International Journal of Software Science and Computational Intelligence (IJSSCI) Volume 9
Author: Yingxu Wang
Publisher:
Published: 2017
Total Pages: 93
ISBN-13: 9781522512745
DOWNLOAD EBOOKRead and Download eBook Full
Author: Yingxu Wang
Publisher:
Published: 2017
Total Pages: 93
ISBN-13: 9781522512745
DOWNLOAD EBOOKAuthor: Yingxu Wang
Publisher:
Published: 2017
Total Pages: 85
ISBN-13: 9781522512738
DOWNLOAD EBOOKAuthor: Yingxu Wang
Publisher:
Published: 2017
Total Pages: 93
ISBN-13: 9781522512714
DOWNLOAD EBOOKAuthor: Yingxu Wang
Publisher: IGI Publishing
Published: 2010
Total Pages: 110
ISBN-13: 9781613502648
DOWNLOAD EBOOKThe latest developments in computer science, theoretical software engineering, cognitive science, cognitive informatics, intelligence science, and the crystallization of accumulated knowledge by the fertilization of these areas, have led to the emergence of a transdisciplinary and convergence field known as software and intelligence sciences International Journal of Software Science and Computational Intelligence (IJSSCI) is a transdisciplinary, archived, and rigorously refereed journal that publishes and disseminates cutting-edge research findings and technological developments in the emerging fields of software science and computational intelligence, as well as their engineering applications.
Author: Brij B. Gupta
Publisher: CRC Press
Published: 2021-03-16
Total Pages: 93
ISBN-13: 1000351203
DOWNLOAD EBOOKWith the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it’s a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.
Author: Adesh Kumar
Publisher: CRC Press
Published: 2024-09-11
Total Pages: 361
ISBN-13: 1040113893
DOWNLOAD EBOOKThe text comprehensively discusses machine-to-machine communication in real-time, low-power system design and estimation using field programmable gate arrays, PID, hardware, accelerators, and software integration for service applications. It further covers the recent advances in embedded computing and IoT for healthcare systems. The text explains the use of low-power devices such as microcontrollers in executing deep neural networks, and other machine learning techniques. This book: Discusses the embedded system software and hardware methodologies for system-on-chip and FPGA Illustrates low-power embedded applications, AI-based system design, PID control design, and CNN hardware design Highlights the integration of advanced 5G communication technologies with embedded systems Explains weather prediction modeling, embedded machine learning, and RTOS Highlights the significance of machine-learning techniques on the Internet of Things (IoT), real-time embedded system design, communication, and healthcare applications, and provides insights on IoT applications in education, fault attacks, security concerns, AI integration, banking, blockchain, intelligent tutoring systems, and smart technologies It is primarily written for senior undergraduates, graduate students, and academic researchers in the fields of electrical engineering, electronics and communications engineering, and computer engineering.
Author: Wang, Yingxu
Publisher: IGI Global
Published: 2012-03-31
Total Pages: 293
ISBN-13: 1466602627
DOWNLOAD EBOOKThe junction of software development and engineering combined with the study of intelligence has created a bustling intersection of theory, design, engineering, and conceptual thought.Software and Intelligent Sciences: New Transdisciplinary Findings sits at a crossroads and informs advanced researchers, students, and practitioners on the developments in computer science, theoretical software engineering, cognitive science, cognitive informatics, and intelligence science. The crystallization of accumulated knowledge by the fertilization of these areas, have led to the emergence of a transdisciplinary field known as software and intelligence sciences, to which this book is an important contribution and a resource for both fields alike.
Author: Arvind Dagur
Publisher: CRC Press
Published: 2023-12-01
Total Pages: 795
ISBN-13: 1003845835
DOWNLOAD EBOOKThis book contains the conference proceedings of ICABCS 2023, a non-profit conference with the objective to provide a platform that allows academicians, researchers, scholars and students from various institutions, universities and industries in India and abroad to exchange their research and innovative ideas in the field of Artificial Intelligence, Blockchain, Computing and Security. It explores the recent advancement in field of Artificial Intelligence, Blockchain, Communication and Security in this digital era for novice to profound knowledge about cutting edges in artificial intelligence, financial, secure transaction, monitoring, real time assistance and security for advanced stage learners/ researchers/ academicians. The key features of this book are: Broad knowledge and research trends in artificial intelligence and blockchain with security and their role in smart living assistance Depiction of system model and architecture for clear picture of AI in real life Discussion on the role of Artificial Intelligence and Blockchain in various real-life problems across sectors including banking, healthcare, navigation, communication, security Explanation of the challenges and opportunities in AI and Blockchain based healthcare, education, banking, and related industries This book will be of great interest to researchers, academicians, undergraduate students, postgraduate students, research scholars, industry professionals, technologists, and entrepreneurs.
Author: Dr. Hemalatha N.
Publisher: REDSHINE Publication
Published: 2024-08-25
Total Pages: 263
ISBN-13: 9358092459
DOWNLOAD EBOOKAuthor: Brij B. Gupta
Publisher: CRC Press
Published: 2021-03-01
Total Pages: 124
ISBN-13: 1000347079
DOWNLOAD EBOOKThe complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them. Features: Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classification of defensive mechanisms on the basis of deployment location, the types of defensive action, and the solutions offering economic incentives. Introduces chapters discussing the various types of DDoS attack associated with different layers of security, an attacker’s motivations, and the importance of incentives and liabilities in any defensive solution. Illustrates the role of fair resource-allocation schemes, separate payment mechanisms for attackers and legitimate users, negotiation models on cost and types of resources, and risk assessments and transfer mechanisms. DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures is designed for the readers who have an interest in the cybersecurity domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals who are focusing on developing defensive schemes and applications for detecting or mitigating the DDoS attacks, and faculty members across different universities.