You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The international multi-topic conference IMTIC 2008 was held in Pakistan during April 11–12, 2008. It was a joint venture between Mehran University, Jamshoro, Sindh and Aalborg University, Esbjerg, Denmark. Apart from the two-day main event, two workshops were also held: the Workshop on Creating Social Semantic Web 2.0 Information Spaces and the Workshop on Wireless Sensor Networks. Two hundred participants registered for the main conference from 24 countries and 43 papers were presented; the two workshops had overwhelming support and over 400 delegates registered. IMTIC 2008 served as a platform for international scientists and the engineering community in general, and in particular for l...
This proceedings of Symposium on DAMLAI–2024, jointly organized by GTU – Ahmedabad and ISI – Kolkata, includes extended abstracts of research problems under study, by the research scholars of GTU, along with the proposed solution and primary results. These problems encompass blood glucose estimation, state of human minds during the meditation, underwater wireless sensor networks, automatic analog circuit environment, image steganography, employability of the students, reward-based crowdfunding, flood hazard, prediction of lung cancer, cloud computing security and wireless networked control systems. The book also contains various use cases, new algorithms, novel solutions of real-time problems based on AI, ML and DA for supply chain management, quality management, manufacturing systems, healthcare, transportation developed by invited experts of Indian Statistical Institute, Kolkata and Indian Institute of Management, Ahmedabad. The book will be useful to the students of under graduate and post graduate who are willing to contribute in related cutting-edge technologies. It will also inspire them to explore opportunities in artificial intelligence and connected research domains.
As information technology (IT) becomes specialized and fragmented, it is easy to lose sight that many topics have common threads and because of this, advances in one s- discipline may transmit to another. The presentation of results between different s- disciplines encourages this interchange for the advancement of IT as a whole. This volume comprises the selection of papers presented at the Second International Mega-Conference on Future Generation Information Technology (FGIT 2010), composed of the following 11 international conferences: Advanced Software Engineering and Its Applications (ASEA 2010), Bio-Science and Bio- Technology (BSBT 2010), Control and Automation (CA 2010), Disaster Rec...
This book provides knowledge into the intelligence and security areas of smart-city paradigms. It focuses on connected computing devices, mechanical and digital machines, objects, and/or people that are provided with unique identifiers. The authors discuss the ability to transmit data over a wireless network without requiring human-to-human or human-to-computer interaction via secure/intelligent methods. The authors also provide a strong foundation for researchers to advance further in the assessment domain of these topics in the IoT era. The aim of this book is hence to focus on both the design and implementation aspects of the intelligence and security approaches in smart city applications that are enabled and supported by the IoT paradigms. Presents research related to cognitive computing and secured telecommunication paradigms; Discusses development of intelligent outdoor monitoring systems via wireless sensing technologies; With contributions from researchers, scientists, engineers and practitioners in telecommunication and smart cities.
Information and communication technology and the Internet of Things play key roles in smart city projects. It is challenging to handle the large amount of data generated by the different processes related to land use, the environment, the social and economic milieu, energy consumption, and transportation. This book emphasizes that green computing-based infrastructure initiatives benefit not only the environment but the enterprise as well. Green Computing for Sustainable Smart Cities: A Data Analytics Applications Perspective covers the need for smart green computing from various engineering disciplines and offers diversified applications for such computing with cases studies. The book highli...
The modern business world faces many new challenges in preserving its confidentiality and data from online attackers. Further, it also faces a struggle with preventing fraud. These challenges threaten businesses internally and externally and can cause huge losses. It is essential for business leaders to be up to date on the current fraud prevention, confidentiality, and data security to protect their businesses. Fraud Prevention, Confidentiality, and Data Security for Modern Businesses provides examples and research on the security challenges, practices, and blueprints for todays data storage and analysis systems to protect against current and emerging attackers in the modern business world. It includes the organizational, strategic, and technological depth to design modern data security practices within any organization. Covering topics such as confidential communication, information security management, and social engineering, this premier reference source is an indispensable resource for business executives and leaders, entrepreneurs, IT managers, security specialists, students and educators of higher education, librarians, researchers, and academicians.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2020), held at Jan Wyzykowski University, Poland, during June 2020. The book covers the topics in data analytics, data management, big data, computational intelligence, and communication networks. The book presents innovative work by leading academics, researchers, and experts from industry which is useful for young researchers and students.
This book presents Internet of Things (IoT) technology and security-related solutions that employ intelligent data processing technologies and machine learning (ML) approaches for data analytics. It presents practical scenarios from the industry for the application of the internet of things in various domains. Next Generation Communication Networks for Industrial Internet of Things Systems presents concepts and research challenges in communication networking for Industrial internet of things systems. Features: Discusses process monitoring, environmental monitoring, control, and maintenance monitoring. Covers data collection and communication protocols in a comprehensive manner. Highlights the internet of things industrial applications, and industrial revolution 4.0. Presents 5G-enabled internet of things technology and architecture. Showcases artificial intelligence techniques in the IoT networks. It will serve as an ideal reference text for senior undergraduate, graduate students, and academic researchers in the areas of electrical engineering, electronics, and communications engineering, computer engineering, and information technology.
The growth of innovative cyber threats, many based on metamorphosing techniques, has led to security breaches and the exposure of critical information in sites that were thought to be impenetrable. The consequences of these hacking actions were, inevitably, privacy violation, data corruption, or information leaking. Machine learning and data mining techniques have significant applications in the domains of privacy protection and cybersecurity, including intrusion detection, authentication, and website defacement detection, that can help to combat these breaches. Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity provides machine and deep learning methods for ana...
This book is devoted to the new standards, technologies, and communication systems for Artificial Intelligence of Things (AIoT) networks. Smart and intelligent communication networks have gained significant attention due to the combination of AI and IoT networks to improve human and machine interfaces and enhance data processing and services. AIoT networks involve the collection of data from several devices and sensor nodes in the environment. AI can enhance these networks to make them faster, greener, smarter, and safer. Computer vision, language processing, and speech recognition are some examples of AIoT networks. Due to a large number of devices in today’s world, efficient and intellig...