Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 10 of 10 matches in All Departments
With the intriguing development of technologies in several industries along with the advent of accrescent and ubiquitous computational resources, it creates an ample number of opportunities to develop innovative intelligence technologies in order to solve the wide range of uncertainties, imprecision, and vagueness issues in various real-life problems. Hybridizing modern computational intelligence with traditional computing methods has attracted researchers and academicians to focus on developing innovative AI techniques using data science. International Conference on Data Science and Artificial Intelligence (ICDSAI) 2022, organized on April 23-24, 2022 by the Indian Institute of Technology, Patna at NITIE Mumbai (India) in collaboration with the International Association of Academicians (IAASSE) USA collected scientific and technical contributions with respect to models, tools, technologies, and applications in the field of modern Artificial Intelligence and Data Science, covering the entire range of concepts from theory to practice, including case studies, works-in-progress, and conceptual explorations.
In today's globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits that computing systems offer, there remains an assortment of issues and challenges in maintaining the integrity and confidentiality of these databases. As professionals become more dependent cyberspace, there is a need for research on modern strategies and concepts for improving the security and safety of these technologies. Modern Theories and Practices for Cyber Ethics and Security Compliance is a collection of innovative research on the concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber protection. While highlighting topics including database governance, cryptography, and intrusion detection, this book provides guidelines for the protection, safety, and security of business data and national infrastructure from cyber-attacks. It is ideally designed for security analysts, law enforcement, researchers, legal practitioners, policymakers, business professionals, governments, strategists, educators, and students seeking current research on combative solutions for cyber threats and attacks.
This edited volume on machine learning and big data analytics (Proceedings of ICMLBDA 2022) is intended to be used as a reference book for researchers and professionals to share their research and reports of new technologies and applications in Machine Learning and Big Data Analytics like biometric Recognition Systems, medical diagnosis, industries, telecommunications, AI Petri Nets Model-Based Diagnosis, gaming, stock trading, Intelligent Aerospace Systems, robot control, law, remote sensing and scientific discovery agents and multiagent systems; and natural language and Web intelligence. The intent of this book is to provide awareness of algorithms used for machine learning and big data in the advanced Scientific Technologies, provide a correlation of multidisciplinary areas and become a point of great interest for Data Scientists, systems architects, developers, new researchers and graduate level students. This volume provides cutting-edge research from around the globe on this field. Current status, trends, future directions, opportunities, etc. are discussed, making it friendly for beginners and young researchers.
This book presents the recent research adoption of a variety of enabling wireless communication technologies like RFID tags, BLE, ZigBee, etc., and embedded sensor and actuator nodes, and various protocols like CoAP, MQTT, DNS, etc., that has made Internet of things (IoT) to step out of its infancy to become smart things. Now, smart sensors can collaborate directly with the machine without human involvement to automate decision making or to control a task. Smart technologies including green electronics, green radios, fuzzy neural approaches, and intelligent signal processing techniques play important roles in the developments of the wearable healthcare systems. In the proceedings of 5th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2020, brought out research works on the advances in the Internet of things (IoT) and connected technologies (various protocols, standards, etc.). This conference aimed at providing a forum to discuss the recent advances in enabling technologies and applications for IoT.
This volume presents the refereed proceedings of the 7th International ICST Conference on Security and Privacy in Communication Networks, SecureComm 2011, held in London, UK, in September 2011. The 35 revised papers included in the volume were carefully reviewed and selected from numerous submissions. Topics covered include network intrusion detection; anonymity and privacy; wireless security; system security; DNS and routing security; and key management.
