Author: Ajith Abraham
Publisher: Springer
ISBN: 3319173987
Category : Technology & Engineering
Languages : en
Pages : 356
Book Description
This Volume presents the selected papers from the 5 Parallel Symposiums of the 2014 Fourth World Congress on Information and Communication Technologies (WICT 2014) held in Malacca, Malaysia. The theme of WICT 2014 'Innovating ICT for Social Revolutions'. WICT 2014 is Co-Organized by Machine Intelligence Research Labs (MIR Labs), USA and Universiti Teknikal Malaysia Melaka, Malaysia. WICT 2014 is technically co-sponsored by IEEE Systems, Man & Cybernetics Society Malaysia and Spain Chapters and Technically Supported by IEEE Systems Man and Cybernetics Society, Technical Committee on Soft Computing.
Pattern Analysis, Intelligent Security and the Internet of Things
Author: Ajith Abraham
Publisher: Springer
ISBN: 3319173987
Category : Technology & Engineering
Languages : en
Pages : 356
Book Description
This Volume presents the selected papers from the 5 Parallel Symposiums of the 2014 Fourth World Congress on Information and Communication Technologies (WICT 2014) held in Malacca, Malaysia. The theme of WICT 2014 'Innovating ICT for Social Revolutions'. WICT 2014 is Co-Organized by Machine Intelligence Research Labs (MIR Labs), USA and Universiti Teknikal Malaysia Melaka, Malaysia. WICT 2014 is technically co-sponsored by IEEE Systems, Man & Cybernetics Society Malaysia and Spain Chapters and Technically Supported by IEEE Systems Man and Cybernetics Society, Technical Committee on Soft Computing.
Publisher: Springer
ISBN: 3319173987
Category : Technology & Engineering
Languages : en
Pages : 356
Book Description
This Volume presents the selected papers from the 5 Parallel Symposiums of the 2014 Fourth World Congress on Information and Communication Technologies (WICT 2014) held in Malacca, Malaysia. The theme of WICT 2014 'Innovating ICT for Social Revolutions'. WICT 2014 is Co-Organized by Machine Intelligence Research Labs (MIR Labs), USA and Universiti Teknikal Malaysia Melaka, Malaysia. WICT 2014 is technically co-sponsored by IEEE Systems, Man & Cybernetics Society Malaysia and Spain Chapters and Technically Supported by IEEE Systems Man and Cybernetics Society, Technical Committee on Soft Computing.
Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence
Author: Rawat, Romil
Publisher: IGI Global
ISBN: 1668439441
Category : Computers
Languages : en
Pages : 300
Book Description
Data stealing is a major concern on the internet as hackers and criminals have begun using simple tricks to hack social networks and violate privacy. Cyber-attack methods are progressively modern, and obstructing the attack is increasingly troublesome, regardless of whether countermeasures are taken. The Dark Web especially presents challenges to information privacy and security due to anonymous behaviors and the unavailability of data. To better understand and prevent cyberattacks, it is vital to have a forecast of cyberattacks, proper safety measures, and viable use of cyber-intelligence that empowers these activities. Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence discusses cyberattacks, security, and safety measures to protect data and presents the shortcomings faced by researchers and practitioners due to the unavailability of information about the Dark Web. Attacker techniques in these Dark Web environments are highlighted, along with intrusion detection practices and crawling of hidden content. Covering a range of topics such as malware and fog computing, this reference work is ideal for researchers, academicians, practitioners, industry professionals, computer scientists, scholars, instructors, and students.
Publisher: IGI Global
ISBN: 1668439441
Category : Computers
Languages : en
Pages : 300
Book Description
Data stealing is a major concern on the internet as hackers and criminals have begun using simple tricks to hack social networks and violate privacy. Cyber-attack methods are progressively modern, and obstructing the attack is increasingly troublesome, regardless of whether countermeasures are taken. The Dark Web especially presents challenges to information privacy and security due to anonymous behaviors and the unavailability of data. To better understand and prevent cyberattacks, it is vital to have a forecast of cyberattacks, proper safety measures, and viable use of cyber-intelligence that empowers these activities. Dark Web Pattern Recognition and Crime Analysis Using Machine Intelligence discusses cyberattacks, security, and safety measures to protect data and presents the shortcomings faced by researchers and practitioners due to the unavailability of information about the Dark Web. Attacker techniques in these Dark Web environments are highlighted, along with intrusion detection practices and crawling of hidden content. Covering a range of topics such as malware and fog computing, this reference work is ideal for researchers, academicians, practitioners, industry professionals, computer scientists, scholars, instructors, and students.
