This volume contains 73 papers presented at CSI 2014: Emerging ICT for Bridging the Future: Proceedings of the 49th Annual Convention of Computer Society of India. The convention was held during 12-14, December, 2014 at Hyderabad, Telangana, India. This volume contains papers mainly focused on Fuzzy Systems, Image Processing, Software Engineering, Cyber Security and Digital Forensic, E-Commerce, Big Data, Cloud Computing and ICT applications.
This volume contains 70 papers presented at CSI 2014: Emerging ICT for Bridging the Future: Proceedings of the 49th Annual Convention of Computer Society of India. The convention was held during 12-14, December, 2014 at Hyderabad, Telangana, India. This volume contains papers mainly focused on Machine Learning & Computational Intelligence, Ad hoc Wireless Sensor Networks and Networks Security, Data Mining, Data Engineering and Soft Computing.
This book presents the proceedings of the International Conference on Computing Networks, Big Data and IoT [ICCBI 2019], held on December 19–20, 2019 at the Vaigai College of Engineering, Madurai, India. Recent years have witnessed the intertwining development of the Internet of Things and big data, which are increasingly deployed in computer network architecture. As society becomes smarter, it is critical to replace the traditional technologies with modern ICT architectures. In this context, the Internet of Things connects smart objects through the Internet and as a result generates big data. This has led to new computing facilities being developed to derive intelligent decisions in the big data environment. The book covers a variety of topics, including information management, mobile computing and applications, emerging IoT applications, distributed communication networks, cloud computing, and healthcare big data. It also discusses security and privacy issues, network intrusion detection, cryptography, 5G/6G networks, social network analysis, artificial intelligence, human–machine interaction, smart home and smart city applications.
This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2021), held at Jan Wyzykowski University, Poland, during June 2021. The book covers the topics in data analytics, data management, big data, computational intelligence, and communication networks. The book presents innovative work by leading academics, researchers, and experts from industry which is useful for young researchers and students.
The book is a collection of high-quality peer-reviewed research papers presented in the Second International Conference on Computational Intelligence in Data Mining (ICCIDM 2015) held at Bhubaneswar, Odisha, India during 5 – 6 December 2015. The two-volume Proceedings address the difficulties and challenges for the seamless integration of two core disciplines of computer science, i.e., computational intelligence and data mining. The book addresses different methods and techniques of integration for enhancing the overall goal of data mining. The book helps to disseminate the knowledge about some innovative, active research directions in the field of data mining, machine and computational intelligence, along with some current issues and applications of related topics.
This book presents high-quality research papers that demonstrate how emerging technologies in the field of intelligent systems can be used to effectively meet global needs. The respective papers highlight a wealth of innovations and experimental results, while also addressing proven IT governance, standards and practices, and new designs and tools that facilitate rapid information flows to the user. The book is divided into five major sections, namely: “Advances in High Performance Computing”, “Advances in Machine and Deep Learning”, “Advances in Networking and Communication”, “Advances in Circuits and Systems in Computing” and “Advances in Control and Soft Computing”.
This book aims at offering a unique collection of ideas and experiences mainly focusing on the main streams and merger of Artificial Intelligence (AI) and the Internet of Things (IoT) for a wide slice of the communication and networking community. In the era when the world is grappling with many unforeseen challenges, scientists and researchers are envisioning smart cyber systems that guarantee sustainable development for a better human life. The main contributors that destined to play a huge role in developing such systems, among others, are AI and IoT. While AI provides intelligence to machines and data by identifying patterns, developing predictions, and detecting anomalies, IoT performs as a nerve system by connecting a huge number of machines and capturing an enormous amount of data. AI-enabled IoT, therefore, redefines the way industries, businesses, and economies function with increased automation and efficiency and reduced human interaction and costs. This book is an attempt to publish innovative ideas, emerging trends, implementation experience, and use-cases pertaining to the merger of AI and IoT. The primary market of this book is centered around students, researchers, academicians, industrialists, entrepreneurs, and professionals working in electrical/computer engineering, IT, telecom/electronic engineering, and related fields. The secondary market of this book is related to individuals working in the fields such as finance, management, mathematics, physics, environment, mechatronics, and the automation industry.
This book presents architectural solutions of wireless network and its variations. It basically deals with modeling, analysis, design and enhancement of different architectural parts of wireless network. The main aim of this book is to enhance the applications of wireless network by reducing and controlling its architectural issues. The book discusses efficiency and robustness of wireless network as a platform for communication and data transmission and also discusses some challenges and security issues such as limited hardware resources, unreliable communication, dynamic topology of some wireless networks, vulnerability and unsecure environment. This book is edited for users, academicians and researchers of wireless network. Broadly, topics include modeling of security enhancements, optimization model for network lifetime, modeling of aggregation systems and analyzing of troubleshooting techniques.