Risks and Security of Internet and Systems: 14th International Conference, Crisis 2019, Hammamet, Tunisia, October 29-31, 2019, Proceedings, Kallel Slim, Cuppens Frйdйric, Cuppens-Boulahia Nora
Описание: This book contains extended versions of the best papers presented at the First International Workshop on Distributed Computing for Emerging Smart Networks, DiCES-N 2019, held in Hammamet, Tunisia, in October 2019. The 9 revised full papers included in this volume were carefully reviewed and selected from 24 initial submissions.
Описание: This volume constitutes the refereed proceedings of the 10th International Conference on Multimedia Communications, Services and Security, MCSS 2020, held in Krakow, Poland, in October 2020. The 24 full papers and 2 short papers included in the volume were selected from 54 submissions.
Описание: This book presents the proceedings of the 5th International Conference on Advanced Intelligent Systems and Informatics 2019 (AISI2019), which took place in Cairo, Egypt, from October 26 to 28, 2019. This international and interdisciplinary conference, which highlighted essential research and developments in the fields of informatics and intelligent systems, was organized by the Scientific Research Group in Egypt (SRGE). The book is divided into several sections, covering the following topics: machine learning and applications, swarm optimization and applications, robotic and control systems, sentiment analysis, e-learning and social media education, machine and deep learning algorithms, recognition and image processing, intelligent systems and applications, mobile computing and networking, cyber-physical systems and security, smart grids and renewable energy, and micro-grid and power systems.
Описание: This three-volume book highlights significant advances in the development of new information systems technologies and architectures. Further, it helps readers solve specific research and analytical problems and glean useful knowledge and business value from data. Each chapter provides an analysis of a specific technical problem, followed by a numerical analysis, simulation, and implementation of the solution to the real-world problem.Managing an organization, especially in today’s rapidly changing environment, is a highly complex process. Increased competition in the marketplace, especially as a result of the massive and successful entry of foreign businesses into domestic markets, changes in consumer behaviour, and broader access to new technologies and information, calls for organisational restructuring and the introduction and modification of management methods using the latest scientific advances. This situation has prompted various decision-making bodies to introduce computer modelling of organization management systems.This book presents the peer-reviewed proceedings of the 40th Anniversary International Conference “Information Systems Architecture and Technology” (ISAT), held on September 15–17, 2019, in Wroc?aw, Poland. The conference was organised by the Computer Science Department, Faculty of Computer Science and Management, Wroclaw University of Sciences and Technology, and University of Applied Sciences in Nysa, Poland. The papers have been grouped into three major sections:Part I—discusses topics including, but not limited to, artificial intelligence methods, knowledge discovery and data mining, big data, knowledge-based management, Internet of Things, cloud computing and high-performance computing, distributed computer systems, content delivery networks, and service-oriented computing.Part II—addresses various topics, such as system modelling for control, recognition and decision support, mathematical modelling in computer system design, service-oriented systems, and cloud computing, and complex process modelling.Part III—focuses on a number of themes, like knowledge-based management, modelling of financial and investment decisions, modelling of managerial decisions, production systems management, and maintenance, risk management, small business management, and theories and models of innovation.
Описание: This book constitutes the refereed proceedings of the 34th IFIP TC 11 International Conference on Information Security and Privacy Protection, SEC 2019, held in Lisbon, Portugal, in June 2019. The 26 revised full papers presented were carefully reviewed and selected from 76 submissions.
Описание: The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.
The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows:
Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.
