Handbook of Research on Intelligent Data Processing and Information Security Systems

Handbook of Research on Intelligent Data Processing and Information Security Systems PDF Author: Bilan, Stepan Mykolayovych
Publisher: IGI Global
ISBN: 1799812928
Category : Computers
Languages : en
Pages : 434

Get Book Here

Book Description
Intelligent technologies have emerged as imperative tools in computer science and information security. However, advanced computing practices have preceded new methods of attacks on the storage and transmission of data. Developing approaches such as image processing and pattern recognition are susceptible to breaches in security. Modern protection methods for these innovative techniques require additional research. The Handbook of Research on Intelligent Data Processing and Information Security Systems provides emerging research exploring the theoretical and practical aspects of cyber protection and applications within computer science and telecommunications. Special attention is paid to data encryption, steganography, image processing, and recognition, and it targets professionals who want to improve their knowledge in order to increase strategic capabilities and organizational effectiveness. As such, this book is ideal for analysts, programmers, computer engineers, software engineers, mathematicians, data scientists, developers, IT specialists, academicians, researchers, and students within fields of information technology, information security, robotics, artificial intelligence, image processing, computer science, and telecommunications.

Handbook of Research on Intelligent Data Processing and Information Security Systems

Handbook of Research on Intelligent Data Processing and Information Security Systems PDF Author: Bilan, Stepan Mykolayovych
Publisher: IGI Global
ISBN: 1799812928
Category : Computers
Languages : en
Pages : 434

Get Book Here

Book Description
Intelligent technologies have emerged as imperative tools in computer science and information security. However, advanced computing practices have preceded new methods of attacks on the storage and transmission of data. Developing approaches such as image processing and pattern recognition are susceptible to breaches in security. Modern protection methods for these innovative techniques require additional research. The Handbook of Research on Intelligent Data Processing and Information Security Systems provides emerging research exploring the theoretical and practical aspects of cyber protection and applications within computer science and telecommunications. Special attention is paid to data encryption, steganography, image processing, and recognition, and it targets professionals who want to improve their knowledge in order to increase strategic capabilities and organizational effectiveness. As such, this book is ideal for analysts, programmers, computer engineers, software engineers, mathematicians, data scientists, developers, IT specialists, academicians, researchers, and students within fields of information technology, information security, robotics, artificial intelligence, image processing, computer science, and telecommunications.

Handbook of Research on Intrusion Detection Systems

Handbook of Research on Intrusion Detection Systems PDF Author: Gupta, Brij B.
Publisher: IGI Global
ISBN: 1799822435
Category : Computers
Languages : en
Pages : 407

Get Book Here

Book Description
Businesses in today’s world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.

Perspectives and Considerations on the Evolution of Smart Systems

Perspectives and Considerations on the Evolution of Smart Systems PDF Author: Habib, Maki K.
Publisher: IGI Global
ISBN: 166847686X
Category : Computers
Languages : en
Pages : 435

Get Book Here

Book Description
Smart systems are rapidly evolving and finding ways to influence different aspects of human life, industry, and the environment. Smart systems based on available data should have the ability to predict and be adaptive, which leads to performing reliable, smart actions. Smartness and learning capabilities are essential characteristics describing smart systems besides connectivity and digital virtual cloudification technologies. Perspectives and Considerations on the Evolution of Smart Systems discusses the latest edge development that informs and facilitates the next level of development. It highlights how the evolving technologies and techniques are going to impact the developments in the field considering climate, environment, circular economy, and ecosystems. Covering topics such as dynamic difficulty adjustment, intelligent control, and serious games, this premier reference source is an excellent resource for engineers, computer scientists, IT professionals, developers, data analysts, students and educators of higher education, librarians, researchers, and academicians.

