Intelligent and Fuzzy Techniques for Emerging Conditions and Digital Transformation

Intelligent and Fuzzy Techniques for Emerging Conditions and Digital Transformation

Author: Cengiz Kahraman

Publisher: Springer Nature

Published: 2021-08-23

Total Pages: 954

ISBN-13: 3030856267

DOWNLOAD EBOOK

This book presents recent research in intelligent and fuzzy techniques. Emerging conditions such as pandemic, wars, natural disasters and various high technologies force people for significant changes in business and social life. The adoption of digital technologies to transform services or businesses, through replacing non-digital or manual processes with digital processes or replacing older digital technology with newer digital technologies through intelligent systems is the main scope of this book. It focuses on revealing the reflection of digital transformation in our business and social life under emerging conditions through intelligent and fuzzy systems. The latest intelligent and fuzzy methods and techniques on digital transformation are introduced by theory and applications. The intended readers are intelligent and fuzzy systems researchers, lecturers, M.Sc. and Ph.D. students studying digital transformation. Usage of ordinary fuzzy sets and their extensions, heuristics and metaheuristics from optimization to machine learning, from quality management to risk management makes the book an excellent source for researchers.


A GA-LR wrapper approach for feature selection in network intrusion detection

A GA-LR wrapper approach for feature selection in network intrusion detection

Author: Chaouki Khammassi

Publisher: Infinite Study

Published:

Total Pages: 23

ISBN-13:

DOWNLOAD EBOOK

Intrusions constitute one of the main issues in computer network security.Through malicious actions, hackers can have unauthorised access that compromises the integrity, the confidentiality,and the availability of resources or services.Intrusion detection systems (IDSs) have been developed to monitor and filter network activities by identifying attacks and alerting network administrators.


Computer Security

Computer Security

Author: William Stallings

Publisher: Pearson Higher Ed

Published: 2012-02-28

Total Pages: 817

ISBN-13: 0133072630

DOWNLOAD EBOOK

This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. Computer Security: Principles and Practice, 2e, is ideal for courses in Computer/Network Security. In recent years, the need for education in computer security and related topics has grown dramatically – and is essential for anyone studying Computer Science or Computer Engineering. This is the only text available to provide integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. In addition to an extensive pedagogical program, the book provides unparalleled support for both research and modeling projects, giving students a broader perspective. The Text and Academic Authors Association named Computer Security: Principles and Practice, 1e, the winner of the Textbook Excellence Award for the best Computer Science textbook of 2008.


Service Chain Management

Service Chain Management

Author: Christos Voudouris

Publisher: Springer Science & Business Media

Published: 2007-12-18

Total Pages: 304

ISBN-13: 3540755047

DOWNLOAD EBOOK

Service chain management enables service organisations to improve customer satisfaction and reduce operational costs. In this book, Christos Voudouris and his BT colleagues together with experts from industry and academia present the latest innovations and technologies used to manage the operations of a service company. The viewpoints presented are based on the BT experience and on associated research and development. Service chain management is looked at both from the enterprise perspective and from the standpoints of the service professional and customer. The focus is on real-world challenges.


Soft Computing in Data Analytics

Soft Computing in Data Analytics

Author: Janmenjoy Nayak

Publisher: Springer

Published: 2018-08-21

Total Pages: 848

ISBN-13: 9811305145

DOWNLOAD EBOOK

The volume contains original research findings, exchange of ideas and dissemination of innovative, practical development experiences in different fields of soft and advance computing. It provides insights into the International Conference on Soft Computing in Data Analytics (SCDA). It also concentrates on both theory and practices from around the world in all the areas of related disciplines of soft computing. The book provides rapid dissemination of important results in soft computing technologies, a fusion of research in fuzzy logic, evolutionary computations, neural science and neural network systems and chaos theory and chaotic systems, swarm based algorithms, etc. The book aims to cater the postgraduate students and researchers working in the discipline of computer science and engineering along with other engineering branches.


Linux Dictionary

Linux Dictionary

Author: Binh Nguyen

Publisher: Binh Nguyen

Published:

Total Pages: 1761

ISBN-13:

