Download or read book Artificial Intelligence of Things for Achieving Sustainable Development Goals written by Sanjay Misra and published by Springer Nature. This book was released on with total page 394 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Proceedings of Data Analytics and Management written by Abhishek Swaroop and published by Springer Nature. This book was released on 2023-12-29 with total page 686 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2023), held at London Metropolitan University, London, UK, during June 2023. The book covers the topics in data analytics, data management, big data, computational intelligence, and communication networks. The book presents innovative work by leading academics, researchers, and experts from industry which is useful for young researchers and students. The book is divided into four volumes.
Download or read book Proceedings of International Conference on Recent Innovations in Computing written by Yashwant Singh and published by Springer Nature. This book was released on with total page 689 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Computer Safety Reliability and Security written by Barbara Gallina and published by Springer. This book was released on 2018-09-03 with total page 575 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed proceedings of five workshops co-located with SAFECOMP 2018, the 37th International Conference on Computer Safety, Reliability, and Security, held in Västerås, Sweden, in September 2018. The 28 revised full papers and 21 short papers presented together with 5 introductory papers to each workshop were carefully reviewed and selected from 73 submissions. This year's workshops are: ASSURE 2018 – Assurance Cases for Software-Intensive Systems; DECSoS 2018 – ERCIM/EWICS/ARTEMIS Dependable Smart Embedded and Cyber-Physical Systems and Systems-of-Systems; SASSUR 2018 – Next Generation of System Assurance Approaches for Safety-Critical Systems; STRIVE 2018 – Safety, securiTy, and pRivacy In automotiVe systEms; and WAISE 2018 – Artificial Intelligence Safety Engineering. The chapter '“Boxing Clever”: Practical Techniques for Gaining Insights into Training Data and Monitoring Distribution Shift' is available open access under an Open Government License via link.springer.com.
Download or read book Computer Security written by Sokratis Katsikas and published by Springer Nature. This book was released on 2020-02-21 with total page 451 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed post-conference proceedings of the 5th International Workshop on Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2019, the Third International Workshop on Security and Privacy Requirements Engineering, SECPRE 2019, the First International Workshop on Security, Privacy, Organizations, and Systems Engineering, SPOSE 2019, and the Second International Workshop on Attacks and Defenses for Internet-of-Things, ADIoT 2019, held in Luxembourg City, Luxembourg, in September 2019, in conjunction with the 24th European Symposium on Research in Computer Security, ESORICS 2019. The CyberICPS Workshop received 13 submissions from which 5 full papers and 2 short papers were selected for presentation. They cover topics related to threats, vulnerabilities and risks that cyber-physical systems and industrial control systems face; cyber attacks that may be launched against such systems; and ways of detecting and responding to such attacks. From the SECPRE Workshop 9 full papers out of 14 submissions are included. The selected papers deal with aspects of security and privacy requirements assurance and evaluation; and security requirements elicitation and modelling and to GDPR compliance. The SPOSE Workshop received 7 submissions from which 3 full papers and 1 demo paper were accepted for publication. They demonstrate the possible spectrum for fruitful research at the intersection of security, privacy, organizational science, and systems engineering. From the ADIoT Workshop 5 full papers and 2 short papers out of 16 submissions are included. The papers focus on IoT attacks and defenses and discuss either practical or theoretical solutions to identify IoT vulnerabilities and IoT security mechanisms.
Download or read book Speech and Computer written by Alexey Karpov and published by Springer Nature. This book was released on 2020-10-04 with total page 704 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the proceedings of the 22nd International Conference on Speech and Computer, SPECOM 2020, held in St. Petersburg, Russia, in October 2020. The 65 papers presented were carefully reviewed and selected from 160 submissions. The papers present current research in the area of computer speech processing including speech science, speech technology, natural language processing, human-computer interaction, language identification, multimedia processing, human-machine interaction, deep learning for audio processing, computational paralinguistics, affective computing, speech and language resources, speech translation systems, text mining and sentiment analysis, voice assistants, etc. Due to the Corona pandemic SPECOM 2020 was held as a virtual event.
