You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book reviews present state-of-the-art research related to the security of cloud computing including developments in conversational AI applications. It is particularly suited for those that bridge the academic world and industry, allowing readers to understand the security concerns in advanced security solutions for conversational AI in the cloud platform domain by reviewing present and evolving security solutions, their limitations, and future research directions. Conversational AI combines natural language processing (NLP) with traditional software like chatbots, voice assistants, or an interactive voice recognition system to help customers through either a spoken or typed interface. C...
Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication. Quantum physics, however, safeguards against data eavesdropping. A significant am...
ROBOTIC PROCESS AUTOMATION Presenting the latest technologies and practices in this ever-changing field, this groundbreaking new volume covers the theoretical challenges and practical solutions for using robotics across a variety of industries, encompassing many disciplines, including mathematics, computer science, electrical engineering, information technology, mechatronics, electronics, bioengineering, and command and software engineering. Robotics is the study of creating devices that can take the place of people and mimic their behaviors. Mechanical engineering, electrical engineering, information engineering, mechatronics, electronics, bioengineering, computer engineering, control engin...
The ideas of frequency reuse and handoff, two cornerstones of cellular radio, are covered in depth. This exemplifies the importance of trunking efficiency and the interplay between mobile and base station interference in reducing cellular networks' total capacity. It shows how several radio propagation models may be used to foresee the far-reaching consequences of radio waves in a variety of operational settings. This also describes how to quantify and estimate the influence of signal bandwidth and velocity on the instantaneous received signal over the multi-path channel, as well as smaller propagation effects like fading, time delay spread, and doppler spread. Students should be directed to...
This book focuses on futuristic approaches and designs for real-time systems and applications, as well as the fundamental concepts of including advanced techniques and tools in models of data-driven blockchain ecosystems. The Data-Driven Blockchain Ecosystem: Fundamentals, Applications, and Emerging Technologies discusses how to implement and manage processes for releasing and delivering blockchain applications. It presents the core of blockchain technology, IoT-based and AI-based blockchain systems, and various manufacturing areas related to Industry 4.0. The book illustrates how to apply design principles to develop and manage blockchain networks, and also covers the role that cloud computing plays in blockchain applications. All major technologies involved in blockchain-embedded applications are included in this book, which makes it useful to engineering students, researchers, academicians, and professionals interested in the core of blockchain technology.
This book highlights recent research on bio-inspired computing and its various innovative applications in information and communication technologies. It presents 38 high-quality papers from the 10th International Conference on Innovations in Bio-Inspired Computing and Applications (IBICA 2019) and 9th World Congress on Information and Communication Technologies (WICT 2019), which was held at GIET University, Gunupur, India, on December 16–18, 2019. As a premier conference, IBICA–WICT brings together researchers, engineers and practitioners whose work involves bio-inspired computing, computational intelligence and their applications in information security, real-world contexts, etc. Including contributions by authors from 18 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering.
This book contains the papers presented at the First International Conference on Innovations in Intelligent Computing and Communication, ICIICC 2021, held in Bhubaneswar, Odisha, India, in December, 2022. The 31 full papers presented were thoroughly reviewed and selected from 78 submissions. They are divided in three tracks with the following topics: Intelligent Computing; Communications; and Machine Learning and Data Analytics.
Data stealing is a major concern on the internet as hackers and criminals have begun using simple tricks to hack social networks and violate privacy. Cyber-attack methods are progressively modern, and obstructing the attack is increasingly troublesome, regardless of whether countermeasures are taken. The Dark Web especially presents challenges to information privacy and security due to anonymous behaviors and the unavailability of data. To better understand and prevent cyberattacks, it is vital to have a forecast of cyberattacks, proper safety measures, and viable use of cyber-intelligence that empowers these activities. Dark Web Pattern Recognition and Crime Analysis Using Machine Intellige...
With the advent of advanced technologies in AI, driverless vehicles have elevated curiosity among various sectors of society. The automotive industry is in a technological boom with autonomous vehicle concepts. Autonomous driving is one of the crucial application areas of Artificial Intelligence (AI). Autonomous vehicles are armed with sensors, radars, and cameras. This made driverless technology possible in many parts of the world. In short, our traditional vehicle driving may swing to driverless technology. Many researchers are trying to come out with novel AI algorithms that are capable of handling driverless technology. The current existing algorithms are not able to support and elevate ...
This book presents a vital method for companies to connect with potential clients andconsumers in the digital era of Online Social Networks (OSNs), utilizing the strengthof well-known social networks and AI to achieve success through fostering brandsupporters, generating leads, and enhancing customer interactions. There are currently 4.8 billion Online Social Network (OSN) users worldwide. Online Social Networks in Business Frameworks presents marketing through online social networks (OSNs), which is a potent method for companies of all sizes to connect with potential clients and consumers. If visitors are not on OSN sites like Facebook, Twitter, and LinkedIn, they are missing out on the fac...