2D and 3D Image Analysis by Moments
Author: Jan Flusser
Publisher: John Wiley & Sons
ISBN: 1119039363
Category : Technology & Engineering
Languages : en
Pages : 776
Book Description
Presents recent significant and rapid development in the field of 2D and 3D image analysis 2D and 3D Image Analysis by Moments, is a unique compendium of moment-based image analysis which includes traditional methods and also reflects the latest development of the field. The book presents a survey of 2D and 3D moment invariants with respect to similarity and affine spatial transformations and to image blurring and smoothing by various filters. The book comprehensively describes the mathematical background and theorems about the invariants but a large part is also devoted to practical usage of moments. Applications from various fields of computer vision, remote sensing, medical imaging, image retrieval, watermarking, and forensic analysis are demonstrated. Attention is also paid to efficient algorithms of moment computation. Key features: Presents a systematic overview of moment-based features used in 2D and 3D image analysis. Demonstrates invariant properties of moments with respect to various spatial and intensity transformations. Reviews and compares several orthogonal polynomials and respective moments. Describes efficient numerical algorithms for moment computation. It is a "classroom ready" textbook with a self-contained introduction to classifier design. The accompanying website contains around 300 lecture slides, Matlab codes, complete lists of the invariants, test images, and other supplementary material. 2D and 3D Image Analysis by Moments, is ideal for mathematicians, computer scientists, engineers, software developers, and Ph.D students involved in image analysis and recognition. Due to the addition of two introductory chapters on classifier design, the book may also serve as a self-contained textbook for graduate university courses on object recognition.
Publisher: John Wiley & Sons
ISBN: 1119039363
Category : Technology & Engineering
Languages : en
Pages : 776
Book Description
Presents recent significant and rapid development in the field of 2D and 3D image analysis 2D and 3D Image Analysis by Moments, is a unique compendium of moment-based image analysis which includes traditional methods and also reflects the latest development of the field. The book presents a survey of 2D and 3D moment invariants with respect to similarity and affine spatial transformations and to image blurring and smoothing by various filters. The book comprehensively describes the mathematical background and theorems about the invariants but a large part is also devoted to practical usage of moments. Applications from various fields of computer vision, remote sensing, medical imaging, image retrieval, watermarking, and forensic analysis are demonstrated. Attention is also paid to efficient algorithms of moment computation. Key features: Presents a systematic overview of moment-based features used in 2D and 3D image analysis. Demonstrates invariant properties of moments with respect to various spatial and intensity transformations. Reviews and compares several orthogonal polynomials and respective moments. Describes efficient numerical algorithms for moment computation. It is a "classroom ready" textbook with a self-contained introduction to classifier design. The accompanying website contains around 300 lecture slides, Matlab codes, complete lists of the invariants, test images, and other supplementary material. 2D and 3D Image Analysis by Moments, is ideal for mathematicians, computer scientists, engineers, software developers, and Ph.D students involved in image analysis and recognition. Due to the addition of two introductory chapters on classifier design, the book may also serve as a self-contained textbook for graduate university courses on object recognition.
Code and Conscience
Author: Judit Bayer
Publisher: Springer Nature
ISBN: 3031520823
Category :
Languages : en
Pages : 172
Book Description
Publisher: Springer Nature
ISBN: 3031520823
Category :
Languages : en
Pages : 172
Book Description
Computational Intelligence in the Internet of Things
Author: Purnomo, Hindriyanto Dwi
Publisher: IGI Global
ISBN: 1522579567
Category : Computers
Languages : en
Pages : 363
Book Description
In recent years, the need for smart equipment has increased exponentially with the upsurge in technological advances. To work to their fullest capacity, these devices need to be able to communicate with other devices in their network to exchange information and receive instructions. Computational Intelligence in the Internet of Things is an essential reference source that provides relevant theoretical frameworks and the latest empirical research findings in the area of computational intelligence and the Internet of Things. Featuring research on topics such as data analytics, machine learning, and neural networks, this book is ideally designed for IT specialists, managers, professionals, researchers, and academicians.
