Proceedings of the 14th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2022)


Book Description

This book highlights the recent research on soft computing, pattern recognition, nature-inspired computing, and their various practical applications. It presents 69 selected papers from the 14th International Conference on Soft Computing and Pattern Recognition (SoCPaR 2022) and 19 papers from the 14th World Congress on Nature and Biologically Inspired Computing (NaBIC 2022), which was held online, from December 14 to 16, 2022. A premier conference in the field of soft computing, artificial intelligence, and machine learning applications, SoCPaR-NaBIC 2022 brought together researchers, engineers, and practitioners whose work involves intelligent systems, network security, and their applications in industry. Including contributions by authors from over 25 countries, the book offers a valuable reference guide for all researchers, students, and practitioners in the fields of computer science and engineering.







Fourth International Congress on Information and Communication Technology


Book Description

The second volume of this book includes selected high-quality research papers presented at the Fourth International Congress on Information and Communication Technology, which was held at Brunel University, London, on February 27–28, 2019. It discusses emerging topics pertaining to information and communication technology (ICT) for managerial applications, e-governance, e-agriculture, e-education and computing technologies, the Internet of Things (IoT), and e-mining. Written by respected experts and researchers actively working in ICT, the book offers a valuable resource, especially for researchers who are newcomers to the field.




ICT Analysis and Applications


Book Description

This book proposes new technologies and discusses future solutions for ICT design infrastructures, as reflected in high-quality papers presented at the 6th International Conference on ICT for Sustainable Development (ICT4SD 2021), held in Goa, India, on 5–6 August 2021. The book covers the topics such as big data and data mining, data fusion, IoT programming toolkits and frameworks, green communication systems and network, use of ICT in smart cities, sensor networks and embedded system, network and information security, wireless and optical networks, security, trust, and privacy, routing and control protocols, cognitive radio and networks, and natural language processing. Bringing together experts from different countries, the book explores a range of central issues from an international perspective.




Applications of Computational Intelligence Techniques in Communications


Book Description

The book titled "Applications of Computational Intelligence Techniques in Communications" is a one-stop platform for the researchers, academicians, and people from industry to get a thorough understanding of the latest research in the field of communication engineering. Over the past decade, a manyfold increase in the use of computational intelligence techniques has been identified for obtaining the most optimal and timely solution to a problem. The various aspects covering the significant contribution of numerous computational intelligence techniques have been discussed in detail in this book. Today’s era of machine learning and Internet of Things (IoT) is demanding as high as possible data rate which has resulted into tremendous increased speed of communication. To match-up the pace, the computational intelligence is posing to be the most efficient and favourite tool. The book aims to cover the current technological advancements in the field of communication engineering and give a detailed prospect of computational intelligence to its readers. This book will be a great support to the people working in the field of IoT, machine learning, healthcare, optimization, filter design, 5G and beyond, signal processing etc. The chapters included here will expose its audience to various newly introduced and advanced computational intelligence techniques applicable in communication domain. The readers will be exposed multiple interdisciplinary areas of research in communication and will get the motivation to work in collaboration with other professionals from both the academia and industry.




Blockchain


Book Description

Blockchain: Principles and Applications in IoT covers all the aspects of Blockchain and its application in IOT. The book focuses on Blockchain, its features, and the core technologies that are used to build the Blockchain network. The gradual flow of chapters traces the history of blockchain from cryptocurrencies to blockchain technology platforms and applications that are adopted by mainstream financial and industrial domains worldwide due to their ease of use, increased security and transparency. • Focuses on application of Blockchain on IoT domain • Focuses on Blockchain as a data repository • Most books on Blockchain cover bitcoins and crypto currency. This book will also cover blockchain in other areas like healthcare, supply chain management, etc • Covers consensus algorithms like PAROX, RAFT etc. and its applications This book is primarily aimed at graduates and researchers in computer science and IT.




Reshaping Intelligent Business and Industry


Book Description

The convergence of Artif icial Intelligence (AI) and Internet of Things (IoT) is reshaping the way industries, businesses, and economies function; the 34 chapters in this collection show how the full potential of these technologies is being enabled to create intelligent machines that simulate smart behavior and support decision-making with little or no human interference, thereby providing startling organizational efficiencies. Readers will discover that in Reshaping Intelligent Business and Industry: The book unpacks the two superpowers of innovation, AI and IoT, and explains how they connect to better communicate and exchange information about online activities; How the center and the network’s edge generate predictive analytics or anomaly alerts; The meaning of AI at the edge and IoT networks. How bandwidth is reduced and privacy and security are enhanced; How AI applications increase operating efficiency, spawn new products and services, and enhance risk management; How AI and IoT create ‘intelligent’ devices and how new AI technology enables IoT to reach its full potential; Analyzes AIOT platforms and the handling of personal information for shared frameworks that remain sensitive to customers’ privacy while effectively utilizing data. Audience This book will appeal to all business and organization leaders, entrepreneurs, policymakers, and economists, as well as scientists, engineers, and students working in artificial intelligence, software engineering, and information technology.







Data Management and Analysis


Book Description

Data management and analysis is one of the fastest growing and most challenging areas of research and development in both academia and industry. Numerous types of applications and services have been studied and re-examined in this field resulting in this edited volume which includes chapters on effective approaches for dealing with the inherent complexity within data management and analysis. This edited volume contains practical case studies, and will appeal to students, researchers and professionals working in data management and analysis in the business, education, healthcare, and bioinformatics areas.




Information and Communication Technology for Competitive Strategies (ICTCS 2020)


Book Description

This book contains the best selected research papers presented at ICTCS 2020: Fifth International Conference on Information and Communication Technology for Competitive Strategies. The conference was held at Jaipur, Rajasthan, India during 11–12 December 2020. The book covers state-of-the-art as well as emerging topics pertaining to ICT and effective strategies for its implementation for engineering and managerial applications. This book contains papers mainly focused on ICT for computation, algorithms and data analytics and IT security.