Browse Results

Showing 52,801 through 52,825 of 54,344 results

Enabling Industry 4.0 through Advances in Manufacturing and Materials: Selected Articles from iM3F 2021, Malaysia (Lecture Notes in Mechanical Engineering)

by Amiril Sahab Abdul Sani Muhammed Nafis Osman Zahid Mohamad Rusydi Mohamad Yasin Siti Zubaidah Ismail Mohd Zairulnizam Mohd Zawawi Ahmad Rosli Abdul Manaf Siti Nadiah Mohd Saffe Radhiyah Abd Aziz Faiz Mohd Turan

This book presents part of the proceedings of the Manufacturing and Materials track of the iM3F 2021 conference held in Malaysia. This collection of articles deliberates on the key challenges and trends related to manufacturing as well as materials engineering and technology in setting the stage for the world in embracing the Fourth Industrial Revolution. It presents recent findings with regard to manufacturing and materials that are pertinent toward the realizations and ultimately the embodiment of Industry 4.0, with contributions from both industry and academia.

Intelligent Sustainable Systems: Proceedings of ICISS 2022 (Lecture Notes in Networks and Systems #458)

by Jennifer S. Raj Yong Shi Danilo Pelusi Valentina Emilia Balas

This book features research papers presented at the 5th International Conference on Intelligent Sustainable Systems (ICISS 2022), held at SCAD College of Engineering and Technology, Tirunelveli, Tamil Nadu, India, during February 17–18, 2022. The book discusses latest research works that discusses the tools, methodologies, practices, and applications of sustainable systems and computational intelligence methodologies. The book is beneficial for readers from both academia and industry.

Analysis of Legal Argumentation Documents: A Computational Argumentation Approach (Translational Systems Sciences #29)

by Hayato Hirata Katsumi Nitta

This book introduces methods to analyze legal documents such as negotiation records and legal precedents, using computational argumentation theory.First, a method to automatically evaluate argumentation skills from the records of argumentation exercises is proposed. In law school, argumentation exercises are often conducted and many records of them are produced. From each utterance in the record, a pattern of “speech act +factor” is extracted, and argumentation skills are evaluated from the sequences of the patterns, using a scoring prediction model constructed by multiple regression analyses between the appearance pattern and the scoring results. The usefulness of this method is shown by applying it to the example case “the garbage house problem”. Second, a method of extracting factors (elements that characterize precedents and cases) and legal topoi from individual precedents and using them as the expression of precedents to analyze how the pattern of factors and legal topoi appearing in a group of precedents affects the judgment (plaintiff wins/defendant wins) is proposed. This method has been applied to a group of tax cases. Third, the logical structure of 70 labor cases is described in detail by using factors and a bipolar argumentation framework (BAF) and an (extended argumentation framework (EAF) together. BAF describes the logical structure between plaintiff and defendant, and EAF describes the decision of the judge. Incorporating the legal topoi into the EAF of computational argumentation theory, the strength of the analysis of precedents by combined use of factored BAF and EAF, not only which argument the judge adopted could be specified. It was also possible to determine what kind of value judgment was made and to verify the logic. The analysis methods in this book demonstrate the application of logic-based AI methods to the legal domain, and they contribute to the education and training of law school students in logical ways of argumentation.

Emerging IT/ICT and AI Technologies Affecting Society (Lecture Notes in Networks and Systems #478)

by Mousmi Ajay Chaurasia Chia-Feng Juang

This book presents the applications of future technologies to overcome the toughest humanitarian challenges from an engineering approach. COVID-19, a worldwide pandemic, has limited many physical operational areas and at the same time has motivated to uplift the initiative to digitalize the world. Society is facing ever more intense and protracted humanitarian crises, and as a result, the global community is pressed to find new ways to help people and communities in need. This interdisciplinary book highlights the exchange of relevant trends and research results as well as the presentation of practical experiences gained while developing and testing elements of technology enhanced learning experiences with the help of emerging technologies like IT/ICT, AI, ML, edge computing, robotics automation, 5G for the betterment of humanity. It highlights the analytics and optimization issues impacting society and technology for example on security, sustainability, identity, inclusion, working life, corporate and community welfare, and well-being of people to create a secure tomorrow.