Publisher: IGI Global
ISBN: 1522579567
Category : Computers
Languages : en
Pages : 363
Book Description
In recent years, the need for smart equipment has increased exponentially with the upsurge in technological advances. To work to their fullest capacity, these devices need to be able to communicate with other devices in their network to exchange information and receive instructions. Computational Intelligence in the Internet of Things is an essential reference source that provides relevant theoretical frameworks and the latest empirical research findings in the area of computational intelligence and the Internet of Things. Featuring research on topics such as data analytics, machine learning, and neural networks, this book is ideally designed for IT specialists, managers, professionals, researchers, and academicians.
Frontier Computing
Author: Jason C. Hung
Publisher: Springer
ISBN: 9811336482
Category : Technology & Engineering
Languages : en
Pages : 2028
Book Description
This book presents the proceedings of the 6th International Conference on Frontier Computing, held in Kuala Lumpur, Malaysia on July 3–6, 2018, and provides comprehensive coverage of the latest advances and trends in information technology, science and engineering. It addresses a number of broad themes, including communication networks, business intelligence and knowledge management, web intelligence, and related fields that inspire the development of information technology. The contributions cover a wide range of topics: database and data mining, networking and communications, web and internet of things, embedded systems, soft computing, social network analysis, security and privacy, optical communication, and ubiquitous/pervasive computing. Many of the papers outline promising future research directions. The book is a valuable resource for students, researchers and professionals, and also offers a useful reference guide for newcomers to the field.
Publisher: Springer
ISBN: 9811336482
Category : Technology & Engineering
Languages : en
Pages : 2028
Book Description
This book presents the proceedings of the 6th International Conference on Frontier Computing, held in Kuala Lumpur, Malaysia on July 3–6, 2018, and provides comprehensive coverage of the latest advances and trends in information technology, science and engineering. It addresses a number of broad themes, including communication networks, business intelligence and knowledge management, web intelligence, and related fields that inspire the development of information technology. The contributions cover a wide range of topics: database and data mining, networking and communications, web and internet of things, embedded systems, soft computing, social network analysis, security and privacy, optical communication, and ubiquitous/pervasive computing. Many of the papers outline promising future research directions. The book is a valuable resource for students, researchers and professionals, and also offers a useful reference guide for newcomers to the field.
Information Security and Cryptology
Author: Yi Deng
Publisher: Springer Nature
ISBN: 303126553X
Category : Computers
Languages : en
Pages : 495
Book Description
This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11–13, 2022. The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.
Publisher: Springer Nature
ISBN: 303126553X
Category : Computers
Languages : en
Pages : 495
Book Description
This book constitutes the refereed proceedings of the 18th International Conference on Information Security and Cryptology, Inscrypt 2022, held in Beijing, China during December 11–13, 2022. The 23 full papers and 3 short papers included in this book were carefully reviewed and selected from 68 submissions. They were organized in topical sections as follows: Block Ciphers, Public key Encryption & Signature, Quantum, MPC, Cryptanalysis, Mathematical aspects of Crypto, Stream ciphers, Malware, Lattices.
IoT
Author: Souvik Pal
Publisher: CRC Press
ISBN: 1000058611
Category : Technology & Engineering
Languages : en
Pages : 344
Book Description
IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps readers gain an understand of security architecture through IoT and describes the state of the art of IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT. This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience includes specialists, researchers, graduate students, designers, experts and engineers who are focused on research and security related issues. Souvik Pal, PhD, has worked as Assistant Professor in Nalanda Institute of Technology, Bhubaneswar, and JIS College of Engineering, Kolkata (NAAC "A" Accredited College). He is the organizing Chair and Plenary Speaker of RICE Conference in Vietnam; and organizing co-convener of ICICIT, Tunisia. He has served in many conferences as chair, keynote speaker, and he also chaired international conference sessions and presented session talks internationally. His research area includes Cloud Computing, Big Data, Wireless Sensor Network (WSN), Internet of Things, and Data Analytics. Vicente García-Díaz, PhD, is an Associate Professor in the Department of Computer Science at the University of Oviedo (Languages and Computer Systems area). He is also the editor of several special issues in prestigious journals such as Scientific Programming and International Journal of Interactive Multimedia and Artificial Intelligence. His research interests include eLearning, machine learning and the use of domain specific languages in different areas. Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of Information Technology, and Vice-Director of Information Technology Apply and Foreign Language Training Center, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical. Presently, he is serving on the editorial board of several international journals and has authored nine computer science books published by Springer, Wiley, CRC Press, Lambert Publication, and Scholar Press.
