Listing 1 - 10 of 56 | << page >> |
Sort by
|
Choose an application
Computer security --- Seguretat informàtica --- Models matemàtics --- Mineria de dades --- Algorismes computacionals --- Algorismes per ordinadors --- Algorismes --- Algorismes en línia --- Geometria computacional --- Prospecció de dades --- Cerca en bases de dades --- Arquitectura orientada a serveis (Informàtica) --- Extracció de dades de llocs web --- Mineria de web --- Models (Matemàtica) --- Models experimentals --- Models teòrics --- Mètodes de simulació --- Anàlisi de sistemes --- Mètode de Montecarlo --- Modelització multiescala --- Models economètrics --- Models lineals (Estadística) --- Models multinivell (Estadística) --- Models no lineals (Estadística) --- Programació (Ordinadors) --- Simulació per ordinador --- Teoria de màquines --- Models biològics --- Informàtica (Seguretat) --- Mesures de seguretat (Informàtica) --- Seguretat (Informàtica) --- Seguretat dels sistemes informàtics --- Sistemes de seguretat --- Protecció de dades --- Control d'accés als ordinadors --- Seguretat de les xarxes d'ordinadors --- Xifratge (Informàtica) --- Pirates informàtics
Choose an application
This book features extended versions of selected papers that were presented and discussed at the 8th International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2021), held in Kolkata, India, on April 9-10, 2021. Organized by the Departments of Computer Science & Engineering and A.K. Choudhury School of Information Technology at the University of Calcutta, the symposiums international partners were Ca' Foscari University of Venice, Italy, and Bialystok University of Technology, Poland. The topics covered include biometrics, image processing, pattern recognition, algorithms, cloud computing, wireless sensor networks, and security systems, reflecting the various symposium sessions.
Computer security --- Computer security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
This book features a collection of high-quality research papers presented at the 9th International Symposium on Applied Computing for Software and Smart systems (ACSS 2022), to be held during September 09–10, 2022 in Kolkata, India. The book presents innovative works by undergraduate, graduate students and as well as PhD scholars. The emphasis of the workshop is on software and smart systems and research outcomes on other relevant areas pertaining to advancement of computing.
Computational intelligence. --- Artificial intelligence. --- Internet of things. --- Cloud Computing. --- Big data. --- Artificial intelligence—Data processing. --- Computational Intelligence. --- Artificial Intelligence. --- Internet of Things. --- Big Data. --- Data Science. --- Data sets, Large --- Large data sets --- Data sets --- Electronic data processing --- Web services --- IoT (Computer networks) --- Things, Internet of --- Computer networks --- Embedded Internet devices --- Machine-to-machine communications --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Intelligence, Computational --- Artificial intelligence --- Soft computing --- Distributed processing --- Computer software. --- Software, Computer --- Computer systems
Choose an application
Choose an application
The diverse applications of IoT are achieved by a set of complex inter-related networks of things and communications. IoT applications are also concerned about an array of devices such as sensors, mobile devices, personal computers, the smart systems such as Alexa, Eco, etc, besides the whole range of communication network binding them together in a seamless manner. This book explores the variegated perspectives of security in the complex context of Internet of Things. It also aims to present the changing face of security, from the ubiquitous networks comprising of WSN as the lowest layer, to the enabler apps working as bridge between the users and the complex IoT system.It takes a closer look at the different types of security schemes required to fit in the heterogeneous nature of IoT network., whilst the readers are also introduced to basic attacks targeting an IoT network, as well as specific types of security schemes worked out by researchers across different countries. As Programmable Logic Controllers (PLC) play a fundamental role in Industrial Control Systems, since they provide various functionalities of physical tools by collecting data from input devices and sending commands to output devices, this book includes a discussion on the security considerations of extending a PLC-based system with IoT capabilities. Other advanced topics include: The machine ethics aspects in the IoT system;t he Intrusion detection of WSN; and the methods of securing the user from privacy breaches due to the overprivileged IoT apps. This book will be beneficial toany readers interested in security of IoT systems and how to develop a layer-wise security scheme for such a system.