Proceedings of 7th International Conference on Harmony Search, Soft Computing and Applications: ICHSA 2022 (Lecture Notes on Data Engineering and Communications Technologies #140)

by Joong Hoon Kim Kusum Deep Zong Woo Geem Ali Sadollah Anupam Yadav

The book covers different aspects of real-world applications of optimization algorithms. It provides insights from the Seventh International Conference on Harmony Search, Soft Computing and Applications held at Virtual Conference, Seoul, South Korea, in February 2022. Harmony search (HS) is one of the most popular metaheuristic algorithms, developed in 2001 by Prof. Joong Hoon Kim and Prof. Zong Woo Geem, that mimics the improvisation process of jazz musicians to seek the best harmony. The book consists of research articles on novel and newly proposed optimization algorithms; the theoretical study of nature-inspired optimization algorithms; numerically established results of nature-inspired optimization algorithms; and real-world applications of optimization algorithms and synthetic benchmarking of optimization algorithms.

Blockchain in Life Sciences (Blockchain Technologies)

by Wendy Charles

This book highlights the latest advances on the implementation and adaptation of blockchain technologies in real-world scientific, biomedical, and data applications. It presents rapid advancements in life sciences research and development by applying the unique capabilities inherent in distributed ledger technologies. The book unveils the current uses of blockchain in drug discovery, drug and device tracking, real-world data collection, and increased patient engagement used to unlock opportunities to advance life sciences research. This paradigm shift is explored from the perspectives of pharmaceutical professionals, biotechnology start-ups, regulatory agencies, ethical review boards, and blockchain developers. This book enlightens readers about the opportunities to empower and enable data in life sciences.

Advanced Computing and Intelligent Technologies: Proceedings of ICACIT 2022 (Lecture Notes in Electrical Engineering #914)

by Rabindra Nath Shaw Sanjoy Das Vincenzo Piuri Monica Bianchini

This book gathers selected high-quality research papers presented at International Conference on Advanced Computing and Intelligent Technologies (ICACIT 2022), held at BIHER Chennai India, during March 12–13, 2022, jointly organized by Institute of Higher Education and Research Chennai 600073, Indira Gandhi National Tribal University, Regional Campus Manipur, India, and Department of Information Engineering and Mathematics Università Di Siena, Italy. It discusses emerging topics pertaining to advanced computing, intelligent technologies and networks including AI and machine learning, data mining, big data analytics, high performance computing network performance analysis, Internet of things networks, wireless sensor networks, and others. The book offers a valuable asset for researchers from both academia and industries involved in advanced studies.

Evolution of Digitized Societies Through Advanced Technologies (Advanced Technologies and Societal Change)

by Amitava Choudhury T. P. Singh Arindam Biswas Mrinal Anand

This book provides an understanding of the evolution of digitization in our day to day life and how it has become a part of our social system. The obvious challenges faced during this process and how these challenges were overcome have been discussed. The discussions revolve around the solutions to these challenges by leveraging the use of various advanced technologies. The book mainly covers the use of these technologies in variety of areas such as smart cities, healthcare informatics, transportation automation, digital transformation of education. The book intends to be treated as a source to provide the systematic discussion to the bouquet of areas that are essential part of digitized societies. In light of this, the book accommodates theoretical, methodological, well-established, and validated empirical work dealing with various related topics.

Overhang Design Methods: Optimal Thermal and Daylighting Performance (SpringerBriefs in Architectural Design and Technology)

by Sanja Stevanovic

It is estimated that windows in office buildings are responsible for one third of energy used for their heating and cooling. Designing window shading that balances often contradictory goals of preventing excessive heat gains in hot periods, without compromising beneficial heat gains in cold periods or visual comfort in indoor spaces of modern buildings with highly glazed facades, is an interesting multi-objective optimisation problem that represents an active research topic in the field of building energy and daylighting. Window overhangs are the simplest and most traditional shading devices that are easy to install, highly cost-effective, require low or no maintenance and offer unobstructed views outside. This book provides a review of overhang design methods for optimal thermal and daylighting performance. It starts with a historical overview of methods based on solar positions and shading masks. Next it discusses current research methodology, including shading calculation methods, ways of quantifying thermal and daylighting overhang effectiveness and the use of multi-objective optimisation approaches, together with the case studies that employ them. It further covers methods for designing innovative overhang types such as NURBS outlined overhangs and PV integrated dynamic overhangs. The appendix classifies published overhang case studies according to major climate type and latitude of their locations. As such, the book presents a valuable resource for understanding subtle nuances of interaction between solar radiation, shading devices and indoor comfort. The intended target audience are building energy researchers interested in optimisation of window shading devices.​

Computational Methods and Data Engineering: Proceedings of ICCMDE 2021 (Lecture Notes on Data Engineering and Communications Technologies #139)

by Vijayan K. Asari Vijendra Singh Rajkumar Rajasekaran R. B. Patel

The book features original papers from International Conference on Computational Methods and Data Engineering (ICCMDE 2021), organized by School of Computer Science and Engineering, Vellore Institute of Technology, Vellore, Tamil Nadu, India, during November 25–26, 2021. The book covers innovative and cutting-edge work of researchers, developers, and practitioners from academia and industry working in the area of advanced computing.

