You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Information in a signal is often followed by undesirable disturbance which is termed as noise. Preventing noise in the signal leads to signal integrity, which also leads to better signal quality. The previous related works have the major issues while reducing noise in signals regarding assumptions, frequency and time domain, etc. This paper proposes a new Neutrosophic approach to reduce noises and errors in signal transmission. In the proposed method, confidence function is used as the truth membership function, which is associated with sampled time intervals.
This eighth volume of Collected Papers includes 75 papers comprising 973 pages on (theoretic and applied) neutrosophics, written between 2010-2022 by the author alone or in collaboration with the following 102 co-authors (alphabetically ordered) from 24 countries: Mohamed Abdel-Basset, Abduallah Gamal, Firoz Ahmad, Ahmad Yusuf Adhami, Ahmed B. Al-Nafee, Ali Hassan, Mumtaz Ali, Akbar Rezaei, Assia Bakali, Ayoub Bahnasse, Azeddine Elhassouny, Durga Banerjee, Romualdas Bausys, Mircea Boșcoianu, Traian Alexandru Buda, Bui Cong Cuong, Emilia Calefariu, Ahmet Çevik, Chang Su Kim, Victor Christianto, Dae Wan Kim, Daud Ahmad, Arindam Dey, Partha Pratim Dey, Mamouni Dhar, H. A. Elagamy, Ahmed K. Es...
The focus of the Asian Applied Computing Conference (AACC) is primarily to bring the research in computer science closer to practical applications. The conference is aimed primarily at topics that have immediate practical bene?ts. By hosting the conf- ence in the developingnations in Asia we aim to provide a forum for engagingboth the academic and the commercial sectors in that region. The ?rst conference “Information Technology Prospects and Challenges” was held in May 2003 in Kathmandu, Nepal. Thisyear theconferencenamewas changedto “Asian AppliedComputingConference” to re?ect both the regional- and the application-oriented nature of the conference. AACC is planned to be a themed c...
This sixth volume of Collected Papers includes 74 papers comprising 974 pages on (theoretic and applied) neutrosophics, written between 2015-2021 by the author alone or in collaboration with the following 121 co-authors from 19 countries: Mohamed Abdel-Basset, Abdel Nasser H. Zaied, Abduallah Gamal, Amir Abdullah, Firoz Ahmad, Nadeem Ahmad, Ahmad Yusuf Adhami, Ahmed Aboelfetouh, Ahmed Mostafa Khalil, Shariful Alam, W. Alharbi, Ali Hassan, Mumtaz Ali, Amira S. Ashour, Asmaa Atef, Assia Bakali, Ayoub Bahnasse, A. A. Azzam, Willem K.M. Brauers, Bui Cong Cuong, Fausto Cavallaro, Ahmet Çevik, Robby I. Chandra, Kalaivani Chandran, Victor Chang, Chang Su Kim, Jyotir Moy Chatterjee, Victor Christia...
This book comprises select papers from the international conference on Research in Intelligent and Computing in Engineering (RICE 2019) held at Hanoi University of Industry, Hanoi, Vietnam. The volume focuses on current research on various computing models such as centralized, distributed, cluster, grid and cloud. The contents cover recent advances in wireless sensor networks, mobile ad hoc networks, internet of things, machine learning, grid and cloud computing, and their various applications. The book will help researchers as well as professionals to gain insight into the rapidly evolving fields of internet computing and data mining.
The volume contains original research findings, exchange of ideas and dissemination of innovative, practical development experiences in different fields of soft and advance computing. It provides insights into the International Conference on Soft Computing in Data Analytics (SCDA). It also concentrates on both theory and practices from around the world in all the areas of related disciplines of soft computing. The book provides rapid dissemination of important results in soft computing technologies, a fusion of research in fuzzy logic, evolutionary computations, neural science and neural network systems and chaos theory and chaotic systems, swarm based algorithms, etc. The book aims to cater the postgraduate students and researchers working in the discipline of computer science and engineering along with other engineering branches.
The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections named: Smart and Innovative Trends in Communication Protocols and Standards; Smart and Innovative Trends in Computational Intelligence and Data Science; Smart and Innovative Trends in Image Processing and Machine Vision; Smart Innovative Trends in Natural Language Processing for Indian Languages; Smart Innovative Trends in Security and Privacy.
The book IoT and Big Data Analytics (IoT-BDA) for Smart Cities – A Global Perspective, emphasizes the challenges, architectural models, and intelligent frameworks with smart decisionmaking systems using Big Data and IoT with case studies. The book illustrates the benefits of Big Data and IoT methods in framing smart systems for smart applications. The text is a coordinated amalgamation of research contributions and industrial applications in the field of smart cities. Features: Provides the necessity of convergence of Big Data Analytics and IoT techniques in smart city application Challenges and Roles of IoT and Big Data in Smart City applications Provides Big Data-IoT intelligent smart sy...
This book gathers the proceedings of the 10th International Conference on Frontier Computing, held in Singapore, on July 10–13, 2020, and provides comprehensive coverage of the latest advances and trends in information technology, science, and engineering. It addresses a number of broad themes, including communication networks, business intelligence and knowledge management, web intelligence, and related fields that inspire the development of information technology. The respective contributions cover a wide range of topics: database and data mining, networking and communications, web and Internet of things, embedded systems, soft computing, social network analysis, security and privacy, optical communication, and ubiquitous/pervasive computing. Many of the papers outline promising future research directions, and the book benefits students, researchers, and professionals alike. Further, it offers a useful reference guide for newcomers to the field.
This book delves into cutting-edge research in cyberspace and outer space security, encompassing both theoretical and experimental aspects. It provides mitigation measures and strategies to address the identified challenges within. It covers a spectrum of topics including techniques and strategies for enhancing cyberspace security, combating ransomware attacks, and securing autonomous vehicles. Additionally, it explores security and surveillance systems involving autonomous vehicles, resilience schemes against security attacks using blockchain for autonomous vehicles, security analysis of autonomous drones (UAVs), the cybersecurity kill chain, the internet of drones (IoD), and cyberspace sol...