Proceedings of the 3rd International Symposium on Big Data and Cloud Computing Challenges (ISBCC – 16’)


Book Description

This proceedings volume contains selected papers that were presented in the 3rd International Symposium on Big data and Cloud Computing Challenges, 2016 held at VIT University, India on March 10 and 11. New research issues, challenges and opportunities shaping the future agenda in the field of Big Data and Cloud Computing are identified and presented throughout the book, which is intended for researchers, scholars, students, software developers and practitioners working at the forefront in their field. This book acts as a platform for exchanging ideas, setting questions for discussion, and sharing the experience in Big Data and Cloud Computing domain.​




IoT, Big Data and AI for Improving Quality of Everyday Life: Present and Future Challenges


Book Description

This book focuses mainly on the usages of three key technologies: IoT, big data, and AI for various day to day applications. Further, it explores the possibilities of future research based on the usages of latest information systems. This book explores the current research and challenges to be faced by different researchers for building intelligent information solutions using key technologies; IoT, big data, and AI in improving quality of lives in smart cities and explores the limitations and capabilities of these three key computing technologies. The book is organized into three major parts; each part includes chapters exploring a specific topic, and there are: PART-1: IoT for Real World Solutions , (ii) Part-2: Big Data And Cloud Computing for Innovative Solutions For Day to Day Lives, and (iii) Part-3 Artificial Intelligence for Everyday Lives. This book may be useful to the scientists, scholars, and researchers who are working in the field of computer science and engineering, and communication engineering, along with the students in these subjects who are working or willing to work on IoT, big data, and AI technologies for improving quality of everyday life. Specialists as well as student readers find the book chapters encouraging and helpful. IoT, data science & cloud, and AI all are the undergraduate (UG/ bachelor) subjects. Use of these three key technologies for building new applications for better world is helpful for UG and postgraduate (PG/ MS) Programmes students (as an elective and core course). This book may also be very useful for the Ph.D. (research scholars) during their course work and may be used as an instrument to identify the different challenges associated with information systems.




Computer Supported Cooperative Work and Social Computing


Book Description

This book constitutes the refereed proceedings of the 14th CCF Conference on Computer Supported Cooperative Work and Social Computing, ChineseCSCW 2019, held in Kunming, China, in August 2019. The 52 revised full papers and 10 short papers were carefully reviewed and selected from 169 submissions. The papers of this volume are organized in topical sections on: collaborative models, approaches, algorithms, and systems; social computing (online communities, crowdsourcing, recommendation, sentiment analysis, etc.); AI for CSCW and social computing.




Handbook of Security and Privacy of AI-Enabled Healthcare Systems and Internet of Medical Things


Book Description

The fast-growing number of patients suffering from various ailments has overstretched the carrying capacity of traditional healthcare systems. This handbook addresses the increased need to tackle security issues and preserve patients’ privacy concerns in Artificial Intelligence of Medical Things (AIoMT) devices and systems. Handbook of Security and Privacy of AI-Enabled Healthcare Systems and the Internet of Medical Things provides new insights into the deployment, application, management, and benefits of AIoMT by examining real-world scenarios. The handbook takes a critical look at existing security designs and offers solutions to revamp traditional security architecture, including the new design of effi cient intrusion detection algorithms, attack prevention techniques, and both cryptographic and noncryptographic solutions. The handbook goes on to discuss the critical security and privacy issues that affect all parties in the healthcare ecosystem and provides practical AI-based solutions. This handbook offers new and valuable information that will be highly beneficial to educators, researchers, and others. .




Blockchain Technology for IoE


Book Description

This book explores opportunities and challenges in the field of Internet of Everything (IoE) security and privacy under the umbrella of distributed ledger technologies and blockchain technology including distributed consensus mechanisms, crypto-sensors, encryption algorithms, and fault tolerance mechanisms for devices and systems. It focusses on the applicability of blockchain technology, including architectures and platforms for blockchain and IoE, authentication and encryption algorithms for IoE, malicious transactions detection, blockchain for forensics, and so forth. Outlines the major benefits as well as challenges associated with integration of blockchain with IoE; Describes detailed framework to provide security in IoE using blockchain technology; Reviews various issues while using distributed ledger technologies for IoE; Provides comprehensive coverage of blockchain for IoE in securing information including encryption schemes, authentication, security issues, and challenges; Includes case studies in realistic situations like healthcare informatics, smart industry, and smart transportation. This book is aimed at researchers and graduate students in computing, cryptography, IoT, computer engineering, and networks.




