You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This proceedings constitutes the refereed proceedings of the 15th EAI International Conference on Communications and Networking, ChinaCom 2020, held in November 2020 in Shanghai, China. Due to COVID-19 pandemic the conference was held virtually. The 54 papers presented were carefully selected from 143 submissions. The papers are organized in topical sections on Transmission Optimization in Edge Computing; Performance and Scheduling Optimization in Edge Computing; Mobile Edge Network System; Communication Routing and Control; Transmission and Load Balancing; Edge Computing and Distributed Machine Learning; Deep Learning.
The Global Conference on Artificial Intelligence and Applications (GCAIA 2021) provides a prominent venue for researchers, engineers, entrepreneurs, and scholar students to share their research ideas in the area of AI. Academic researchers would reveal the results and conclusions of laboratory based investigations via the GCAIA 21 platform, which bridges the gap between academia, industry, and government ethics. The GCAIA 21 platform will also bring together regional and worldwide issues to explore current advancements in contemporary Computation Intelligence. This Conference Proceedings volume contains the written versions of most of the contributions presented during the conference of GCAIA 2021. The conference has provided an excellent chance for researchers from diverse locations to present and debate their work in the field of artificial intelligence and its applications. It includes a selection of 62 papers. All accepted papers were subjected to strict peer-review by 2–4 expert referees. The papers have been selected for this volume because of their quality and their relevance to the theme of the conference.
Sweet Pet, Entertainment Circle, Short and Medium Stories, Black Lotus, Romance, City, Modern Romance, Modern Romance, Ending, 140,000 words
This book constitutes the thoroughly refereed post-conference proceedings of the 14th International Conference on Mobile Multimedia Communications, Mobimedia 2021, held in July 2021. Due to COVID-19 pandemic the conference was held virtually. The 66 revised full papers presented were carefully selected from 166 submissions. The papers are organized in topical sections as follows: Internet of Things and Wireless Communications Communication; Strategy Optimization and Task Scheduling Oral Presentations; Privacy Computing Technology; Cyberspace Security and Access control; Neural Networks and Feature Learning Task Classification and Prediction; Object Recognition and Detection.
The International Conference on “Computational Intelligence in Data Mining” (ICCIDM), after three successful versions, has reached to its fourth version with a lot of aspiration. The best selected conference papers are reviewed and compiled to form this volume. The proceedings discusses the latest solutions, scientific results and methods in solving intriguing problems in the fields of data mining, computational intelligence, big data analytics, and soft computing. The volume presents a sneak preview into the strengths and weakness of trending applications and research findings in the field of computational intelligence and data mining along with related field.
This book constitutes the refereed proceedings of the 5th International Conference on Dependability in Sensor, Cloud, and Big Data Systems and Applications, DependSys, held in Guangzhou, China, in November 2019. The volume presents 39 full papers, which were carefully reviewed and selected from 112 submissions. The papers are organized in topical sections on dependability and security fundamentals and technologies; dependable and secure systems; dependable and secure applications; dependability and security measures and assessments; explainable artificial inteligence for cyberspace.
This book constitutes the refereed proceedings of six workshops of the 14th International Conference on Web-Age Information Management, WAIM 2013, held in Beidaihe, China, June 2013. The 37 revised full papers are organized in topical sections on the six following workshops: The International Workshop on Big Data Management on Emerging Hardware (HardBD 2013), the Second International Workshop on Massive Data Storage and Processing (MDSP 2013), the First International Workshop on Emergency Management in Big Data Age (BigEM 2013), the International Workshop on Trajectory Mining in Social Networks (TMSN 2013), the First International Workshop on Location-based Query Processing in Mobile Environments (LQPM 2013), and the First International Workshop on Big Data Management and Service (BDMS 2013).
This two-volume set constitutes the refereed proceedings of the First EAI International Conference on Intelligent Systems and Machine Learning, ICISML 2022, held in Hyderabad, India, in December 16-17,2022. The 75 full papers presented were carefully reviewed and selected from 209 submissions. The conference focuses on Intelligent Systems and Machine Learning Applications in Health care; Digital Forensic & Network Security; Intelligent Communication Wireless Networks; Internet of Things (IoT) Applications; Social Informatics; and Emerging Applications.
Provides applications of soft computing techniques related to healthcare systems, such as machine learning, fuzzy logic, and statistical mathematics, play in the advancements of smart healthcare systems Examine descriptive, predictive, and social network techniques and discusses analytical tools and the important role they play in enhancing the services to connected healthcare systems Addresses real-time challenges and case studies in the Healthcare industry Presents various soft computing methodologies like fuzzy logic, ANN, and Genetic Algorithms, to help decision making Focuses on data-centric operations in the Healthcare industry
This book constitutes the refereed proceedings of the Chinese Conference on Trusted Computing and Information Security, CTCIS 2019, held in Shanghai, China, in October 2019. The 22 revised full papers presented were carefully reviewed and selected from 247 submissions. The papers are centered around cryptography, systems security, trusted computing, information security, network security, information hiding.