You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book presents the latest cutting-edge research, theoretical methods, and novel applications in the field of computational intelligence techniques and methods for combating fake news. Fake news is everywhere. Despite the efforts of major social network players such as Facebook and Twitter to fight disinformation, miracle cures and conspiracy theories continue to rain down on the net. Artificial intelligence can be a bulwark against the diversity of fake news on the Internet and social networks. This book discusses new models, practical solutions, and technological advances related to detecting and analyzing fake news based on computational intelligence models and techniques, to help decision-makers, managers, professionals, and researchers design new paradigms considering the unique opportunities associated with computational intelligence techniques. Further, the book helps readers understand computational intelligence techniques combating fake news in a systematic and straightforward way.
This book constitutes the refereed proceedings of the International Conference on Soft Computing in Data Science, SCDS 2016, held in Putrajaya, Malaysia, in September 2016. The 27 revised full papers presented were carefully reviewed and selected from 66 submissions. The papers are organized in topical sections on artificial neural networks; classification, clustering, visualization; fuzzy logic; information and sentiment analytics.
This book presents high-quality research papers presented at the International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2020) held during July 7–8, 2020, in the Department of Smart Computing, Kyungdong University, Global Campus, South Korea. The book includes selected works from academics and industrial experts in the field of computer science, information technology, and electronics and telecommunication. The content addresses challenges of cyber security.
Thanks to rapid technological developments in terms of Computational Intelligence, smart tools have been playing active roles in daily life. It is clear that the 21st century has brought about many advantages in using high-level computation and communication solutions to deal with real-world problems; however, more technologies bring more changes to society. In this sense, the concept of smart cities has been a widely discussed topic in terms of society and Artificial Intelligence-oriented research efforts. The rise of smart cities is a transformation of both community and technology use habits, and there are many different research orientations to shape a better future. The objective of thi...
Intelligent computing refers greatly to artificial intelligence with the aim at making computer to act as a human. This newly developed area of real-time intelligent computing integrates the aspect of dynamic environments with the human intelligence. This book presents a comprehensive practical and easy to read account which describes current state-of-the art in designing and implementing real-time intelligent computing to robotics, alert systems, IoT, remote access control, multi-agent systems, networking, mobile smart systems, crowd sourcing, broadband systems, cloud computing, streaming data and many other applications areas. The solutions discussed in this book will encourage the researchers and IT professional to put the methods into their practice.
Providing a comprehensive introduction to next-generation networks, this book strikes a balance between how and why things work and making them work. It examines Internet architectures and protocols, network management and traffic engineering, embedded systems and sensor networks, web services, cloud technologies, and next-generation wireless networking. Containing the contributions of top industry experts and academics, the book investigates new technologies such as IPv6 over Low Power Wireless Personal Area Networks (6LoWPAN) architectures and standards, mobility, and security.
Simulation is a widely used mechanism for validating the theoretical models of networking and communication systems. Although the claims made based on simulations are considered to be reliable, how reliable they really are is best determined with real-world implementation trials. Simulation Technologies in Networking and Communications: Selecting the Best Tool for the Test addresses the spectrum of issues regarding the different mechanisms related to simulation technologies in networking and communications fields. Focusing on the practice of simulation testing instead of the theory, it presents the work of more than 50 experts from around the world. Considers superefficient Monte Carlo simul...
This book introduces and presents the newest up-to-date methods, approaches and technologies on how to detect child cyberbullying on social media as well as monitor kids E-learning, monitor games designed and social media activities for kids. On a daily basis, children are exposed to harmful content online. There have been many attempts to resolve this issue by conducting methods based on rating and ranking as well as reviewing comments to show the relevancy of these videos to children; unfortunately, there still remains a lack of supervision on videos dedicated to kids. This book also introduces a new algorithm for content analysis against harmful information for kids. Furthermore, it establishes the goal to track useful information of kids and institutes detection of kid’s textual aggression through methods of machine and deep learning and natural language processing for a safer space for children on social media and online and to combat problems, such as lack of supervision, cyberbullying, kid’s exposure to harmful content. This book is beneficial to postgraduate students and researchers' concerns on recent methods and approaches to kids' cybersecurity.
Wireless sensor networks (WSNs) utilize fast, cheap, and effective applications to imitate the human intelligence capability of sensing on a wider distributed scale. But acquiring data from the deployment area of a WSN is not always easy and multiple issues arise, including the limited resources of sensor devices run with one-time batteries. Additi
IT policies are set in place to streamline the preparation and development of information communication technologies in a particular setting. IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications is a comprehensive collection of research on the features of modern organizations in order to advance the understanding of IT standards. This is an essential reference source for researchers, scholars, policymakers, and IT managers as well as organizations interested in carrying out research in IT policies.