Описание: Design and Implementation of Automatic Following Technology for Mobile Devices.- Efficient Deployment Based on Congestion Control Delivery in Multi-Hop Wireless Sensor Network.- A combined routing path and node importance network invulnerability evaluating method for Ad Hoc network.- An OFDMA-based neighbor discovery and tracking protocol for directional Ad-Hoc Network.- Understanding Mobile User Intent Using Attentive Sequence-to-Sequence RNNs.- Relay Selection exploiting Genetic Algorithms for Multi-Hop Device-to-Device Communication.- A Deep Reinforcement Learning Based Intrusion Detection System (DRL-IDS) For Securing Wireless Sensor Networks and Internet of Things.- A Coin Recognition System Towards Unmanned Stores Using Convolutional Neural Networks.- Towards the Implementation of Movie Recommender System by Using Unsupervised Machine Learning Schemes.- A Group Signature Scheme for Securing Blockchain-based Mobile Edge Computing.- A Research on Blockchain-Based Central Bank Digital Currency.- Application of Blockchain in Smart Contracts Technology.- Discover the Optimal IoT Packets Routing Path of Software-Defined Network via Artificial Bee Colony Algorithm.- Network Protocols and Connectivity for Internet of Things.- BatTalk: Monitoring Asian Parti-colored Bats through the IoT Technology.- Using multi-channel transmission technology to construct an IoT mechanism for homecare service.- IOT Applications to the Land Acquisition Evaluation Mechanism.- An Edge Computing Architecture for Object Detection.- The Implementation of an Edge Computing Architecture with LoRaWAN for Air Quality Monitoring Applications.- Combination of OFDM and CDMA Techniques for a High Bandwidth Optimization and a Great Improve-ment of Signal Quality in OFDM Systems.- Traffic Load Perception based OFDMA MAC Protocol for the Next Generation WLAN.- Environment Sensing based Adaptive Acknowledgement and Backoff for the Next Generation WLAN.- Multi-BSS Association and Cooperation based Handoff Scheme for the Next Generation mmWave WiFi: IEEE 802.11ay.- A Plug-in Framework for Efficient Multicast Using SDN.- Cross-border E-commerce Intellectual Property Protection in China-U.S. Trade Friction.- A Framework for Big Data Analytics on Service Quality Evaluation of Online Bookstore.- Intention of online consumers to buy behavior affected by extreme weather-take the mainland Chinese Haining market as an example.
Описание: This edited book is about basics and high level concepts regarding Blockchain Technology and Application, Multimedia Security, Information Processing, Security of Network, Cloud and IoT, Cryptography and Cryptosystem, Learning and Intelligent Computing, Information Hiding.
Описание: Part 1: Communication & Network Technologies.- Chapter 1. State Of The Art: A Review on Vehicular Communications, Impact of 5g, Fractal Antennas for Future Communication.- Chapter 2. Energy Enhancement of TORA and DYMO by Optimization of Hello Messaging using BFO for MANET's.- Chapter 3. Horseshoe Shaped Multiband Antenna for Wireless Application.- Chapter 4. A Review Paper on Performance Analysis of IEEE 802.11e.- Chapter 5. Voice Control IOT Devices Framework for Smart Home.- Chapter 6. Comprehensive Analysis of Social based Opportunistic Routing Protocol: A Study.- Chapter 7. An Efficient Delay based Load Balancing using AOMDV in MANET.- Chapter 8. Metaheuristic-based Intelligent Solutions Searching Algorithms of Ant Colony Optimization and Backpropagation in Neural Networks.- Chapter 9. Evaluating Cohesion Score with Email Clustering.-Chapter 10. Congestion Control for Named Data Networking Based Wireless Ad-hoc Network.-Chapter 11. A Comparative review of various techniques for Image Splicing Detection and Localization..-Chapter 12. Analysis and Synthesis of Performance Parameter of Rectangular Patch Antenna.- Part 2: Advanced Computing Technologies & Latest Electrical & Electronics Trends.- Chapter 13. Fog Computing Research Opportunities & Challenges: A Comprehensive Survey.- Chapter 14. IIGPTS: IoT-based framework for Intelligent Green Public Transportation System.- Chapter 15. Integrating the AAL CasAware platform within an IoT ecosystem, leveraging the INTER-IoT approach.
Описание: This book constitutes the refereed proceedings of the 18th International Conference on Information Security, ISSA 2019, held in Johannesburg, South Africa, in August 2019. The 12 revised full papers presented were carefully reviewed and selected from 35 submissions. operating systems security; file system security; Web protocol security;
Описание: Flag-assisted Early Release of RRC Scheme for Power Saving in NB-IoT System.- DTMFTalk: A DTMF-based Realization of IoT Remote Control for Smart Elderly Care.- IoT Insider Attack - Survey.- Energy Management for Zones-based Isolated DC Multi-microgrids.- Mining network security holes based on data flow analysis technology.- Network Design for Internet of Things in Energy Sector.- Power Prediction via Module Temperature for Solar Modules Under Soiling Conditions.- Customized Attack Detection Under Power Industrial Control System.- HomeTalk: A Smart Home Platform.- Deep Learning Based Pest Identification on Mobile Prediction Traffic Flow with Combination Arima and PageRank.
Описание: The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called "International Conference on Cloud Computing and Security" with the acronym ICCCS.
The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows:
Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru