|
Showing 1 - 25 of
127 matches in All Departments
In recent years, most applications deal with constraint
decision-making systems as problems are based on imprecise
information and parameters. It is difficult to understand the
nature of data based on applications and it requires a specific
model for understanding the nature of the system. Further research
on constraint decision-making systems in engineering is required.
Constraint Decision-Making Systems in Engineering derives and
explores several types of constraint decisions in engineering and
focuses on new and innovative conclusions based on problems, robust
and efficient systems, and linear and non-linear applications.
Covering topics such as fault detection, data mining techniques,
and knowledge-based management, this premier reference source is an
essential resource for engineers, managers, computer scientists,
students and educators of higher education, librarians,
researchers, and academicians.
In recent years, technological advances have led to significant
developments within a variety of business applications. In
particular, data-driven research provides ample opportunity for
enterprise growth, if utilized efficiently. Privacy and Security
Policies in Big Data is a pivotal reference source for the latest
research on innovative concepts on the management of security and
privacy analytics within big data. Featuring extensive coverage on
relevant areas such as kinetic knowledge, cognitive analytics, and
parallel computing, this publication is an ideal resource for
professionals, researchers, academicians, advanced-level students,
and technology developers in the field of big data.
Modern society exists in a digital era in which high volumes of
multimedia information exists. To optimize the management of this
data, new methods are emerging for more efficient information
retrieval. Web Semantics for Textual and Visual Information
Retrieval is a pivotal reference source for the latest academic
research on embedding and associating semantics with multimedia
information to improve data retrieval techniques. Highlighting a
range of pertinent topics such as automation, knowledge discovery,
and social networking, this book is ideally designed for
researchers, practitioners, students, and professionals interested
in emerging trends in information retrieval.
This book extends the work from introduction of ubiquitous
computing, to the Internet of things to security and to privacy
aspects of ubiquitous computing. The uniqueness of this book is the
combination of important fields like the Internet of things and
ubiquitous computing. It assumes that the readers' goal is to
achieve a complete understanding of IoT, smart computing, security
issues, challenges and possible solutions. It is not oriented
towards any specific use cases and security issues; privacy threats
in ubiquitous computing problems are discussed across various
domains. This book is motivating to address privacy threats in new
inventions for a wide range of stakeholders like layman to educated
users, villages to metros and national to global levels. This book
contains numerous examples, case studies, technical descriptions,
scenarios, procedures, algorithms and protocols. The main endeavour
of this book is threat analysis and activity modelling of attacks
in order to give an actual view of the ubiquitous computing
applications. The unique approach will help readers for a better
understanding.
Organizations are showing a remarkable interest in realizing
knowledge management technologies and processes to adopt knowledge
management as part of their overall strategy. However, even with
the current advancement in technology, few organizations are
entirely capable of developing critical organizational knowledge to
achieve improved performance. Technological Innovations in
Knowledge Management and Decision Support is a vital research
publication that examines different knowledge management areas for
organizational competitiveness, survival, and effectiveness. It
also provides cutting-edge research techniques in related
optimization methods and other automated techniques in real-world
processes. Featuring a broad range of topics such as enterprise
resource planning, neural networks, and image segmentation, this
book is a critical resource for managers, IT specialists,
healthcare and social sciences professionals, engineers,
academicians, and researchers seeking research on effective
knowledge management systems.
This book presents architectural solutions of wireless network and
its variations. It basically deals with modeling, analysis, design
and enhancement of different architectural parts of wireless
network. The main aim of this book is to enhance the applications
of wireless network by reducing and controlling its architectural
issues. The book discusses efficiency and robustness of wireless
network as a platform for communication and data transmission and
also discusses some challenges and security issues such as limited
hardware resources, unreliable communication, dynamic topology of
some wireless networks, vulnerability and unsecure environment.
This book is edited for users, academicians and researchers of
wireless network. Broadly, topics include modeling of security
enhancements, optimization model for network lifetime, modeling of
aggregation systems and analyzing of troubleshooting techniques.
This book highlights essential concepts in connection with the
traditional bat algorithm and its recent variants, as well as its
application to find optimal solutions for a variety of real-world
engineering and medical problems. Today, swarm intelligence-based
meta-heuristic algorithms are extensively being used to address a
wide range of real-world optimization problems due to their
adaptability and robustness. Developed in 2009, the bat algorithm
(BA) is one of the most successful swarm intelligence procedures,
and has been used to tackle optimization tasks for more than a
decade. The BA's mathematical model is quite straightforward and
easy to understand and enhance, compared to other swarm approaches.
