You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 12th International ICT Innovations Conference, ICT Innovations 2020, held in Skopje, North Macedonia, in September 2020. The 12 full papers and 6 short papers presented were carefully reviewed and selected from 60 submissions. The focal point of the volume is machine learning and applications in spheres of business, science and technology.
This book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: symmetric cryptography, cryptographic hardware, cryptographic protocols and public key cryptography. The book also contains one invited talk in full paper length.
This book gathers selected high-quality research papers presented at the Sixth International Congress on Information and Communication Technology, held at Brunel University, London, on February 25–26, 2021. It discusses emerging topics pertaining to information and communication technology (ICT) for managerial applications, e-governance, e-agriculture, e-education and computing technologies, the Internet of Things (IoT) and e-mining. Written by respected experts and researchers working on ICT, the book offers a valuable asset for young researchers involved in advanced studies. The book is presented in four volumes.
Information communication technologies have become the necessity in everyday life enabling increased level of communication, processing and information exchange to extent that one could not imagine only a decade ago. Innovations in these technologies open new fields in areas such as: language processing, biology, medicine, robotics, security, urban planning, networking, governance and many others. The applications of these innovations are used to define services that not only ease, but also increase the quality of life. Good education is essential for establishing solid basis of individual development and performance. ICT is integrated part of education at every level and type. Therefore, th...
The present stage of the human civilization is the e-society, which is build over the achievements obtained by the development of the information and communication technologies. It affects everyone, from ordinary mobile phone users to designers of high quality industrial products, and every human activity, from taking medical care to improving the state governing. The science community working in computer sciences and informatics is therefore under constant challenge; it has to solve the new appeared theoretical problem as well as to find new practical solutions. The fourth ICT Innovations Conference, held in September 2012 in Ohrid, Macedonia, was one of the several world-wide forums where ...
This book constitutes the refereed proceedings of the Second International Conference, ICT Innovations 2010, held in Ohrid, Macedonia, in September 2010. The 33 revised papers presented together with 5 invited papers were carefully reviewed and selected. The papers address the following topics: internet applications and services, artificial intelligence, bioinformatics, internet, mobile and wireless technologies, multimedia information systems, computer networks, computer security, e-business, cryptography, high-performance-computing, social networks, e-government, as well as GPU computing.
Data is a common ground, a starting point for each ICT system. Data needs processing, use of different technologies and state-of-the-art methods in order to obtain new knowledge, to develop new useful applications that not only ease, but also increase the quality of life. These applications use the exploration of Big Data, High throughput data, Data Warehouse, Data Mining, Bioinformatics, Robotics, with data coming from social media, sensors, scientific applications, surveillance, video and image archives, internet texts and documents, internet search indexing, medical records, business transactions, web logs, etc. Information and communication technologies have become the asset in everyday ...
This book constitutes the refereed proceedings of the 14th International Conference on ICT Innovations 2022. Reshaping the Future Towards a New Normal, ICT Innovations 2022, held in Skopje, Macedonia, during September 29–October 1, 2022. The 14 full papers and 1 short papers included in this book were carefully reviewed and selected from 42 submissions. They were organized in topical sections as follows: theoretical foundations and distributed computing; artificial intelligence and deep learning; applied artificial intelligence; education; and medical informatics.
This book is a comprehensive collection of chapters focusing on the core areas of computing and their further applications in the real world. Each chapter is a paper presented at the Computing Conference 2021 held on 15-16 July 2021. Computing 2021 attracted a total of 638 submissions which underwent a double-blind peer review process. Of those 638 submissions, 235 submissions have been selected to be included in this book. The goal of this conference is to give a platform to researchers with fundamental contributions and to be a premier venue for academic and industry practitioners to share new ideas and development experiences. We hope that readers find this volume interesting and valuable as it provides the state-of-the-art intelligent methods and techniques for solving real-world problems. We also expect that the conference and its publications is a trigger for further related research and technology improvements in this important subject.
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the objective of which was to improve and adapt existent cryptanalysis methodologies and tools to the ubiquitous computing framework. The cryptanalysis implemented lies along four axes: cryptographic models, cryptanalysis of building blocks, hardware and software security engineering, and security assessment of real-world systems. The authors are top-class researchers in security and cryptography, and the contributions are of value to researchers and practitioners in these domains. This book is open access under a CC BY license.