Proceedings of the International Conference on Soft Computing Systems


Book Description

The book is a collection of high-quality peer-reviewed research papers presented in International Conference on Soft Computing Systems (ICSCS 2015) held at Noorul Islam Centre for Higher Education, Chennai, India. These research papers provide the latest developments in the emerging areas of Soft Computing in Engineering and Technology. The book is organized in two volumes and discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. It presents invited papers from the inventors/originators of new applications and advanced technologies.




Proceedings of the International Conference on Soft Computing Systems


Book Description

The book is a collection of high-quality peer-reviewed research papers presented in International Conference on Soft Computing Systems (ICSCS 2015) held at Noorul Islam Centre for Higher Education, Chennai, India. These research papers provide the latest developments in the emerging areas of Soft Computing in Engineering and Technology. The book is organized in two volumes and discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. It presents invited papers from the inventors/originators of new applications and advanced technologies.







Handbook of Big Data and IoT Security


Book Description

This handbook provides an overarching view of cyber security and digital forensic challenges related to big data and IoT environment, prior to reviewing existing data mining solutions and their potential application in big data context, and existing authentication and access control for IoT devices. An IoT access control scheme and an IoT forensic framework is also presented in this book, and it explains how the IoT forensic framework can be used to guide investigation of a popular cloud storage service. A distributed file system forensic approach is also presented, which is used to guide the investigation of Ceph. Minecraft, a Massively Multiplayer Online Game, and the Hadoop distributed file system environment are also forensically studied and their findings reported in this book. A forensic IoT source camera identification algorithm is introduced, which uses the camera's sensor pattern noise from the captured image. In addition to the IoT access control and forensic frameworks, this handbook covers a cyber defense triage process for nine advanced persistent threat (APT) groups targeting IoT infrastructure, namely: APT1, Molerats, Silent Chollima, Shell Crew, NetTraveler, ProjectSauron, CopyKittens, Volatile Cedar and Transparent Tribe. The characteristics of remote-controlled real-world Trojans using the Cyber Kill Chain are also examined. It introduces a method to leverage different crashes discovered from two fuzzing approaches, which can be used to enhance the effectiveness of fuzzers. Cloud computing is also often associated with IoT and big data (e.g., cloud-enabled IoT systems), and hence a survey of the cloud security literature and a survey of botnet detection approaches are presented in the book. Finally, game security solutions are studied and explained how one may circumvent such solutions. This handbook targets the security, privacy and forensics research community, and big data research community, including policy makers and government agencies, public and private organizations policy makers. Undergraduate and postgraduate students enrolled in cyber security and forensic programs will also find this handbook useful as a reference.




Advanced Information Networking and Applications


Book Description

Networks of today are going through a rapid evolution and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations are emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low cost and high volume applications. Several of such applications have been difficult to realize because of many interconnections problems. To fulfill their large range of applications different kinds of networks need to collaborate and wired and next generation wireless systems should be integrated in order to develop high performance computing solutions to problems arising from the complexities of these networks. This volume covers the theory, design and applications of computer networks, distributed computing and information systems. The aim of the volume “Advanced Information Networking and Applications” is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications.




Data Management and Analysis


Book Description

Data management and analysis is one of the fastest growing and most challenging areas of research and development in both academia and industry. Numerous types of applications and services have been studied and re-examined in this field resulting in this edited volume which includes chapters on effective approaches for dealing with the inherent complexity within data management and analysis. This edited volume contains practical case studies, and will appeal to students, researchers and professionals working in data management and analysis in the business, education, healthcare, and bioinformatics areas.




Deep Natural Language Processing and AI Applications for Industry 5.0


Book Description

To sustain and stay at the top of the market and give absolute comfort to the consumers, industries are using different strategies and technologies. Natural language processing (NLP) is a technology widely penetrating the market, irrespective of the industry and domains. It is extensively applied in businesses today, and it is the buzzword in every engineer’s life. NLP can be implemented in all those areas where artificial intelligence is applicable either by simplifying the communication process or by refining and analyzing information. Neural machine translation has improved the imitation of professional translations over the years. When applied in neural machine translation, NLP helps educate neural machine networks. This can be used by industries to translate low-impact content including emails, regulatory texts, etc. Such machine translation tools speed up communication with partners while enriching other business interactions. Deep Natural Language Processing and AI Applications for Industry 5.0 provides innovative research on the latest findings, ideas, and applications in fields of interest that fall under the scope of NLP including computational linguistics, deep NLP, web analysis, sentiments analysis for business, and industry perspective. This book covers a wide range of topics such as deep learning, deepfakes, text mining, blockchain technology, and more, making it a crucial text for anyone interested in NLP and artificial intelligence, including academicians, researchers, professionals, industry experts, business analysts, data scientists, data analysts, healthcare system designers, intelligent system designers, practitioners, and students.




DigiTwin: An Approach for Production Process Optimization in a Built Environment


Book Description

The focus of this book is an application of Digital Twin as a concept and an approach, based on the most accurate view on a physical production system and its digital representation of complex engineering products and systems. It describes a methodology to create and use Digital Twin in a built environment for the improvement and optimization of factory processes such as factory planning, investment planning, bottleneck analysis, and in-house material transport. The book provides a practical response based on achievements of engineering informatics in solving challenges related to the optimization of factory layout and corresponding processes. This book introduces the topic, providing a foundation of knowledge on process planning, before discussing the acquisition of objects in a factory and the methods for object recognition. It presents process simulation techniques, explores challenges in process planning, and concludes by looking at future areas of progression. By providing a holistic, trans-disciplinary perspective, this book will showcase Digital Twin technology as state-of-the-art both in research and practice.




Soft Computing: Theories and Applications


Book Description

This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains, ranging from medicine and healthcare, to supply chain management, image processing, and cryptanalysis. It gathers high-quality papers presented at the International Conference on Soft Computing: Theories and Applications (SoCTA 2021), organized online. The book offers valuable insights into soft computing for teachers and researchers alike; the book will inspire further research in this dynamic field.




Soft Computing and Signal Processing


Book Description

This book presents selected research papers on current developments in the fields of soft computing and signal processing from the Third International Conference on Soft Computing and Signal Processing (ICSCSP 2020). The book covers topics such as soft sets, rough sets, fuzzy logic, neural networks, genetic algorithms and machine learning and discusses various aspects of these topics, e.g., technological considerations, product implementation and application issues.