You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
SUPERVISED and UNSUPERVISED DATA ENGINEERING for MULTIMEDIA DATA Explore the cutting-edge realms of data engineering in multimedia with Supervised and Unsupervised Data Engineering for Multimedia Data, where expert contributors delve into innovative methodologies, offering invaluable insights to empower both novices and seasoned professionals in mastering the art of manipulating multimedia data with precision and efficiency. Supervised and Unsupervised Data Engineering for Multimedia Data presents a groundbreaking exploration into the intricacies of handling multimedia data through the lenses of both supervised and unsupervised data engineering. Authored by a team of accomplished experts in ...
This book is an essential resource for anyone seeking to stay ahead in the dynamic field of cybersecurity, providing a comprehensive toolkit for understanding and combating digital threats and offering practical, insightful guidance ideal for cybersecurity professionals, digital forensic investigators, legal practitioners, law enforcement, scholars, and students. In the rapidly evolving domain of digital security, this book emerges as a vital guide for understanding and addressing the sophisticated landscape of cyber threats. This in-depth volume, featuring contributions from renowned experts, provides a thorough examination of the current state and future challenges in digital security and ...
This volume demonstrates the diverse state-of-the-art applications that combine artificial intelligence with soft computing, which has great potential for creating smart personalized healthcare services. The book showcases the myriad uses of AI and computer techniques in healthcare that employ deep learning, robotics, machine learning, blockchain, emerging cloud, edge computing, Practical Byzantine Fault Tolerance consensus, CNN architecture, Splunk, genetic algorithms (GA), DurBhashan, and many more. These technologies can be used in healthcare for enhanced data sharing, remote health monitoring, tele-rehabilitation, connecting rural populations with healthcare services, identifying diseases and health issues, automated medical diagnosis, analyzing information in surgical videos, ensuring timely communication and transportation during health disasters and emergencies, for optimizing expenditures, and more.
The book presents high-quality, peer-reviewed papers from the FICR International Conference on Rising Threats in Expert Applications and Solutions 2022 organized by IIS (Deemed to be University), Jaipur, Rajasthan, India, during January 7–8, 2022. The volume is a collection of innovative ideas from researchers, scientists, academicians, industry professionals, and students. The book covers a variety of topics, such as expert applications and artificial intelligence/machine learning; advance web technologies such as IoT, big data, cloud computing in expert applications; information and cyber security threats and solutions, multimedia applications in forensics, security and intelligence; advancements in app development; management practices for expert applications; and social and ethical aspects in expert applications through applied sciences.
Explore the power of machine learning to revolutionize signal processing and optimization with cutting-edge techniques and practical insights in this outstanding new volume from Scrivener Publishing. Modeling and Optimization of Signals using Machine Learning Techniques is designed for researchers from academia, industries, and R&D organizations worldwide who are passionate about advancing machine learning methods, signal processing theory, data mining, artificial intelligence, and optimization. This book addresses the role of machine learning in transforming vast signal databases from sensor networks, internet services, and communication systems into actionable decision systems. It explores...
INDUSTRIAL CONTROL SYSTEMS This volume serves as a comprehensive guide in the journey of industrial control systems with a multidisciplinary approach to the key engineering problems in the 21st century. The journey of the control system may be viewed from the control of steam engines to spacecraft, aeroplane missile control systems to networked control systems and cybersecurity controls. In terms of industrial control and application, the journey starts from the design of P-I-D controllers to fuzzy controllers, neuro-fuzzy controllers, backstepping controllers, sliding mode controllers, and event-triggered controls for networked control systems. Recently, control theory has spread its golden...
The book addresses the challenges in designing blockchain-based secured solutions for Industry 4.0 applications using artificial intelligence. It further provides a comparative analysis of various advanced security approaches such as edge computing, cybersecurity, and cloud computing in the realm of information technology. This book: Address the challenges in designing blockchain-based secured solutions for Industry 4.0 applications using artificial intelligence Provides a comparative analysis of various advanced security approaches such as edge computing, cybersecurity, and cloud computing in the realm of information technology Discusses the evolution of blockchain and artificial intelligen...
DEEP LEARNING APPROACHES TO CLOUD SECURITY Covering one of the most important subjects to our society today, cloud security, this editorial team delves into solutions taken from evolving deep learning approaches, solutions allowing computers to learn from experience and understand the world in terms of a hierarchy of concepts, with each concept defined through its relation to simpler concepts. Deep learning is the fastest growing field in computer science. Deep learning algorithms and techniques are found to be useful in different areas like automatic machine translation, automatic handwriting generation, visual recognition, fraud detection, and detecting developmental delay in children. How...