International Journal of Software Science and Computational Intelligence, Issue 3

International Journal of Software Science and Computational Intelligence, Issue 3

Author: Yingxu Wang

Publisher: IGI Publishing

Published: 2010

Total Pages: 110

ISBN-13: 9781613502648

DOWNLOAD EBOOK

The latest developments in computer science, theoretical software engineering, cognitive science, cognitive informatics, intelligence science, and the crystallization of accumulated knowledge by the fertilization of these areas, have led to the emergence of a transdisciplinary and convergence field known as software and intelligence sciences International Journal of Software Science and Computational Intelligence (IJSSCI) is a transdisciplinary, archived, and rigorously refereed journal that publishes and disseminates cutting-edge research findings and technological developments in the emerging fields of software science and computational intelligence, as well as their engineering applications.


Secure Searchable Encryption and Data Management

Secure Searchable Encryption and Data Management

Author: Brij B. Gupta

Publisher: CRC Press

Published: 2021-03-16

Total Pages: 93

ISBN-13: 1000351203

DOWNLOAD EBOOK

With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it’s a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.


Embedded Devices and Internet of Things

Embedded Devices and Internet of Things

Author: Adesh Kumar

Publisher: CRC Press

Published: 2024-09-11

Total Pages: 361

ISBN-13: 1040113893

DOWNLOAD EBOOK

The text comprehensively discusses machine-to-machine communication in real-time, low-power system design and estimation using field programmable gate arrays, PID, hardware, accelerators, and software integration for service applications. It further covers the recent advances in embedded computing and IoT for healthcare systems. The text explains the use of low-power devices such as microcontrollers in executing deep neural networks, and other machine learning techniques. This book: Discusses the embedded system software and hardware methodologies for system-on-chip and FPGA Illustrates low-power embedded applications, AI-based system design, PID control design, and CNN hardware design Highlights the integration of advanced 5G communication technologies with embedded systems Explains weather prediction modeling, embedded machine learning, and RTOS Highlights the significance of machine-learning techniques on the Internet of Things (IoT), real-time embedded system design, communication, and healthcare applications, and provides insights on IoT applications in education, fault attacks, security concerns, AI integration, banking, blockchain, intelligent tutoring systems, and smart technologies It is primarily written for senior undergraduates, graduate students, and academic researchers in the fields of electrical engineering, electronics and communications engineering, and computer engineering.


Software and Intelligent Sciences: New Transdisciplinary Findings

Software and Intelligent Sciences: New Transdisciplinary Findings

Author: Wang, Yingxu

Publisher: IGI Global

Published: 2012-03-31

Total Pages: 293

ISBN-13: 1466602627

DOWNLOAD EBOOK

The junction of software development and engineering combined with the study of intelligence has created a bustling intersection of theory, design, engineering, and conceptual thought.Software and Intelligent Sciences: New Transdisciplinary Findings sits at a crossroads and informs advanced researchers, students, and practitioners on the developments in computer science, theoretical software engineering, cognitive science, cognitive informatics, and intelligence science. The crystallization of accumulated knowledge by the fertilization of these areas, have led to the emergence of a transdisciplinary field known as software and intelligence sciences, to which this book is an important contribution and a resource for both fields alike.


Artificial Intelligence, Blockchain, Computing and Security Volume 2

Artificial Intelligence, Blockchain, Computing and Security Volume 2

Author: Arvind Dagur

Publisher: CRC Press

Published: 2023-12-01

Total Pages: 795

ISBN-13: 1003845835

DOWNLOAD EBOOK

This book contains the conference proceedings of ICABCS 2023, a non-profit conference with the objective to provide a platform that allows academicians, researchers, scholars and students from various institutions, universities and industries in India and abroad to exchange their research and innovative ideas in the field of Artificial Intelligence, Blockchain, Computing and Security. It explores the recent advancement in field of Artificial Intelligence, Blockchain, Communication and Security in this digital era for novice to profound knowledge about cutting edges in artificial intelligence, financial, secure transaction, monitoring, real time assistance and security for advanced stage learners/ researchers/ academicians. The key features of this book are: Broad knowledge and research trends in artificial intelligence and blockchain with security and their role in smart living assistance Depiction of system model and architecture for clear picture of AI in real life Discussion on the role of Artificial Intelligence and Blockchain in various real-life problems across sectors including banking, healthcare, navigation, communication, security Explanation of the challenges and opportunities in AI and Blockchain based healthcare, education, banking, and related industries This book will be of great interest to researchers, academicians, undergraduate students, postgraduate students, research scholars, industry professionals, technologists, and entrepreneurs.


Distributed Denial of Service (DDoS) Attacks

Distributed Denial of Service (DDoS) Attacks

Author: Brij B. Gupta

Publisher: CRC Press

Published: 2021-03-01

Total Pages: 124

ISBN-13: 1000347079

DOWNLOAD EBOOK

The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them. Features: Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classification of defensive mechanisms on the basis of deployment location, the types of defensive action, and the solutions offering economic incentives. Introduces chapters discussing the various types of DDoS attack associated with different layers of security, an attacker’s motivations, and the importance of incentives and liabilities in any defensive solution. Illustrates the role of fair resource-allocation schemes, separate payment mechanisms for attackers and legitimate users, negotiation models on cost and types of resources, and risk assessments and transfer mechanisms. DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures is designed for the readers who have an interest in the cybersecurity domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals who are focusing on developing defensive schemes and applications for detecting or mitigating the DDoS attacks, and faculty members across different universities.