You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book is a printed edition of the Special Issue "Road Vehicles Surroundings Supervision: On-Board Sensors and Communications" that was published in Applied Sciences
This book presents high-quality, peer-reviewed papers from 4th International Conference on “Universal Threats in Expert Applications and Solutions" (UNI-TEAS 2025), jointly being organized by IES University, Bhopal, and Shree KKarni Universe College, Jaipur, in association with CSI Jaipur Chapter and Jaipur ACM Professional Chapter during February 1–4, 2025. The book is a collection of innovative ideas from researchers, scientists, academicians, industry professionals, and students. The book covers a variety of topics, such as expert applications and artificial intelligence/machine learning; advance web technologies such as IoT, big data, and cloud computing in expert applications; information and cyber security threats and solutions, multimedia applications in forensics, security and intelligence; advancements in app development; management practices for expert applications; and social and ethical aspects in expert applications through applied sciences.
The compiled volume originates from the notable contributions presented at the 1st International Conference on Advancementof Intelligent Computational Methods and Technologies (AICMT2023), which took place in a hybrid format on June 27, 2023,at Delhi Technical Campus, Greater Noida, Uttar Pradesh, India. This comprehensive collection serves as an exploration into the dynamic domain of intelligent computational methods and technologies, offering insights into the latest and upcoming trends in computation methods. AICMT2023’s scope encompasses the evolutionary trajectory of computational methods, addressing pertinent issues in real time implementation, delving into the emergence of new intelligent technologies, exploring next-generation problem-solving methodologies, and other interconnected areas. The conference is strategically designed to spotlight current research trendswithin the field, fostering a vibrant research culture and contributing to the collective knowledge base.
While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc. Machine learning is a branch of Computer Science which enables computing machines to adopt new behaviors on the basis of observable and verifiable data and information. It can be applied to ensure the security of the computers and the information by detecting anomalies using data mining and other such techniques. Th...
It is with great pleasure to present the proceedings of the International Conference on Computational Intelligence and Mathematical Applications (ICCIMA 2023), held on 21-22 December 2023, at Panipat Institute of Engineering and Technology, Panipat. This conference brought scholars, researchers, professionals, and intellectuals together from diverse fields to exchange ideas, share insights, and foster collaborations in Optimization, Computational Intelligence and Mathematical Applications. The ICCIMA 2023 served as a platform for contributors to demonstrate their latest findings, discuss emerging trends, and explore innovations to the problems that different disciplines are currently experiencing. The conference’s scope and depth of themes reflect our community’s rich diversity of interests and levels of competence.
This book constitutes selected papers presented at the First International Conference on Artificial Intelligence and Data Science, ICAIDS 2021, held in Hyderabad, India, in December 2021. The 43 papers presented in this volume were thoroughly reviewed and selected from the 195 submissions. They focus on topics of artificial intelligence for intelligent applications and data science for emerging technologies.
Informative reference on the state of the art in cybersecurity and how to achieve a more secure cyberspace AI for Cybersecurity presents the state of the art and practice in AI for cybersecurity with a focus on four interrelated defensive capabilities of deter, protect, detect, and respond. The book examines the fundamentals of AI for cybersecurity as a multidisciplinary subject, describes how to design, build, and operate AI technologies and strategies to achieve a more secure cyberspace, and provides why-what-how of each AI technique-cybersecurity task pair to enable researchers and practitioners to make contributions to the field of AI for cybersecurity. This book is aligned with the Nati...
The book features a review of films before Partition, plots of great cinema classics, trivia and cinema lore. Anecdotes and reminiscences about the people who shaped the entertainment industry as well as interviews with directors and producers make this book a treasure trove for cineasts. But alongside the trivia is a clever synthesis juxtaposing the artistic development of the cinematic world with the overall social development in the country. It shows how the narrow self-interest of the ruling clique clashed with the creative potential of the artistic world stifling originality and all but destroying the film industry.
"In 2004, as fighting continued in Iraq and Afghanistan moved towards elections, a third aspect of the 'war on terrorism' involved US pressure on Pakistan to eliminate Taliban remnants and foreign, especially Al Qaeda, militants from the Federally Administered Tribal Areas along the Pakistan-Afghanistan border." "Throughout 2004, Pakistan used political negotiation and military force to crush or disperse militants and Pakistani sympathizers, especially near the town of Wana in South Waziristan. Pakistani tactics, derived from British colonial methods, included negotiating with tribal councils, economic blockades, the destruction of homes, mass arrests, and military attacks." "This short volume reprints two, one-hundred-year-old colonial reports on FATA regions, one on Wana and one on the Adam Khel Afridi homelands located near Peshawar. For generations, governments have tried to understand and control FATA regions. These reports suggest the difficulty that state builders with centralizing ambitions have always had in prevailing against semi-independent communities yet to be fully integrated into wider political, economic and administrative systems."--BOOK JACKET.