You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 10th International Conference on Applications and Techniques in Information Security, ATIS 2019, held in Tamil Nadul, India, in November 2019. The 22 full papers and 2 short papers presented in the volume were carefully reviewed and selected from 50 submissions. The papers are organized in the following topical sections: information security; network security; intrusion detection system; authentication and key management system; security centric applications.
This book addresses different methods and techniques of integration for enhancing the overall goal of data mining. The book is a collection of high-quality peer-reviewed research papers presented in the Sixth International Conference on Computational Intelligence in Data Mining (ICCIDM 2021) held at Aditya Institute of Technology and Management, Tekkali, Andhra Pradesh, India, during December 11–12, 2021. The book addresses the difficulties and challenges for the seamless integration of two core disciplines of computer science, i.e., computational intelligence and data mining. The book helps to disseminate the knowledge about some innovative, active research directions in the field of data mining, machine and computational intelligence, along with some current issues and applications of related topics.
The integration of Artificial Intelligence (AI) with Communication Technologies (ICT) is a critical aspect of research and development today, but it poses numerous challenges and bottlenecks. To address these issues, the book AI and Its Convergence with Communication Technologies, edited by a team of expert scholars, provides a comprehensive overview of the state-of-the-art research and practical challenges related to AI's convergence with ICT. It is designed to benefit engineers, professionals, scientists, and academicians, providing them with insights into the ICT industry and research from an AI perspective. The book covers a wide range of topics, including recent advancements and applica...
This book gathers selected papers presented at the Inventive Communication and Computational Technologies conference (ICICCT 2019), held on 29–30 April 2019 at Gnanamani College of Technology, Tamil Nadu, India. The respective contributions highlight recent research efforts and advances in a new paradigm called ISMAC (IoT in Social, Mobile, Analytics and Cloud contexts). Topics covered include the Internet of Things, Social Networks, Mobile Communications, Big Data Analytics, Bio-inspired Computing and Cloud Computing. The book is chiefly intended for academics and practitioners working to resolve practical issues in this area.
The two-volume set LNAI 13725 and 13726 constitutes the proceedings of the 18th International Conference on Advanced Data Mining and Applications, ADMA 2022, which took place in Brisbane, Queensland, Australia, in November 2022. The 72 papers presented in the proceedings were carefully reviewed and selected from 198 submissions. The contributions were organized in topical sections as follows: Finance and Healthcare; Web and IoT Applications; On-device Application; Other Applications; Pattern Mining; Graph Mining; Text Mining; Image, Multimedia and Time Series Data Mining; Classification, Clustering and Recommendation; Multi-objective, Optimization, Augmentation, and Database; and Others.
This volume constitutes the refereed proceedings of the Second International Conference on Intelligent Information Technologies, ICIIT 2017, held in Chennai, India, in December 2017. The 20 full papers and 7 short papers presented were carefully reviewed and selected from 117 submissions. They feature research on the Internet of Things (IoT) and are organized in the following topical sections: IoT enabling technologies; IoT security; social IoT; web of things; and IoT services and applications.
This book features high-quality research papers presented at the 5th International Conference on Computational Intelligence in Pattern Recognition (CIPR 2023), held at Department of Computer Science and Engineering, Techno Main Salt Lake, West Bengal, India, during May 27–28, 2023. It includes practical development experiences in various areas of data analysis and pattern recognition, focusing on soft computing technologies, clustering and classification algorithms, rough set and fuzzy set theory, evolutionary computations, neural science and neural network systems, image processing, combinatorial pattern matching, social network analysis, audio and video data analysis, data mining in dynamic environments, bioinformatics, hybrid computing, big data analytics, and deep learning. It also provides innovative solutions to the challenges in these areas and discusses recent developments.
Zusammenfassung: This book includes the results from the 5th International Conference on Deep Learning, Artificial Intelligence and Robotics (ICDLAIR), held in National Institute of Technology, Kurukshetra, on December 07-09, 2023, which brought together visionaries, researchers, and industry leaders at the forefront of technological innovation. In the rapidly evolving landscape of technology, deep learning, artificial intelligence, and robotics stand as a beacon of innovation and intellectual exchange. Among the myriad of groundbreaking contributions, a notable gem emerges--a forthcoming book that promises to encapsulate the essence of the 5th International Conference on Deep Learning, Arti...
As the advancement of technology continues, cyber security continues to play a significant role in todays world. With society becoming more dependent on the internet, new opportunities for virtual attacks can lead to the exposure of critical information. Machine and deep learning techniques to prevent this exposure of information are being applied to address mounting concerns in computer security. The Handbook of Research on Machine and Deep Learning Applications for Cyber Security is a pivotal reference source that provides vital research on the application of machine learning techniques for network security research. While highlighting topics such as web security, malware detection, and secure information sharing, this publication explores recent research findings in the area of electronic security as well as challenges and countermeasures in cyber security research. It is ideally designed for software engineers, IT specialists, cybersecurity analysts, industrial experts, academicians, researchers, and post-graduate students.