Enterprise Information Systems


Book Description

This book constitutes extended, revised and selected papers from the 22nd International Conference on Enterprise Information Systems, ICEIS 2020, held online during May 5-7, 2020. The 41 papers presented in this volume were carefully reviewed and selected for inclusion in this book from a total of 255 submissions. They were organized in topical sections as follows: database and information systems integration; artificial intelligence and decision support systems; information systems analysis and specification; software agents and internet computing; human-computer interaction; and enterprise architecture.




Enterprise, Business-Process and Information Systems Modeling


Book Description

This book constitutes the proceedings of two events held at the CAiSE conference and relating to the areas of enterprise, business process and information systems modeling: The 20th International Conference on Business Process Modeling, Development and Support, BPMDS 2019, and the 24th International Conference on Evaluation and Modeling Methods for Systems Analysis and Development, EMMSAD 2019. The conferences took place in Rome, Italy, in June 2019. The 7 full and 2 short papers accepted for BPMDS were carefully reviewed and selected from a total of 20 submissions; for EMMSAD 15 full papers were accepted from 38 submissions. The papers were organized in topical sections named as follows: BPMDS: large and complex business process modeling and development; execution and understandability of declarative process models; novel approaches in enterprise modeling; transformative business process modeling, development, and support. EMMSAD: foundations of modeling and method engineering; enterprise process and capability modeling; information systems and requirements modeling; domain-specific and ontology modeling; and evaluation of modeling approaches.




Social Networks Science: Design, Implementation, Security, and Challenges


Book Description

The main target of this book is to raise the awareness about social networking systems design, implementation, security requirements, and approaches. The book entails related issues including computing, engineering, security, management, and organization policy. It interprets the design, implementation and security threats in the social networks and offers some solutions in this concern. It clarifies the authentication concept between servers to identity users. Most of the models that focus on protecting users’ information are also included. This book introduces the Human-Interactive Security Protocols (HISPs) efficiently. Presenting different types of the social networking systems including the internet and mobile devices is one of the main targets of this book. This book includes the social network performance evaluation metrics. It compares various models and approaches used in the design of the social networks. This book includes various applications for the use of the social networks in the healthcare, e-commerce, crisis management, and academic applications. The book provides an extensive background for the development of social network science and its challenges. This book discusses the social networks integration to offer online services, such as instant messaging, email, file sharing, transferring patients’ medical reports/images, location-based recommendations and many other functions. This book provides users, designers, engineers and managers with the valuable knowledge to build a better secured information transfer over the social networks. The book gathers remarkable materials from an international experts’ panel to guide the readers during the analysis, design, implementation and security achievement for the social network systems. In this book, theories, practical guidance, and challenges are included to inspire designers and researchers. The book guides the engineers, designers, and researchers to exploit the intrinsic design of the social network systems.




Artificial Intelligence and Soft Computing


Book Description

The two-volume set LNAI 13588 and 13589 constitutes the refereed post-conference proceedings of the 21st International Conference on Artificial Intelligence and Soft Computing, ICAISC 2022, held in Zakopane, Poland, during June 19–23, 2022. The 69 revised full papers presented in these proceedings were carefully reviewed and selected from 161 submissions. The papers are organized in the following topical sections: Volume I: Neural networks and their applications; fuzzy systems and their applications; evolutionary algorithms and their applications; pattern classification; artificial intelligence in modeling and simulation. Volume II: Computer vision, image and speech analysis; data mining; various problems of artificial intelligence; bioinformatics, biometrics and medical applications.




Fog Computing for Healthcare 4.0 Environments


Book Description

This book provides an analysis of the role of fog computing, cloud computing, and Internet of Things in providing uninterrupted context-aware services as they relate to Healthcare 4.0. The book considers a three-layer patient-driven healthcare architecture for real-time data collection, processing, and transmission. It gives insight to the readers for the applicability of fog devices and gateways in Healthcare 4.0 environments for current and future applications. It also considers aspects required to manage the complexity of fog computing for Healthcare 4.0 and also develops a comprehensive taxonomy.