You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In today’s digital age, the risks to data and infrastructure have increased in both range and complexity. As a result, companies need to adopt cutting-edge artificial intelligence (AI) solutions to effectively detect and counter potential threats. This handbook fills the existing knowledge gap by bringing together a team of experts to discuss the latest advancements in security systems powered by AI. The handbook offers valuable insights on proactive strategies, threat mitigation techniques, and comprehensive tactics for safeguarding sensitive data. Handbook of AI-Driven Threat Detection and Prevention: A Holistic Approach to Security explores AI-driven threat detection and prevention, and...
Various Multiple Criteria Decision-Making (MCDM) techniques in one book: 13 MCDM techniques have been applied, namely, WSM, WPM, WASPAS, GRA, SMART, CRITIC, ENTROPY, EDAS, MOORA, AHP, TOPSIS, VIKOR, and new tools: MDEMATEL, Fuzzy MDEMATEL, Modified Fuzzy TOPSIS and Modified Fuzzy VIKOR. To date, no other book possesses this many tools. Various quantitative techniques: Different quantitative techniques have been applied, namely, Cronbach alpha, Chi-square and ANOVA (for demographic analysis), Percent Point Score and Central Tendency (response analysis), Factor Analysis, Correlation and Regression. To date, no other book possesses this many tools. Interpretive Structural Modelling: ISM has bee...
Scientific analysis of the biblical Epistles of the Apostles from the New Testament. In English. Научный построчный разбор библейских Посланий апостолов из Нового завета. На английском языке.
Positioned at the crossroads of genomics, proteomics, artificial intelligence, and biomedical engineering, this book provides a roadmap for leveraging computational intelligence to address the complex challenges of modern life sciences, healthcare, and industrial biotechnology. Across twelve comprehensive chapters, the book lays the foundations for sequencing technologies, omics data, and the principles of biotechnology data management. It then transitions into the application of machine learning models ranging from neural networks to optimization frameworks to extract meaningful insights from large-scale biological datasets. Subsequently it addresses pressing challenges such as data noise, ...
Scientific line-by-line analysis of the Biblical books of the prophets Ezekiel and Daniel. In English. Научный построчный разбор библейских книг пророков Иезекииля и Даниила. На английском языке.
Communications represent a strategic sector for privacy protection and for personal, company, national and international security. The interception, damage or lost of information during communication can generate material and non material economic damages from both a personal and collective point of view. The purpose of this book is to give the reader information relating to all aspects of communications security, beginning at the base ideas and building to reach the most advanced and updated concepts. The book will be of interest to integrated system designers, telecommunication designers, system engineers, system analysts, security managers, technicians, intelligence personnel, security personnel, police, army, private investigators, scientists, graduate and postgraduate students and anyone that needs to communicate in a secure way.
Selected, peer reviewed papers from the International Conference on Advances in Manufacturing and Materials Engineering 2014 (ICAMME 2014), September 23-25, 2014, Kuala Lumpur, Malaysia
Selected, peer reviewed papers from the 2014 International Conference on Advanced Materials, Structures and Mechanical Engineering (ICAMSME 2014), May 3-4, 2014, Incheon, South-Korea
"European Community-African-Caribbean-Pacific" (varies).
Selected, peer reviewed papers from the 2014 International Mechanical Engineering Congress (IMEC 2014), June 13-15, 2014, Tamil Nadu, India