The 10th International Conference on Computer Engineering and Networks


Book Description

This book contains a collection of the papers accepted by the CENet2020 – the 10th International Conference on Computer Engineering and Networks held on October 16-18, 2020 in Xi’an, China. The topics focus but are not limited to Internet of Things and Smart Systems, Artificial Intelligence and Applications, Communication System Detection, Analysis and Application, and Medical Engineering and Information Systems. Each part can be used as an excellent reference by industry practitioners, university faculties, research fellows and undergraduates as well as graduate students who need to build a knowledge base of the most current advances and state-of-practice in the topics covered by this conference proceedings. This will enable them to produce, maintain, and manage systems with high levels of trustworthiness and complexity.




Proceedings of the 9th International Conference on Computer Engineering and Networks


Book Description

This book gathers papers presented at the 9th International Conference on Computer Engineering and Networks (CENet2019), held in Changsha, China, on October 18–20, 2019. It examines innovations in the fields of computer engineering and networking and explores important, state-of-the-art developments in areas such as Information Security, Information Hiding and Cryptography, Cyber Security, and Intelligent Computing and Applications. The book also covers emerging topics in computer engineering and networking, along with their applications, discusses how to improve productivity by using the latest advanced technologies, and examines innovation in the fields of computer engineering and networking, particularly in intelligent computing and security.




Proceedings of the 12th International Conference on Computer Engineering and Networks


Book Description

This conference proceeding is a collection of the papers accepted by the CENet2022 – the 12th International Conference on Computer Engineering and Networks held on November 4-7, 2022 in Haikou, China. The topics focus but are not limited to Internet of Things and Smart Systems, Artificial Intelligence and Applications, Communication System Detection, Analysis and Application, and Medical Engineering and Information Systems. Each part can be used as an excellent reference by industry practitioners, university faculties, research fellows and undergraduates as well as graduate students who need to build a knowledge base of the most current advances and state-of-practice in the topics covered by this conference proceedings. This will enable them to produce, maintain, and manage systems with high levels of trustworthiness and complexity.




Frontier Computing


Book Description

This book gathers the proceedings of the 11th International Conference on Frontier Computing, held in Seoul, on July 13–17, 2021, and provides comprehensive coverage of the latest advances and trends in information technology, science, and engineering. It addresses a number of broad themes, including communication networks, business intelligence and knowledge management, Web intelligence, and related fields that inspire the development of information technology. The respective contributions cover a wide range of topics: database and data mining, networking and communications, Web and Internet of things, embedded systems, soft computing, social network analysis, security and privacy, optical communication, and ubiquitous/pervasive computing. Many of the papers outline promising future research directions, and the book benefits students, researchers, and professionals alike. Further, it offers a useful reference guide for newcomers to the field.




Security of Information and Networks


Book Description

This book is a select collection of edited papers from the International Conference on Security of Information and Networks (SIN 2007) on the main theme of Information Assurance, Security, and Public Policy. SIN 2007 was hosted by the Eastern Mediterranean University in Gazimagusa, North Cyprus and co-organized by the Istanbul Technical University, Turkey. While SIN 2007 covered all areas of information and network security, the papers included here focused on the following topics: - cryptology: design and analysis of cryptographic algorithms, hardware and software implementations of cryptographic algorithms, and steganography; - network security: authentication, authorization and access control, privacy, intrusion detection, grid security, and mobile and personal area networks; - IT governance: information security management systems, risk and threat analysis, and information security policies. They represent an interesting mix of innovative academic research and experience reports from practitioners. This is further complemented by a number of invited papers providing excellent overviews: - Elisabeth Oswald, University of Bristol, Bristol, UK: Power Analysis Attack: A Very Brief Introduction; - Marc Joye, Thomson R&D, France: On White-Box Cryptography; - Bart Preneel, Katholieke Universiteit Leuven, Leuven, Belgium: Research Challenges in Cryptology; - Mehmet Ufuk Caglayan, Bogazici University, Turkey: Secure Routing in Ad Hoc Networks and Model Checking. The papers are organized in a logical sequence covering Ciphers; Mobile Agents & Networks; Access Control and Security Assurance; Attacks, Intrusion Detection, and Security Recommendations; and, Security Software, Performance, and Experience.




