You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 9th International Conference on Advanced Concepts for Intelligent Vision Systems, ACIVS 2007, held in Delft, The Netherlands, August 2007. Coverage includes noise reduction and restoration, segmentation, motion estimation and tracking, video processing and coding, camera calibration, image registration and stereo matching, biometrics and security, medical imaging, image retrieval, as well as classification and recognition.
This book sheds light on systems that learn extensively, with purpose and naturally interact with humans. Improving operations and increasing competitive differentiation among manufacturing organizations by harnessing the power of cognitive abilities, IoT can help build and influence the flow of information—making the shop floor more cognitive through effective processing, analysis, and operational optimization. Now we are seeing the first-hand potential of cognitive computing—its ability to transform businesses, governments, and society. The real potential of the cognitive age can be realized by combining data analysis and statistical reasoning of machines with uniquely human qualities,...
The two-volume proceedings of the ACIIDS 2015 conference, LNAI 9011 + 9012, constitutes the refereed proceedings of the 7th Asian Conference on Intelligent Information and Database Systems, held in Bali, Indonesia, in March 2015. The total of 117 full papers accepted for publication in these proceedings was carefully reviewed and selected from 332 submissions. They are organized in the following topical sections: semantic web, social networks and recommendation systems; text processing and information retrieval; intelligent database systems; intelligent information systems; decision support and control systems; machine learning and data mining; multiple model approach to machine learning; in...
Due to the Internet’s explosive growth, network security is now a major concern; as a result, tracking network traffic is essential for a variety of uses, including improving system efficiency, fixing bugs in the network, and keeping sensitive data secure. Firewalls are a crucial component of enterprise-wide security architectures because they protect individual networks from intrusion. The efficiency of a firewall can be negatively impacted by issues with its design, configuration, monitoring, and administration. Recent firewall security methods do not have the rigor to manage the vagueness that comes with filtering packets from the exterior. Knowledge representation and reasoning are two...
The book presents high-quality papers from the Fourth International Conference on Microelectronics and Telecommunication Engineering (ICMETE 2021). It discusses the latest technological trends and advances in major research areas such as microelectronics, wireless communications, optical communication, signal processing, image processing, big data, cloud computing, artificial intelligence and sensor network applications. This book includes the contributions of national and international scientists, researchers, and engineers from both academia and the industry. The contents of this volume will be useful to researchers, professionals, and students alike.
This book highlights recent research on intelligent systems and nature-inspired computing. It presents 223 selected papers from the 22nd International Conference on Intelligent Systems Design and Applications (ISDA 2022), which was held online. The ISDA is a premier conference in the field of computational intelligence, and the latest installment brought together researchers, engineers, and practitioners whose work involves intelligent systems and their applications in industry. Including contributions by authors from 65 countries, the book offers a valuable reference guide for all researchers, students, and practitioners in the fields of computer science and engineering.
The special issue is dedicated to National conference on Communication, computational intelligence and learning-NCCCIL sponsored by AICTE and organized by Department of Information Technology at Army Institute of Technology from 12–13 January 2022. This conference gave the collaborative forum to academic experts, researchers and corporate professionals to enrich their knowledge in the automation and analysis of industry and business processes in a smart way. The two day conference included invited talks and paper presentations focusing on the applications of Computational intelligence, Communication, Machine Learning and Artificial Intelligence.
This book explores new and novel applications of machine learning, deep learning, and artificial intelligence that are related to major challenges in the field of cybersecurity. The provided research goes beyond simply applying AI techniques to datasets and instead delves into deeper issues that arise at the interface between deep learning and cybersecurity. This book also provides insight into the difficult "how" and "why" questions that arise in AI within the security domain. For example, this book includes chapters covering "explainable AI", "adversarial learning", "resilient AI", and a wide variety of related topics. It’s not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more. Researchers and advanced level students working and studying in the fields of cybersecurity (equivalently, information security) or artificial intelligence (including deep learning, machine learning, big data, and related fields) will want to purchase this book as a reference. Practitioners working within these fields will also be interested in purchasing this book.
Siber güvenliğin farklı açılardan irdelendiği bu ciltte; siber güvenliğin kapsamı ve boyutu, yapılan saldırıların türleri, alınabilecek önlemler, karşılaşılan yeni riskler ve problemlere yer verilmiş, karşılaşılabilecek risklere dikkat çekilmiş ve sonuçta alınması gereken önlemler ve yapılması gerekenler özetlenmiştir. Her bir bölüm; ülkemizde bu alana katkı sağlayan, bu alanda eğitim almış, tez hazırlamış, çalışmalar yapmış değerli akademisyen, kamu çalışanı ve üst düzey yöneticiler tarafından hazırlanmıştır. Her bir bölüm, birbirinden bağımsz olarak hazırlansa da konu bütünlüğü ve devamlılığı nın sağlanmasına ...
This, the 26th issue of the Transactions on Computational Science journal, is comprised of ten extended versions of selected papers from the International Conference on Cyberworlds 2014, held in Santander, Spain, in June 2014. The topics covered include areas of virtual reality, games, social networks, haptic modeling, cybersecurity, and applications in education and arts.