This book is a collection of papers from the 2009 International Conference on Signals, Systems and Automation (ICSSA 2009). The conference at a glance: - Pre-conference Workshops/Tutorials on 27th Dec, 2009 - Five Plenary talks - Paper/Poster Presentation: 28-29 Dec, 2009 - Demonstrations by SKYVIEWInc, SLS Inc., BSNL, Baroda Electric Meters, SIS - On line paper submission facility on website - 200+ papers are received from India and abroad - Delegates from different countries including Poland, Iran, USA - Delegates from 16 states of India - Conference website is seen by more than 3000 persons across the world (27 countries and 120 cities)
The International Conference on Signals, Systems and Automation (ICSSA 2011) aims to spread awareness in the research and academic community regarding cutting-edge technological advancements revolutionizing the world. The main emphasis of this conference is on dissemination of information, experience, and research results on the current topics of interest through in-depth discussions and participation of researchers from all over the world. The objective is to provide a platform to scientists, research scholars, and industrialists for interacting and exchanging ideas in a number of research areas. This will facilitate communication among researchers in different fields of Electronics and Communication Engineering. The International Conference on Intelligent System and Data Processing (ICISD 2011) is organized to address various issues that will foster the creation of intelligent solutions in the future. The primary goal of the conference is to bring together worldwide leading researchers, developers, practitioners, and educators interested in advancing the state of the art in computational intelligence and data processing for exchanging knowledge that encompasses a broad range of disciplines among various distinct communities. Another goal is to promote scientific information interchange between researchers, developers, engineers, students, and practitioners working in India and abroad.
This volume constitutes the third of three parts of the refereed proceedings of the First International Conference on Computer Science and Information Technology, CCSIT 2010, held in Bangalore, India, in January 2011. The 46 revised full papers presented in this volume were carefully reviewed and selected. The papers are organized in topical sections on soft computing, such as AI, Neural Networks, Fuzzy Systems, etc.; distributed and parallel systems and algorithms; security and information assurance; ad hoc and ubiquitous computing; wireless ad hoc networks and sensor networks.
This book constitutes the proceedings of the 13th conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems, held in Dortmund, Germany, in June 2010.
This volume is based on the proceedings of the 28th International Conference on CAD/CAM, Robotics and Factories of the Future. This book specially focuses on the positive changes made in the field of robotics, CAD/CAM and future outlook for emerging manufacturing units. Some of the important topics discussed in the conference are product development and sustainability, modeling and simulation, automation, robotics and handling systems, supply chain management and logistics, advanced manufacturing processes, human aspects in engineering activities, emerging scenarios in engineering education and training. The contents of this set of proceedings will prove useful to both researchers and practitioners.
This book presents advances in security assurance for cyber-physical systems (CPS) and report on new machine learning (ML) and artificial intelligence (AI) approaches and technologies developed by the research community and the industry to address the challenges faced by this emerging field. Cyber-physical systems bridge the divide between cyber and physical-mechanical systems by combining seamlessly software systems, sensors, and actuators connected over computer networks. Through these sensors, data about the physical world can be captured and used for smart autonomous decision-making. This book introduces fundamental AI/ML principles and concepts applied in developing secure and trustworthy CPS, disseminates recent research and development efforts in this fascinating area, and presents relevant case studies, examples, and datasets. We believe that it is a valuable reference for students, instructors, researchers, industry practitioners, and related government agencies staff.
This book presents the latest developments in biometrics technologies and reports on new approaches, methods, findings, and technologies developed or being developed by the research community and the industry. The book focuses on introducing fundamental principles and concepts of key enabling technologies for biometric systems applied for both physical and cyber security. The authors disseminate recent research and developing efforts in this area, investigate related trends and challenges, and present case studies and examples such as fingerprint, face, iris, retina, keystroke dynamics, and voice applications . The authors also investigate the advances and future outcomes in research and development in biometric security systems. The book is applicable to students, instructors, researchers, industry practitioners, and related government agencies staff. Each chapter is accompanied by a set of PowerPoint slides for use by instructors.
The ability to create intelligent machines has intrigued humans since ancient times, and today with the advent of the computer and 50 years of research into AI programming techniques, the dream of smart machines is becoming a reality. The concept of human-computer interfaces has been undergoing changes over the years. In carrying out the most important tasks is the lack of formalized application methods, mathematical models and advanced computer support. The evolution of biological systems to adapt to their environment has fascinated and challenged scientists to increase their level of understanding of the functional characteristics of such systems. This book has 19 chapters and explain that the expert systems are products of the artificial intelligence, branch of computer science that seeks to develop intelligent programs for human, materials and automation.
This book presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018. The conference focuses on challenges with respect to the dependability of integrated applications and intelligence-driven security threats against the platforms supporting these applications. The WIDECOM 2018 proceedings features papers addressing issues related to the new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems. The proceeding is a valuable reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners, in industry, in the aforementioned areas. The book’s structure and content is organized in such a manner that makes it useful at a variety of learning levels. Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2018), organized by SRM University, NCR Campus, New Delhi, India, February 16-18, 2018; Includes an array of topics related to new dependability paradigms, design, control, and management of next generation networks, performance of dependable network computing and mobile systems, protocols that deal with network computing, mobile/ubiquitous systems, cloud systems, and Internet of Things (IoT) systems; Addresses issues related to the design and performance of dependable network computing and systems and to the security of these systems.
"This book presents the emerging fields of service intelligence and service science, positioning them as the most promising directions for the evolution of service computing, demonstrating the critical role such areas play in supporting service computing processes"--Provided by publisher.