Cloud Computing Technology

by Huawei Technologies Co., Ltd.

This open access book introduces cloud computing and related technologies from the concept, technology, and architecture of cloud computing, combined with typical application cases of cloud; provides students with a more complete knowledge framework in the field of cloud computing; and lays the foundation for future research, development, and further study in cloud computing, big data, and other related fields. As the world's leading provider of ICT (information and communication technology) infrastructure and intelligence terminals, Huawei's products are already available in a number of areas, including connectivity, security, wireless, storage, cloud computing, intelligent computing, and artificial intelligence.

Data Communications and Network Technologies

by Huawei Technologies Co., Ltd.

This open access book is written according to the examination outline for Huawei HCIA-Routing Switching V2.5 certification, aiming to help readers master the basics of network communications and use Huawei network devices to set up enterprise LANs and WANs, wired networks, and wireless networks, ensure network security for enterprises, and grasp cutting-edge computer network technologies. The content of this book includes: network communication fundamentals, TCP/IP protocol, Huawei VRP operating system, IP addresses and subnetting, static and dynamic routing, Ethernet networking technology, ACL and AAA, network address translation, DHCP server, WLAN, IPv6, WAN PPP and PPPoE protocol, typical networking architecture and design cases of campus networks, SNMP protocol used by network management, operation and maintenance, network time protocol NTP, SND and NFV, programming, and automation. As the world’s leading provider of ICT (information and communication technology) infrastructure and smart terminals, Huawei’s products range from digital data communication, cyber security, wireless technology, data storage, cloud-computing, and smart computing to artificial intelligence.

Database Principles and Technologies – Based on Huawei GaussDB

by Huawei Technologies Co., Ltd.

This open access book contains eight chapters that deal with database technologies, including the development history of database, database fundamentals, introduction to SQL syntax, classification of SQL syntax, database security fundamentals, database development environment, database design fundamentals, and the application of Huawei’s cloud database product GaussDB database. This book can be used as a textbook for database courses in colleges and universities, and is also suitable as a reference book for the HCIA-GaussDB V1.5 certification examination. The Huawei GaussDB (for MySQL) used in the book is a Huawei cloud-based high-performance, highly applicable relational database that fully supports the syntax and functionality of the open source database MySQL. All the experiments in this book can be run on this database platform. As the world’s leading provider of ICT (information and communication technology) infrastructure and smart terminals, Huawei’s products range from digital data communication, cyber security, wireless technology, data storage, cloud computing, and smart computing to artificial intelligence.

Computer Networks and Inventive Communication Technologies: Proceedings of Fifth ICCNCT 2022 (Lecture Notes on Data Engineering and Communications Technologies #141)

by S. Smys Pavel Lafata Ram Palanisamy Khaled A. Kamel

This book is a collection of peer-reviewed best selected research papers presented at 5th International Conference on Computer Networks and Inventive Communication Technologies (ICCNCT 2022). The book covers new results in theory, methodology, and applications of computer networks and data communications. It includes original papers on computer networks, network protocols and wireless networks, data communication technologies, and network security. The proceedings of this conference is a valuable resource, dealing with both the important core and the specialized issues in the areas of next generation wireless network design, control, and management, as well as in the areas of protection, assurance, and trust in information security practice. It is a reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners for advance work in the area.

Confidential Computing: Hardware Based Memory Protection (Advanced Technologies and Societal Change)

by Vicente Garcia Diaz Gloria Jeanette Rincón Aponte

This book highlights the three pillars of data security, viz protecting data at rest, in transit, and in use. Protecting data at rest means using methods such as encryption or tokenization so that even if data is copied from a server or database, a thief cannot access the information. Protecting data in transit means making sure unauthorized parties cannot see information as it moves between servers and applications. There are well-established ways to provide both kinds of protection. Protecting data while in use, though, is especially tough because applications need to have data in the clear—not encrypted or otherwise protected—in order to compute. But that means malware can dump the contents of memory to steal information. It does not really matter if the data was encrypted on a server’s hard drive if it is stolen while exposed in memory.​ As computing moves to span multiple environments—from on-premise to public cloud to edge—organizations need protection controls that help safeguard sensitive IP and workload data wherever the data resides. Many organizations have declined to migrate some of their most sensitive applications to the cloud because of concerns about potential data exposure. Confidential computing makes it possible for different organizations to combine data sets for analysis without accessing each other’s data.

Construction, Operation and Maintenance of Network System(Junior Level)

by Huawei Technologies Co., Ltd.