Hence, it has attracted the attention of researchers who are
working to find optimal solutions in a diverse range of domains,
such as N-dimensional numerical optimization,
constrained/unconstrained optimization and linear/nonlinear
optimization problems. Along with the traditional BA, its enhanced
versions are now also being used to solve optimization problems in
science, engineering and medical applications around the globe.
Recent advancements and innovations in medical image and data
processing have led to a need for robust and secure mechanisms to
transfer images and signals over the internet and maintain
copyright protection. The Handbook of Research on Information
Security in Biomedical Signal Processing provides emerging research
on security in biomedical data as well as techniques for accurate
reading and further processing. While highlighting topics such as
image processing, secure access, and watermarking, this publication
explores advanced models and algorithms in information security in
the modern healthcare system. This publication is a vital resource
for academicians, medical professionals, technology developers,
researchers, students, and practitioners seeking current research
on intelligent techniques in medical data security.
Metaheuristic algorithms are present in various applications for
different domains. Recently, researchers have conducted studies on
the effectiveness of these algorithms in providing optimal
solutions to complicated problems. Advancements in Applied
Metaheuristic Computing is a crucial reference source for the
latest empirical research on methods and approaches that include
metaheuristics for further system improvements, and it offers
outcomes of employing optimization algorithms. Featuring coverage
on a broad range of topics such as manufacturing, genetic
programming, and medical imaging, this publication is ideal for
researchers, academicians, advanced-level students, and technology
developers seeking current research on the use of optimization
algorithms in several applications.
This book includes research articles and expository papers on the
applications of artificial intelligence and big data analytics to
battle the pandemic. In the context of COVID-19, this book focuses
on how big data analytic and artificial intelligence help fight
COVID-19. The book is divided into four parts. The first part
discusses the forecasting and visualization of the COVID-19 data.
The second part describes applications of artificial intelligence
in the COVID-19 diagnosis of chest X-Ray imaging. The third part
discusses the insights of artificial intelligence to stop spread of
COVID-19, while the last part presents deep learning and big data
analytics which help fight the COVID-19.
This book proposes new technologies and discusses future solutions
for ICT design infrastructures, as reflected in high-quality papers
presented at the 5th International Conference on ICT for
Sustainable Development (ICT4SD 2020), held in Goa, India, on 23-24
July 2020. The conference provided a valuable forum for
cutting-edge research discussions among pioneering researchers,
scientists, industrial engineers, and students from all around the
world. Bringing together experts from different countries, the book
explores a range of central issues from an international
perspective.
This book introduces research presented at the "International
Conference on Artificial Intelligence: Advances and
Applications-2019 (ICAIAA 2019)," a two-day conference and workshop
bringing together leading academicians, researchers as well as
students to share their experiences and findings on all aspects of
engineering applications of artificial intelligence. The book
covers research in the areas of artificial intelligence, machine
learning, and deep learning applications in health care,
agriculture, business and security. It also includes research in
core concepts of computer networks, intelligent system design and
deployment, real-time systems, WSN, sensors and sensor nodes, SDN
and NFV. As such it is a valuable resource for students, academics
and practitioners in industry working on AI applications.
This book presents a cutting-edge research procedure in the
Nature-Inspired Computing (NIC) domain and its connections with
computational intelligence areas in real-world engineering
applications. It introduces readers to a broad range of algorithms,
such as genetic algorithms, particle swarm optimization, the
firefly algorithm, flower pollination algorithm, collision-based
optimization algorithm, bat algorithm, ant colony optimization, and
multi-agent systems. In turn, it provides an overview of
meta-heuristic algorithms, comparing the advantages and
disadvantages of each. Moreover, the book provides a brief outline
of the integration of nature-inspired computing techniques and
various computational intelligence paradigms, and highlights
nature-inspired computing techniques in a range of applications,
including: evolutionary robotics, sports training planning,
assessment of water distribution systems, flood simulation and
forecasting, traffic control, gene expression analysis, antenna
array design, and scheduling/dynamic resource management.
This book proposes new algorithms to ensure secured communications
and prevent unauthorized data exchange in secured multimedia
systems. Focusing on numerous applications' algorithms and
scenarios, it offers an in-depth analysis of data hiding
technologies including watermarking, cryptography, encryption, copy
control, and authentication. The authors present a framework for
visual data hiding technologies that resolves emerging problems of
modern multimedia applications in several contexts including the
medical, healthcare, education, and wireless communication
networking domains. Further, it introduces several intelligent
security techniques with real-time implementation. As part of its
comprehensive coverage, the book discusses contemporary multimedia
authentication and fingerprinting techniques, while also proposing
personal authentication/recognition systems based on hand images,
surveillance system security using gait recognition, face
recognition under restricted constraints such as dry/wet face
conditions, and three-dimensional face identification using the
approach developed here. This book equips perception technology
professionals with the latest technologies, techniques, and
strategies for multimedia security systems, offering a valuable
resource for engineers and researchers working to develop security
systems.
