You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book features high-quality research papers presented at the 6th International Conference on Computational Intelligence in Pattern Recognition (CIPR 2024), held at Maharaja Sriram Chandra Bhanja Deo University (MSCB University), Baripada, Odisha, India, during March 15–16, 2024. It includes practical development experiences in various areas of data analysis and pattern recognition, focusing on soft computing technologies, clustering and classification algorithms, rough set and fuzzy set theory, evolutionary computations, neural science and neural network systems, image processing, combinatorial pattern matching, social network analysis, audio and video data analysis, data mining in dynamic environments, bioinformatics, hybrid computing, big data analytics, and deep learning. It also provides innovative solutions to the challenges in these areas and discusses recent developments.
Integration of IoT (Internet of Things) with big data and cloud computing has brought forward numerous advantages and challenges such as data analytics, integration, and storage. This book highlights these challenges and provides an integrating framework for these technologies, illustrating the role of blockchain in all possible facets of IoT security. Furthermore, it investigates the security and privacy issues associated with various IoT systems along with exploring various machine learning-based IoT security solutions. This book brings together state-of-the-art innovations, research activities (both in academia and in industry), and the corresponding standardization impacts of 5G as well....
This book is composed of the Proceedings of the International Conference on Advanced Computing, Networking, and Informatics (ICACNI 2013), held at Central Institute of Technology, Raipur, Chhattisgarh, India during June 14–16, 2013. The book records current research articles in the domain of computing, networking, and informatics. The book presents original research articles, case-studies, as well as review articles in the said field of study with emphasis on their implementation and practical application. Researchers, academicians, practitioners, and industry policy makers around the globe have contributed towards formation of this book with their valuable research submissions.
This book constitutes the refereed proceedings of the Third International Conference on Computing, Communication and Learning, CoCoLe 2024, held in Warangal, India, in September 2024. The 24 full papers and 10 short papers presented here were carefully reviewed and selected from 149 submissions. These papers have been categorized under the following topical sections: Advancements in AI for Predictive Modeling, Quality Enhancement, and Real-Time Detection Across Various Domains; Machine Learning Advances in Medical Imaging, Agricultural Monitoring, and Multimedia Processing; Advancements in Privacy-Preservation and Intelligent Detection Systems for Federated Learning and Edge Computing.
Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing amidst many others. This two volume proceedings explore the combined use of Advanced Computing and Informatics in the next generation wireless networks and security, signal and image processing, ontology and human-computer interfaces (HCI). The two volumes together include 132 scholarly articles, which have been accepted for presentation from over 550 submissions in the Third International Conference on Advanced Computing, Networking and Informatics, 2015, held in Bhubaneswar, India during June 23–25, 2015.
This book showcases the technologies and algorithms being used for human authentication and recognition. Examining the full range of biometrics solutions, including unimodal and multimodal biometrics, the book covers conventional biometric techniques as well as novel systems developed over the past few years. It includes coverage of new biometric algorithms with novel feature extraction techniques, new computer vision approaches, soft computing approaches, and machine learning techniques under a unified framework used in biometrics systems. The text includes model question papers, mathematical notations, and exercises to reinforce understanding.
Cloud technologies have revolutionized the way we store information and perform various computing tasks. With the rise of this new technology, the ability to secure information stored on the cloud becomes a concern. The Handbook of Research on Securing Cloud-Based Databases with Biometric Applications explores the latest innovations in promoting cloud security through human authentication techniques. Exploring methods of access by identification, including the analysis of facial features, fingerprints, DNA, dental characteristics, and voice patterns, this publication is designed especially for IT professionals, academicians, and upper-level students seeking current research surrounding cloud security.
This book focuses on recent technical advancements and state-of-the art technologies for analyzing characteristic features and probabilistic modelling of complex social networks and decentralized online network architectures. Such research results in applications related to surveillance and privacy, fraud analysis, cyber forensics, propaganda campaigns, as well as for online social networks such as Facebook. The text illustrates the benefits of using advanced social network analysis methods through application case studies based on practical test results from synthetic and real-world data. This book will appeal to researchers and students working in these areas.
The book focuses on both theory and applications in the broad areas of communication technology, computer science and information security. This two volume book contains the Proceedings of International Conference on Advanced Computing and Intelligent Engineering. These volumes bring together academic scientists, professors, research scholars and students to share and disseminate information on knowledge and scientific research works related to computing, networking, and informatics to discuss the practical challenges encountered and the solutions adopted. The book also promotes translation of basic research into applied investigation and convert applied investigation into practice.
The book focuses on both theory and applications in the broad areas of communication technology, computer science and information security. This two volume book contains the Proceedings of International Conference on Advanced Computing and Intelligent Engineering. These volumes bring together academic scientists, professors, research scholars and students to share and disseminate information on knowledge and scientific research works related to computing, networking, and informatics to discuss the practical challenges encountered and the solutions adopted. The book also promotes translation of basic research into applied investigation and convert applied investigation into practice.