DOWNLOAD EBOOK

This document is designed to be a resource for those Linux users wishing to seek clarification on Linux/UNIX/POSIX related terms and jargon. At approximately 24000 definitions and two thousand pages it is one of the largest Linux related dictionaries currently available. Due to the rapid rate at which new terms are being created it has been decided that this will be an active project. We welcome input into the content of this document. At this moment in time half yearly updates are being envisaged. Please note that if you wish to find a 'Computer Dictionary' then see the 'Computer Dictionary Project' at http://computerdictionary.tsf.org.za/ Searchable databases exist at locations such as: http://www.swpearl.com/eng/scripts/dictionary/ (SWP) Sun Wah-PearL Linux Training and Development Centre is a centre of the Hong Kong Polytechnic University, established in 2000. Presently SWP is delivering professional grade Linux and related Open Source Software (OSS) technology training and consultant service in Hong Kong. SWP has an ambitious aim to promote the use of Linux and related Open Source Software (OSS) and Standards. The vendor independent positioning of SWP has been very well perceived by the market. Throughout the last couple of years, SWP becomes the Top Leading OSS training and service provider in Hong Kong. http://www.geona.com/dictionary?b= Geona, operated by Gold Vision Communications, is a new powerful search engine and internet directory, delivering quick and relevant results on almost any topic or subject you can imagine. The term "Geona" is an Italian and Hebrew name, meaning wisdom, exaltation, pride or majesty. We use our own database of spidered web sites and the Open Directory database, the same database which powers the core directory services for the Web's largest and most popular search engines and portals. Geona is spidering all domains listed in the non-adult part of the Open Directory and millions of additional sites of general interest to maintain a fulltext index of highly relevant web sites. http://www.linuxdig.com/documents/dictionary.php LINUXDIG.COM, "Yours News and Resource Site", LinuxDig.com was started in May 2001 as a hobby site with the original intention of getting the RFC's online and becoming an Open Source software link/download site. But since that time the site has evolved to become a RFC distribution site, linux news site and a locally written technology news site (with bad grammer :)) with focus on Linux while also containing articles about anything and everything we find interesting in the computer world. LinuxDig.Com contains about 20,000 documents and this number is growing everyday! http://linux.about.com/library/glossary/blglossary.htm Each month more than 20 million people visit About.com. Whether it be home repair and decorating ideas, recipes, movie trailers, or car buying tips, our Guides offer practical advice and solutions for every day life. Wherever you land on the new About.com, you'll find other content that is relevant to your interests. If you're looking for "How To" advice on planning to re-finish your deck, we'll also show you the tools you need to get the job done. If you've been to About before, we'll show you the latest updates, so you don't see the same thing twice. No matter where you are on About.com, or how you got here, you'll always find content that is relevant to your needs. Should you wish to possess your own localised searcheable version please make use of the available "dict", http://www.dict.org/ version at the Linux Documentation Project home page, http://www.tldp.org/ The author has decided to leave it up to readers to determine how to install and run it on their specific systems. An alternative form of the dictionary is available at: http://elibrary.fultus.com/covers/technical/linux/guides/Linux-Dictionary/cover.html Fultus Corporation helps writers and companies to publish, promote, market, and sell books and eBooks. Fultus combines traditional self-publishing practices with modern technology to produce paperback and hardcover print-on-demand (POD) books and electronic books (eBooks). Fultus publishes works (fiction, non-fiction, science fiction, mystery, ...) by both published and unpublished authors. We enable you to self-publish easily and cost-effectively, creating your book as a print-ready paperback or hardcover POD book or as an electronic book (eBook) in multiple eBook's formats. You retain all rights to your work. We provide distribution to bookstores worldwide. And all at a fraction of the cost of traditional publishing. We also offer corporate publishing solutions that enable businesses to produce and deliver manuals and documentation more efficiently and economically. Our use of electronic delivery and print-on-demand technologies reduces printed inventory and saves time. Please inform the author as to whether you would like to create a database or an alternative form of the dictionary so that he can include you in this list. Also note that the author considers breaches of copyright to be extremely serious. He will pursue all claims to the fullest extent of the law.


Network Anomaly Detection

Network Anomaly Detection

Author: Dhruba Kumar Bhattacharyya

Publisher: CRC Press

Published: 2013-06-18

Total Pages: 364

ISBN-13: 146658209X

DOWNLOAD EBOOK

With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of network attacks, network intrusion detection has become increasingly important. Anomaly-based network intrusion detection refers to finding exceptional or nonconforming patterns in network traffic data compared to normal behavi


Software Engineering Methods in Intelligent Algorithms

Software Engineering Methods in Intelligent Algorithms

Author: Radek Silhavy

Publisher: Springer

Published: 2019-05-07

Total Pages: 482

ISBN-13: 3030198073

DOWNLOAD EBOOK

This book presents software engineering methods in the context of the intelligent systems. It discusses real-world problems and exploratory research describing novel approaches and applications of software engineering, software design and algorithms. The book constitutes the refereed proceedings of the Software Engineering Methods in Intelligent Algorithms Section of the 8th Computer Science On-line Conference 2019 (CSOC 2019), held on-line in April 2019.


Network Warrior

Network Warrior

Author: Gary A. Donahue

Publisher: "O'Reilly Media, Inc."

Published: 2011-05-13

Total Pages: 786

ISBN-13: 1449309356

DOWNLOAD EBOOK

Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you’ll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout. Topics include: An in-depth view of routers and routing Switching, using Cisco Catalyst and Nexus switches as examples SOHO VoIP and SOHO wireless access point design and configuration Introduction to IPv6 with configuration examples Telecom technologies in the data-networking world, including T1, DS3, frame relay, and MPLS Security, firewall theory, and configuration, as well as ACL and authentication Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ) IP address allocation, Network Time Protocol (NTP), and device failures


Navigating the Indian Cyberspace Maze

Navigating the Indian Cyberspace Maze

Author: Ashish Chhibbar

Publisher: K W Publishers Pvt Limited

Published: 2020-10-28

Total Pages: 284

ISBN-13: 9789389137477

DOWNLOAD EBOOK

Cyberspace has turned out to be one of the greatest discoveries of mankind. Today, we have more than four-and-a-half billion people connected to the internet and this number is all set to increase dramatically as the next generational Internet of Things (IoT) devices and 5G technology gets fully operational. India has been at the forefront of this amazing digital revolution and is a major stakeholder in the global cyberspace ecosystem. As the world embarks on embracing internet 2.0 characterised by 5G high-speed wireless interconnect, generation of vast quantities of data and domination of transformational technologies of Artificial Intelligence (AI), block chain and big data, India has been presented with a unique opportunity to leapfrog from a developing country to a developed knowledge-based nation in a matter of years and not decades. This book presents an exciting and fascinating journey into the world of cyberspace with focus on the impactful technologies of AI, block chain and Big Data analysis, coupled with an appraisal of the Indian cyberspace ecosystem. It has been written especially for a policymaker in order to provide a lucid overview of the cyberspace domain in adequate detail.