Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book presents the proceedings of the 5th International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2022), which took place at the University of Windsor, Windsor, Canada, October 12-14, 2022. The book addresses issues related to new dependability paradigms, design, and performance of dependable network computing and mobile systems, as well as issues related to the security of these systems. The goal of the conference is to provide a forum for researchers, students, scientists and engineers working in academia and industry to share their experiences, new ideas and research results in the above-mentioned areas.
This book constitutes selected papers presented at the First International Conference on Artificial Intelligence and Internet of Things, ICAII 2022, held in Jamshedpur, India. ICAII 2022 has been postponed to April 2023. The 23 papers were thoroughly reviewed and selected from the 86 submissions. They are arranged in topical sections on ¿artificial Intelligence, and Internet of Things.
This book constitutes the proceedings of the 17th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2023, held in Kent, United Kingdom, in July 2023. The 37 full papers presented in this volume were carefully reviewed and selected from 54 submissions. They are organized in the following topical sections: education and training; management, policy and skills; evolving threats and attacks; social-technical factors; and research methods.
This book demonstrates that the reliable and secure communication performance of maritime communications can be significantly improved by using intelligent reflecting surface (IRS) aided communication, privacy-aware Internet of Things (IoT) communications, intelligent resource management and location privacy protection. In the IRS aided maritime communication system, the reflecting elements of IRS can be intelligently controlled to change the phase of signal, and finally enhance the received signal strength of maritime ships (or sensors) or jam maritime eavesdroppers illustrated in this book.The power and spectrum resource in maritime communications can be jointly optimized to guarantee the quality of service (i.e., security and reliability requirements), and reinforcement leaning is adopted to smartly choose the resource allocation strategy. Moreover, learning based privacy-aware offloading and location privacy protection are proposed to intelligently guarantee the privacy-preserving requirements of maritime ships or (sensors). Therefore, these communication schemes based on reinforcement learning algorithms can help maritime communication systems to improve the information security, especially in dynamic and complex maritime environments.This timely book also provides broad coverage of the maritime wireless communication issues, such as reliability, security, resource management, and privacy protection. Reinforcement learning based methods are applied to solve these issues. This book includes four rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students. Practitioners seeking solutions to maritime wireless communication and security related issues will benefit from this book as well.
This book constitutes the refereed post-proceedings of the 15th International Conference on Biomedical Engineering Systems and Technologies, BIOSTEC 2022, held as a Virtual Event, during February 9¿11, 2022. The 21 full papers included in this book were carefully reviewed and selected from 262 submissions. The papers selected to be included in this book contribute to the understanding of relevant trends of current research on Biomedical Engineering Systems and Technologies, including: Pattern Recognition and Machine Learning, Application of Health Informatics in Clinical Cases, Evaluation and Use of Healthcare IT, Medical Signal Acquisition, Analysis and Processing, Data Mining and Data Analysis, Decision Support Systems, e-Health, e-Health Applications, Mobile Technologies for Healthcare Applications and Medical Devices design.
Conduct impact measurement and outcomes evaluation, with a specific focus on nonprofits, using Salesforce Nonprofit Cloud (aka Salesforce for Nonprofits). As funding grows more challenging for nonprofits, having a robust technology system in place allows nonprofits to better seek out funding and receive more when they do. Readers of this book will be better positioned to ensure the long-term success of their organization and make maximum use of their technology.The book begins with an introduction to Salesforce and to Nonprofit Cloud for users who may be new to the platform. Next, you will learn the fundamentals of impact measurement and outcomes evaluation. You will understand why these are important and discover several frameworks that can be used to select outcomes that make sense for your organization to prove that its work is successful. These frameworks include Social Return on Investment (SROI), Cost-Benefit Analysis (CBA), and Pre and Post Comparison (and others).You will use your chosen framework to develop a logic model or theory of change which demonstrates how the work that nonprofits do translates into the outputs and outcomes that clients experience and that nonprofits seek funding to deliver. After covering the theory, author Dustin MacDonald teaches you how to translate the framework you chose into Salesforce. You will learn how to create reports, dashboards, formula fields, roll up summaries, and other basic Salesforce tools in order to collect the information you need to validate your framework.This book also demonstrates how to report on the outcomes you have achieved, tweak results to improve performance, and see the entire end-to-end experience in practice through a set of case studies. The book concludes with a discussion of advanced tools and techniques available inside Salesforce, such as Einstein Prediction Builder, as well as information on how you can immediately apply what you have learned to your own organization.What You Will LearnUnderstand how to use Nonprofit Cloud to collect and analyze dataKnow how to create a theory of change that shows your impactBecome adept at working with impact measurement frameworksBuild everything you need in Salesforce without writing a single line of codeTurn your insights into new funding to keep your organization strongWho This Book Is ForSalesforce administrators, nonprofit staff members, and others working at nonprofits who are required to conduct impact measurement and outcomes evaluation. Additionally, business analysts and technical architects who are designing and implementing solutions for nonprofits at implementation partners will benefit from this book.
