Download or read book Proceedings of the International Conference on Soft Computing Systems written by L. Padma Suresh and published by Springer. This book was released on 2015-12-07 with total page 721 pages. Available in PDF, EPUB and Kindle. Book excerpt: The book is a collection of high-quality peer-reviewed research papers presented in International Conference on Soft Computing Systems (ICSCS 2015) held at Noorul Islam Centre for Higher Education, Chennai, India. These research papers provide the latest developments in the emerging areas of Soft Computing in Engineering and Technology. The book is organized in two volumes and discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. It presents invited papers from the inventors/originators of new applications and advanced technologies.
Download or read book Proceedings of the International Conference on Soft Computing Systems written by L. Padma Suresh and published by Springer. This book was released on 2015-12-28 with total page 973 pages. Available in PDF, EPUB and Kindle. Book excerpt: The book is a collection of high-quality peer-reviewed research papers presented in International Conference on Soft Computing Systems (ICSCS 2015) held at Noorul Islam Centre for Higher Education, Chennai, India. These research papers provide the latest developments in the emerging areas of Soft Computing in Engineering and Technology. The book is organized in two volumes and discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. It presents invited papers from the inventors/originators of new applications and advanced technologies.
Download or read book Proceedings of the International Conference on Soft Computing Systems ICSCS 2015 written by L. Padma Suresh and published by . This book was released on 2016 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Soft Computing Systems written by Ivan Zelinka and published by Springer. This book was released on 2018-09-24 with total page 870 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book (CCIS 837) constitutes the refereed proceedings of the Second International Conference on Soft Computing Systems, ICSCS 2018, held in Sasthamcotta, India, in April 2018. The 87 full papers were carefully reviewed and selected from 439 submissions. The papers are organized in topical sections on soft computing, evolutionary algorithms, image processing, deep learning, artificial intelligence, big data analytics, data minimg, machine learning, VLSI, cloud computing, network communication, power electronics, green energy.
Download or read book Proceedings of the 12th International Conference on Soft Computing for Problem Solving written by Millie Pant and published by Springer Nature. This book was released on with total page 942 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Handbook of Big Data and IoT Security written by Ali Dehghantanha and published by Springer. This book was released on 2019-03-22 with total page 382 pages. Available in PDF, EPUB and Kindle. Book excerpt: This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe. The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions. This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.
Download or read book Semantic Web Technologies written by Archana Patel and published by CRC Press. This book was released on 2022-10-17 with total page 405 pages. Available in PDF, EPUB and Kindle. Book excerpt: Semantic web technologies (SWTs) offer the richest machine-interpretable (rather than just machine-processable) and explicit semantics that are being extensively used in various domains and industries. This book provides a roadmap for semantic web technologies (SWTs) and highlights their role in a wide range of domains including cloud computing, Internet of Things, big data, sensor network, and so forth. It also explores the prospects of these technologies including different data interchange formats, query languages, ontologies, Linked Data, and notations. The role of SWTs in ‘epidemic Covid-19’, ‘e-learning platforms and systems’, ‘block chain’, ‘open online courses’, and ‘visual analytics in healthcare’ is described as well. This book: Explores all the critical aspects of semantic web technologies (SWTs) Discusses the impact of SWTs on cloud computing, Internet of Things, big data, and sensor network Offers a comprehensive examination of the emerging research in the areas of SWTs and their related domains Provides a template to develop a wide range of smart and intelligent applications Includes latest applications and examples with real data This book is aimed at researchers and graduate students in computer science, informatics, web technology, cloud computing, and Internet of Things.
Download or read book Fuzzy Systems and Data Mining VIII written by A.J. Tallón-Ballesteros and published by IOS Press. This book was released on 2022-11-04 with total page 440 pages. Available in PDF, EPUB and Kindle. Book excerpt: Fuzzy logic is vital to applications in the electrical, industrial, chemical and engineering realms, as well as in areas of management and environmental issues. Data mining is indispensible in dealing with big data, massive data, and scalable, parallel and distributed algorithms. This book presents papers from FSDM 2022, the 8th International Conference on Fuzzy Systems and Data Mining. The conference, originally scheduled to take place in Xiamen, China, was held fully online from 4 to 7 November 2022, due to ongoing restrictions connected with the COVID-19 pandemic. This year, FSDM received 196 submissions, of which 47 papers were ultimately selected for presentation and publication after a thorough review process, taking into account novelty, and the breadth and depth of research themes falling under the scope of FSDM. This resulted in an acceptance rate of 23.97%. Topics covered include fuzzy theory, algorithms and systems, fuzzy applications, data mining and the interdisciplinary field of fuzzy logic and data mining. Offering an overview of current research and developments in fuzzy logic and data mining, the book will be of interest to all those working in the field of data science.
Download or read book Collaborative Filtering Using Data Mining and Analysis written by Bhatnagar, Vishal and published by IGI Global. This book was released on 2016-07-13 with total page 336 pages. Available in PDF, EPUB and Kindle. Book excerpt: Internet usage has become a normal and essential aspect of everyday life. Due to the immense amount of information available on the web, it has become obligatory to find ways to sift through and categorize the overload of data while removing redundant material. Collaborative Filtering Using Data Mining and Analysis evaluates the latest patterns and trending topics in the utilization of data mining tools and filtering practices. Featuring emergent research and optimization techniques in the areas of opinion mining, text mining, and sentiment analysis, as well as their various applications, this book is an essential reference source for researchers and engineers interested in collaborative filtering.
Download or read book Applications of Computational Science in Artificial Intelligence written by Nayyar, Anand and published by IGI Global. This book was released on 2022-04-22 with total page 284 pages. Available in PDF, EPUB and Kindle. Book excerpt: Computational science, in collaboration with engineering, acts as a bridge between hypothesis and experimentation. It is essential to use computational methods and their applications in order to automate processes as many major industries rely on advanced modeling and simulation. Computational science is inherently interdisciplinary and can be used to identify and evaluate complicated systems, foresee their performance, and enhance procedures and strategies. Applications of Computational Science in Artificial Intelligence delivers technological solutions to improve smart technologies architecture, healthcare, and environmental sustainability. It also provides background on key aspects such as computational solutions, computation framework, smart prediction, and healthcare solutions. Covering a range of topics such as high-performance computing and software infrastructure, this reference work is ideal for software engineers, practitioners, researchers, scholars, academicians, instructors, and students.
Download or read book Soft Computing Theories and Applications written by Millie Pant and published by Springer. This book was released on 2017-11-23 with total page 771 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book focuses on soft computing and its applications to solve real-life problems occurring in different domains ranging from medical and health care, supply chain management and image processing to cryptanalysis. It presents the proceedings of International Conference on Soft Computing: Theories and Applications (SoCTA 2016), offering significant insights into soft computing for teachers and researchers and inspiring more and more researchers to work in the field of soft computing. >The term soft computing represents an umbrella term for computational techniques like fuzzy logic, neural networks, and nature inspired algorithms. In the past few decades, there has been an exponential rise in the application of soft computing techniques for solving complex and intricate problems arising in different spheres of life. The versatility of these techniques has made them a favorite among scientists and researchers working in diverse areas. SoCTA is the first international conference being organized at Amity University Rajasthan (AUR), Jaipur. The objective of SoCTA 2016 is to provide a common platform to researchers, academicians, scientists, and industrialists working in the area of soft computing to share and exchange their views and ideas on the theory and application of soft computing techniques in multi-disciplinary areas. The aim of the conference is to bring together young and experienced researchers, academicians, scientists, and industrialists for the exchange of knowledge. SoCTA especially encourages the young researchers at the beginning of their career to participate in this conference and present their work on this platform.