The healthcare sector is facing a series of challenges that could seem insurmountable - an increase in demand caused by the ageing population in western, developed countries; the corresponding reduction in the numbers of young people to pay for and resource care; and simultaneous squeezing of funding, eternal issues with the quality of care, and patients' rising expectations. All of this is compounded by advances in medical technology that offer longer, healthier, happy lives while simultaneously increasing the cost burden to the healthcare system.This book collects together the experiences of practitioners, technologists, clinicians, managers and economists in helping to deal with these challenges. The Health and Care Revolution describes through the eyes of real experience the current transformation of healthcare to support healthy living - preventing, detect and managing disease early, and expanding its horizons from essentially acute clinical interventions into a care continuum throughout people's lives. The examples discussed put the individual in the driving seat of their lives, rather than the professionals surrounded by organisation, geography and working practice boundaries. Here you will find, from around the world, experts talking about the ways personal responsibility, access to information, working practices, access to care, and the underlying motivations to change, have been transformed. The eminent authors are often working at the forefront of change in processes, governance, capabilities and technology - and share their pains and gains clearly.With a preface from one of the World Health Organisation's thought leaders, and featuring a wide variety of topics from Information Therapy to changing clinical working practice, via telemedicine to the innovative design of new facilities, The Health and Care Revolution captures essential knowledge for those wishing to drive progress in one of the world's most important industries.The royalties for this book are being donated to charity at the Editors' request.
This book presents recent advances on IoT and connected technologies. We are currently in the midst of the Fourth Industrial Revolution, and IoT is having the most significant impact on our society. The recent adoption of a variety of enabling wireless communication technologies like RFID tags, BLE, ZigBee, etc., embedded sensor and actuator nodes, and various protocols like CoAP, MQTT, DNS, etc., has made the Internet of things (IoT) step out of its infancy. Internet of things (IoT) and connecting technologies are already having profound effects on the different parts of society like the government, health care, businesses, and personal lives. 6th International Conference on Internet of Things and Connected Technologies (ICIoTCT), 2021, was a platform to discuss and feature research on topics such as augmented reality, sensor networks, and wearable technology. This book is ideally designed for marketing managers, business professionals, researchers, academicians, and graduate-level students seeking to learn how IoT and connecting technologies increase the amount of data gained through devices, enhance customer experience, and widen the scope of IoT analytics in enhancing customer marketing outcomes.
This book constitutes the proceedings of the 5th International Symposium on Cyberspace Safety and Security, CSS 2013, held in Zhangjiajie, China, in November 2013. The 30 full papers presented in this volume were carefully reviewed and selected from 105 submissions. In addition the book contains 6 workshop papers. The papers are organized in topical sections named: data and applications security; network and communications security; software and systems security; and cloud security and cyberspace safety.
In today's globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits that computing systems offer, there remains an assortment of issues and challenges in maintaining the integrity and confidentiality of these databases. As professionals become more dependent cyberspace, there is a need for research on modern strategies and concepts for improving the security and safety of these technologies. Modern Theories and Practices for Cyber Ethics and Security Compliance is a collection of innovative research on the concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber protection. While highlighting topics including database governance, cryptography, and intrusion detection, this book provides guidelines for the protection, safety, and security of business data and national infrastructure from cyber-attacks. It is ideally designed for security analysts, law enforcement, researchers, legal practitioners, policymakers, business professionals, governments, strategists, educators, and students seeking current research on combative solutions for cyber threats and attacks.
This book investigates the security and privacy issues in mobile healthcare management and develops solutions based on Mobile Web services and XML security technologies. Web services can be extended to develop services for the applications in mobile hand-held devices that are connected to a mobile network. Transferring healthcare services to electronic and mobile environment is one of the emerging research areas in healthcare as solutions to the present overstretched and under budgeted healthcare services. This approach will transfer patient medical records and services on wired and over the air techniques between patients and healthcare services. So patients and healthcare service providers have remote access to medical records and medical services over the Internet or mobile network. Mobile healthcare environment transfer patient life sensitive medical records between different actors in the environment. There are a number of possible external security attacks on the system during the data storage and transmission. Therefore, protecting the mobile healthcare Web services environment from security and privacy attacks is one of the emerging research areas.
|
You may like...
|