This book constitutes the refereed proceedings of the 8th EAI International Conference on IoT as a Service, IoTaaS 2022 was held virtually due to the COVID-19 crisis.The 17 full papers and 10 short papers included in this book were carefully reviewed and selected from 50 submissions. They were organized in topical sections as follows: ¿Next generation wireless networks, Internet of Things, Artificial Intelligence, Wireless Communications, Vehicular Networks, Resource Optimization, Satellite communications and Machine Learning, Network Security.
This book constitutes revised selected papers from the 53rd International Simulation and Gaming Association Conference, ISAGA 2022, which took place in Boston, USA, during July 11¿14, 2022.The 15 full papers presented in this volume were carefully reviewed and selected from 35 submissions. They were organized in topical sections named: education and training; resilience and sustainability; health; and social justice.
This book offers the latest research results in recent development on the principles, techniques and applications in mobile crowdsourcing. It presents state-of-the-art content and provides an in-depth overview of the basic background in this related field. Crowdsourcing involves a large crowd of participants working together to contribute or produce goods and services for the society. The early 21st century applications of crowdsourcing can be called crowdsourcing 1.0, which includes businesses using crowdsourcing to accomplish various tasks, such as the ability to offload peak demand, access cheap labor, generate better results in a timely matter, and reach a wider array of talent outside the organization. Mobile crowdsensing can be described as an extension of crowdsourcing to the mobile network to combine the idea of crowdsourcing with the sensing capacity of mobile devices. As a promising paradigm for completing complex sensing and computationtasks, mobile crowdsensing serves the vital purpose of exploiting the ubiquitous smart devices carried by mobile users to make conscious or unconscious collaboration through mobile networks. Considering that we are in the era of mobile internet, mobile crowdsensing is developing rapidly and has great advantages in deployment and maintenance, sensing range and granularity, reusability, and other aspects. Due to the benefits of using mobile crowdsensing, many emergent applications are now available for individuals, business enterprises, and governments. In addition, many new techniques have been developed and are being adopted. This book will be of value to researchers and students targeting this topic as a reference book. Practitioners, government officials, business organizations and even customers -- working, participating or those interested in fields related to crowdsourcing will also want to purchase this book.
This book constitutes the refereed proceedings of the 13th EAI International Conference on Practical Aspects of Digital Forensics and Cyber Crime, ICDF2C 2022, held in Boston, MA, during November 16-18, 2022.The 28 full papers included in this book were carefully reviewed and selected from 80 submissions. They were organized in topical sections as follows: Image Forensics; Forensics Analysis; spread spectrum analysis; traffic analysis and monitoring; malware analysis; security risk management; privacy and security.
This book constitutes the refereed proceedings of the 20th Annual RECOMB Satellite Workshop on Comparative Genomics, RECOMB-CG 2023 which took place in Istanbul, Turkey, in April 2023. The 15 full papers included in this book were carefully reviewed and selected from 25 submissions. The papers present cutting edge research in comparative genomics, with an emphasis on computational approaches and novel experimental results.Chapters "Inferring Clusters of Orthologous and Paralogous Transcripts" and "Gene Order Phylogeny via Ancestral Genome Reconstruction under Dollo" are published Open Access under Creative Commons Attribution license (CC BY 4.0).
