You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
This book gathers a collection of high-quality peer-reviewed research papers presented at International Conference on Cyber Intelligence and Information Retrieval (CIIR 2021), held at Institute of Engineering & Management, Kolkata, India during 20–21 May 2021. The book covers research papers in the field of privacy and security in the cloud, data loss prevention and recovery, high-performance networks, network security and cryptography, image and signal processing, artificial immune systems, information and network security, data science techniques and applications, data warehousing and data mining, data mining in dynamic environment, higher-order neural computing, rough set and fuzzy set theory, and nature-inspired computing techniques.
This book features research papers presented at the International Conference on Emerging Technologies in Data Mining and Information Security (IEMIS 2022) held at Institute of Engineering & Management, Kolkata, India, during February 23–25, 2022. The book is organized in three volumes and includes high-quality research work by academicians and industrial experts in the field of computing and communication, including full-length papers, research-in-progress papers and case studies related to all the areas of data mining, machine learning, Internet of Things (IoT) and information security.
As organizations continue to move towards digital enterprise, the need for digital transformation continues to grow especially due to the COVID-19 pandemic. These impacts will last far into the future, as newer digital technologies continue to be accepted, used, and developed. These digital tools will forever change the face of business and management. However, on the road to digital enterprise transformation there are many successes, difficulties, challenges, and failures. Finding solutions for these issues through strategic thinking and identification of the core issues facing the enterprise is of primary concern. This means modernizing management and strategies around the digital workforc...
This book presents practical development experiences in different areas of data analysis and pattern recognition, focusing on soft computing technologies, clustering and classification algorithms, rough set and fuzzy set theory, evolutionary computations, neural science and neural network systems, image processing, combinatorial pattern matching, social network analysis, audio and video data analysis, data mining in dynamic environments, bioinformatics, hybrid computing, big data analytics and deep learning. It also provides innovative solutions to the challenges in these areas and discusses recent developments.
"Melodies of Spring", created by StarWords India, is a compilation of 50+ poems. These poems have been handpicked based on the performance of hundreds of contestants who had taken part in the Poetry Writing Competition organized by StarWords India. The book is an amalgamation of different emotions and situations that the poets have beautifully penned down. From published authors to faculty members to students, the pages of this book have bound the passion of every poet together. This book is a wonderful read for the lovers of poetry.
This book includes high-quality research papers presented at the First International Conference on Human-Centric Smart Computing (ICHCSC 2022), organized by the University of Engineering and Management, Jaipur, India, on 27–29 April 2022. The topics covered in the book are human-centric computing, hyper connectivity, and data science. The book presents innovative work by leading academics, researchers, and experts from industry.
This edited book brings together scholarly chapters on linguistic aspects of humour in literary and non-literary domains and contexts in different parts of the world. Previous scholarly engagements and theoretical postulations on humour and the comic provide veritable resources for reexamining the relationship between linguistic elements and comic sensations on the one hand, and the validity of interpretive humour stylistics on the other hand. Renowned Stylistics scholars, such as Michael Toolan, who writes the volume’s foreword against the backdrop of nearly four decades of scholarly engagement with stylistics, and Katie Wales, who in this volume engages with Charles Dickens, one of the m...
This book serves the need for developing an insight and understanding of the cutting-edge innovation in Cloud technology. It provides an understanding of cutting-edge innovations, paradigms, and security by using real-life applications, case studies, and examples. This book provides a holistic view of cloud technology theories, practices, and future applications with real-life examples. It comprehensively explains cloud technology, design principles, development trends, maintaining state-of-the-art cloud computing and software services. It describes how cloud technology can transform the operating contexts of business enterprises. It exemplifies the potential of cloud computing for next-generation computational excellence and the role it plays as a key driver for the 4th industrial revolution in Industrial Engineering and a key driver for manufacturing industries. Researchers, academicians, postgraduates, and industry specialists will find this book of interest.
This book gathers outstanding research papers presented at the 2nd International Conference on Frontiers in Computing and Systems (COMSYS 2021), organized by Department of Electronics and Communication Engineering and Department of Information Technology, North-Eastern Hill University, Shillong, Meghalaya, India held during September 29–October 1, 2021. The book presents the latest research and results in various fields of machine learning, computational intelligence, VLSI, networks and systems, computational biology, and security, making it a rich source of reference material for academia and industry alike.
Today, relevant data are typically delivered to cloud-based servers for storing and analysis in order to extract key features and enable enhanced applications beyond the basic transmission of raw data and to realize the possibilities associated with the impending Internet of Things (IoT). To allow for quicker, more efficient, and expanded privacy-preserving services, a new trend called Fog Computing has emerged: moving these responsibilities to the network's edge. Traditional centralized cloud computing paradigms confront new problems posed by IoT application growth, including high latency, limited storage, and outages due to a lack of available resources. Fog Computing puts the cloud and Io...