Data and Applications Security and Privacy XXXVI

Data and Applications Security and Privacy XXXVI
Author: Shamik Sural
Publisher: Springer Nature
Total Pages: 330
Release: 2022-07-12
Genre: Computers
ISBN: 3031106849

This book constitutes the refereed proceedings of the 36th Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy, DBSec 2022, held in Newark, NJ, USA, in July 2022. The 12 full papers and 6 short papers presented were carefully reviewed and selected from 33 submissions. The conference covers research in data and applications security and privacy.

Artificial Intelligence Transformations for Healthcare Applications: Medical Diagnosis, Treatment, and Patient Care

Artificial Intelligence Transformations for Healthcare Applications: Medical Diagnosis, Treatment, and Patient Care
Author: Murugan, Thangavel
Publisher: IGI Global
Total Pages: 418
Release: 2024-07-22
Genre: Medical
ISBN:

Artificial intelligence (AI) has emerged as a transformative force across various domains, revolutionizing the way we perceive and address challenges in healthcare. The convergence of AI and healthcare holds immense promise, offering unprecedented opportunities to enhance medical diagnosis, treatment, and patient care. In today’s world, the intersection of AI and healthcare stands as one of the most promising frontiers for innovation and progress. Artificial Intelligence Transformations for Healthcare Applications: Medical Diagnosis, Treatment, and Patient Care embodies this convergence, offering a comprehensive exploration of how AI is revolutionizing various aspects of healthcare delivery. At its core, this book addresses the urgent need for more effective and efficient healthcare solutions in an increasingly complex and data-rich environment. Covering topics such as chronic disease, image classification, and precision medicine, this book is an essential resource for healthcare professionals, medical researchers, AI and machine learning specialists, healthcare administrators and executives, medical educators and students, biomedical engineers, healthcare IT professionals, policy makers and regulators, academicians, and more.

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI

Transactions on Large-Scale Data- and Knowledge-Centered Systems XXXVI
Author: Abdelkader Hameurlain
Publisher: Springer
Total Pages: 204
Release: 2017-11-27
Genre: Computers
ISBN: 3662562669

This volume, the 36th issue of Transactions on Large-Scale Data- and Knowledge-Centered Systems, contains eight revised, extended papers selected from the 3rd International Conference on Future Data and Security Engineering, FDSE 2016, and the 10th International Conference on Advanced Computing and Applications, ACOMP 2016, which were held in Can Tho City, Vietnam, in November 2016. Topics covered include big data analytics, massive dataset mining, security and privacy, cryptography, access control, deep learning, crowd sourcing, database watermarking, and query processing and optimization.

Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications

Future Data and Security Engineering. Big Data, Security and Privacy, Smart City and Industry 4.0 Applications
Author: Tran Khanh Dang
Publisher: Springer Nature
Total Pages: 502
Release: 2021-11-13
Genre: Computers
ISBN: 9811680620

This book constitutes the proceedings of the 8th International Conference on Future Data and Security Engineering, FDSE 2021, held in Ho Chi Minh City, Vietnam, in November 2021.* The 28 full papers and 8 short were carefully reviewed and selected from 168 submissions. The selected papers are organized into the following topical headings: big data analytics and distributed systems; security and privacy engineering; industry 4.0 and smart city: data analytics and security; blockchain and access control; data analytics and healthcare systems; and short papers: security and data engineering. * The conference was held virtually due to the COVID-19 pandemic.

Artificial Intelligence XXXVI

Artificial Intelligence XXXVI
Author: Max Bramer
Publisher: Springer Nature
Total Pages: 500
Release: 2019-12-09
Genre: Computers
ISBN: 3030348857

This book constitutes the proceedings of the 39th SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence, AI 2019, held in Cambridge, UK, in December 2019. The 29 full papers and 14 short papers presented in this volume were carefully reviewed and selected from 49 submissions. The volume includes technical papers presenting new and innovative developments in the field as well as application papers presenting innovative applications of AI techniques in a number of subject domains. The papers are organized in the following topical sections: machine learning; knowledge discovery and data mining; agents, knowledge acquisition and ontologies; medical applications; applications of evolutionary algorithms; machine learning for time series data; applications of machine learning; and knowledge acquisition.