Download or read book Experimental IR Meets Multilinguality Multimodality and Interaction written by Lorraine Goeuriot and published by Springer Nature. This book was released on with total page 356 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book IoT Enabled Healthcare Systems written by Yatindra Kumar and published by CRC Press. This book was released on 2024-12-06 with total page 235 pages. Available in PDF, EPUB and Kindle. Book excerpt: IoT technology for healthcare is a modern innovation that provides reliable and secure use of available resources for serving the healthcare industry. It not only helps improve contact between the community and public healthcare providers but also significantly lowers healthcare costs and improves treatment outcomes. This book highlights the latest in IoT technology for revolutionizing current healthcare systems, focusing on how IoT can make healthcare smarter and more beneficial for people. It explores such technologies as medical blockchain, biosensing for bioanalyses, pesticide monitoring in humans, and more. It also discusses how the cloud platform can be used for health monitoring systems and the applications of IoT for cancer.
Download or read book Computer Aided Verification written by Alexandra Silva and published by Springer Nature. This book was released on 2021-07-17 with total page 922 pages. Available in PDF, EPUB and Kindle. Book excerpt: This open access two-volume set LNCS 12759 and 12760 constitutes the refereed proceedings of the 33rd International Conference on Computer Aided Verification, CAV 2021, held virtually in July 2021. The 63 full papers presented together with 16 tool papers and 5 invited papers were carefully reviewed and selected from 290 submissions. The papers were organized in the following topical sections: Part I: invited papers; AI verification; concurrency and blockchain; hybrid and cyber-physical systems; security; and synthesis. Part II: complexity and termination; decision procedures and solvers; hardware and model checking; logical foundations; and software verification. This is an open access book.
Download or read book Service Science written by Zhongjie Wang and published by Springer Nature. This book was released on 2023-07-26 with total page 523 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes selected papers presented at the 16th International Conference on Service Science, ICSS 2023, held in Harbin, China, in May 2023. The 36 full papers and 2 short papers presented were thoroughly reviewed and selected from the 71 submissions. They are organized in the following topical sections: serverless edge computing; edge services reliability; intelligent services; service application; knowledge-inspired service; service ecosystem; graph-based service optimization; AI-inspired service optimization.
Download or read book Handbook of Learning from Multiple Representations and Perspectives written by Peggy Van Meter and published by Routledge. This book was released on 2020-03-10 with total page 696 pages. Available in PDF, EPUB and Kindle. Book excerpt: In and out of formal schooling, online and off, today’s learners must consume and integrate a level of information that is exponentially larger and delivered through a wider range of formats and viewpoints than ever before. The Handbook of Learning from Multiple Representations and Perspectives provides a path for understanding the cognitive, motivational, and socioemotional processes and skills necessary for learners across educational contexts to make sense of and use information sourced from varying inputs. Uniting research and theory from education, psychology, literacy, library sciences, media and technology, and more, this forward-thinking volume explores the common concerns, shared challenges, and thematic patterns in our capacity to make meaning in an information-rich society. Chapter 16 of this book is freely available as a downloadable Open Access PDF under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 license available at http://www.taylorfrancis.com/books/e/9780429443961.
Download or read book Security Data Analytics and Energy Aware Solutions in the IoT written by Hei, Xiali and published by IGI Global. This book was released on 2021-12-24 with total page 218 pages. Available in PDF, EPUB and Kindle. Book excerpt: Internet of things networks have shown promising outcomes in the provisioning of potentially critical services such as safety applications, healthcare, and manufacturing. However, there are many challenges related to the security, data analysis, and limited resources of the performed operations that require further investigation. Additional research is necessary to address the concerns and doubts of researchers and industry professionals in the Internet of Things. Security, Data Analytics, and Energy-Aware Solutions in the IoT reports novel methodologies, theories, technologies, and solutions for security and data analytics techniques and energy-aware solutions for the Internet of Things. Covering a wide range of topics such as laser attacks and personal data, it is ideal for academicians, industry professionals, researchers, instructors, and students.
Download or read book Secure Edge Computing written by Mohiuddin Ahmed and published by CRC Press. This book was released on 2021-08-12 with total page 305 pages. Available in PDF, EPUB and Kindle. Book excerpt: The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. This increased connectivity and the devices used for edge computing will create more room for cyber criminals to exploit the system’s vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse-use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked when they are most needed to fight cyber crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of the network. In this context, this book addresses the cyber security challenges associated with edge computing, which provides a bigger picture of the concepts, techniques, applications, and open research directions in this area. In addition, the book serves as a single source of reference for acquiring the knowledge on the technology, process and people involved in next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.
