Handbook of Inclusive Knowledge Management: Ensuring Inclusivity, Diversity, and Equity in Knowledge Processing Activities examines the role that diversity, equity and inclusivity (DEI) plays in the field and discipline of knowledge management (KM).
This book presents the latest developments in deep learning-enabled healthcare tools and technologies and offers practical ideas for using the IoT with deep learning (motion-based object data) to deal with human dynamics and challenges including critical application domains, technologies, medical imaging, drug discovery, insurance fraud detection and solutions to handle relevant challenges.
Advancements in computational intelligence, which encompasses artificial intelligence, machine learning, and data analytics, have revolutionized the way we process and analyze biomedical and health data.
Advancements in computational intelligence, which encompasses artificial intelligence, machine learning, and data analytics, have revolutionized the way we process and analyze biomedical and health data.
The International Conference on Security, Surveillance & Artificial Intelligence (ICSSAI2023) was held in West Bengal, India during December 1-2, 2023.
The International Conference on Security, Surveillance & Artificial Intelligence (ICSSAI2023) was held in West Bengal, India during December 1-2, 2023.
This book presents the latest developments in deep learning-enabled healthcare tools and technologies and offers practical ideas for using the IoT with deep learning (motion-based object data) to deal with human dynamics and challenges including critical application domains, technologies, medical imaging, drug discovery, insurance fraud detection and solutions to handle relevant challenges.
Intelligent Cybersecurity and Resilience for Critical Industries: Challenges and Applications thoroughly explores cybersecurity principles, strategies, and technologies crucial for protecting digital assets and combating evolving cyber threats in critical industries.
The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography.
Covering a wide range of different online platforms, including social media sites and chatrooms, this volume is a comprehensive exploration of the current state of sociological and criminological scholarship focused on online deviance.
By imparting crucial insights into the digital evolution of far-right extremism and its challenges, this book explores how far-right extremism has transformed, utilising digital spaces for communication and employing coded language to evade detection.
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities.
This book journeys through the labyrinth of usable privacy, a place where the interplay of privacy and Human-Computer Interaction (HCI) reveals a myriad of challenges, solutions, and new possibilities.
The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection.
In today's interactive network environment, where various types of organizations are eager to monitor and track Internet use, anonymity is one of the most powerful resources available to counterbalance the threat of unknown spectators and to ensure Internet privacy.