed proceedings of the Third International Conference on Wireless Mobile Communication and Healthcare, MobiHealth 2012, and of the two workshops: Workshop on Advances in Personalized Healthcare Services, Wearable Mobile Monitoring, and Social Media Pervasive Technologies (APHS 2012), and Workshop on Advances in Wireless Physical Layer Communications for Emerging Healthcare Applications (IWAWPLC 2012), all held in Paris, France, in November 2012. The 39 revised full papers presented were carefully reviewed and selected from 66 submissions. The papers are organized in topical sections covering wearable, outdoor and home-based applications; remote diagnosis and patient management; data processing; sensor devices and systems; biomedical monitoring in relation to society and the environment; body area networks; telemedicine systems for disease-specific applications; data collection and management; papers from the invited session "Implants"; papers from the IWAWPLC and APHS workshops.
This book constitutes the proceedings of the First International Conference on Codes, Cryptology and Information Security, C2SI 2015, held in Rabat, Morocco, in May 2015. The 22 regular papers presented together with 8 invited talks were carefully reviewed and selected from 59 submissions. The first aim of this conference is to pay homage to Thierry Berger for his valuable contribution in teaching and disseminating knowledge in coding theory and cryptography in Morocco since 2003. The second aim of the conference is to provide an international forum for researchers from academia and practitioners from industry from all over the world for discussion of all forms of cryptology, coding theory and information security.
This text emphasizes the importance of artificial intelligence techniques in the field of biological computation. It also discusses fundamental principles that can be applied beyond bio-inspired computing. It comprehensively covers important topics including data integration, data mining, machine learning, genetic algorithms, evolutionary computation, evolved neural networks, nature-inspired algorithms, and protein structure alignment. The text covers the application of evolutionary computations for fractal visualization of sequence data, artificial intelligence, and automatic image interpretation in modern biological systems. The text is primarily written for graduate students and academic ...
L’Internet des objets (en anglais Internet of Things, IoT), aujourd’hui omniprésent, a grandement contribué à l’accroissement du trafic des données sur Internet. Les technologies d’accès IoT et les contraintes des objets peuvent causer des problèmes de performances et de sécurité. Cela démontre l’importance des défis liés à cet environnement comme le contrôle des communications radio et de l’accès au réseau, la gestion de la qualité de service et de la consommation énergétique ou l’implémentation de mécanismes de sécurité dédiés à l’IoT. En réponse à ces problématiques, cet ouvrage présente de nouvelles solutions pour la gestion et le contrôle des performances et de la sécurité dans l’IoT. L’originalité de ces propositions réside principalement dans l’utilisation de techniques intelligentes. Cette notion d’intelligence permet, entre autres, de supporter l’hétérogénéité des objets, leurs capacités limitées et la grande dynamique caractérisant l’IoT.
La gestion et le contrôle des réseaux ne peuvent plus être envisagés sans l’introduction de l’intelligence artificielle dans l’ensemble de leurs étapes. Cet ouvrage traite des thèmes d’actualité qui sont liés principalement à la sécurité intelligente des réseaux informatiques, au déploiement de services de sécurité dans les réseaux SDN (Software-Defined Networking), à l’optimisation des réseaux à l’aide des techniques de l’intelligence artificielle et aux méthodes d’optimisation multicritères pour la sélection des réseaux dans un environnement hétérogène. Gestion et contrôle intelligents des réseaux s’intéresse également à la sélection des se...