Biometric Data in Smart Cities

Biometric Data in Smart Cities PDF Author: Stepan Bilan
Publisher: CRC Press
ISBN: 1000412423
Category : Technology & Engineering
Languages : en
Pages : 228

Get Book Here

Book Description
covers the theoretical foundations of building a biometric multisensor network, which allowsto create a unified urban biometric community provides foundations of the parallel shift technology and the Radon transformation on cellular automata with a hexagonal covering discusses the methods of biometric identification by gait parameters and the geometric shape of the auricle, which are effectively used in a smart city serves as a great resource for undergraduate, graduate students and specialists working and conducting research in the field of biometric information processing, as well as in the development and construction of distributed intelligent systems

Implementation of Machine Learning Algorithms Using Control-Flow and Dataflow Paradigms

Implementation of Machine Learning Algorithms Using Control-Flow and Dataflow Paradigms PDF Author: Milutinovi?, Veljko
Publisher: IGI Global
ISBN: 1799883523
Category : Computers
Languages : en
Pages : 296

Get Book Here

Book Description
Based on current literature and cutting-edge advances in the machine learning field, there are four algorithms whose usage in new application domains must be explored: neural networks, rule induction algorithms, tree-based algorithms, and density-based algorithms. A number of machine learning related algorithms have been derived from these four algorithms. Consequently, they represent excellent underlying methods for extracting hidden knowledge from unstructured data, as essential data mining tasks. Implementation of Machine Learning Algorithms Using Control-Flow and Dataflow Paradigms presents widely used data-mining algorithms and explains their advantages and disadvantages, their mathematical treatment, applications, energy efficient implementations, and more. It presents research of energy efficient accelerators for machine learning algorithms. Covering topics such as control-flow implementation, approximate computing, and decision tree algorithms, this book is an essential resource for computer scientists, engineers, students and educators of higher education, researchers, and academicians.

Handbook of Research on Cyber Crime and Information Privacy

Handbook of Research on Cyber Crime and Information Privacy PDF Author: Cruz-Cunha, Maria Manuela
Publisher: IGI Global
ISBN: 1799857298
Category : Computers
Languages : en
Pages : 753

Get Book Here

Book Description
In recent years, industries have transitioned into the digital realm, as companies and organizations are adopting certain forms of technology to assist in information storage and efficient methods of production. This dependence has significantly increased the risk of cyber crime and breaches in data security. Fortunately, research in the area of cyber security and information protection is flourishing; however, it is the responsibility of industry professionals to keep pace with the current trends within this field. The Handbook of Research on Cyber Crime and Information Privacy is a collection of innovative research on the modern methods of crime and misconduct within cyber space. It presents novel solutions to securing and preserving digital information through practical examples and case studies. While highlighting topics including virus detection, surveillance technology, and social networks, this book is ideally designed for cybersecurity professionals, researchers, developers, practitioners, programmers, computer scientists, academicians, security analysts, educators, and students seeking up-to-date research on advanced approaches and developments in cyber security and information protection.

Data Analysis and Methods of Qualitative Research: Emerging Research and Opportunities

Data Analysis and Methods of Qualitative Research: Emerging Research and Opportunities PDF Author: Madondo, Silas Memory
Publisher: IGI Global
ISBN: 1799885518
Category : Reference
Languages : en
Pages : 249

Get Book Here

Book Description
An intellectual property discussion is central to qualitative research projects, and ethical guidelines are essential to the safe accomplishment of research projects. Undertaking research studies without adhering to ethics may be dangerous to researchers and research subjects. Therefore, it is important to understand and develop practical techniques for handling ethics with a specific focus on qualitative projects so that researchers conducting this type of research may continue to use ethical practices at every step of the project. Data Analysis and Methods of Qualitative Research: Emerging Research and Opportunities discusses in detail the methods related to the social constructionist paradigm that is popular with qualitative research projects. These methods help researchers undertake ideal qualitative projects that are free from quantitative research techniques/concepts all while acquiring practical skills in handling ethics and ethical issues in qualitative projects. The chapters each contain case studies, learning outcomes, question and answer sections, and discuss critical research philosophies in detail along with topics such as ethics, research design, data gathering and sampling methods, research outputs, data analysis, and report writing. Featuring a wide range of topics such as epistemology, probability sampling, and big data, this book is ideal for researchers, practitioners, computer scientists, academicians, analysts, coders, and students looking to become competent qualitative research specialists.