Collaborative Computing: Networking, Applications and Worksharing


Book Description

The two-volume set LNICST 460 and 461 constitutes the proceedings of the 18th EAI International Conference on Collaborative Computing: Networking, Applications and Worksharing, CollaborateCom 2022, held in Hangzhou, China, in October 2022. The 57 full papers presented in the proceedings were carefully reviewed and selected from 171 submissions. The papers are organized in the following topical sections: Recommendation System; Federated Learning and application; Edge Computing and Collaborative working; Blockchain applications; Security and Privacy Protection; Deep Learning and application; Collaborative working; Images processing and recognition.




10th International Conference on Theory and Application of Soft Computing, Computing with Words and Perceptions - ICSCCW-2019


Book Description

This book presents the proceedings of the 10th Conference on Theory and Applications of Soft Computing, Computing with Words and Perceptions, ICSCCW 2019, held in Prague, Czech Republic, on August 27–28, 2019. It includes contributions from diverse areas of soft computing and computing with words, such as uncertain computation, decision-making under imperfect information, neuro-fuzzy approaches, deep learning, natural language processing, and others. The topics of the papers include theory and applications of soft computing, information granulation, computing with words, computing with perceptions, image processing with soft computing, probabilistic reasoning, intelligent control, machine learning, fuzzy logic in data analytics and data mining, evolutionary computing, chaotic systems, soft computing in business, economics and finance, fuzzy logic and soft computing in earth sciences, fuzzy logic and soft computing in engineering, fuzzy logic and soft computing in material sciences, soft computing in medicine, biomedical engineering, and pharmaceutical sciences. Showcasing new ideas in the field of theories of soft computing and computing with words and their applications in economics, business, industry, education, medicine, earth sciences, and other fields, it promotes the development and implementation of these paradigms in various real-world contexts. This book is a useful guide for academics, practitioners and graduates.




International Conference on Advanced Computing Networking and Informatics


Book Description

The book comprises selected papers presented at the International Conference on Advanced Computing, Networking and Informatics (ICANI 2018), organized by Medi-Caps University, India. It includes novel and original research work on advanced computing, networking and informatics, and discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques in the field of computing and networking.




Proceedings of International Conference on Trends in Computational and Cognitive Engineering


Book Description

This book presents various computational and cognitive modeling approaches in the areas of health, education, finance, environment, engineering, commerce, and industry. It is a collection of selected conference papers presented at the International Conference on Trends in Computational and Cognitive Engineering (TCCE 2020). It shares cutting-edge insights and ideas from mathematicians, engineers, scientists, and researchers and discusses fresh perspectives on problem solving in a range of research areas.




Introduction to Wireless Localization


Book Description

This book provides a comprehensive overview of the entire landscape of both outdoor and indoor wireless positioning, and guides the reader step by step in the implementation of wireless positioning applications on the iPhone. Explanations of fundamental positioning techniques are given throughout the text, along with many programming examples, providing the reader with an independent, practical, and enjoyable learning of the material while gaining a real feel for the subject. Provides an accessible introduction to positioning technologies such as Global Positioning System and Wi-Fi positioning Presents hands-on skills to iOS 5.0 programming for location-aware applications Gives a thorough grounding in signal propagation, line-of-sight and interference effects for accurate positioning Covers the location-aware video streaming and conferencing with practical iPhone application examples Accompanied by a website containing programming code described in the text and lecture presentation slides for instructors This book is primarily intended for anyone who wants to study wireless localization. It is an ideal textbook for graduate students who are first learning localization techniques, as well as advanced undergraduates in computer science interested in translating localization concepts into real code. Professionals, engineers and researchers working in location-aware services and related techniques using mobile positioning and AI technologies will find this book to be a helpful reference. Companion website for the book: www.wiley.com/go/chan/wireless