You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book reviews present state-of-the-art research related to the security of cloud computing including developments in conversational AI applications. It is particularly suited for those that bridge the academic world and industry, allowing readers to understand the security concerns in advanced security solutions for conversational AI in the cloud platform domain by reviewing present and evolving security solutions, their limitations, and future research directions. Conversational AI combines natural language processing (NLP) with traditional software like chatbots, voice assistants, or an interactive voice recognition system to help customers through either a spoken or typed interface. C...
This book presents a vital method for companies to connect with potential clients andconsumers in the digital era of Online Social Networks (OSNs), utilizing the strengthof well-known social networks and AI to achieve success through fostering brandsupporters, generating leads, and enhancing customer interactions. There are currently 4.8 billion Online Social Network (OSN) users worldwide. Online Social Networks in Business Frameworks presents marketing through online social networks (OSNs), which is a potent method for companies of all sizes to connect with potential clients and consumers. If visitors are not on OSN sites like Facebook, Twitter, and LinkedIn, they are missing out on the fac...
Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication. Quantum physics, however, safeguards against data eavesdropping. A significant am...
This edited book is a collection of quality research articles reporting research advances in the area of deep learning, IoT and urban computing. It describes new insights based on deep learning and IoT for urban computing and is useful for architects, engineers, policymakers, facility managers, academicians, and researchers who are interested in expanding their knowledge of the applications of deep learning trends involving urban computing.
Machine learning has become one of the most prevalent topics in recent years. The application of machine learning we see today is a tip of the iceberg. The machine learning revolution has just started to roll out. It is becoming an integral part of all modern electronic devices. Applications in automation areas like automotive, security and surveillance, augmented reality, smart home, retail automation and healthcare are few of them. Robotics is also rising to dominate the automated world. The future applications of machine learning in the robotics area are still undiscovered to the common readers. We are, therefore, putting an effort to write this edited book on the future applications of m...
In recent years, industries have shifted into the digital domain, as businesses and organizations have used various forms of technology to aid information storage and efficient production methods. Because of these advances, the risk of cybercrime and data security breaches has skyrocketed. Fortunately, cyber security and data privacy research are thriving; however, industry experts must keep themselves updated in this field. Exploring Cyber Criminals and Data Privacy Measures collects cutting-edge research on information security, cybercriminals, and data privacy. It proposes unique strategies for safeguarding and preserving digital information using realistic examples and case studies. Covering key topics such as crime detection, surveillance technologies, and organizational privacy, this major reference work is ideal for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students.
It is crucial that forensic science meets challenges such as identifying hidden patterns in data, validating results for accuracy, and understanding varying criminal activities in order to be authoritative so as to hold up justice and public safety. Artificial intelligence, with its potential subsets of machine learning and deep learning, has the potential to transform the domain of forensic science by handling diverse data, recognizing patterns, and analyzing, interpreting, and presenting results. Machine Learning and deep learning frameworks, with developed mathematical and computational tools, facilitate the investigators to provide reliable results. Further study on the potential uses of...
This book presents selected papers from the 2021 International Conference on Electrical and Electronics Engineering (ICEEE 2020), held on January 2–3, 2021. The book focuses on the current developments in various fields of electrical and electronics engineering, such as power generation, transmission and distribution; renewable energy sources and technologies; power electronics and applications; robotics; artificial intelligence and IoT; control, automation and instrumentation; electronics devices, circuits and systems; wireless and optical communication; RF and microwaves; VLSI; and signal processing. The book is a valuable resource for academics and industry professionals alike.
In the new world order, conflicts between countries are increasing. Fluctuations in the economy and imbalances in the distribution of scarce resources to developing countries can result in wars. The effect of the recent COVID-19 pandemic and economic crisis has caused changes in the strategies and policies of countries. Technological changes and developments have also triggered cyber wars. Despite this, many countries prefer to fight on the field. The damage to the international economy of wars, which kills civilians and causes serious damage to developing countries, is a current issue. The Handbook of Research on War Policies, Strategies, and Cyber Wars examines the factors that lead to war and the damages caused by war strategies and policies. It is a guide for future generations to develop constructive policies and strategies for living in a peaceful world. Covering topics such as geopolitical consequences, civil liberty, and terrorism, this major reference work is a dynamic resource for policymakers, strategists, government officials, politicians, sociologists, students and educators of higher education, librarians, researchers, and academicians.
Nanotechnology continues to contribute to the progress of innovations in the area of forensic science ranging from sensing, DNA monitoring, and counterfeiting to fingerprinting. In recent years, functional nanomaterials are widely applied in nanoscience and forensic investigation. They can be used in future interdisciplinary research by scientists, engineers, and biotechnologists. Modeling and Simulation of Functional Nanomaterials for Forensic Investigation focuses on multiple applications related to forensics and provides information linked with nanoparticles. This book provides nanotechnology results in improving the sensitivity of established forensic techniques. It further focuses on different fabrication and characterization techniques of nanomaterials and relates their characteristics with forensic applications. Covering topics such as explosive detection, nano-forensic testing, and nano-trackers, this premier reference source is a comprehensive resource for material engineers, chemical engineers, nanotechnologists, biotechnologists, forensic scientists, students and educators of higher education, researchers, and academicians.