Download or read book Semantic Modeling and Enrichment of Mobile and WiFi Network Data written by Abdulbaki Uzun and published by Springer. This book was released on 2018-07-20 with total page 225 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book discusses the fusion of mobile and WiFi network data with semantic technologies and diverse context sources for offering semantically enriched context-aware services in the telecommunications domain. It presents the OpenMobileNetwork as a platform for providing estimated and semantically enriched mobile and WiFi network topology data using the principles of Linked Data. This platform is based on the OpenMobileNetwork Ontology consisting of a set of network context ontology facets that describe mobile network cells as well as WiFi access points from a topological perspective and geographically relate their coverage areas to other context sources. The book also introduces Linked Crowdsourced Data and its corresponding Context Data Cloud Ontology, which is a crowdsourced dataset combining static location data with dynamic context information. Linked Crowdsourced Data supports the OpenMobileNetwork by providing the necessary context data richness for more sophisticated semantically enriched context-aware services. Various application scenarios and proof of concept services as well as two separate evaluations are part of the book. As the usability of the provided services closely depends on the quality of the approximated network topologies, it compares the estimated positions for mobile network cells within the OpenMobileNetwork to a small set of real-world cell positions. The results prove that context-aware services based on the OpenMobileNetwork rely on a solid and accurate network topology dataset. The book also evaluates the performance of the exemplary Semantic Tracking as well as Semantic Geocoding services, verifying the applicability and added value of semantically enriched mobile and WiFi network data.
Download or read book International Conference on Innovative Computing and Communications written by Ashish Khanna and published by Springer Nature. This book was released on 2020-02-28 with total page 891 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book includes high-quality research papers presented at the Second International Conference on Innovative Computing and Communication (ICICC 2019), which is held at the VŠB - Technical University of Ostrava, Czech Republic, on 21–22 March 2019. Introducing the innovative works of scientists, professors, research scholars, students, and industrial experts in the fields of computing and communication, the book promotes the transformation of fundamental research into institutional and industrialized research and the conversion of applied exploration into real-time applications.
Download or read book Proceedings of the 12th International Conference on Soft Computing and Pattern Recognition SoCPaR 2020 written by Ajith Abraham and published by Springer Nature. This book was released on 2021-04-15 with total page 1061 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book highlights the recent research on soft computing and pattern recognition and their various practical applications. It presents 62 selected papers from the 12th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2020) and 35 papers from the 16th International Conference on Information Assurance and Security (IAS 2020), which was held online, from December 15 to 18, 2020. A premier conference in the field of artificial intelligence, SoCPaR-IAS 2020 brought together researchers, engineers and practitioners whose work involves intelligent systems, network security and their applications in industry. Including contributions by authors from 40 countries, the book offers a valuable reference guide for all researchers, students and practitioners in the fields of Computer Science and Engineering.
Download or read book Digital Technologies and Applications written by Saad Motahhir and published by Springer Nature. This book was released on with total page 572 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Soft Computing Theories and Applications written by Rajesh Kumar and published by Springer Nature. This book was released on 2022-06-01 with total page 976 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains, ranging from medicine and healthcare, to supply chain management, image processing, and cryptanalysis. It gathers high-quality papers presented at the International Conference on Soft Computing: Theories and Applications (SoCTA 2021), organized online. The book offers valuable insights into soft computing for teachers and researchers alike; the book will inspire further research in this dynamic field.
Download or read book Challenges in Cybersecurity and Privacy the European Research Landscape written by Jorge Bernal Bernabe and published by CRC Press. This book was released on 2022-09-01 with total page 211 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT, since they present additional vulnerabilities due to their constrained capabilities, their unattended nature and the usage of potential untrustworthiness components. Likewise, identity-theft, fraud, personal data leakages, and other related cyber-crimes are continuously evolving, causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context, new holistic approaches, methodologies, techniques and tools are needed to cope with those issues, and mitigate cyberattacks, by employing novel cyber-situational awareness frameworks, risk analysis and modeling, threat intelligent systems, cyber-threat information sharing methods, advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition, novel privacy-preserving techniques, and crypto-privacy mechanisms, identity and eID management systems, trust services, and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means, including the Horizon 2020 Research and Innovation program, thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project, which aims to cope with digital security and privacy aspects, risks, threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives, the particular challenges they are covering, research achievements on security and privacy, as well as the techniques, outcomes, and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields, and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely, the EU projects analyzed in the book are: ANASTACIA, SAINT, YAKSHA, FORTIKA, CYBECO, SISSDEN, CIPSEC, CS-AWARE. RED-Alert, Truessec.eu. ARIES, LIGHTest, CREDENTIAL, FutureTrust, LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects.