You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Natural Language Processing and Information Retrieval is a textbook designed to meet the requirements of engineering students pursuing undergraduate and postgraduate programs in computer science and information technology. The book attempts to bridge the gap between theory and practice and would also serve as a useful reference for professionals and researchers working on language-related projects.
In the ever-accelerating tapestry of our digital age, the symbiotic relationship between computational intelligence and cyber security has become the linchpin of progress. The relentless pace of technological evolution and the ceaseless emergence of cyber threats demand not only adaptation but also an exploration of the forefronts of innovation and defence. Recent Advances in Computational Intelligence and Cyber security is a testament to the exhilarating journey undertaken by researchers, practitioners, and visionaries in these pivotal fields. Within the confines of this book, we embark on a captivating exploration of the cutting-edge developments that define the current state of computational intelligence and the intricate dance with the ever-evolving landscape of cyber security.
Dear Reader! Welcome to the proceedings of the First International Conference on Intelligent Human Computer Interaction (IHCI 2009) organized by the Indian Institute of Information Technology Allahabad. This is the first International Conference focused on Human Computer Interaction being organized in India. There is an increased interest in the human factors issues of computer use with a number of systems. The conference aims to provide an excellent opportunity for the dissemination of interesting new research, discussion about them and the generation of new ideas in these areas. We planned to organize the conference around the following five tracks: Signal and Vision Processing Language Pr...
This book discusses the applications of different soft computing techniques for the web-based systems and services. The respective chapters highlight recent developments in the field of soft computing applications, from web-based information retrieval to online marketing and online healthcare. In each chapter author endeavor to explain the basic ideas behind the proposed applications in an accessible format for readers who may not possess a background in these fields. This carefully edited book covers a wide range of new applications of soft computing techniques in Web recommender systems, Online documents classification, Online documents summarization, Online document clustering, Online mar...
Advancing technologies, especially computer technologies, have necessitated the creation of a comprehensive investigation and collection methodology for digital and online evidence. The goal of cyber forensics is to perform a structured investigation while maintaining a documented chain of evidence to find out exactly what happened on a computing device or on a network and who was responsible for it. Critical Concepts, Standards, and Techniques in Cyber Forensics is a critical research book that focuses on providing in-depth knowledge about online forensic practices and methods. Highlighting a range of topics such as data mining, digital evidence, and fraud investigation, this book is ideal for security analysts, IT specialists, software engineers, researchers, security professionals, criminal science professionals, policymakers, academicians, and students.
This book presents select papers from the International Conference on Emerging Trends in Communication, Computing and Electronics (IC3E 2018). Covering the latest theories and methods in three related fields – electronics, communication and computing, it describes cutting-edge methods and applications in the areas of signal and image processing, cyber security, human-computer interaction, machine learning, electronic devices, nano-electronics, wireless sensor networks, antenna and wave propagation, and mobile communication. The contents of this book will be beneficial to students, researchers, and professionals working in the field of networks and communications.
The four volume set LNAI 3681, LNAI 3682, LNAI 3683, and LNAI 3684 constitute the refereed proceedings of the 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems, KES 2005, held in Melbourne, Australia in September 2005. The 716 revised papers presented were carefully reviewed and selected from nearly 1400 submissions. The papers present a wealth of original research results from the field of intelligent information processing in the broadest sense; topics covered in the fourth volume are innovations in intelligent systems and their applications, data mining and soft computing applications, skill acquisition and ubiquitous human computer interactio...
Individuals with disabilities often have difficulty accomplishing tasks, living independently, and utilizing information technologies; simple aspects of daily life taken for granted by non-disabled individuals. Assistive Technologies: Concepts, Methodologies, Tools, and Applications presents a comprehensive collection of research, developments, and knowledge on technologies that enable disabled individuals to function effectively and accomplish otherwise impossible tasks. These volumes serve as a crucial reference source for experts in fields as diverse as healthcare, information science, education, engineering, and human-computer interaction, with applications bridging multiple disciplines.