Handbook of Research on AI-Based Technologies and Applications in the Era of the Metaverse

Handbook of Research on AI-Based Technologies and Applications in the Era of the Metaverse
Author: Khang, Alex
Publisher: IGI Global
Total Pages: 554
Release: 2023-07-03
Genre: Computers
ISBN: 1668488531

The recent advancements in the field of the internet of things (IoT), AI, big data, blockchain, augmented reality (AR)/virtual reality (VR), cloud platforms, quantum computing, cybersecurity, and telecommunication technology enabled the promotion of conventional computer-aided industry to the metaverse ecosystem that is powered by AR/VR-driven technologies. In this paradigm shift, the integrated technologies of IoT and AI play a vital role to connect the cyberspace of computing systems and virtual environments. AR/VR supports a huge range of industrial applications such as logistics, the food industry, and manufacturing utilities. AI-Based Technologies and Applications in the Era of the Metaverse discusses essential components of the metaverse ecosystem such as concepts, methodologies, technologies, modeling, designs, statistics, implementation, and maintenance. Covering key topics such as machine learning, deep learning, quantum computing, and blockchain, this premier reference source is ideal for computer scientists, industry professionals, researchers, academicians, scholars, practitioners, instructors, and students.

Ambient Intelligence – Software and Applications –, 9th International Symposium on Ambient Intelligence

Ambient Intelligence – Software and Applications –, 9th International Symposium on Ambient Intelligence
Author: Paulo Novais
Publisher: Springer
Total Pages: 436
Release: 2018-11-04
Genre: Technology & Engineering
ISBN: 303001746X

The aim of the book is to introduce new developments in Ambient Intelligence from researchers of several countries. The book includes different works in the area of Ubiquitous Computing, e-Health, Ambient Assisted Living, Distributed Computing and Context Aware Computing that have been selected by an international committee. The studies have been presented in the 9th International Symposium on Ambient Intelligence held in Toledo in June 2018.

CompTIA Security+ Study Guide

CompTIA Security+ Study Guide
Author: Emmett Dulaney
Publisher: John Wiley & Sons
Total Pages: 552
Release: 2014-04-22
Genre: Computers
ISBN: 1118875478

NOTE: The exam this book covered, CompTIA Security+: SY0-401, was retired by CompTIA in 2017 and is no longer offered. For coverage of the current exam CompTIA Security+: Exam SY0-501, please look for the latest edition of this guide: CompTIA Security+ Study Guide: Exam SY0-501 (9781119416876). Join over 250,000 IT professionals who've earned Security+ certification If you're an IT professional hoping to progress in your career, then you know that the CompTIA Security+ exam is one of the most valuable certifications available. Since its introduction in 2002, over a quarter million professionals have achieved Security+ certification, itself a springboard to prestigious certifications like the CASP, CISSP, and CISA. The CompTIA Security+ Study Guide: SY0-401 covers 100% of the Security+ exam objectives, with clear and concise information on crucial security topics. You'll find everything you need to prepare for the 2014 version of the Security+ certification exam, including insight from industry experts on a wide range of IT security topics. Readers also get access to a robust set of learning tools, featuring electronic flashcards, assessment tests, robust practice test environment, with hundreds of practice questions, and electronic flashcards. CompTIA authorized and endorsed Includes updates covering the latest changes to the exam, including better preparation for real-world applications Covers key topics like network security, compliance and operational security, threats and vulnerabilities, access control and identity management, and cryptography Employs practical examples and insights to provide real-world context from two leading certification experts Provides the necessary tools to take that first important step toward advanced security certs like CASP, CISSP, and CISA, in addition to satisfying the DoD's 8570 directive If you're serious about jump-starting your security career, you need the kind of thorough preparation included in the CompTIA Security+ Study Guide: SY0-401.

Data Localization Laws and Policy

Data Localization Laws and Policy
Author: W. Kuan Hon
Publisher: Edward Elgar Publishing
Total Pages: 489
Release: 2017
Genre: Cloud computing
ISBN: 1786431971

Countries are increasingly introducing data localization laws, threatening digital globalization and inhibiting cloud computing adoption despite its acknowledged benefits. This multi-disciplinary book analyzes the EU restriction (including the Privacy Shield and General Data Protection Regulation) through a cloud computing lens, covering historical objectives and practical problems, showing why the focus should move from physical data location to effective jurisdiction over those controlling access to intelligible data, and control of access to data through security.