2013 11th International Conference on Frontiers of Information Technology (FIT)


Book Description

The main objective of this conference is to provide a platform for engineers, academicians, scientists, industrial professionals and researchers from over the world to present the result of their research activities in the field of Information technology and Technological innovation FIT 2013 provides opportunities for the delegates to share the knowledge, ideas, innovations and problem solving techniques Submitted papers will be reviewed by the technical committee of the conference




Cloud Computing and Big Data: Technologies, Applications and Security


Book Description

This book addresses topics related to cloud and Big Data technologies, architecture and applications including distributed computing and data centers, cloud infrastructure and security, and end-user services. The majority of the book is devoted to the security aspects of cloud computing and Big Data. Cloud computing, which can be seen as any subscription-based or pay-per-use service that extends the Internet’s existing capabilities, has gained considerable attention from both academia and the IT industry as a new infrastructure requiring smaller investments in hardware platforms, staff training, or licensing software tools. It is a new paradigm that has ushered in a revolution in both data storage and computation. In parallel to this progress, Big Data technologies, which rely heavily on cloud computing platforms for both data storage and processing, have been developed and deployed at breathtaking speed. They are among the most frequently used technologies for developing applications and services in many fields, such as the web, health, and energy. Accordingly, cloud computing and Big Data technologies are two of the most central current and future research mainstreams. They involve and impact a host of fields, including business, scientific research, and public and private administration. Gathering extended versions of the best papers presented at the Third International Conference on Cloud Computing Technologies and Applications (CloudTech’17), this book offers a valuable resource for all Information System managers, researchers, students, developers, and policymakers involved in the technological and application aspects of cloud computing and Big Data.




IMDC-SDSP 2020


Book Description

IMDC-SDSP conference offers an exceptional platform and opportunity for practitioners, industry experts, technocrats, academics, information scientists, innovators, postgraduate students, and research scholars to share their experiences for the advancement of knowledge and obtain critical feedback on their work. The timing of this conference coincides with the rise of Big Data, Artificial Intelligence powered applications, Cognitive Communications, Green Energy, Adaptive Control and Mobile Robotics towards maintaining the Sustainable Development and Smart Planning and management of the future technologies. It is aimed at the knowledge generated from the integration of the different data sources related to a number of active real-time applications in supporting the smart planning and enhance and sustain a healthy environment. The conference also covers the rise of the digital health, well-being, home care, and patient-centred era for the benefit of patients and healthcare providers; in addition to how supporting the development of a platform of smart Dynamic Health Systems and self-management.




Computer Vision -- ACCV 2014


Book Description

The five-volume set LNCS 9003--9007 constitutes the thoroughly refereed post-conference proceedings of the 12th Asian Conference on Computer Vision, ACCV 2014, held in Singapore, Singapore, in November 2014. The total of 227 contributions presented in these volumes was carefully reviewed and selected from 814 submissions. The papers are organized in topical sections on recognition; 3D vision; low-level vision and features; segmentation; face and gesture, tracking; stereo, physics, video and events; and poster sessions 1-3.




Smart Societies, Infrastructure, Technologies and Applications


Book Description

This book constitutes the refereed post-conference proceedings of the First International Conference on Smart Cities, Infrastructures, Technologies and Applications, SCITA 2017, held in Jeddah, Saudi Arabia, in November 2017. The 35 revised full papers were carefully reviewed and selected from 62 submissions. The papers are grouped in topical sections: infrastructure track, e-governance and transportation track, healthcare track, applications track.




Emerging Technologies in Computer Engineering: Cognitive Computing and Intelligent IoT


Book Description

This book constitutes the refereed proceedings of the 5th International Conference on Emerging Technologies in Computer Engineering, ICETCE 2021, held in Jaipur, India, in February 2022. The 40 revised full papers along with 20 short papers presented were carefully reviewed and selected from 235 submissions. The papers are organized according to the following topical headings: ​cognitive computing; Internet of Things (IoT); machine learning and applications; soft computing; data science and big data analytics; blockchain and cyber security.




Handbook of Research on Intrusion Detection Systems


Book Description

Businesses in today’s world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.




Collaborate Computing: Networking, Applications and Worksharing


Book Description

This book constitutes the thoroughly refereed proceedings of the 12th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2016, held in Beijing, China, in November 2016. The 66 papers presented were carefully reviewed and selected from 116 submissions and focus on topics such as: participatory sensing, crowdsourcing, and citizen science; architectures, protocols, and enabling technologies for collaborative computing networks and systems; autonomic computing and quality of services in collaborative networks, systems, and applications; collaboration in pervasive and cloud computing environments; collaboration in data-intensive scientific discovery; collaboration in social media; big data and spatio-temporal data in collaborative environments/systems; collaboration techniques in data-intensive computing and cloud computing.