You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Charts the transnational story of Romanian Germans in modern Europe - their migration, their position as a minority, and their memories.
This book contains the conference proceedings of ICABCS 2023, a non-profit conference with the objective to provide a platform that allows academicians, researchers, scholars and students from various institutions, universities and industries in India and abroad to exchange their research and innovative ideas in the field of Artificial Intelligence, Blockchain, Computing and Security. It explores the recent advancement in field of Artificial Intelligence, Blockchain, Communication and Security in this digital era for novice to profound knowledge about cutting edges in artificial intelligence, financial, secure transaction, monitoring, real time assistance and security for advanced stage lear...
None
The objective of Document Analysis and Recognition (DAR) is to recognize the text and graphical components of a document and to extract information. This book is a collection of research papers and state-of-the-art reviews by leading researchers all over the world. It includes pointers to challenges and opportunities for future research directions. The main goal of the book is to identify good practices for the use of learning strategies in DAR.
Effective response to misuse or abusive activity in IT systems requires the capability to detect and understand improper activity. Intrusion Detection Systems observe IT activity, record these observations in audit data, and analyze the collected audit data to detect misuse. Privacy-Respecting Intrusion Detection introduces the concept of technical purpose binding, which restricts the linkability of pseudonyms in audit data to the amount necessary for misuse detection. Also, it limits the recovery of personal data to pseudonyms involved in a detected misuse scenario. The book includes case studies demonstrating this theory, and solutions that are constructively validated by providing algorithms.
In the age of e-society, handwritten signature processing is an enabling technology in a multitude of fields in the “digital agenda” of many countries, ranging from e-health to e-commerce, from e-government to e-justice, from e-democracy to e-banking, and smart cities. Handwritten signatures are very complex signs; they are the result of an elaborate process that depends on the psychophysical state of the signer and the conditions under which the signature apposition process occurs. Notwithstanding, recent efforts from academies and industries now make possible the integration of signature-based technologies into other standard equipment to form complete solutions that are able to suppor...
In pre-modern religions in the geographical context of Asia we encounter unique scripts, number systems, calendars, and naming conventions. These can make Western-built technologies – even tools specifically developed for digital humanities – an ill fit to our needs. The present volume explores this struggle and the limitations and potential opportunities of applying a digital humanities approach to pre-modern Asian religions. The authors cover Buddhism, Christianity, Daoism, Islam, Jainism, Judaism and Shintoism with chapters categorized according to their focus on: 1) temples, 2) manuscripts, 3) texts, and 4) social media. Thus, the volume guides readers through specific methodologies and practical examples while also providing a critical reflection on the state of the field, pushing the interface between digital humanities and pre-modern Asian religions into new territory.