Download or read book Handbook of Sleep Research written by and published by Academic Press. This book was released on 2019-06-21 with total page 758 pages. Available in PDF, EPUB and Kindle. Book excerpt: Handbook of Sleep Research, Volume 30, provides a comprehensive review of the current status of the neuroscience of sleep research. It begins with an overview of the neural, hormonal and genetic mechanisms of sleep and wake regulation before outlining the various proposed functions of sleep and the role it plays in plasticity, and in learning and memory. Finally, the book discusses disorders of sleep and waking, covering both lifestyle factors that cause disrupted sleep and psychiatric and neurological conditions that contribute to disorders. - Emphasizes a comparative and multidisciplinary approach to the topic of sleep - Covers the neurobiology and physiology of sleep stages, mechanisms of waking, and dreaming - Discusses in detail the proposed functions of sleep, from health and rest, to memory consolidation and synaptic plasticity - Examines the current state of research in mammalian and non-mammalian species, ranging from primates to invertebrates
Download or read book ICT Systems Security and Privacy Protection written by Weizhi Meng and published by Springer Nature. This book was released on 2022-06-03 with total page 522 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed proceedings of the 37th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2022, held in Copenhagen, Denmark, in June 2022. The 29 full papers presented were carefully reviewed and selected from 127 submissions. The papers present novel research on theoretical and practical aspects of security and privacy protection in information processing systems. They are organized in topical sections on privacy models and preferences; network security and IDS; network security and privacy; forensics; trust and PETs; crypto-based solutions; usable security; blockchain; mobile security and privacy; PETs and crypto; and vulnerabilities.
Download or read book Machine Learning and Knowledge Discovery in Databases written by Frank Hutter and published by Springer Nature. This book was released on 2021-02-24 with total page 770 pages. Available in PDF, EPUB and Kindle. Book excerpt: The 5-volume proceedings, LNAI 12457 until 12461 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases, ECML PKDD 2020, which was held during September 14-18, 2020. The conference was planned to take place in Ghent, Belgium, but had to change to an online format due to the COVID-19 pandemic. The 232 full papers and 10 demo papers presented in this volume were carefully reviewed and selected for inclusion in the proceedings. The volumes are organized in topical sections as follows: Part I: Pattern Mining; clustering; privacy and fairness; (social) network analysis and computational social science; dimensionality reduction and autoencoders; domain adaptation; sketching, sampling, and binary projections; graphical models and causality; (spatio-) temporal data and recurrent neural networks; collaborative filtering and matrix completion. Part II: deep learning optimization and theory; active learning; adversarial learning; federated learning; Kernel methods and online learning; partial label learning; reinforcement learning; transfer and multi-task learning; Bayesian optimization and few-shot learning. Part III: Combinatorial optimization; large-scale optimization and differential privacy; boosting and ensemble methods; Bayesian methods; architecture of neural networks; graph neural networks; Gaussian processes; computer vision and image processing; natural language processing; bioinformatics. Part IV: applied data science: recommendation; applied data science: anomaly detection; applied data science: Web mining; applied data science: transportation; applied data science: activity recognition; applied data science: hardware and manufacturing; applied data science: spatiotemporal data. Part V: applied data science: social good; applied data science: healthcare; applied data science: e-commerce and finance; applied data science: computational social science; applied data science: sports; demo track.
Download or read book Smart and Agile Cybersecurity for IoT and IIoT Environments written by Al-Haija, Qasem Abu and published by IGI Global. This book was released on 2024-07-18 with total page 416 pages. Available in PDF, EPUB and Kindle. Book excerpt: The world we live in today is highly interconnected and has seen a significant rise in the use of the Internet of Things (IoT) and Industrial Internet of Things (IIoT). This digital transformation, while beneficial, has also created new cybersecurity challenges. Cyber threats are becoming more sophisticated and frequent, and individuals and organizations alike must adopt intelligent and agile cybersecurity solutions to safeguard their digital assets. Smart and Agile Cybersecurity for IoT and IIoT Environments addresses this pressing challenge by providing a comprehensive guide to securing IoT and IIoT environments. The book offers insights into the latest cybersecurity strategies and technologies, from intelligent threat detection to agile security approaches. By delving into data privacy, network security, and incident response, readers can gain the knowledge and skills to fortify their cybersecurity posture and mitigate risks effectively.