Researchers in the evolving fields of artificial intelligence and information systems are constantly presented with new challenges. Artificial Intelligence and Integrated Intelligent Information Systems: Emerging Technologies and Applications provides both researchers and professionals with the latest knowledge applied to customized logic systems, agent-based approaches to modeling, and human-based models. Artificial Intelligence and Integrated Intelligent Information Systems: Emerging Technologies and Applications presents the recent advances in multi-mobile agent systems, the product development process, fuzzy logic systems, neural networks, and ambient intelligent environments among many other innovations in this exciting field.
This book analyses the role of Enterprise Resource Planning (ERP) and Business Intelligence (BI) systems in improving information quality through an empirical analysis carried out in Italy. The study begins with a detailed examination of ERP features that highlights the advantages and disadvantages of ERP adoption. Critical success factors for ERP implementation and post-implementation are then discussed, along with the capabilities of ERP in driving the alignment between management accounting and financial accounting information.The study goes on to illustrate the features of BI systems and to summarize companies’ needs for BI. Critical success factors for BI implementation are then presented, along with the BI maturity model and lifecycle. The focus of the research entails a detailed empirical analysis in the Italian setting designed to investigate the role played by ERP and BI systems in reducing information overload/underload and improving information quality by influencing the features of information flow. The practical and theoretical implications of the study are discussed and future avenues of research are suggested. This book will be of value for all those who have an interest in the capacities of ERP and BI systems to enhance business information quality.
Reflects a decade of leading-edge research on intelligence and security informatics. Dr Chen is researcher at the Artificial Intelligence Laboratory and the NSF COPLINK Center for Homeland Security Information Technology Research. Describes real-world community situations. Targets wide-ranging audience: from researchers in computer science, information management and information science via analysts and policy makers in federal departments and national laboratories to consultants in IT hardware, communication, and software companies.
Annotation In this book, Rick van der Lans explains how data virtualization servers work, what techniques to use to optimize access to various data sources and how these products can be applied in different projects.
Provides insights on how computer engineers can implement artificial intelligence (AI) in real world applications. This book presents practical applications of AI.
This book contains accepted papers presented at CISIS 2020 held in the beautiful and historic city of Burgos (Spain), in September 2020. The aim of the CISIS 2020 conference is to offer a meeting opportunity for academic and industry-related researchers belonging to the various, vast communities of computational intelligence, information security, and data mining. The need for intelligent, flexible behaviour by large, complex systems, especially in mission-critical domains, is intended to be the catalyst and the aggregation stimulus for the overall event. After a thorough peer-review process, the CISIS 2020 International Program Committee selected 43 papers which are published in these conference proceedings achieving an acceptance rate of 28%. Due to the COVID-19 outbreak, the CISIS 2020 edition was blended, combining on-site and on-line participation. In this relevant edition, a special emphasis was put on the organization of five special sessions related to relevant topics as Fake News Detection and Prevention, Mathematical Methods and Models in Cybersecurity, Measurements for a Dynamic Cyber-Risk Assessment, Cybersecurity in a Hybrid Quantum World, Anomaly/Intrusion Detection, and From the least to the least: cryptographic and data analytics solutions to fulfil least minimum privilege and endorse least minimum effort in information systems. The selection of papers was extremely rigorous in order to maintain the high quality of the conference and we would like to thank the members of the Program Committees for their hard work in the reviewing process. This is a crucial process to the creation of a high standard conference, and the CISIS conference would not exist without their help.
The Intelligent Systems Series comprises titles that present state of the art knowledge and the latest advances in intelligent systems. Its scope includes theoretical studies, design methods, and real-world implementations and applications. Traditionally, Intelligence and Security Informatics (ISI) research and applications have focused on information sharing and data mining, social network analysis, infrastructure protection and emergency responses for security informatics. With the continuous advance of IT technologies and the increasing sophistication of national and international security, in recent years, new directions in ISI research and applications have emerged to address complicated problems with advanced technologies. This book provides a comprehensive and interdisciplinary account of the new advances in ISI area along three fundamental dimensions: methodological issues in security informatics; new technological developments to support security-related modeling, detection, analysis and prediction; and applications and integration in interdisciplinary socio-cultural fields. - Identifies emerging directions in ISI research and applications that address the research challenges with advanced technologies - Provides an integrated account of the new advances in ISI field in three core aspects: methodology, technological developments and applications - Benefits researchers as well as security professionals who are involved in cutting-edge research and applications in security informatics and related fields
This book constitutes the refereed proceedings of the 5th International Conference on Information Systems, Technology and Management, ICISTM 2011, held in Gurgaon, India, in March 2011. The 35 revised full papers presented together with 4 short papers were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on information management, information systems, information technology, healthcare information management and technology, business intelligence, applications, as well as management science and education.
Industrial engineering is a branch of engineering dealing with the optimization of complex processes or systems. It is concerned with the development, improvement, implementation and evaluation of production and service systems. Computational Intelligence Systems find a wide application area in industrial engineering: neural networks in forecasting, fuzzy sets in capital budgeting, ant colony optimization in scheduling, Simulated Annealing in optimization, etc. This book will include most of the application areas of industrial engineering through these computational intelligence systems. In the literature, there is no book including many real and practical applications of Computational Intelligence Systems from the point of view of Industrial Engineering. Every chapter will include explanatory and didactic applications. It is aimed that the book will be a main source for MSc and PhD students.
Information and computer technologies for data analysis and processing in various fields of data mining and machine learning generates the conditions for increasing the effectiveness of information processing by making it faster and more accurate. The book includes 49 scientific papers presenting the latest research in the fields of data mining, machine learning and decision-making. Divided into three sections: “Analysis and Modeling of Complex Systems and Processes”; “Theoretical and Applied Aspects of Decision-Making Systems”; and “Computational Intelligence and Inductive Modeling”, the book is of interest to scientists and developers in the field.