Search Constraints
Number of results to display per page
Results for:
Search Results
-
Courseware
6.858 Computer Systems Security is a class about the design and implementation of secure computer systems. Lectures cover threat models, attacks that compromise security, and techniques for achieving security, based on recent research papers. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications.
- Subjects:
- Computing
- Keywords:
- Data protection Computer security Computer networks -- Security measures Data encryption (Computer science)
- Resource Type:
- Courseware
-
e-book
In the era of Internet of Things (IoT) and with the explosive worldwide growth of electronic data volume, and associated need of processing, analysis, and storage of such humongous volume of data, several new challenges are faced in protecting privacy of sensitive data and securing systems by designing novel schemes for secure authentication, integrity protection, encryption, and non-repudiation. Lightweight symmetric key cryptography and adaptive network security algorithms are in demand for mitigating these challenges. This book presents some of the state-of-the-art research work in the field of cryptography and security in computing and communications. It is a valuable source of knowledge for researchers, engineers, practitioners, graduates, and doctoral students who are working in the field of cryptography, network security, and security and privacy issues in the Internet of Things (IoT). It will also be useful for faculty members of graduate schools and universities.
- Subjects:
- Computing
- Keywords:
- Data protection Computer security Computer networks -- Security measures Data encryption (Computer science)
- Resource Type:
- e-book
-
e-book
Pattern recognition has gained significant attention due to the rapid explosion of internet- and mobile-based applications. Among the various pattern recognition applications, face recognition is always being the center of attraction. With so much of unlabeled face images being captured and made available on internet (particularly on social media), conventional supervised means of classifying face images become challenging. This clearly warrants for semi-supervised classification and subspace projection. Another important concern in face recognition system is the proper and stringent evaluation of its capability. This book is edited keeping all these factors in mind. This book is composed of five chapters covering introduction, overview, semi-supervised classification, subspace projection, and evaluation techniques.
- Subjects:
- Electronic and Information Engineering and Computing
- Keywords:
- Human face recognition (Computer science)
- Resource Type:
- e-book
-
e-book
Evolutionary algorithms are successively applied to wide optimization problems in the engineering, marketing, operations research, and social science, such as include scheduling, genetics, material selection, structural design and so on. Apart from mathematical optimization problems, evolutionary algorithms have also been used as an experimental framework within biological evolution and natural selection in the field of artificial life.
- Subjects:
- Computing
- Keywords:
- Mathematical optimization Genetic algorithms Evolutionary programming (Computer science)
- Resource Type:
- e-book
-
e-book
The development of modern information systems is a demanding task. New technologies and tools are designed, implemented and presented in the market on a daily bases. User needs change dramatically fast and the IT industry copes to reach the level of efficiency and adaptability for its systems in order to be competitive and up-to-date. Thus, the realization of modern information systems with great characteristics and functionalities implemented for specific areas of interest is a fact of our modern and demanding digital society and this is the main scope of this book. Therefore, this book aims to present a number of innovative and recently developed information systems. It is titled "Modern Information Systems" and includes 8 chapters. This book may assist researchers on studying the innovative functions of modern systems in various areas like health, telematics, knowledge management, etc. It can also assist young students in capturing the new research tendencies of the information systems' development.
- Subjects:
- Environmental Sciences and Computing
- Keywords:
- Medical informatics Knowledge management Management information systems
- Resource Type:
- e-book
-
e-book
Artificial intelligence (AI) is a potent buzzword and happening technology which has greatly impacted the lifestyle of every human being either directly or indirectly and is shaping the future of tomorrow. In fact, AI is fast becoming an intrinsic part of our daily life and is not confined to university research labs, even if remarkable progress has been made in this domain. The benefit of this phenomenon is widely recognized in diversified areas, ranging from medicine to security to consumer applications and business, and resulting in improvements in the quality of life of humankind. Every new disruptive technology has its own pros and cons and AI is no exception to this rule. Privacy, data protection, and the rights of individuals pose social and ethical challenges.
- Subjects:
- Computing
- Keywords:
- Artificial intelligence
- Resource Type:
- e-book
-
e-book
The purpose of this book is to provide an up-to-date and systematical introduction to the principles and algorithms of machine learning. The definition of learning is broad enough to include most tasks that we commonly call “learning” tasks, as we use the word in daily life. It is also broad enough to encompass computers that improve from experience in quite straightforward ways. The book will be of interest to industrial engineers and scientists as well as academics who wish to pursue machine learning. The book is intended for both graduate and postgraduate students in fields such as computer science, cybernetics, system sciences, engineering, statistics, and social sciences, and as a reference for software professionals and practitioners. The wide scope of the book provides a good introduction to many approaches of machine learning, and it is also the source of useful bibliographical information.