This volume comprises of 21 selected chapters, including two
overview chapters devoted to abdominal imaging in clinical
applications supported computer aided diagnosis approaches as well
as different techniques for solving the pectoral muscle extraction
problem in the preprocessing part of the CAD systems for detecting
breast cancer in its early stage using digital mammograms. The aim
of this book is to stimulate further research in medical imaging
applications based algorithmic and computer based approaches and
utilize them in real-world clinical applications. The book is
divided into four parts, Part-I: Clinical Applications of Medical
Imaging, Part-II: Classification and clustering, Part-III: Computer
Aided Diagnosis (CAD) Tools and Case Studies and Part-IV:
Bio-inspiring based Computer Aided diagnosis techniques.
This book explores the fundamentals of smart cities along with
issues, controversies, problems and applications concerning
security and privacy in smart city development. Future smart cities
must incorporate innovations like smart rainwater harvesting, smart
street lighting, digital identity management, solar energy,
intelligent transport systems and emerging communication
applications. The target audience of the book includes
professionals, researchers, academics, advanced-level students,
technology developers, doctors and biologists working in the field
of smart city applications. Professionals will find innovative
ideas for marketing and research, while developers can use various
technologies like IoTand block chain to develop the applications
discussed here. As the book shows, by integrating new technologies,
the cities of the future are becoming a reality today.
Microwave photonics and information optics provide high bandwidth
and precision along with ultrafast speed at a low cost. In order to
reduce noise at the communication trans-receivers, scattering in
the devices needs to be decreased, which can be achieved by
replacing optoelectronic devices with photonic devices because in
the latter only photons propagate electromagnetic waves.
Contemporary Developments in High-Frequency Photonic Devices is a
crucial research book that examines high-frequency photonics and
their applications in communication engineering. Featuring coverage
on a wide range of topics such as metamaterials, optoelectronic
devices, and plasmonics, this book is excellent for students,
researchers, engineers, and professionals.
Advanced techniques in image processing have led to many
innovations supporting the medical field, especially in the area of
disease diagnosis. Biomedical imaging is an essential part of early
disease detection and often considered a first step in the proper
management of medical pathological conditions. Classification and
Clustering in Biomedical Signal Processing focuses on existing and
proposed methods for medical imaging, signal processing, and
analysis for the purposes of diagnosing and monitoring patient
conditions. Featuring the most recent empirical research findings
in the areas of signal processing for biomedical applications with
an emphasis on classification and clustering techniques, this
essential publication is designed for use by medical professionals,
IT developers, and advanced-level graduate students.
This book addresses a broad range of topics concerning machine
learning, big data, the Internet of things (IoT), and security in
the IoT. Its goal is to bring together several innovative studies
on these areas, in order to help researchers, engineers, and
designers in several interdisciplinary domains pursue related
applications. It presents an overview of the various algorithms
used, focusing on the advantages and disadvantages of each in the
fields of machine learning and big data. It also covers
next-generation computing paradigms that are expected to support
wireless networking with high data transfer rates and autonomous
decision-making capabilities. In turn, the book discusses IoT
applications (e.g. healthcare applications) that generate a huge
amount of sensor data and imaging data that must be handled
correctly for further processing. In the traditional IoT ecosystem,
cloud computing offers a solution for the efficient management of
huge amounts of data, thanks to its ability to access shared
resources and provide a common infrastructure in a ubiquitous
manner. Though these new technologies are invaluable, they also
reveal serious IoT security challenges. IoT applications are
vulnerable to various types of attack such as eavesdropping,
spoofing and false data injection, the man-in-the-middle attack,
replay attack, denial-of-service attack, jamming attack, flooding
attack, etc. These and other security issues in the Internet of
things are explored in detail. In addition to highlighting
outstanding research and recent advances from around the globe, the
book reports on current challenges and future directions in the
IoT. Accordingly, it offers engineers, professionals, researchers,
and designers an applied-oriented resource to support them in a
broad range of interdisciplinary areas.
The main target of this book is to raise the awareness about social
networking systems design, implementation, security requirements,
and approaches. The book entails related issues including
computing, engineering, security, management, and organization
policy. It interprets the design, implementation and security
threats in the social networks and offers some solutions in this
concern. It clarifies the authentication concept between servers to
identity users. Most of the models that focus on protecting users'
information are also included. This book introduces the
Human-Interactive Security Protocols (HISPs) efficiently.
