International Journal of Software Science and Computational Intelligence

International Journal of Software Science and Computational Intelligence

Author: Yingxu Wang

Publisher: IGI Publishing

Published: 2010

Total Pages: 116

ISBN-13: 9781609609467

DOWNLOAD EBOOK

The latest developments in computer science, theoretical software engineering, cognitive science, cognitive informatics, intelligence science, and the crystallization of accumulated knowledge by the fertilization of these areas, have led to the emergence of a transdisciplinary and convergence field known as software and intelligence sciences International Journal of Software Science and Computational Intelligence (IJSSCI) is a transdisciplinary, archived, and rigorously refereed journal that publishes and disseminates cutting-edge research findings and technological developments in the emerging fields of software science and computational intelligence, as well as their engineering applications.


Artificial Intelligence, Blockchain, Computing and Security Volume 2

Artificial Intelligence, Blockchain, Computing and Security Volume 2

Author: Arvind Dagur

Publisher: CRC Press

Published: 2023-12-01

Total Pages: 795

ISBN-13: 1003845835

DOWNLOAD EBOOK

This book contains the conference proceedings of ICABCS 2023, a non-profit conference with the objective to provide a platform that allows academicians, researchers, scholars and students from various institutions, universities and industries in India and abroad to exchange their research and innovative ideas in the field of Artificial Intelligence, Blockchain, Computing and Security. It explores the recent advancement in field of Artificial Intelligence, Blockchain, Communication and Security in this digital era for novice to profound knowledge about cutting edges in artificial intelligence, financial, secure transaction, monitoring, real time assistance and security for advanced stage learners/ researchers/ academicians. The key features of this book are: Broad knowledge and research trends in artificial intelligence and blockchain with security and their role in smart living assistance Depiction of system model and architecture for clear picture of AI in real life Discussion on the role of Artificial Intelligence and Blockchain in various real-life problems across sectors including banking, healthcare, navigation, communication, security Explanation of the challenges and opportunities in AI and Blockchain based healthcare, education, banking, and related industries This book will be of great interest to researchers, academicians, undergraduate students, postgraduate students, research scholars, industry professionals, technologists, and entrepreneurs.


Advances in Abstract Intelligence and Soft Computing

Advances in Abstract Intelligence and Soft Computing

Author: Yingxu Wang

Publisher:

Published: 2012-11-05

Total Pages: 0

ISBN-13: 9781466626515

DOWNLOAD EBOOK

Continuous developments in software and intelligence sciences have brought together the studies of both natural and machine intelligence and the relationship between the function of the brain and the abstract soft mind; creating a new multidisciplinary field of study. This brings together the latest research in computer science: theoretical software engineering, cognitive science and informatics, and also their influence on the processes of natural and machine intelligence.


Embedded Devices and Internet of Things

Embedded Devices and Internet of Things

Author: Adesh Kumar

Publisher: CRC Press

Published: 2024-09-11

Total Pages: 361

ISBN-13: 1040113893

DOWNLOAD EBOOK

The text comprehensively discusses machine-to-machine communication in real-time, low-power system design and estimation using field programmable gate arrays, PID, hardware, accelerators, and software integration for service applications. It further covers the recent advances in embedded computing and IoT for healthcare systems. The text explains the use of low-power devices such as microcontrollers in executing deep neural networks, and other machine learning techniques. This book: Discusses the embedded system software and hardware methodologies for system-on-chip and FPGA Illustrates low-power embedded applications, AI-based system design, PID control design, and CNN hardware design Highlights the integration of advanced 5G communication technologies with embedded systems Explains weather prediction modeling, embedded machine learning, and RTOS Highlights the significance of machine-learning techniques on the Internet of Things (IoT), real-time embedded system design, communication, and healthcare applications, and provides insights on IoT applications in education, fault attacks, security concerns, AI integration, banking, blockchain, intelligent tutoring systems, and smart technologies It is primarily written for senior undergraduates, graduate students, and academic researchers in the fields of electrical engineering, electronics and communications engineering, and computer engineering.


