Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
This book constitutes the revised selected papers from the 23rd International Conference on Information Security Applications, WISA 2022, which took place on Jeju Island, South Korea, during August 2022.The 25 papers included in this book were carefully reviewed and selected from 76 submissions. They were organized in topical sections as follows: network security; cryptography; vulnerability analysis; privacy enhancing technique; security management; security engineering.
This book constitutes the refereed proceedings of the 18th EAI International Conference, SecureComm 2022, Virtual Event, October 2022, Proceedings. The 43 full papers included in this book were carefully reviewed and selected from 130 submissions. They were organized in topical sections as follows: AI for Security, Applied Cryptography, Binary Analysis, Blockchain, Cryptography, Data Security, Intrusion Detection, Mobile Security, Network Security, Privacy, Software Security, Security and Privacy-preserving Solutions in the Internet of Things (S/P-IoT).
This book constitutes the refereed proceedings of the 28th China Conference on Information Retrieval, CCIR 2022, held in Chongqing, China, in September 2022. Information retrieval aims to meet the demand of human on the Internet to obtain information quickly and accurately. The 8 full papers presented were carefully reviewed and selected from numerous submissions. The papers provide a wide range of research results in information retrieval area.
This volume constitutes the papers of several workshops which were held in conjunction with the ICWE 2022 International Workshops, BECS, SWEET and WALS, held in Bari, Italy, July 5¿8, 2022.The 14 revised full papers and 1 short paper presented in this book were carefully reviewed and selected from 25 submissions. ICWE 2022 presents the following three workshops:Second International Workshop on Big Data driven Edge Cloud Services (BECS 2022)First International Workshop on the Semantic WEb of Everything (SWEET 2022)First International Workshop on Web Applications for Life Sciences (WALS 2022)
This book constitutes the refereed proceedings of the Second International Conference on Applied Intelligence and Informatics, AII 2022, held in Reggio Calabria, Italy, during September 1¿3, 2022. The 38 full papers included in this book were carefully reviewed and selected from 108 submissions. They were organized in topical sections as follows: ¿Emerging Applications of AI and Informatics; Application of AI and Informatics in Healthcare; Application of AI and Informatics in Pattern Recognition; and Application of AI and Informatics in Network, Security, and Analytics.
This book is oriented towards applications and perspectives on future developments connected to intelligent technologies. Specifying topics connected to industry, mobility, telecommunications, biomechanics, among others.The innovative character of the text allows relating technical experiences and advances that seek to improve the implication of new technologies at local, national and regional levels, demonstrating the advances towards the different fields of knowledge in the area of engineering.The potential readers of this work would be master and doctorate students, professors¿researchers in the field of new technologies and companies connected to the development of engineering. The texts serve to illustrate new procedures, new cases and new techniques for the optimization of systems that optimize social progress.
This book constitutes the thoroughly refereed post-conference proceedings of the 15th EAI International Conference on Mobile Multimedia Communications, MobiMedia 2022, held in July 22-24, 2022. Due to COVID-19 pandemic the conference was held virtually. The 29 full papers presented were carefully selected from numerous submissions. The papers are organized in topical sections as follows: Internet of Things and Wireless Communications Communication Strategy Optimization; Cyberspace Security on Cryptography, Privacy Protection, Data Sharing, Access Control and Task Prediction; Neural Networks and Feature Learning; and Object Recognition and Detection.
This book constitutes the post-conference proceedings of the First MICCAI Workshop on Medical Applications with Disentanglements, MAD 2022, held in conjunction with MICCAI 2022, in Singapore, on September22, 2022. The 8 full papers presented in this book together with one short paper were carefully reviewed and cover generative adversarial networks (GAN), variational autoencoders (VAE) and normalizing-flow architectures as well as a wide range of medical applications, like brain age prediction, skull reconstruction and unsupervised pathology disentanglement.
This book constitutes the refereed post-conference proceedings of the 5th EAI International Conference on Innovations and Interdisciplinary Solutions for Underserved Areas, InterSol 2022, held in Nile University of Nigeria Abuja, Nigeria, in March 2022. The 26 papers presented were selected from 66 submissions and issue different problems in underserved and unserved areas. They face problems in almost all sectors such as energy, water, communication, climate change, food, education, transportation, social development, and economic growth.
The book investigates acoustic cloaking for elliptical targets, starting from the development of a systematic approach to deal with such non-axisymmetrical shapes by adopting transformation acoustics in elliptic coordinates, and concluding with numerical and experimental validation of a microstructured cloak in the underwater environment. The book thus comprises all the steps from theory to practice that led to the first experimental validation of acoustic invisibility for non-cylindrical objects, whose results are presented in the last chapter. Indeed, despite Transformation Theory is now an established tool to design material distributions capable to unlock the design of invisibility devices, it is not trivial to apply it for shapes different than the sphere and the cylinder, which are thus the ones mainly addressed in the literature. This book paves the way for exploration of other shapes, demonstrating the effectiveness of a pentamode cloak in reducing the acoustic visibility of anelliptical target, and discussing design choices that can make the implementation of the required microstructure less cumbersome despite the lack of axial symmetry of the problem, from both the numerical and manufacturing point of views.
This book constitutes the proceedings of the 10th International Conference on Big Data Analytics, BDA 2022, which took place in Hyderabad, India, in December 2022.The 7 full papers and 7 short papers presented in this volume were carefully reviewed and selected from 36 submissions. The book also contains 4 keynote talks in full-paper length. The papers are organized in the following topical sections: Big Data Analytics: Vision and Perspectives; Data Science: Architectures; Data Science: Applications; Graph Analytics; Pattern Mining; Predictive Analytics in Agriculture.