Choose an application
This book constitutes the proceedings of the 16th IFIP TC8 International Conference on Computer Information Systems and Industrial Management, CISIM 2017, held in Bialystok, Poland, in June 2017. The 60 regular papers presented together with 5 keynotes were carefully reviewed and Selected from 85 submissions. They are organized in the following topical sections: algorithms; biometrics and pattern recognition applications; data analysis and information retrieval; engineering of enterprise software products; industrial management and other applications; modelling and optimization; various aspects of computer security.
Computer science. --- Algorithms. --- Artificial intelligence. --- Computer simulation. --- Application software. --- Computer Science. --- Computer Applications. --- Information Systems Applications (incl. Internet). --- Artificial Intelligence (incl. Robotics). --- Algorithm Analysis and Problem Complexity. --- Simulation and Modeling. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Computer modeling --- Computer models --- Modeling, Computer --- Models, Computer --- Simulation, Computer --- Electromechanical analogies --- Mathematical models --- Simulation methods --- Model-integrated computing --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Fifth generation computers --- Neural computers --- Algorism --- Algebra --- Arithmetic --- Informatics --- Science --- Foundations --- Computer software. --- Artificial Intelligence. --- Software, Computer --- Computer systems
Choose an application
This book constitutes the proceedings of the 18th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2019, held in Belgrade, Serbia, in September 2019. The 43 full papers presented together with 3 abstracts of keynotes were carefully reviewed and selected from 70 submissions. The main topics covered by the chapters in this book are biometrics, security systems, multimedia, classification and clustering, industrial management. Besides these, the reader will find interesting papers on computer information systems as applied to wireless networks, computer graphics, and intelligent systems. The papers are organized in the following topical sections: biometrics and pattern recognition applications; computer information systems; industrial management and other applications; machine learning and high performance computing; modelling and optimization; various aspects of computer security.
Computer science. --- Artificial intelligence. --- Computer Communication Networks. --- Computer Applications. --- Artificial Intelligence. --- Information Systems Applications (incl. Internet). --- Arithmetic and Logic Structures. --- Informatics --- Science --- AI (Artificial intelligence) --- Artificial thinking --- Electronic brains --- Intellectronics --- Intelligence, Artificial --- Intelligent machines --- Machine intelligence --- Thinking, Artificial --- Bionics --- Cognitive science --- Digital computer simulation --- Electronic data processing --- Logic machines --- Machine theory --- Self-organizing systems --- Simulation methods --- Fifth generation computers --- Neural computers --- Computer networks --- Application software. --- Arithmetic and logic units, Computer. --- Computer communication systems. --- Arithmetic and logic units, Computer --- Computer arithmetic --- Electronic digital computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Circuits --- Distributed processing
Choose an application
This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India. The Volume I of this double-volume book contains fourteen high quality book chapters in three different parts. Part 1 is on Pattern Recognition and it presents four chapters. Part 2 is on Imaging and Healthcare Applications contains four more book chapters. The Part 3 of this volume is on Wireless Sensor Networking and it includes as many as six chapters. Volume II of the book has three Parts presenting a total of eleven chapters in it. Part 4 consists of five excellent chapters on Software Engineering ranging from cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book chapters in it. Part 6 of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.