Presenting different types of the social networking systems
including the internet and mobile devices is one of the main
targets of this book. This book includes the social network
performance evaluation metrics. It compares various models and
approaches used in the design of the social networks. This book
includes various applications for the use of the social networks in
the healthcare, e-commerce, crisis management, and academic
applications. The book provides an extensive background for the
development of social network science and its challenges. This book
discusses the social networks integration to offer online services,
such as instant messaging, email, file sharing, transferring
patients' medical reports/images, location-based recommendations
and many other functions. This book provides users, designers,
engineers and managers with the valuable knowledge to build a
better secured information transfer over the social networks. The
book gathers remarkable materials from an international experts'
panel to guide the readers during the analysis, design,
implementation and security achievement for the social network
systems. In this book, theories, practical guidance, and challenges
are included to inspire designers and researchers. The book guides
the engineers, designers, and researchers to exploit the intrinsic
design of the social network systems.
This book explores several problems and their solutions regarding
data analysis and prediction for industrial applications. Machine
learning is a prominent topic in modern industries: its influence
can be felt in many aspects of everyday life, as the world rapidly
embraces big data and data analytics. Accordingly, there is a
pressing need for novel and innovative algorithms to help us find
effective solutions in industrial application areas such as media,
healthcare, travel, finance, and retail. In all of these areas,
data is the crucial parameter, and the main key to unlocking the
value of industry. The book presents a range of intelligent
algorithms that can be used to filter useful information in the
above-mentioned application areas and efficiently solve particular
problems. Its main objective is to raise awareness for this
important field among students, researchers, and industrial
practitioners.
Video is one of the most important forms of multimedia available,
as it is utilized for security purposes, to transmit information,
promote safety, and provide entertainment. As motion is the most
integral element in videos, it is important that motion detection
systems and algorithms meet specific requirements to achieve
accurate detection of real time events. Feature Detectors and
Motion Detection in Video Processing explores innovative methods
and approaches to analyzing and retrieving video images. Featuring
empirical research and significant frameworks regarding feature
detectors and descriptor algorithms, the book is a critical
reference source for professionals, researchers, advanced-level
students, technology developers, and academicians.
This book highlights state-of-the-art research on big data and the
Internet of Things (IoT), along with related areas to ensure
efficient and Internet-compatible IoT systems. It not only
discusses big data security and privacy challenges, but also
energy-efficient approaches to improving virtual machine placement
in cloud computing environments. Big data and the Internet of
Things (IoT) are ultimately two sides of the same coin, yet
extracting, analyzing and managing IoT data poses a serious
challenge. Accordingly, proper analytics infrastructures/platforms
should be used to analyze IoT data. Information technology (IT)
allows people to upload, retrieve, store and collect information,
which ultimately forms big data. The use of big data analytics has
grown tremendously in just the past few years. At the same time,
the IoT has entered the public consciousness, sparking people's
imaginations as to what a fully connected world can offer. Further,
the book discusses the analysis of real-time big data to derive
actionable intelligence in enterprise applications in several
domains, such as in industry and agriculture. It explores possible
automated solutions in daily life, including structures for smart
cities and automated home systems based on IoT technology, as well
as health care systems that manage large amounts of data (big data)
to improve clinical decisions. The book addresses the security and
privacy of the IoT and big data technologies, while also revealing
the impact of IoT technologies on several scenarios in smart cities
design. Intended as a comprehensive introduction, it offers
in-depth analysis and provides scientists, engineers and
professionals the latest techniques, frameworks and strategies used
in IoT and big data technologies.
This comprehensive book focuses on better big-data security for
healthcare organizations. Following an extensive introduction to
the Internet of Things (IoT) in healthcare including challenging
topics and scenarios, it offers an in-depth analysis of medical
body area networks with the 5th generation of IoT communication
technology along with its nanotechnology. It also describes a novel
strategic framework and computationally intelligent model to
measure possible security vulnerabilities in the context of
e-health. Moreover, the book addresses healthcare systems that
handle large volumes of data driven by patients' records and
health/personal information, including big-data-based knowledge
management systems to support clinical decisions. Several of the
issues faced in storing/processing big data are presented along
with the available tools, technologies and algorithms to deal with
those problems as well as a case study in healthcare analytics.
Addressing trust, privacy, and security issues as well as the IoT
and big-data challenges, the book highlights the advances in the
field to guide engineers developing different IoT devices and
evaluating the performance of different IoT techniques.
Additionally, it explores the impact of such technologies on
public, private, community, and hybrid scenarios in healthcare.
This book offers professionals, scientists and engineers the latest
technologies, techniques, and strategies for IoT and big data.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R369
Discovery Miles 3 690
Loot
Nadine Gordimer
Paperback
(2)
R398
R369
Discovery Miles 3 690
|