This volume constitutes the refereed proceedings of the 5th International Workshop on Emerging Technologies for Authorization and Authentication, ETAA 2022, held in Copenhagen, Denmark, on September 30, 2022, co-located with ESORICS 2022.The revised 8 full papers presented together with one invited paper were carefully reviewed and selected from 10 submissions. They cover topics such as: new techniques for biometric and behavioral based authentication, authentication and authorization in the IoT and in distributed systems in general, including the smart home environment.
This book comprises high-quality peer-reviewed research papers presented at the 4th International Symposium on Computer Science, Digital Economy and Intelligent Systems (CSDEIS2022), held in Wuhan, China, from November 11¿13, 2022, organized jointly by the Wuhan University of Technology, Hubei University of Technology, Wuhan University of Science and Technology, the Polish Operational and Systems Society, and the International Center of Informatics and Computer Science (ICICS). The topics discussed in the book include state-of-the-art papers in computer science and their technological applications; intelligent systems and intellectual approaches; digital economics and educational approaches. It is an excellent source of references for researchers, graduate students, engineers, management practitioners, and undergraduate students interested in computer science and its applications in engineering and management.
This book constitutes the refereed proceedings of the 21st International Workshop, IWDW 2022, held in Guilin, China, during November 18-19, 2022. The 14 full papers included in this book were carefully reviewed and selected from 30 submissions. They were organized in topical sections as follows: Steganology, Forensics and Security Analysis, Watermarking.
This book constitutes the refereed proceedings of the First Southwest Data Science Conference, on The Recent Advances in Transdisciplinary Data Science, SDSC 2022, held in Waco, TX, USA, during March 25¿26, 2022.The 14 full papers and 2 short papers included in this book were carefully reviewed and selected from 72 submissions. They were organized in topical sections as follows: Business and social data science; Health and biological data science; Applied data science, artificial intelligence, and data engineering.
This book constitutes the proceedings of the 13th International Workshop on Statistical Atlases and Computational Models of the Heart, STACOM 2022, held in conjunction with the 25th MICCAI conference.The 34 regular workshop papers included in this volume were carefully reviewed and selected after being revised and deal with topics such as: common cardiac segmentation and modelling problems to more advanced generative modelling for ageing hearts, learning cardiac motion using biomechanical networks, physics-informed neural networks for left atrial appendage occlusion, biventricular mechanics for Tetralogy of Fallot, ventricular arrhythmia prediction by using graph convolutional network, and deeper analysis of racial and sex biases from machine learning-based cardiac segmentation.In addition, 14 papers from the CMRxMotion challenge are included in the proceedings which aim to assess the effects of respiratory motion on cardiac MRI (CMR) imaging quality and examine the robustness of segmentation models in face of respiratory motion artefacts. A total of 48 submissions to the workshop was received.
This book represents an excellent opportunity for understanding project management in its new form for professionals, undergraduate and post-graduate students, and people willing to prepare the Project Management Professional (PMI-PMP®) exam. The distinctive feature of this book consists in the approach, very pragmatic and rich in practical examples. In particular, there are several ¿myth¿ and ¿bad ideä boxes where common problematic scenarios that a project manager can find in its everyday working life are discussed and solved according to the book¿s contents. In addition, the book includes several original explanations of some business phenomena, such as the ¿Leadership of the nun¿, ¿The gardener project manager¿, ¿The hamster¿, ¿the change-order dragon¿ and others. Last but not least, it explores several concepts that aren¿t included into most of project management books, such as Sustainability in triple bottom line, Management for Stakeholders and social network analysis, and an extensive part on complexity. The last part of the book is dedicated to concepts that are not properly part of project management, but are relevant for a project manager to be aware of in order to be able to interface with colleagues and partners belonging to these contiguous business worlds.
This book aims to review the key areas of modern research in power engineering regarding environmental conservation, as well as the research and development of digital technologies in the energy sector.The main result of fruitful work within the framework of the III International Conference "Energy Ecosystems: Prospects and Challenges: Applied Digital Technologies" has become this book, which includes 16 best reports on priority issues of modern energy development.The book is of interest to scientists, students, researchers, representatives of energy companies, representatives of leading Russian and European universities, and research institutes. We feel confident that our book will serve as an important source of information and knowledge that will lead to scientific and innovative progress in the field of sustainable development of the society.
This book briefly looks at numerical modeling and micromagnetic simulation results of magnonic crystals, which are periodically modulated magnonic devices regarded as the magnetic counterpart of photonic crystals with spin waves acting as the information carrier. Since the wavelength of the spin wave is several orders of magnitude shorter than that of electromagnetic waves of the same frequency, magnonic crystals are promising candidates for miniaturization, especially in the fields of data storage and processing. The book begins by describing the dispersion relation of dipolar spin waves in a magnonic curved waveguide, solving Walker's equation in cylindrical coordinates, and then calculating the dispersion of exchange spin waves using perturbation theory. It describes simulated nano-contact-driven spin wave excitations in a magnonic cavity, featuring a design of an antidot magnonic crystal around the nano-contact, with the frequency of the spin wave mode generated lying within the band gap of the magnonic crystal. The proposed device behaves as a SWASER¿Spin Wave Amplification by the Stimulated Emission of Radiation. This book will find interest among researchers and practitioners interested in the modeling, simulation, and design of novel magnonic devices.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.