Soft Computing in Data Analytics

Soft Computing in Data Analytics

Author: Janmenjoy Nayak

Publisher: Springer

Published: 2018-08-21

Total Pages: 848

ISBN-13: 9811305145

DOWNLOAD EBOOK

The volume contains original research findings, exchange of ideas and dissemination of innovative, practical development experiences in different fields of soft and advance computing. It provides insights into the International Conference on Soft Computing in Data Analytics (SCDA). It also concentrates on both theory and practices from around the world in all the areas of related disciplines of soft computing. The book provides rapid dissemination of important results in soft computing technologies, a fusion of research in fuzzy logic, evolutionary computations, neural science and neural network systems and chaos theory and chaotic systems, swarm based algorithms, etc. The book aims to cater the postgraduate students and researchers working in the discipline of computer science and engineering along with other engineering branches.


Cyber Security Using Modern Technologies

Cyber Security Using Modern Technologies

Author: Om Pal

Publisher: CRC Press

Published: 2023-08-02

Total Pages: 351

ISBN-13: 1000908062

DOWNLOAD EBOOK

The main objective of this book is to introduce cyber security using modern technologies such as Artificial Intelligence, Quantum Cryptography, and Blockchain. This book provides in-depth coverage of important concepts related to cyber security. Beginning with an introduction to Quantum Computing, Post-Quantum Digital Signatures, and Artificial Intelligence for cyber security of modern networks and covering various cyber-attacks and the defense measures, strategies, and techniques that need to be followed to combat them, this book goes on to explore several crucial topics, such as security of advanced metering infrastructure in smart grids, key management protocols, network forensics, intrusion detection using machine learning, cloud computing security risk assessment models and frameworks, cyber-physical energy systems security, a biometric random key generator using deep neural network and encrypted network traffic classification. In addition, this book provides new techniques to handle modern threats with more intelligence. It also includes some modern techniques for cyber security, such as blockchain for modern security, quantum cryptography, and forensic tools. Also, it provides a comprehensive survey of cutting-edge research on the cyber security of modern networks, giving the reader a general overview of the field. It also provides interdisciplinary solutions to protect modern networks from any type of attack or manipulation. The new protocols discussed in this book thoroughly examine the constraints of networks, including computation, communication, and storage cost constraints, and verifies the protocols both theoretically and experimentally. Written in a clear and comprehensive manner, this book would prove extremely helpful to readers. This unique and comprehensive solution for the cyber security of modern networks will greatly benefit researchers, graduate students, and engineers in the fields of cryptography and network security.


Recent Developments in Data Science and Business Analytics

Recent Developments in Data Science and Business Analytics

Author: Madjid Tavana

Publisher: Springer

Published: 2018-03-27

Total Pages: 494

ISBN-13: 3319727451

DOWNLOAD EBOOK

This edited volume is brought out from the contributions of the research papers presented in the International Conference on Data Science and Business Analytics (ICDSBA- 2017), which was held during September 23-25 2017 in ChangSha, China. As we all know, the field of data science and business analytics is emerging at the intersection of the fields of mathematics, statistics, operations research, information systems, computer science and engineering. Data science and business analytics is an interdisciplinary field about processes and systems to extract knowledge or insights from data. Data science and business analytics employ techniques and theories drawn from many fields including signal processing, probability models, machine learning, statistical learning, data mining, database, data engineering, pattern recognition, visualization, descriptive analytics, predictive analytics, prescriptive analytics, uncertainty modeling, big data, data warehousing, data compression, computer programming, business intelligence, computational intelligence, and high performance computing among others. The volume contains 55 contributions from diverse areas of Data Science and Business Analytics, which has been categorized into five sections, namely: i) Marketing and Supply Chain Analytics; ii) Logistics and Operations Analytics; iii) Financial Analytics. iv) Predictive Modeling and Data Analytics; v) Communications and Information Systems Analytics. The readers shall not only receive the theoretical knowledge about this upcoming area but also cutting edge applications of this domains.


Fuzzy Multi-Criteria Decision Making

Fuzzy Multi-Criteria Decision Making

Author: Cengiz Kahraman

Publisher: Springer Science & Business Media

Published: 2008-08-09

Total Pages: 591

ISBN-13: 0387768130

DOWNLOAD EBOOK

This work examines all the fuzzy multicriteria methods recently developed, such as fuzzy AHP, fuzzy TOPSIS, interactive fuzzy multiobjective stochastic linear programming, fuzzy multiobjective dynamic programming, grey fuzzy multiobjective optimization, fuzzy multiobjective geometric programming, and more. Each of the 22 chapters includes practical applications along with new developments/results. This book may be used as a textbook in graduate operations research, industrial engineering, and economics courses. It will also be an excellent resource, providing new suggestions and directions for further research, for computer programmers, mathematicians, and scientists in a variety of disciplines where multicriteria decision making is needed.