This open access book follows the development rules of network technical talents, simultaneously placing its focus on the transfer of network knowledge, the accumulation of network skills, and the improvement of professionalism. Through the complete process from the elaboration of the theories of network technology to the analysis of application scenarios then to the design and implementation of case projects, readers are enabled to accumulate project experience and eventually acquire knowledge and cultivate their ability so as to lay a solid foundation for adapting to their future positions. This book comprises six chapters, which include “General Operation Safety of Network System,” “Cabling Project,” “Hardware Installation of Network System,” “Basic Knowledge of Network System,” “Basic Operation of Network System,” and “Basic Operation and Maintenance of Network System.” This book can be used for teaching and training for the vocational skills certification of network system construction, operation, and maintenance in the pilot work of Huawei’s “1+X” Certification System, and it is also suitable as a textbook for application-oriented universities, vocational colleges, and technical colleges. In the meantime, it can also serve as a reference book for technicians engaged in network technology development, network management and maintenance, and network system integration. As the world’s leading ICT (information and communications technology) infrastructure and intelligent terminal provider, Huawei Technologies Co., Ltd. has covered many fields such as data communication, security, wireless, storage, cloud computing, intelligent computing, and artificial intelligence. Taking Huawei network equipment (routers, switches, wireless controllers, and wireless access points) as the platform, and based on network engineering projects, this book organizes all the contents according to the actual needs of the industry.

The New Civilization Upon Data: How Big Data Reshapes Human Civilization, Business and the Personal World

by Zipei Tu

This book focuses on the changes which big data brings to human's society and personal thinking models. The author uses the concept of “data civilization” to reveal that we have entered a brand-new era on civilization level, which could be found and understood from three levels: human data civilization, commercial data civilization, and personal data civilization. There is no doubt data civilization will inevitably make a profound influence on the subversion and reconstruction of human beings including business, society, and thinking models. The book presents a unique perspective to understand the world which is dominated by data more and more.

Computational Intelligence in Pattern Recognition: Proceedings of CIPR 2022 (Lecture Notes in Networks and Systems #480)

by Asit Kumar Das Janmenjoy Nayak Bighnaraj Naik S. Vimal Danilo Pelusi

This book features high-quality research papers presented at the 4th International Conference on Computational Intelligence in Pattern Recognition (CIPR 2022), held at Indian Institute of Engineering Science and Technology, Shibpur, Howrah, West Bengal, India, during 23 – 24 April 2022. It includes practical development experiences in various areas of data analysis and pattern recognition, focusing on soft computing technologies, clustering and classification algorithms, rough set and fuzzy set theory, evolutionary computations, neural science and neural network systems, image processing, combinatorial pattern matching, social network analysis, audio and video data analysis, data mining in dynamic environments, bioinformatics, hybrid computing, big data analytics and deep learning. It also provides innovative solutions to the challenges in these areas and discusses recent developments.

Smart Education and e-Learning - Smart Pedagogy (Smart Innovation, Systems and Technologies #305)

by Vladimir L. Uskov Robert J. Howlett Lakhmi C. Jain

This book serves as a reference for researchers and practitioners in academia and industry. Smart education, smart e-learning and smart pedagogy are emerging and rapidly growing areas that have a potential to transform existing teaching strategies, learning environments and educational activities and technology. They are focused at enabling instructors to develop innovative ways of achieving excellence in teaching in highly technological smart university and providing students with new opportunities to maximize their success using smart classrooms, smart systems and technology. This book contains the contributions presented at the 9th international KES conference on Smart Education and e-Learning (SEEL-2022) with the Smart Pedagogy as the main conference theme. It comprises of forty nine high-quality peer-reviewed papers that are grouped into several interconnected parts: Part 1—Smart Pedagogy, Part 2—Smart Education, Part 3—Smart e-Learning, Part 4—Smart University, Part 5—Smart Education: Systems and Technology, Part 6—Digital Humanities and Social Sciences for Smart University Development: the Innovative Methods, Models and Technologies, Part 7—Digital Transformation of Education and Economics in Smart University and Part 8—Smart Education for Children with Special Educational Needs. We believe this book will serve as a useful source of research data and valuable information for faculty, scholars, Ph.D. students, administrators and practitioners—those who are interested in smart education, smart e-learning and smart pedagogy.

