Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Information and Communication Technology for Intelligent Systems
  • Language: en
  • Pages: 756

Information and Communication Technology for Intelligent Systems

This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fourth International Conference on Information and Communication Technology for Intelligent Systems, which was held in Ahmedabad, India. Divided into two volumes, the book discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.

Next Generation Wireless Network Security and Privacy
  • Language: en
  • Pages: 393

Next Generation Wireless Network Security and Privacy

  • Type: Book
  • -
  • Published: 2015-10-13
  • -
  • Publisher: IGI Global

As information resources migrate to the Cloud and to local and global networks, protecting sensitive data becomes ever more important. In the modern, globally-interconnected world, security and privacy are ubiquitous concerns. Next Generation Wireless Network Security and Privacy addresses real-world problems affecting the security of information communications in modern networks. With a focus on recent developments and solutions, as well as common weaknesses and threats, this book benefits academicians, advanced-level students, researchers, computer scientists, and software development specialists. This cutting-edge reference work features chapters on topics including UMTS security, procedural and architectural solutions, common security issues, and modern cryptographic algorithms, among others.

Handbook of Research on Security Considerations in Cloud Computing
  • Language: en
  • Pages: 433

Handbook of Research on Security Considerations in Cloud Computing

  • Type: Book
  • -
  • Published: 2015-07-28
  • -
  • Publisher: IGI Global

Cloud computing has quickly become the next big step in security development for companies and institutions all over the world. With the technology changing so rapidly, it is important that businesses carefully consider the available advancements and opportunities before implementing cloud computing in their organizations. The Handbook of Research on Security Considerations in Cloud Computing brings together discussion on current approaches to cloud-based technologies and assesses the possibilities for future advancements in this field. Highlighting the need for consumers to understand the unique nature of cloud-delivered security and to evaluate the different aspects of this service to verify if it will meet their needs, this book is an essential reference source for researchers, scholars, postgraduate students, and developers of cloud security systems.

Emerging Technologies in Data Mining and Information Security
  • Language: en
  • Pages: 922

Emerging Technologies in Data Mining and Information Security

This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2020) held at the University of Engineering & Management, Kolkata, India, during July 2020. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers and case studies related to all the areas of data mining, machine learning, Internet of things (IoT) and information security.

Integrating Artificial Intelligence and Machine Learning with Blockchain Security
  • Language: en
  • Pages: 302

Integrating Artificial Intelligence and Machine Learning with Blockchain Security

Due to its transparency and dependability in secure online transactions, blockchain technology has grown in prominence in recent years. Several industries, including those of finance, healthcare, energy and utilities, manufacturing, retail marketing, entertainment and media, supply chains, e-commerce, and e-business, among others, use blockchain technology. In order to enable intelligent decision-making to prevent security assaults, particularly in permission-less blockchain platforms, artificial intelligence (AI) techniques and machine learning (ML) algorithms are used. By exploring the numerous use cases and security methods used in each of them, this book offers insight on the application of AI and ML in blockchain security principles. The book argues that it is crucial to include artificial intelligence and machine learning techniques in blockchain technology in order to increase security.

Data Science and Applications
  • Language: en
  • Pages: 546

Data Science and Applications

None

Computational Intelligence for Engineering and Management Applications
  • Language: en
  • Pages: 925

Computational Intelligence for Engineering and Management Applications

This book comprises select proceedings of the 1st International Conference on Computational Intelligence for Engineering and Management Applications (CIEMA - 2022). This book emphasizes applications of computational intelligence including machine intelligence, data analytics, and optimization algorithms for solving fundamental and advanced engineering and management problems. This book serves as a valuable resource for researchers, industry professionals, academicians, and doctoral scholars in engineering, production, thermal, materials, design, computer engineering, natural sciences, and management who work on computational intelligence. The book also serves researchers who are willing to use computational intelligence algorithms in real-time applications.

Soft Computing and Signal Processing
  • Language: en
  • Pages: 729

Soft Computing and Signal Processing

This book presents selected research papers on current developments in the fields of soft computing and signal processing from the Third International Conference on Soft Computing and Signal Processing (ICSCSP 2020). The book covers topics such as soft sets, rough sets, fuzzy logic, neural networks, genetic algorithms and machine learning and discusses various aspects of these topics, e.g., technological considerations, product implementation and application issues.

Healthcare 4.0
  • Language: en
  • Pages: 298

Healthcare 4.0

  • Type: Book
  • -
  • Published: 2022-12-27
  • -
  • Publisher: CRC Press

The main aim of Healthcare 4.0: Health Informatics and Precision Data Management is to improve the services given by the healthcare industry and to bring meaningful patient outcomes by applying the data, information and knowledge in the healthcare domain. Features: Improves the quality of health data of a patient Presents a wide range of opportunities and renewed possibilities for healthcare systems Gives a way for carefully and meticulously tracking the provenance of medical records Accelerates the process of disease-oriented data and medical data arbitration Brings meaningful patient health outcomes Eradicates delayed clinical communications Helps the research intellectuals to step down further toward the disease and clinical data storage Creates more patient-centered services The precise focus of this handbook is on the potential applications and use of data informatics in healthcare, including clinical trials, tailored ailment data, patient and ailment record characterization and health records management.

Building Secure Business Models Through Blockchain Technology: Tactics, Methods, Limitations, and Performance
  • Language: en
  • Pages: 302

Building Secure Business Models Through Blockchain Technology: Tactics, Methods, Limitations, and Performance

  • Type: Book
  • -
  • Published: 2023-04-11
  • -
  • Publisher: IGI Global

Blockchain technology provided a buzz-seeking opportunity for all industries to implement improved corporate procedures and trust-building. Still, some industries, such as the banking sector, may view it as a disruptive technology that must be adopted. A transaction ledger’s contents can be verified, maintained, and synchronized by community members using blockchain technology. A transaction can never be changed or removed from the blockchain; updates may only be made by participants in the system. Its distributed database cannot be manipulated, disrupted, or hacked in the same manner as conventional, user-controlled access systems and centralized databases. Building Secure Business Models...