Engineering. --- Signal, Image and Speech Processing. --- Computational Intelligence. --- Communications Engineering, Networks. --- Telecommunication. --- Ingénierie --- Télécommunications --- Computer architecture -- Congresses. --- Image processing -- Digital techniques -- Congresses. --- Pattern recognition systems -- Congresses. --- Wireless sensor networks -- Congresses. --- Engineering & Applied Sciences --- Electrical & Computer Engineering --- Telecommunications --- Electrical Engineering --- Applied Physics --- Computer networks --- Computers --- Security measures. --- Access control. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computational intelligence. --- Electrical engineering. --- Electric engineering --- Engineering --- Intelligence, Computational --- Artificial intelligence --- Construction --- Industrial arts --- Technology --- Soft computing --- Computer security --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Communication --- Information theory --- Telecommuting --- Signal processing. --- Image processing. --- Speech processing systems. --- Computational linguistics --- Electronic systems --- Modulation theory --- Oral communication --- Speech --- Telecommunication --- Singing voice synthesizers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication)
Choose an application
This book contains the extended version of the works that have been presented and discussed in the First International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2014) held during April 18-20, 2014 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland and University of Calcutta, India. The Volume I of this double-volume book contains fourteen high quality book chapters in three different parts. Part 1 is on Pattern Recognition and it presents four chapters. Part 2 is on Imaging and Healthcare Applications contains four more book chapters. The Part 3 of this volume is on Wireless Sensor Networking and it includes as many as six chapters. Volume II of the book has three Parts presenting a total of eleven chapters in it. Part 4 consists of five excellent chapters on Software Engineering ranging from cloud service design to transactional memory. Part 5 in Volume II is on Cryptography with two book chapters in it. Part 6 of this volume is on Computer Aided Design with four chapters in it. We strongly believe that the twenty five chapters in these two volumes of Applied Computation and Security Systems will be appreciated by all its readers.
Engineering. --- Signal, Image and Speech Processing. --- Computational Intelligence. --- Communications Engineering, Networks. --- Telecommunication. --- Ingénierie --- Télécommunications --- Artificial intelligence -- Congresses. --- Artificial intelligence -- Industrial applications -- Congresses. --- Soft computing -- Congresses. --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Electrical Engineering --- Applied Physics --- Pattern recognition systems --- Image processing --- Wireless sensor networks --- Digital techniques --- WSNs (Sensor networks) --- Computational intelligence. --- Electrical engineering. --- Electric engineering --- Engineering --- Intelligence, Computational --- Artificial intelligence --- Construction --- Industrial arts --- Technology --- Soft computing --- Computer networks --- Low voltage systems --- Sensor networks --- Wireless communication systems --- Context-aware computing --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Communication --- Information theory --- Telecommuting --- Signal processing. --- Image processing. --- Speech processing systems. --- Computational linguistics --- Electronic systems --- Modulation theory --- Oral communication --- Speech --- Telecommunication --- Singing voice synthesizers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication)
Choose an application
The book contains the extended version of the works that have been presented and discussed in the Second International Doctoral Symposium on Applied Computation and Security Systems (ACSS 2015) held during May 23-25, 2015 in Kolkata, India. The symposium has been jointly organized by the AGH University of Science & Technology, Cracow, Poland; Ca’ Foscari University, Venice, Italy and University of Calcutta, India. The book is divided into volumes and presents dissertation works in the areas of Image Processing, Biometrics-based Authentication, Soft Computing, Data Mining, Next Generation Networking and Network Security, Remote Healthcare, Communications, Embedded Systems, Software Engineering and Service Engineering.
Computer Science --- Engineering & Applied Sciences --- Computer science. --- Computer security. --- Computer networks. --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Informatics --- Security measures --- Protection of computer systems --- Protection --- Engineering. --- Computational intelligence. --- Computational Intelligence. --- Signal, Image and Speech Processing. --- Systems and Data Security. --- Data protection --- Security systems --- Hacking --- Intelligence, Computational --- Artificial intelligence --- Construction --- Industrial arts --- Technology --- Soft computing --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Distributed processing --- Signal processing. --- Image processing. --- Speech processing systems. --- Computational linguistics --- Information theory --- Modulation theory --- Oral communication --- Speech --- Singing voice synthesizers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication)
Listing 1 - 10 of 56 | << page >> |
Sort by
|