Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 8 of 8 matches in All Departments
Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested in improving their understanding of the strategic role of trust at different levels of information and knowledge society.
This book constitutes the refereed proceedings of the 6th IFIP TC 5 International Conference on Computational Intelligence and Its Applications, CIIA 2018, held in Oran, Algeria, in May 2018. The 56 full papers presented were carefully reviewed and selected from 202 submissions. They are organized in the following topical sections: data mining and information retrieval; evolutionary computation; machine learning; optimization; planning and scheduling; wireless communication and mobile computing; Internet of Things (IoT) and decision support systems; pattern recognition and image processing; and semantic web services.
"During the last decades Computational Intelligence has emerged and showed its contributions in various broad research communities (computer science, engineering, finance, economic, decision making, etc.). This was done by proposing approaches and algorithms based either on turnkey techniques belonging to the large panoply of solutions offered by computational intelligence such as data mining, genetic algorithms, bio-inspired methods, Bayesian networks, machine learning, fuzzy logic, artificial neural networks, etc. or inspired by computational intelligence techniques to develop new ad-hoc algorithms for the problem under consideration. This volume is a comprehensive collection of extended contributions from the 4th International Conference on Computer Science and Its Applications (CIIA 2013) organized into four main tracks: Track 1: Computational Intelligence, Track 2: Security & Network Technologies, Track 3: Information Technology and Track4: Computer Systems and Applications. This book presents recent advances in the use and exploitation of computational intelligence in several real world hard problems covering these tracks such as image processing, Arab text processing, sensor and mobile networks, physical design of advanced databases, model matching, etc. that require advanced approaches and algorithms borrowed from computational intelligence for solving them.
This proceedings book gives a new vision and real progress towards more difficult problems resolution. In trying to solve the problems we face every day in the complex world we are living, we are constantly developing artificial systems and increasingly complex middleware. Indeed, the research works contained in this book address a large spread of nowadays topics like IoT architectures, communication and routing protocols, smart systems, software defined networks (SDNs), natural language processing (NLP), social media, health systems, machine intelligence and data science, soft computing and optimization, and software technology. This book, which is a selective collection of research papers accepted by the international program committee of the 6th International Symposium on Modelling and Implementation of Complex Systems (MISC 2020), considers intelligence (CI) more as a way of thinking about problems. It includes a mix of old efficient (Fuzzy, NN, GA) and modern AI techniques (deep learning and CNN). The whole complex systems research community finds in this book an appropriate way to approach problems that have no algorithmic solution and finds many well-formulated technical challenges.
This book constitutes the refereed proceedings of the 6th IFIP TC 5 International Conference on Computational Intelligence and Its Applications, CIIA 2018, held in Oran, Algeria, in May 2018. The 56 full papers presented were carefully reviewed and selected from 202 submissions. They are organized in the following topical sections: data mining and information retrieval; evolutionary computation; machine learning; optimization; planning and scheduling; wireless communication and mobile computing; Internet of Things (IoT) and decision support systems; pattern recognition and image processing; and semantic web services.
This book presents the proceedings of the fifth International Symposium on Modelling and Implementation of Complex Systems (MISC 2018). The event was held in Laghouat, Algeria, on December 16-18, 2018. The 25 papers gathered here have been selected from 109 submissions using a strict peer-review process, and address a range of topics concerning the theory and applications of networking and distributed computing, including: cloud computing and the IoT, metaheuristics and optimization, computational intelligence, software engineering and formal methods.
The breakthrough of AI in the design of complex systems in our daily lives has prompted researchers around the world to integrate this paradigm into their work. From simple citizens to large industrialists, including academics and politicians, there is a great enthusiasm for making all objects intelligent. This has led the scientific community to develop complex intelligent systems adaptable to different real-life systems. This book, which is a selective collection of research papers accepted by the international program committee of the 7th international symposium on Modeling and Implementation of Complex Systems (MISC 2022), makes its contribution in this vast field and addresses subjects that are as interesting as they are useful to the citizen life, namely In healthcare: health monitoring systems for heart patients, a model for cardiovascular disease prediction, early diabetic detection, COVID-19 screening from cough sound, and detection in epidemiological diseases. In natural language processing: summarization of major Arabic machine translation corpora, impact of normalization, and data augmentation on named entity recognition (NER) task on Algerian text. In Agriculture 5.0: schedule of the most widely used IoT architectures and plant recognition. In robotics: visually real-time control of a mobile EV3 robot in an indoor environment. In social media: the identification of rumors on social networks. In computer vision and biometrics: illumination-robust face recognition system. In IoT ecosystem, networks and cloud computing: technologies and protocols, architectures and modeling IoT applications, Named Data Networking (NDN) for the emergent IoT, unmanned aerial vehicle carried base stations (UAV-BSs) placement problem in 5G networks, assignment of the submitted tasks to the available resources in a cloud computing environment, providing routes in the presence of obstacles, and security aspects. Finally, the reader finds how to approach problems even if they have no algorithmic or no exact solution by using the following techniques developed in the different chapters of this book: deep CNN models and dense CNN models, voluntary simulation, hybrid gray wolf optimizer (GWO), multi-verse optimizer (MVO), coronavirus herd immunity optimizer (CHIO) algorithm, multi-population differential evolution, graphical formalism with machine learning and Color Petri Nets, and extension of BPMN 2.0.
This volume is a comprehensive collection of extended contributions from the fourth international symposium on Modeling and Implementing Complex Systems (MICS'2106) organized into four main topics: Networking and Cloud Computing, Software Engineering and Formal Methods, Intelligent and Information Systems, and Algorithms and Complexity. This book presents recent advances related to theory and applications of networking and distributed computing, including: cloud computing, software engineering, formal methods, information extraction, optimization algorithms, intelligent systems, and multi-agent systems.
|
You may like...
|