Anti-Spam Techniques Based on Artificial Immune System


Book Description

Email has become an indispensable communication tool in daily life. However, high volumes of spam waste resources, interfere with productivity, and present severe threats to computer system security and personal privacy. This book introduces research on anti-spam techniques based on the artificial immune system (AIS) to identify and filter spam. It




Artificial Immune Systems


Book Description

This book constitutes the refereed proceedings of the 7th International Conference on Artificial Immune Systems, ICARIS 2008, held in Phuket, Thailand, in August 2008. The 40 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers are organized in topical sections on computational immunology, applied AIS, and theoretical AIS. Position papers and conceptual papers are also included.




Intelligent Systems and Applications


Book Description

This book presents the proceedings of the International Computer Symposium 2014 (ICS 2014), held at Tunghai University, Taichung, Taiwan in December. ICS is a biennial symposium founded in 1973 and offers a platform for researchers, educators and professionals to exchange their discoveries and practices, to share research experiences and to discuss potential new trends in the ICT industry. Topics covered in the ICS 2014 workshops include: algorithms and computation theory; artificial intelligence and fuzzy systems; computer architecture, embedded systems, SoC and VLSI/EDA; cryptography and information security; databases, data mining, big data and information retrieval; mobile computing, wireless communications and vehicular technologies; software engineering and programming languages; healthcare and bioinformatics, among others. There was also a workshop on information technology innovation, industrial application and the Internet of Things. ICS is one of Taiwan's most prestigious international IT symposiums, and this book will be of interest to all those involved in the world of information technology.




Sentimental Analysis and Deep Learning


Book Description

This book gathers selected papers presented at the International Conference on Sentimental Analysis and Deep Learning (ICSADL 2021), jointly organized by Tribhuvan University, Nepal; Prince of Songkla University, Thailand; and Ejesra during June, 18–19, 2021. The volume discusses state-of-the-art research works on incorporating artificial intelligence models like deep learning techniques for intelligent sentiment analysis applications. Emotions and sentiments are emerging as the most important human factors to understand the prominent user-generated semantics and perceptions from the humongous volume of user-generated data. In this scenario, sentiment analysis emerges as a significant breakthrough technology, which can automatically analyze the human emotions in the data-driven applications. Sentiment analysis gains the ability to sense the existing voluminous unstructured data and delivers a real-time analysis to efficiently automate the business processes. Meanwhile, deep learning emerges as the revolutionary paradigm with its extensive data-driven representation learning architectures. This book discusses all theoretical aspects of sentimental analysis, deep learning and related topics.




Introduction to Certificateless Cryptography


Book Description

As an intermediate model between conventional PKC and ID-PKC, CL-PKC can avoid the heavy overhead of certificate management in traditional PKC as well as the key escrow problem in ID-PKC altogether. Since the introduction of CL-PKC, many concrete constructions, security models, and applications have been proposed during the last decade. Differing from the other books on the market, this one provides rigorous treatment of CL-PKC. Definitions, precise assumptions, and rigorous proofs of security are provided in a manner that makes them easy to understand.




Machine Learning


Book Description

Machine learning, one of the top emerging sciences, has an extremely broad range of applications. However, many books on the subject provide only a theoretical approach, making it difficult for a newcomer to grasp the subject material. This book provides a more practical approach by explaining the concepts of machine learning algorithms and describing the areas of application for each algorithm, using simple practical examples to demonstrate each algorithm and showing how different issues related to these algorithms are applied.




Artificial Intelligence and Data Mining Approaches in Security Frameworks


Book Description

ARTIFICIAL INTELLIGENCE AND DATA MINING IN SECURITY FRAMEWORKS Written and edited by a team of experts in the field, this outstanding new volume offers solutions to the problems of security, outlining the concepts behind allowing computers to learn from experience and understand the world in terms of a hierarchy of concepts, with each concept defined through its relation to simpler concepts. Artificial intelligence (AI) and data mining is the fastest growing field in computer science. AI and data mining algorithms and techniques are found to be useful in different areas like pattern recognition, automatic threat detection, automatic problem solving, visual recognition, fraud detection, detecting developmental delay in children, and many other applications. However, applying AI and data mining techniques or algorithms successfully in these areas needs a concerted effort, fostering integrative research between experts ranging from diverse disciplines from data science to artificial intelligence. Successful application of security frameworks to enable meaningful, cost effective, personalized security service is a primary aim of engineers and researchers today. However realizing this goal requires effective understanding, application and amalgamation of AI and data mining and several other computing technologies to deploy such a system in an effective manner. This book provides state of the art approaches of artificial intelligence and data mining in these areas. It includes areas of detection, prediction, as well as future framework identification, development, building service systems and analytical aspects. In all these topics, applications of AI and data mining, such as artificial neural networks, fuzzy logic, genetic algorithm and hybrid mechanisms, are explained and explored. This book is aimed at the modeling and performance prediction of efficient security framework systems, bringing to light a new dimension in the theory and practice. This groundbreaking new volume presents these topics and trends, bridging the research gap on AI and data mining to enable wide-scale implementation. Whether for the veteran engineer or the student, this is a must-have for any library. This groundbreaking new volume: Clarifies the understanding of certain key mechanisms of technology helpful in the use of artificial intelligence and data mining in security frameworks Covers practical approaches to the problems engineers face in working in this field, focusing on the applications used every day Contains numerous examples, offering critical solutions to engineers and scientists Presents these new applications of AI and data mining that are of prime importance to human civilization as a whole




Recent Developments in Computing and Its Applications


Book Description

This book comprises of 74 contributions from the experts covering the following topics. " Information Communication Technologies " Network Technologies " Wireless And Sensor Networks " Soft Computing " Circuits and Systems " Software Engineering " Data Mining " Bioinformatics " Data and Network Security




Artificial Immune System


Book Description

This book deals with malware detection in terms of Artificial Immune System (AIS), and presents a number of AIS models and immune-based feature extraction approaches as well as their applications in computer security Covers all of the current achievements in computer security based on immune principles, which were obtained by the Computational Intelligence Laboratory of Peking University, China Includes state-of-the-art information on designing and developing artificial immune systems (AIS) and AIS-based solutions to computer security issues Presents new concepts such as immune danger theory, immune concentration, and class-wise information gain (CIG)




How Healthcare Data Privacy Is Almost Dead ... and What Can Be Done to Revive It!


Book Description

The healthcare industry is under privacy attack. The book discusses the issues from the healthcare organization and individual perspectives. Someone hacking into a medical device and changing it is life-threatening. Personal information is available on the black market. And there are increased medical costs, erroneous medical record data that could lead to wrong diagnoses, insurance companies or the government data-mining healthcare information to formulate a medical ‘FICO’ score that could lead to increased insurance costs or restrictions of insurance. Experts discuss these issues and provide solutions and recommendations so that we can change course before a Healthcare Armageddon occurs.