Advances in Big Data and Cloud Computing

Advances in Big Data and Cloud Computing

Author: Elijah Blessing Rajsingh

Publisher: Springer

Published: 2018-04-06

Total Pages: 402

ISBN-13: 9811072000

DOWNLOAD EBOOK

This book is a compendium of the proceedings of the International Conference on Big-Data and Cloud Computing. It includes recent advances in the areas of big data analytics, cloud computing, the Internet of nano things, cloud security, data analytics in the cloud, smart cities and grids, etc. Primarily focusing on the application of knowledge that promotes ideas for solving the problems of the society through cutting-edge technologies, it provides novel ideas that further world-class research and development. This concise compilation of articles approved by a panel of expert reviewers is an invaluable resource for researchers in the area of advanced engineering sciences.


Future Intent-Based Networking

Future Intent-Based Networking

Author: Mikhailo Klymash

Publisher: Springer Nature

Published: 2021-12-09

Total Pages: 531

ISBN-13: 3030924351

DOWNLOAD EBOOK

So-called Intent-Based Networking (IBN) is founded on well-known SDN (Software-Defined Networking) and represents one of the most important emerging network infrastructure opportunities. The IBN is the beginning of a new era in the history of networking, where the network itself translates business intentions into appropriate network configurations for all devices. This minimizes manual effort, provides an additional layer of network monitoring, and provides the ability to perform network analytics and take full advantage of machine learning. The centralized, software-defined solution provides process automation and proactive problem solving as well as centralized management of the network infrastructure. With software-based network management, many operations can be performed automatically using intelligent control algorithms (artificial intelligence and machine learning). As a result, network operation costs, application response times and energy consumption are reduced, network reliability and performance are improved, network security and flexibility are enhanced. This will be a benefit for existing networks as well as evolved LTE-based mobile networks, emerging Internet of Things (IoT), Cloud systems, and soon for the future 5G/6G networks. The future networks will reach a whole new level of self-awareness, self-configuration, self-optimization, self-recovery and self-protection. This volume consists of 28 chapters, based on recent research on IBN.The volume is a collection of the most important research for the future intent-based networking deployment provided by different groups of researchers from Ukraine, Germany, Slovak Republic, Switzerland, South Korea, China, Czech Republic, Poland, Brazil, Belarus and Israel. The authors of the chapters from this collection present in depth extended research results in their scientific fields.The presented contents are highly interesting while still being rather practically oriented and straightforward to understand. Herewith we would like to wish all our readers a lot of inspiration by studying of the volume!


Network Anomaly Detection

Network Anomaly Detection

Author: Dhruba Kumar Bhattacharyya

Publisher: CRC Press

Published: 2013-06-18

Total Pages: 364

ISBN-13: 146658209X

DOWNLOAD EBOOK

With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of network attacks, network intrusion detection has become increasingly important. Anomaly-based network intrusion detection refers to finding exceptional or nonconforming patterns in network traffic data compared to normal behavi


Machine Learning in Intrusion Detection

Machine Learning in Intrusion Detection

Author: Yihua Liao

Publisher:

Published: 2005

Total Pages: 230

ISBN-13:

DOWNLOAD EBOOK

Detection of anomalies in data is one of the fundamental machine learning tasks. Anomaly detection provides the core technology for a broad spectrum of security-centric applications. In this dissertation, we examine various aspects of anomaly based intrusion detection in computer security. First, we present a new approach to learn program behavior for intrusion detection. Text categorization techniques are adopted to convert each process to a vector and calculate the similarity between two program activities. Then the k-nearest neighbor classifier is employed to classify program behavior as normal or intrusive. We demonstrate that our approach is able to effectively detect intrusive program behavior while a low false positive rate is achieved. Second, we describe an adaptive anomaly detection framework that is de- signed to handle concept drift and online learning for dynamic, changing environments. Through the use of unsupervised evolving connectionist systems, normal behavior changes are efficiently accommodated while anomalous activities can still be recognized. We demonstrate the performance of our adaptive anomaly detection systems and show that the false positive rate can be significantly reduced.


Decision Making with Spherical Fuzzy Sets

Decision Making with Spherical Fuzzy Sets

Author: Cengiz Kahraman

Publisher: Springer Nature

Published: 2020-05-27

Total Pages: 551

ISBN-13: 3030454614

DOWNLOAD EBOOK

This book introduces readers to the novel concept of spherical fuzzy sets, showing how these sets can be applied in practice to solve various decision-making problems. It also demonstrates that these sets provide a larger preference volume in 3D space for decision-makers. Written by authoritative researchers, the various chapters cover a large amount of theoretical and practical information, allowing readers to gain an extensive understanding of both the fundamentals and applications of spherical fuzzy sets in intelligent decision-making and mathematical programming.