Publisher: CRC Press
ISBN: 1000058611
Category : Technology & Engineering
Languages : en
Pages : 344
Book Description
IOT: Security and Privacy Paradigm covers the evolution of security and privacy issues in the Internet of Things (IoT). It focuses on bringing all security and privacy related technologies into one source, so that students, researchers, and practitioners can refer to this book for easy understanding of IoT security and privacy issues. This edited book uses Security Engineering and Privacy-by-Design principles to design a secure IoT ecosystem and to implement cyber-security solutions. This book takes the readers on a journey that begins with understanding the security issues in IoT-enabled technologies and how it can be applied in various aspects. It walks readers through engaging with security challenges and builds a safe infrastructure for IoT devices. The book helps readers gain an understand of security architecture through IoT and describes the state of the art of IoT countermeasures. It also differentiates security threats in IoT-enabled infrastructure from traditional ad hoc or infrastructural networks, and provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, in IoT. This book aims to provide the concepts of related technologies and novel findings of the researchers through its chapter organization. The primary audience includes specialists, researchers, graduate students, designers, experts and engineers who are focused on research and security related issues. Souvik Pal, PhD, has worked as Assistant Professor in Nalanda Institute of Technology, Bhubaneswar, and JIS College of Engineering, Kolkata (NAAC "A" Accredited College). He is the organizing Chair and Plenary Speaker of RICE Conference in Vietnam; and organizing co-convener of ICICIT, Tunisia. He has served in many conferences as chair, keynote speaker, and he also chaired international conference sessions and presented session talks internationally. His research area includes Cloud Computing, Big Data, Wireless Sensor Network (WSN), Internet of Things, and Data Analytics. Vicente García-Díaz, PhD, is an Associate Professor in the Department of Computer Science at the University of Oviedo (Languages and Computer Systems area). He is also the editor of several special issues in prestigious journals such as Scientific Programming and International Journal of Interactive Multimedia and Artificial Intelligence. His research interests include eLearning, machine learning and the use of domain specific languages in different areas. Dac-Nhuong Le, PhD, is Deputy-Head of Faculty of Information Technology, and Vice-Director of Information Technology Apply and Foreign Language Training Center, Haiphong University, Vietnam. His area of research includes: evaluation computing and approximate algorithms, network communication, security and vulnerability, network performance analysis and simulation, cloud computing, IoT and image processing in biomedical. Presently, he is serving on the editorial board of several international journals and has authored nine computer science books published by Springer, Wiley, CRC Press, Lambert Publication, and Scholar Press.
Computational Intelligence in Internet of Agricultural Things
Author: M. G. Sumithra
Publisher: Springer Nature
ISBN: 3031674502
Category :
Languages : en
Pages : 464
Book Description
Publisher: Springer Nature
ISBN: 3031674502
Category :
Languages : en
Pages : 464
Book Description
Security and Trust Issues in Internet of Things
Author: Sudhir Kumar Sharma
Publisher: CRC Press
ISBN: 1000288420
Category : Computers
Languages : en
Pages : 330
Book Description
The purpose of this edited book is to present and showcase the basic fundamentals, applications, and integration of both IoT and Blockchain. The trend of applying Blockchain to IoT is rapidly growing because it helps to overcome various challenges faced by IoT, from smart manufacturing to unmanned aerial vehicles. Thise book aims to showcase the basics of both IoT and Blockchain as well as the integration and challenges for existing practitioners. Thise book initiates conversations among technologists, engineers, scientists, and clinicians to synergize their efforts in producing low-cost, high-performance, highly efficient, deployable IoT systems. Thise book is theory-based and is useful for engineers from various disciplines, including industrial engineering, computer science, electronics, telecommunications, electrical, agricultural, and cybersecurity, along with researchers, professionals, and students.
Publisher: CRC Press
ISBN: 1000288420
Category : Computers
Languages : en
Pages : 330
Book Description
The purpose of this edited book is to present and showcase the basic fundamentals, applications, and integration of both IoT and Blockchain. The trend of applying Blockchain to IoT is rapidly growing because it helps to overcome various challenges faced by IoT, from smart manufacturing to unmanned aerial vehicles. Thise book aims to showcase the basics of both IoT and Blockchain as well as the integration and challenges for existing practitioners. Thise book initiates conversations among technologists, engineers, scientists, and clinicians to synergize their efforts in producing low-cost, high-performance, highly efficient, deployable IoT systems. Thise book is theory-based and is useful for engineers from various disciplines, including industrial engineering, computer science, electronics, telecommunications, electrical, agricultural, and cybersecurity, along with researchers, professionals, and students.