You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book highlights cutting-edge research in the field of network science, offering scientists, researchers, students and practitioners a unique update on the latest advances in theory and a multitude of applications. It presents the peer-reviewed proceedings of the VI International Conference on Complex Networks and their Applications (COMPLEX NETWORKS 2017), which took place in Lyon on November 29 – December 1, 2017. The carefully selected papers cover a wide range of theoretical topics such as network models and measures; community structure, network dynamics; diffusion, epidemics and spreading processes; resilience and control as well as all the main network applications, including social and political networks; networks in finance and economics; biological and ecological networks and technological networks.
We feel greatly honoured to have been assigned the job of organizing the AICTE Sponsored International Conference on Application of AI, ML, DL, Big Data on Recent Societal Issues (ICARSI’2023) on April 21 & April 22,2023 at Saveetha Engineering College. The international conference is a platform that brings together the brightest minds from across the globe to share their ideas and insights on the recent societal issues with Artificial intelligence, Machine Learning, Deep Learning, Big data and emerging technologies. With an aim to promote collaboration and foster innovation, this conference promises to be a melting pot of ideas and knowledge sharing.
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations. With everything becoming increasingly interconnected via the Internet, data security becomes paramount. As technology advances, people need to secure their data communication processes. Personal data security, including data integrity and confidentiality, is particularly vulnerable. Therefore, the concept of cyber security forensics emerges to ensure data security for everyone, addressing issues such as data control, hijacking, and threats to personal devices such as mobile phones, laptops, and other smart...
This text describes how the design, analyzing capacity, and optimization criteria of mechatronics systems can be improved using numerical, experimental, and computational approaches, and how it helps in data sensing, fault detection, and diagnosis. It further discusses topics such as intelligent mechatronics systems and their applications in manufacturing, robotics, and automation. This book: Discusses the applications of mechatronics systems in manufacturing, automation, robotics, medical, pharmaceuticals, ground, and air transportation sectors Presents numerical, experimental, and computational approaches for signal sensing, fault detection, and diagnosis Highlights the importance of using...
The industrial landscape is changing rapidly, and so is global society. This change is driven by the growing adoption of the Industrial Internet of Things (IIoT) and artificial intelligence (AI) technologies. IIoT and AI are transforming the way industrial engineering is done, enabling new levels of automation, productivity, and efficiency. However, as IIoT and AI become more pervasive in the industrial world, they also offer new security risks that must be addressed to ensure the reliability and safety of critical systems. Industrial Internet of Things Security: Protecting AI-Enabled Engineering Systems in Cloud and Edge Environments provides a comprehensive guide to IIoT security, covering...
This book gathers the proceedings of the 10th International Conference on Frontier Computing, held in Singapore, on July 10–13, 2020, and provides comprehensive coverage of the latest advances and trends in information technology, science, and engineering. It addresses a number of broad themes, including communication networks, business intelligence and knowledge management, web intelligence, and related fields that inspire the development of information technology. The respective contributions cover a wide range of topics: database and data mining, networking and communications, web and Internet of things, embedded systems, soft computing, social network analysis, security and privacy, optical communication, and ubiquitous/pervasive computing. Many of the papers outline promising future research directions, and the book benefits students, researchers, and professionals alike. Further, it offers a useful reference guide for newcomers to the field.