You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 4th International Conference on Big Data and Security, ICBDS 2022, held in Xiamen, China, during December 8–12, 2022. The 51 full papers and 3 short papers included in this book were carefully reviewed and selected from 211 submissions. They were organized in topical sections as follows: answer set programming; big data and new method; intelligence and machine learning security; data technology and network security; sybersecurity and privacy; IoT security.
This book covers important aspects of modern optical microscopy and image restoration technologies. Instead of pure optical treatment, the book is delivered with the consideration of the scientists who utilize optical microscopy in their daily research. However, enough details are provided in basic imaging principles, optics and instrumentation in microscopy, spherical aberrations, deconvolution and image restoration. A number of microscopic technologies such as polarization, confocal and multi-photon microscopy are highlighted with their applications in biological and materials sciences/engineering.
This book gives detailed information about how soil, water and wastes can be managed to overcome the various global issues via possible nexus thinking. The emphasis is on the environmental resource perspective of global climate change-related issues. It provides stepwise information on climate change and adaption strategies, urbanization and its impact and management strategies, environmental nexus approaches to cope with global challenges and recourses conservation and ecological approaches to restore the damaged ecosystem. Features: Compiles the possible nexus approaches that contribute to managing the atmospheric environmental variables in sustainable ways Focuses on environmental resources perspective of the global change Covers how soil, water and waste may be managed in a nexus Explains modern strategies to manage the present environmental situation that are feasible and safe to the environment Discusses environmental nexus for judicious resource management This book is aimed at researchers and graduate students in environmental sciences and engineering and sustainable development.
Water stress in plants is caused by the water deficit, as induced possibly by drought or high soil salinity. The prime consequence of water stress in plants is the disruption in the agricultural production, resulting in food shortage. The plants, however, try to adapt to the stress conditions using biochemical and physiological interventions. The edited compilation is an attempt to provide new insights into the mechanism and adaptation aspects of water stress in plants through a thoughtful mixture of viewpoints. We hope that the content of the book will be useful for the researchers working with the plant diversity-related environmental aspects and also provide suggestions for the strategists.
The second International Conference on Applied Cryptography and Network Security (ACNS 2004) was sponsored and organized by ICISA (the International Communications and Information Security Association). It was held in Yellow Mountain, China, June 8–11, 2004. The conference proceedings, representing papers from the academic track, are published in this volume of the Lecture Notes in Computer Science (LNCS) of Springer-Verlag. The area of research that ACNS covers has been gaining importance in recent years due to the development of the Internet, which, in turn, implies global exposure of computing resources. Many ?elds of research were covered by the program of this track, presented in this...
The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.