You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A Criminal consultant is met with a weird request. His long time best friend who had lost touch with him had asked him to make a kill, he asked him to kill himself in order to help catch some mafia who couldn't be caught otherwise. However things take an ugly term when some unexpected revelations are made and the stone cold paranoid Criminal Investigator gets emotionally trapped in a frenzy of lies and deceit and his only way out is to play the dame of death......the death is yet to stare into the lies
METAHEURISTICS for MACHINE LEARNING The book unlocks the power of nature-inspired optimization in machine learning and presents a comprehensive guide to cutting-edge algorithms, interdisciplinary insights, and real-world applications. The field of metaheuristic optimization algorithms is experiencing rapid growth, both in academic research and industrial applications. These nature-inspired algorithms, which draw on phenomena like evolution, swarm behavior, and neural systems, have shown remarkable efficiency in solving complex optimization problems. With advancements in machine learning and artificial intelligence, the application of metaheuristic optimization techniques has expanded, demons...
Engineering plays a major role in solving real-world problems, from small inconveniences to societal or global concerns around food scarcity, water shortages, environmental damage, problems in housing or infrastructure and more. In today's rapidly evolving world, the development of the latest generation of engineering and technology is crucial for maintaining productivity, innovation, and improving our overall quality of life. Intelligent Engineering Applications and Applied Sciences for Sustainability is an essential research book that serves as a compilation of cutting-edge research and advancements in engineering, science, and technology, and more importantly, how the application of these...
DEEP LEARNING APPROACHES TO CLOUD SECURITY Covering one of the most important subjects to our society today, cloud security, this editorial team delves into solutions taken from evolving deep learning approaches, solutions allowing computers to learn from experience and understand the world in terms of a hierarchy of concepts, with each concept defined through its relation to simpler concepts. Deep learning is the fastest growing field in computer science. Deep learning algorithms and techniques are found to be useful in different areas like automatic machine translation, automatic handwriting generation, visual recognition, fraud detection, and detecting developmental delay in children. How...
The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections named: Smart and Innovative Trends in Communication Protocols and Standards; Smart and Innovative Trends in Computational Intelligence and Data Science; Smart and Innovative Trends in Image Processing and Machine Vision; Smart Innovative Trends in Natural Language Processing for Indian Languages; Smart Innovative Trends in Security and Privacy.
The book is aimed to foster knowledge based on Blockchain technology highlighting on the framework basics, operating principles and different incarnations. The fundamental problems encountered in existing blockchain architectures and means for removing those would be covered. It would also touch upon blockchain based IoT systems and applications. The book covers applications and use cases of blockchain technology for industrial IoT systems. In addition, methods for inducing computational intelligence into existing blockchain frameworks thereby thwarting most of the limitations are also discussed. The readers would benefit from the rich technical content in this rapidly emerging field thereby enabling a skilled workforce for the future.
Unlock the true potential of software testing to achieve seamless software performance with this comprehensive guide Key Features Gain a solid understanding of software testing and master its multifaceted strategies Empower yourself to effectively overcome software testing challenges Develop actionable real-world testing skills for succeeding in any role Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionIn today’s world, software is everywhere—from entertainment apps to mission-critical systems that support our health, finance, and infrastructure. Testing plays a vital role in ensuring these systems work reliably. Whether you're a software developer, hobbyist...
ADVANCED ULTRA LOW-POWER SEMICONDUCTOR DEVICES Written and edited by a team of experts in the field, this important new volume broadly covers the design and applications of metal oxide semiconductor field effect transistors. This outstanding new volume offers a comprehensive overview of cutting-edge semiconductor components tailored for ultra-low power applications. These components, pivotal to the foundation of electronic devices, play a central role in shaping the landscape of electronics. With a focus on emerging low-power electronic devices and their application across domains like wireless communication, biosensing, and circuits, this book presents an invaluable resource for understandi...
The two volume set CCIS 1030 and 1031 constitutes the refereed proceedings of the Second International Conference on Computational Intelligence, Communications, and Business Analytics, CICBA 2018, held in Kalyani, India, in July 2018. The 76 revised full papers presented in the two volumes were carefully reviewed and selected from 240 submissions. The papers are organized in topical sections on computational intelligence; signal processing and communications; microelectronics, sensors, and intelligent networks; data science & advanced data analytics; intelligent data mining & data warehousing; and computational forensics (privacy and security).
This book focuses on reversible steganography and authentication via transform encoding, fully discussing in detail the reversibility computation of six transformation techniques: DFT, DCT, wavelets, Z, binomial and grouplet, as well as chaos-based authentication. The book also describes algorithmic approaches based on all transformations along with implementation details and results. Further topics include embedding and extraction into the spatial domain, tuning using GA-based approaches and embedding into imaginary coefficients of the Z domain. Featuring detailed algorithms for encryption and descriptions of all techniques, including embedding techniques for all transform-based steganograp...