You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Complex human activity recognition suffers from ambiguity of interpretation problem. A novel neutrosophic formal concept analysis method has been proposed to quantify non-determinism leading to ambiguity of interpretation and utilize it in activity recognition.
We are delighted to introduce the proceedings of the first edition of the 2020 European Alliance for Innovation (EAI) International Conference on Advanced Scientific Innovation in Science, Engineering and Technology. This conference has brought innovative academics, industrial experts researchers, developers and practitioners around the world in the field of Science, Engineering and Technology to a common forum. The technical program of ICASISET 2020 consisted of 97 full papers, including 6 invited papers in oral presentation sessions at the main conference tracks. The conference tracks were: Innovative Computing, Advanced innovation technology in Communication, Industry automation, hydrogen...
With the rapid growth of technology in society, communication networks have become a heavily researched topic. Implementing these advanced systems is a challenge, however, due to the abundance of optimization problems within these networks. The use of meta-heuristic algorithms and nature-inspired computing has become a prevalent technique among researchers for solving these complex problems within communication networks. Despite its popularity, this specific computing technique lacks the appropriate amount of research that is needed for professionals to grasp a definite understanding. Nature-Inspired Computing Applications in Advanced Communication Networks is a collection of innovative rese...
This book shows how machine learning (ML) methods can be used to enhance cyber security operations, including detection, modeling, monitoring as well as defense against threats to sensitive data and security systems. Filling an important gap between ML and cyber security communities, it discusses topics covering a wide range of modern and practical ML techniques, frameworks and tools.
This two-volume set (CCIS 1240-1241) constitutes the refereed proceedings of the Second International Conference on Machine Learning, Image Processing, Network Security and Data Sciences, MIND 2020, held in Silchar, India. Due to the COVID-19 pandemic the conference has been postponed to July 2020. The 79 full papers and 4 short papers were thoroughly reviewed and selected from 219 submissions. The papers are organized according to the following topical sections: data science and big data; image processing and computer vision; machine learning and computational intelligence; network and cyber security.
This book constitutes the proceedings of the 8th International Conference on Big Data Analytics, BDA 2021, which took place during December 2021. Due to COVID-19 pandemic the conference was held virtually. The 16 full and 3 short papers included in this volume were carefully reviewed and selected from 41 submissions. The contributions were organized in topical sections named as follows: medical and health applications; machine/deep learning; IoTs, sensors, and networks; fundamentation; pattern mining and data analytics.
This volume constitutes the refereed proceedings of the Fourth International Conference on Contemporary Computing, IC3 2010, held in Noida, India, in August 2011. The 58 revised full papers presented were carefully reviewed and selected from 175 submissions.
This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of stori...
This book is a collection of selected peer-reviewed papers presented at the International Conference on Signal Processing and Communication (ICSC 2018). It covers current research and developments in the fields of communications, signal processing, VLSI circuits and systems, and embedded systems. The book offers in-depth discussions and analyses of latest problems across different sub-fields of signal processing and communications. The contents of this book will prove to be useful for students, researchers, and professionals working in electronics and electrical engineering, as well as other allied fields.
This book constitutes the refereed proceedings of the 10th International Conference on Distributed Computing and Internet Technology, ICDCIT 2014, held in Bhubaneswar, India, in February 2014. The 29 revised full papers presented together with 6 invited talks in this volume were carefully reviewed and selected from 197 submissions. The papers cover topics such as distributed computing, sensor networks, Internet technologies and applications, security and multimedia.