You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book focuses on the techniques of artificial intelligence that are mainly used in the power electronics field for the optimization of lost vehicle power. With the intention of optimizing the powerful energy of the vehicles and producing reliable energy, the most efficient methods, algorithms, and strategies of ethical artificial intelligence (AI) are being applied. By employing machine learning methods, the optimization of power energy in vehicles can be quickly recovered and managed efficiently. In today’s bustling world, power energy is indispensable for progress, yet in congested Vehicular Ad-hoc Networks (VANETs), vehicles often face power depletion and decreased efficiency. This ...
This book constitutes the proceedings of 26th International Conference on Advanced Information Systems Engineering, CAiSE 2014, held in Thessaloniki, Greece in June 2014. The 41 papers and 3 keynotes presented were carefully reviewed and selected from 226 submissions. The accepted papers were presented in 13 sessions: clouds and services; requirements; product lines; requirements elicitation; processes; risk and security; process models; data mining and streaming; process mining; models; mining event logs; databases; software engineering.
This double volumes LNCS 10573-10574 constitutes the refereed proceedings of the Confederated International Conferences: Cooperative Information Systems, CoopIS 2017, Ontologies, Databases, and Applications of Semantics, ODBASE 2017, and Cloud and Trusted Computing, C&TC, held as part of OTM 2017 in October 2017 in Rhodes, Greece. The 61 full papers presented together with 19 short papers were carefully reviewed and selected from 180 submissions. The OTM program every year covers data and Web semantics, distributed objects, Web services, databases, information systems, enterprise workflow and collaboration, ubiquity, interoperability, mobility, grid and high-performance computing.
Blockchain technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in the blocking chain, the industry does not matter. Blockchain technology has infiltrated all areas of our lives, from manufacturing to healthcare and beyond. Cybersecurity is an industry that has been significantly affected by this technology and may be more so in the future. Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications is an invaluable resource to discover the blockchain applications for cybersecurity ...
This book is a collection of high-quality research papers presented at the Second International Conference on Machine Intelligence and Emerging Technologies, MIET 2024, hosted by Noakhali Science and Technology University, Noakhali, Bangladesh, during 8-9 November 2024. This book focuses on theoretical, practical, state-of-art applications, and research challenges in the field of artificial intelligence and emerging technologies. It is helpful for active researchers and practitioners in this field.
This book constitutes the revised selected papers of the workshops of the 11th International Conference on Service-Oriented Computing (ICSOC 2013), held in Berlin, Germany, in December 2013. The conference hosted the following five workshops: 3rd International Workshop on Cloud Computing and Scientific Applications (CCSA'13); 1st International Workshop on Cloud Service Brokerage (CSB'13); 1st International Workshop on Pervasive Analytical Service Clouds for the Enterprise and Beyond (PASCEB'13); 9th International Workshop on Semantic Web Enabled Software Engineering (SWESE'13); 9th International Workshop on Engineering Service-Oriented Applications (WESOA'13); and a PhD Symposium, with best papers also being included in this book. The 54 papers included in this volume were carefully reviewed and selected from numerous submissions. They address various topics in the service-oriented computing domain and its emerging applications.
This book collects the proceedings of the International Congress on Health Sciences and Medical Technologies (ICHSMT), held in Tlemcen, Algeria, from December 5 to 7, 2019. The proceedings present a forum for the latest projects and research in scientific and technological development with an emphasis on smart healthcare system design and future technologies. ICHSMT brings together researchers, students, and professionals from the healthcare, corporate, and academic sectors. It includes a far-reaching program supported by a variety of technical tracks that seek to promote medical technologies and innovation at a nationwide level.
AI-driven security systems and intelligent threat response using autonomous cyber defense represent the cutting edge of cybersecurity technology. As cyber threats become more sophisticated, traditional defense mechanisms struggle to keep up with the scale and speed of attacks. AI-powered security systems utilize machine learning, pattern recognition, and data analysis to detect vulnerabilities, predict breaches, and respond to threats. These systems can learn from emerging threats, adapting to new attack methods and autonomously executing countermeasures without human intervention. By using advanced algorithms to recognize anomalies and mitigate risks, autonomous cyber defense offers a proac...
We are all aware that artificial intelligence (AI) has brought a change in our lives, driven by a new form of interaction between man and machine. We are in the era of the fourth Industrial Revolution (IR) where AI plays vital roles in human development by enabling extraordinary technological advances making fundamental changes to the way we live, work and relate to one another. It is an opportunity to help everyone, including leaders, policymakers and people from all income groups and nations, to harness converging technologies in order to create an inclusive, human-centered future. We need to prepare our graduates as well as researchers to conduct their research with 4.0 IR-related technol...
None