This book constitutes the refereed post-conference proceedings of the 11th International Conference on Smart Cities and Green ICT Systems and 8th International Conference on Vehicle Technology and Intelligent Transport Systems, SMARTGREENS 2022 and VEHITS 2022 was held Virtually on April 27¿29, 2022.The 7 full papers included in this book were carefully reviewed and selected from 80 submissions. They were organized in topical sections as follows:¿smart cities and green ICT systems and vehicle technology and intelligent transport systems.
This book constitutes the refereed proceedings of the 11th International Conference on Networked Systems, NETYS 2023, held in Benguerir, Morocco, during May 22¿24, 2023.The 9 full papers and 3 short papers presented were carefully reviewed and selected from 31 submissions. The scope of the conference covers all aspects related to the design and the development of these systems, including, e.g., cloud systems, formal verification, concurrent and distributed algorithms, data management, data science, parallel/concurrent/distributed programming, machine learning, multi-core architectures, networks, and security.
This book constitutes the refereed proceedings of the 14th EAI International Conference on Towards new e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2022, which was held in Zanzibar, Tanzania, in December 2022.The 30 papers presented in this volume were carefully reviewed and selected from 78 submissions. The papers are organized in the following topical sections: E-infrastructure; E-Services (Farming); E-Services (Health); E-Services (Social); E-Services (Education); and Advanced ICT.
This book offers the latest research results in security and privacy for Intelligent Edge Computing Systems. It presents state-of-the art content and provides an in-depth overview of the basic background in this related field. Practical areas in both security and risk analysis are addressed as well as connections directly linked to Edge Computing paradigms. This book also offers an excellent foundation on the fundamental concepts and principles of security, privacy and risk analysis in Edge Computation infrastructures. It guides the reader through the core ideas with relevant ease.Edge Computing has burst onto the computational scene offering key technologies for allowing more flexibility at the edge of networks. As Edge Computing has evolved as well as the need for more in-depth solutions in security, privacy and risk analysis at the edge. This book includes various case studies and applications on Edge Computing. It includes the Internet of Things related areas, such as smart cities, blockchain, mobile networks, federated learning, cryptography and cybersecurity.This book is one of the first reference books covering security and risk analysis in Edge Computing Systems. Researchers and advanced-level students studying or working in Edge Computing and related security fields will find this book useful as a reference. Decision makers, managers and professionals working within these fields will want to purchase this book as well.
This book constitutes the refereed proceedings and revised selected papers from the 15th International Symposium on Music in the AI Era, CMMR 2021, which took place during November 15¿19, 2021 as a virtual event. The 24 full papers included in this book were carefully reviewed and selected from 48 submissions. The papers are grouped in thematical sessions on Music technology in the IA era; Interactive systems for music; Music Information Retrieval and Modeling; and Music and Performance Analysis.
This book constitutes the jointly proceedings of the 3rd International Conference on Intelligent Edge Processing in the IoT Era, Edge-IoT 2022, and the 4th International Conference on Smart Governance for Sustainable Smart Cities, SmartGov 2022. Both conferences were held online due to COVID-19 pandemic in November 2022, held as virtual events, in November 16-18, 2022.The 12 full papers were selected from 31 submissions. SmartGov 2022 was to promote the development of secure and sustainable smart cities with smart governance, while the theme of Edge-IoT 2022 was to address the decentralization of contemporary processing paradigms, notably Edge processing, focusing on the increasing demand for intelligent processing at the edge of the network, which is paving the way to the Intelligent IoT Erä. Both the EAI SmartGov 2022 and EAI Edge-IoT 2022 conferences were co-located with EAI SmartCity360 international convention.The papers are organized in the following topical sections: Edge-IoT Applications; IoT Architectures, Forecasting and Adversarial Training; Artificial Intelligence and Machine Learning for smart governance; and Smart Transportation.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.