Proceedings of Third Doctoral Symposium on Computational Intelligence: DoSCI 2022 (Lecture Notes in Networks and Systems #479)

by Ashish Khanna Deepak Gupta Vineet Kansal Giancarlo Fortino Aboul Ella Hassanien

This book features high-quality research papers presented at Third Doctoral Symposium on Computational Intelligence (DoSCI 2022), organized by Institute of Engineering and Technology (IET), AKTU, Lucknow, India, on March 5, 2022. This book discusses the topics such as computational intelligence, artificial intelligence, deep learning, evolutionary algorithms, swarm intelligence, fuzzy sets and vague sets, rough set theoretic approaches, quantum inspired computational intelligence, hybrid computational intelligence, machine learning, computer vision, soft computing, distributed computing, parallel and grid computing, cloud computing, high performance computing, biomedical computing, and decision support and decision making.

Proceedings of International Conference on Network Security and Blockchain Technology: ICNSBT 2021 (Lecture Notes in Networks and Systems #481)

by Debasis Giri Jyotsna Kumar Mandal Kouichi Sakurai Debashis De

The book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2021), organized by Computer Society of India—Kolkata Chapter, India, during December 2–4, 2021. The book discusses recent developments and contemporary research in cryptography, network security, cyber security, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world.

Solution and Characteristic Analysis of Fractional-Order Chaotic Systems

by Kehui Sun Shaobo He Huihai Wang

This book highlights the solution algorithms and characteristic analysis methods of fractional-order chaotic systems. Fractal dimensions exist broadly in the study of nature and the development of science and technology. Fractional calculus has become a hot research area in nonlinear science. Fractional-order chaotic systems are an important part of fractional calculus. The book discusses the numerical solution algorithms and characteristic analysis of fractional-order chaotic systems and introduces the techniques to implement the systems with circuits. To facilitate a quick grasp, the authors present examples from their years of work in the appendix. Intended for graduate students and researchers interested in chaotic systems, the book helps one to build a theoretical and experimental foundation for the application of fractional-order chaotic systems.

Smart Data Intelligence: Proceedings of ICSMDI 2022 (Algorithms for Intelligent Systems)

by R. Asokan Diego P. Ruiz Zubair A. Baig Selwyn Piramuthu

This book presents high-quality research papers presented at 2nd International Conference on Smart Data Intelligence (ICSMDI 2022) organized by Kongunadu College of Engineering and Technology at Trichy, Tamil Nadu, India, during April 2022. This book brings out the new advances and research results in the fields of algorithmic design, data analysis, and implementation on various real-time applications. It discusses many emerging related fields like big data, data science, artificial intelligence, machine learning, and deep learning which have deployed a paradigm shift in various data-driven approaches that tends to evolve new data-driven research opportunities in various influential domains like social networks, healthcare, information, and communication applications.

Quality Assessment of Visual Content (Advances in Computer Vision and Pattern Recognition)

by Ke Gu Hongyan Liu Chengxu Zhou

This book provides readers with a comprehensive review of image quality assessment technology, particularly applications on screen content images, 3D-synthesized images, sonar images, enhanced images, light-field images, VR images, and super-resolution images. It covers topics containing structural variation analysis, sparse reference information, multiscale natural scene statistical analysis, task and visual perception, contour degradation measurement, spatial angular measurement, local and global assessment metrics, and more. All of the image quality assessment algorithms of this book have a high efficiency with better performance compared to other image quality assessment algorithms, and the performance of these approaches mentioned above can be demonstrated by the results of experiments on real-world images. On the basis of this, those interested in relevant fields can use the results obtained through these quality assessment algorithms for further image processing. The goal of this book is to facilitate the use of these image quality assessment algorithms by engineers and scientists from various disciplines, such as optics, electronics, math, photography techniques and computation techniques. The book can serve as a reference for graduate students who are interested in image quality assessment techniques, for front-line researchers practicing these methods, and for domain experts working in this area or conducting related application development.

Agents and Multi-Agent Systems: Proceedings of 16th KES International Conference, KES-AMSTA 2022, June 2022 (Smart Innovation, Systems and Technologies #306)

by Gordan Jezic Yun-Heh Jessica Chen-Burger Mario Kusek Roman Šperka Robert J. Howlett Lakhmi C. Jain

The book highlights new trends and challenges in research on agents and the new digital and knowledge economy. It includes papers on business process management, agent-based modeling and simulation and anthropic-oriented computing that were originally presented at the 16th International KES Conference on Agents and Multi-Agent Systems: Technologies and Applications (KES-AMSTA 2022), held at Rhodes, Greece in June 20–22, 2022. The respective papers cover topics such as software agents, multi-agent systems, agent modeling, mobile and cloud computing, big data analysis, business intelligence, artificial intelligence, social systems, computer embedded systems and nature inspired manufacturing, all of which contribute to the modern digital economy.

Refine Search

Showing 52,801 through 52,825 of 54,344 results