- Course related:
- COMP4432 Machine Learning
- Subjects:
- Computing
- Keywords:
- Machine learning
- Resource Type:
- e-book
-
e-book
Machine learning techniques have the potential of alleviating the complexity of knowledge acquisition. This book presents today’s state and development tendencies of machine learning. It is a multi-author book. Taking into account the large amount of knowledge about machine learning and practice presented in the book, it is divided into three major parts: Introduction, Machine Learning Theory and Applications. Part I focuses on the introduction to machine learning. The author also attempts to promote a new design of thinking machines and development philosophy. Considering the growing complexity and serious difficulties of information processing in machine learning, in Part II of the book, the theoretical foundations of machine learning are considered, and they mainly include self-organizing maps (SOMs), clustering, artificial neural networks, nonlinear control, fuzzy system and knowledge-based system (KBS). Part III contains selected applications of various machine learning approaches, from flight delays, network intrusion, immune system, ship design to CT and RNA target prediction. The book will be of interest to industrial engineers and scientists as well as academics who wish to pursue machine learning. The book is intended for both graduate and postgraduate students in fields such as computer science, cybernetics, system sciences, engineering, statistics, and social sciences, and as a reference for software professionals and practitioners.
- Course related:
- COMP4432 Machine Learning
- Subjects:
- Computing
- Keywords:
- Machine learning
- Resource Type:
- e-book
-
Courseware
Students of this course will develop a broad understanding of Lean/Six Sigma principles and practices, build capability to implement Lean/Six Sigma initiatives in manufacturing operations, and learn to operate with awareness of Lean/Six Sigma at the enterprise level. All course materials are organized around a common "single-point lesson" (SPL) format, with some of the SPLs provided by the instructor and guests and with some developed and delivered by student teams.
- Subjects:
- Management and Computing
- Keywords:
- Quality control Six sigma (Quality control stard)
- Resource Type:
- Courseware
-
Presentation
This video was recorded at CeGD eGovernance Academy Seminar Series (SEeHealth): The Roadmap from Concept to Practice, Ljubljana 2010. The key of mutual integration of health care institutions lies in their interoperability, gathering and common utilization of data by different applications. Seemingly, imperceptible and smooth applications' integration enables an efficient mutual linkage of all departments within a single health care institution as well as horizontal and vertical linkage of more health care institutions, all with the aim of improvement of health and quality of patient's life. Health care system quality improvement needs a continuous rationalization of resources funds, which leads towards optimization of business processes and availability of all necessary information in the shortest possible period. All necessary information and data on patients must be available independently on location or time of such a necessity. The greatest obstacles for interoperability represent heterogeneous applications. Such heterogeneity can be presented by the fact that they were written in various program languages, that they are intended for utilization at different types of computers or the fact that they use various communication networks and data transfer methods. IT managers in hospitals must decide how to contribute to cross‐organizational integration and what strategy and means to choose for achieving interoperability. If a system is poor in its interoperability, any increasing functions or little changes could stop its working properly. Interoperability must be ensured at technical, semantic and process levels but also in a legislative level, where all recommendations for legal and lawful solutions are given, which remove the most frequent obstacles – human and bureaucratic factors. The Oncology Institute of Vojvodina as a referent center for oncology and a center for medical informatics signed its own Integrated hospital and business information system. The information system at the IOV consists of the following modules: 1. hospital‐clinical IS 2. laboratory IS 3. pharmaceutical IS 4. radiological IS 5. invoicing (accounting) IS 6. business IS 7. managerial IS All of these modules are mutually optimally integrated, and their interoperability at the level of communicational protocols (HL7, DICOM, internal interface), semantics (the same code‐records, rules) and legislative level (the same accounting calculations) enables the user to see all these complex modules as one system. Thus, we created necessary preconditions for our integration into information society, which is a 21st century strategy at the state level.
- Subjects:
- Health Sciences, Management, and Computing
- Keywords:
- Health services administration -- Data processing Management information systems Health services administration -- Computer networks
- Resource Type:
- Presentation