Electronics in Advanced Research Industries

Electronics in Advanced Research Industries PDF Author: Alessandro Massaro
Publisher: John Wiley & Sons
ISBN: 1119716896
Category : Technology & Engineering
Languages : en
Pages : 548

Get Book Here

Book Description
Electronics in Advanced Research Industries A one-of-a-kind examination of the latest developments in machine control In Electronics in Advanced Research Industries: Industry 4.0 to Industry 5.0 Advances, accomplished electronics researcher and engineer Alessandro Massaro delivers a comprehensive exploration of the latest ways in which people have achieved machine control, including automated vision technologies, advanced electronic and micro-nano sensors, advanced robotics, and more. The book is composed of nine chapters, each containing examples and diagrams designed to assist the reader in applying the concepts discussed within to common issues and problems in the real-world. Combining electronics and mechatronics to show how they can each be implemented in production line systems, the book presents insightful new ways to use artificial intelligence in production line machines. The author explains how facilities can upgrade their systems to an Industry 5.0 environment. Electronics in Advanced Research Industries: Industry 4.0 to Industry 5.0 Advances also provides: A thorough introduction to the state-of-the-art in a variety of technological areas, including flexible technologies, scientific approaches, and intelligent automatic systems Comprehensive explorations of information technology infrastructures that support Industry 5.0 facilities, including production process simulation Practical discussions of human-machine interfaces, including mechatronic machine interface architectures integrating sensor systems and machine-to-machine (M2M) interfaces In-depth examinations of Internet of Things (IoT) solutions in industry, including cloud computing IoT Perfect for professionals working in electrical industry sectors in manufacturing, production line manufacturers, engineers, and members of R&D industry teams, Electronics in Advanced Research Industries: Industry 4.0 to Industry 5.0 Advances will also earn a place in libraries of technicians working in the process industry.

Developing Linear Algebra Codes on Modern Processors: Emerging Research and Opportunities

Developing Linear Algebra Codes on Modern Processors: Emerging Research and Opportunities PDF Author: Catalán Pallarés, Sandra
Publisher: IGI Global
ISBN: 1799870847
Category : Mathematics
Languages : en
Pages : 279

Get Book Here

Book Description
Optimized linear algebra (LA) libraries that are able to exploit the underlying hardware are always of interest in the high-performance computing community. The implementation of LA software has evolved along with computer architecture, while the specification remains unaltered almost from the beginning. It is important to differentiate between the specification of LA libraries and their implementation. Because LA libraries pursue high performance, the implementation for a given architecture needs to be optimized for it specifically. However, the type of operations included in the libraries, the input/output parameters, and the data types to be handled are common to all of them. This is why, while the specification remains constant, the implementation evolves with the creation of new architectures. Developing Linear Algebra Codes on Modern Processors: Emerging Research and Opportunities presents the main characteristics of LA libraries, showing the differences between the standards for sparse and dense versions. It further explores relevant linear algebra problems and shows, in a clear and understandable way, how to solve them using different computer architectures. Covering topics such as programming models, batched computing, and distributed memory platforms, this premier reference source is an excellent resource for programmers, computer scientists, engineers, students and faculty of higher education, librarians, researchers, and academicians.

Biometric Identification Technologies Based on Modern Data Mining Methods

Biometric Identification Technologies Based on Modern Data Mining Methods PDF Author: Stepan Bilan
Publisher: Springer Nature
ISBN: 3030483789
Category : Technology & Engineering
Languages : en
Pages : 203

Get Book Here

Book Description
This book emphasizes recent advances in the creation of biometric identification systems for various applications in the field of human activity. The book displays the problems that arise in modern systems of biometric identification, as well as the level of development and prospects for the introduction of biometric technologies. The authors classify biometric technologies into two groups, distinguished according to the type of biometric characteristics used. The first group uses static biometric parameters: fingerprints, hand geometry, retina pattern, vein pattern on the finger, etc. The second group uses dynamic parameters for identification: the dynamics of the reproduction of a signature or a handwritten keyword, voice, gait, dynamics of work on the keyboard, etc. The directions of building information systems that use automatic personality identification based on the analysis of unique biometric characteristics of a person are discussed. The book is intended for professionals working and conducting research in the field of intelligent information processing, information security, and robotics and in the field of real-time identification systems. The book contains examples and problems/solutions throughout.