Book Description
Identifies emerging directions in ISI research and applications that address the research challenges with advanced technologies.
Author : Wenji Mao
Publisher : Academic Press
Page : 129 pages
File Size : 19,93 MB
Release : 2012-04-13
Category : Computers
ISBN : 0123972000
Identifies emerging directions in ISI research and applications that address the research challenges with advanced technologies.
Author : Christopher C Yang
Publisher : Academic Press
Page : 217 pages
File Size : 13,56 MB
Release : 2013-01-28
Category : Computers
ISBN : 0124059023
The Intelligent Systems Series comprises titles that present state-of-the-art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. The most prevalent topics in Intelligence and Security Informatics (ISI) include data management, data and text mining for ISI applications, terrorism informatics, deception and intent detection, terrorist and criminal social network analysis, public health and bio-security, crime analysis, cyber-infrastructure protection, transportation infrastructure security, policy studies and evaluation, and information assurance, among others. This book covers the most active research work in recent years. Pulls together key information on ensuring national security around the world The latest research on this subject is concisely presented within the book, with several figures to support the text. Will be of interest to attendees of The Intelligence and Security Informatics conference series, which include IEEE International Conference on Intelligence and Security Informatics (IEEE ISI)
Author : Kohei Arai
Publisher : Springer
Page : 1405 pages
File Size : 31,13 MB
Release : 2018-11-01
Category : Technology & Engineering
ISBN : 3030011771
This book, gathering the Proceedings of the 2018 Computing Conference, offers a remarkable collection of chapters covering a wide range of topics in intelligent systems, computing and their real-world applications. The Conference attracted a total of 568 submissions from pioneering researchers, scientists, industrial engineers, and students from all around the world. These submissions underwent a double-blind peer review process. Of those 568 submissions, 192 submissions (including 14 poster papers) were selected for inclusion in these proceedings. Despite computer science’s comparatively brief history as a formal academic discipline, it has made a number of fundamental contributions to science and society—in fact, along with electronics, it is a founding science of the current epoch of human history (‘the Information Age’) and a main driver of the Information Revolution. The goal of this conference is to provide a platform for researchers to present fundamental contributions, and to be a premier venue for academic and industry practitioners to share new ideas and development experiences. This book collects state of the art chapters on all aspects of Computer Science, from classical to intelligent. It covers both the theory and applications of the latest computer technologies and methodologies. Providing the state of the art in intelligent methods and techniques for solving real-world problems, along with a vision of future research, the book will be interesting and valuable for a broad readership.
Author : Suresh Chandra Satapathy
Publisher : Springer
Page : 805 pages
File Size : 42,29 MB
Release : 2016-08-24
Category : Technology & Engineering
ISBN : 981101678X
This two-volume book contains research work presented at the First International Conference on Data Engineering and Communication Technology (ICDECT) held during March 10–11, 2016 at Lavasa, Pune, Maharashtra, India. The book discusses recent research technologies and applications in the field of Computer Science, Electrical and Electronics Engineering. The aim of the Proceedings is to provide cutting-edge developments taking place in the field data engineering and communication technologies which will assist the researchers and practitioners from both academia as well as industry to advance their field of study.
Author : Hamido Fujita
Publisher : Springer
Page : 639 pages
File Size : 47,12 MB
Release : 2015-08-31
Category : Computers
ISBN : 3319226894
This book constitutes the best papers selection from the proceedings of the 14th International Conference on Intelligent Software Methodologies, Tools and Techniques, SoMeT 2015, held in Naples, Italy, in September 2015. The 47 full papers presented together with one short paper were carefully reviewed and selected from 118 submissions. The papers are organized in topical sections on embedded and mobile software systems, theory and application; real-time systems; requirement engineering, high-assurance and testing system; social networks and big data; cloud computing and semantic web; artificial intelligence techniques and intelligent system design; software development and integration; security and software methodologies for reliable software design; new software techniques in image processing and computer graphics; software applications systems for medical health care.
Author :
Publisher : DEStech Publications, Inc
Page : 1356 pages
File Size : 48,49 MB
Release : 2014-11-11
Category : Computers
ISBN : 1605951935
The 6th International Conference on Computational and Information Sciences (ICCIS2014) will be held in NanChong, China. The 6th International Conference on Computational and Information Sciences (ICCIS2014)aims at bringing researchers in the areas of computational and information sciences to exchange new ideas and to explore new ground. The goal of the conference is to push the application of modern computing technologies to science, engineering, and information technologies.Following the success of ICCIS2004,ICCIS2010 and ICCIS2011,ICCIS2012,ICCIS2013,ICCIS2014 conference will consist of invited keynote presentations and contributed presentations of latest developments in computational and information sciences. The 2014 International Conference on Computational and Information Sciences (ICCIS 2014), now in its sixth run, has become one of the premier conferences in this dynamic and exciting field. The goal of ICCIS is to catalyze the communications among various communities in computational and information sciences. ICCIS provides a venue for the participants to share their recent research and development, to seek for collaboration resources and opportunities, and to build professional networks.
Author : Isaac Woungang
Publisher : Springer Nature
Page : 556 pages
File Size : 26,32 MB
Release :
Category :
ISBN : 9819736013
Author : Salvatore J. Stolfo
Publisher : Springer
Page : 485 pages
File Size : 46,59 MB
Release : 2013-10-23
Category : Computers
ISBN : 364241284X
This book constitutes the proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses, former Recent Advances in Intrusion Detection, RAID 2013, held in Rodney Bay, St. Lucia in October 2013. The volume contains 22 full papers that were carefully reviewed and selected from 95 submissions, as well as 10 poster papers selected from the 23 submissions. The papers address all current topics in computer security ranged from hardware-level security, server, web, mobile, and cloud-based security, malware analysis, and web and network privacy.
Author : Behrouz Zolfaghari
Publisher : Springer Nature
Page : 229 pages
File Size : 44,40 MB
Release : 2023-11-14
Category : Technology & Engineering
ISBN : 3031448073
This book studies the intersection between cryptography and AI, highlighting the significant cross-impact and potential between the two technologies. The authors first study the individual ecosystems of cryptography and AI to show the omnipresence of each technology in the ecosystem of the other one. Next, they show how these technologies have come together in collaborative or adversarial ways. In the next section, the authors highlight the coevolution being formed between cryptography and AI. Throughout the book, the authors use evidence from state-of-the-art research to look ahead at the future of the crypto-AI dichotomy. The authors explain how they anticipate that quantum computing will join the dichotomy in near future, augmenting it to a trichotomy. They verify this through two case studies highlighting another scenario wherein crypto, AI and quantum converge. The authors study current trends in chaotic image encryption as well as information-theoretic cryptography and show how these trends lean towards quantum-inspired artificial intelligence (QiAI). After concluding the discussions, the authors suggest future research for interested researchers.
Author : Rajendra Prasath
Publisher : Springer
Page : 862 pages
File Size : 25,74 MB
Release : 2013-12-16
Category : Computers
ISBN : 3319038443
This book constitutes the proceedings of the First International Conference on Mining Intelligence and Knowledge Exploration, MIKE 2013, held in Tamil Nadu, India on December 2013. The 82 papers presented were carefully reviewed and selected from 334 submissions. The papers cover the topics such as feature selection, classification, clustering, image processing, network security, speech processing, machine learning, information retrieval, recommender systems, natural language processing, language, cognition and computation and other certain problems in dynamical systems.