Digital Forensics and Cyber Crime Investigation

Digital Forensics and Cyber Crime Investigation

Author: Ahmed A. Abd El-Latif

Publisher: CRC Press

Published: 2024-10-07

Total Pages: 293

ISBN-13: 1040132766

DOWNLOAD EBOOK

In the ever-evolving landscape of digital forensics and cybercrime investigation, staying ahead with the latest advancements is not just advantageous—it’s imperative. Digital Forensics and Cyber Crime Investigation: Recent Advances and Future Directions serves as a crucial bridge, connecting the dots between the present knowledge base and the fast-paced developments in this dynamic field. Through a collection of meticulous research and expert insights, this book dissects various facets of digital forensics and cyber security, providing readers with a comprehensive look at current trends and future possibilities. Distinguished by its in-depth analysis and forward-looking perspective, this volume sets itself apart as an indispensable resource for those keen on navigating the complexities of securing the digital domain. Key features of this book include: Innovative Strategies for Web Application Security: Insights into Moving Target Defense (MTD) techniques Blockchain Applications in Smart Cities: An examination of how blockchain technology can fortify data security and trust Latest Developments in Digital Forensics: A thorough overview of cutting-edge techniques and methodologies Advancements in Intrusion Detection: The role of Convolutional Neural Networks (CNN) in enhancing network security Augmented Reality in Crime Scene Investigations: How AR technology is transforming forensic science Emerging Techniques for Data Protection: From chaotic watermarking in multimedia to deep learning models for forgery detection This book aims to serve as a beacon for practitioners, researchers, and students who are navigating the intricate world of digital forensics and cyber security. By offering a blend of recent advancements and speculative future directions, it not only enriches the reader’s understanding of the subject matter but also inspires innovative thinking and applications in the field. Whether you’re a seasoned investigator, an academic, or a technology enthusiast, Digital Forensics and Cyber Crime Investigation: Recent Advances and Future Directions promises to be a valuable addition to your collection, pushing the boundaries of what’s possible in digital forensics and beyond.


Secure Searchable Encryption and Data Management

Secure Searchable Encryption and Data Management

Author: Brij B. Gupta

Publisher: CRC Press

Published: 2021-03-16

Total Pages: 93

ISBN-13: 1000351203

DOWNLOAD EBOOK

With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it’s a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.


Anticipation, Agency and Complexity

Anticipation, Agency and Complexity

Author: Roberto Poli

Publisher: Springer

Published: 2019-02-15

Total Pages: 198

ISBN-13: 3030036235

DOWNLOAD EBOOK

This volume presents a selection of the Proceedings of the Workshop on Anticipation, Agency and Complexity held in Trento (Italy) on April 2017. The contributions contained in the book brilliantly revolve around three core concepts: agency, complexity and anticipation, giving precious insights to further define the discipline of anticipation. In a world that moves increasingly fast, constantly on the verge of disruptive events, more and more scholars and practitioners in any field feel in need of new approaches to make sense of the complexity and uncertainty that the future seems to bear. The theory of anticipation tries to describe how possible futures are intrinsically intertwined with the present.


Machine Intelligence and Data Science Applications

Machine Intelligence and Data Science Applications

Author: Amar Ramdane-Cherif

Publisher: Springer Nature

Published: 2023-10-03

Total Pages: 559

ISBN-13: 9819916208

DOWNLOAD EBOOK

This book is a compilation of peer-reviewed papers presented at the International Conference on Machine Intelligence and Data Science Applications (MIDAS 2022), held on October 28 and 29, 2022, at the University of Versailles—Paris-Saclay, France. The book covers applications in various fields like data science, machine intelligence, image processing, natural language processing, computer vision, sentiment analysis, and speech and gesture analysis. It also includes interdisciplinary applications like legal, healthcare, smart society, cyber-physical system, and smart agriculture. The book is a good reference for computer science engineers, lecturers/researchers in the machine intelligence discipline, and engineering graduates.


Distributed Denial of Service (DDoS) Attacks

Distributed Denial of Service (DDoS) Attacks

Author: Brij B. Gupta

Publisher: CRC Press

Published: 2021-03-01

Total Pages: 107

ISBN-13: 1000347095

DOWNLOAD EBOOK

The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them. Features: Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classification of defensive mechanisms on the basis of deployment location, the types of defensive action, and the solutions offering economic incentives. Introduces chapters discussing the various types of DDoS attack associated with different layers of security, an attacker’s motivations, and the importance of incentives and liabilities in any defensive solution. Illustrates the role of fair resource-allocation schemes, separate payment mechanisms for attackers and legitimate users, negotiation models on cost and types of resources, and risk assessments and transfer mechanisms. DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures is designed for the readers who have an interest in the cybersecurity domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals who are focusing on developing defensive schemes and applications for detecting or mitigating the DDoS attacks, and faculty members across different universities.