This book consists of a collection of the high-quality research articles in the field of computer vision and robotics which are presented at the International Conference on Computer Vision and Robotics (CVR 2025), organized by National Institute of Technology, Goa, India, during 25–26 April 2025.
This book is the third in a series of books dedicated to publishing extended abstracts of the activities of ICMAM Latin America (International Community of Mathematicians from Latin America).
This book represents a comprehensive exploration of the most recent advancements and applications at the intersection of machine learning, cyber-physical systems, and industrial processes.
This book presents the proceedings of the 9th International Conference on Innovative Technologies in Intelligent Systems & Industrial Application (CITISIA), held in virtual mode in Sydney, Australia and Jakarta, Indonesia, on December 13-15, 2024.
Complementarity functions lie at the heart of modern optimization, offering a powerful way to reformulate the Karush-Kuhn-Tucker (KKT) conditions and the original optimization problem into more tractable forms, either as systems of equations or unconstrained minimization problems.
This book presents key technologies and applications of smart cities, covering a wide range of areas including smart transportation, autonomous driving, wireless communication, artificial intelligence, the Internet of Things (IoT), cybersecurity, digital twins, disaster management, environmental monitoring, and smart buildings.
The volume includes papers presented at the International KES Conference on Human Centred Intelligent Systems 2025 (KES HCIS 2025), held in Solin, Croatia on June 25–27, 2025.
This book gathers outstanding papers presented at the 6th International Conference on Data Science and Applications (ICDSA 2025), organized by Soft Computing Research Society (SCRS) and Malaviya National Institute of Technology Jaipur, India, from 16 to 18 July 2025.
This book gathers outstanding papers presented at the 6th International Conference on Data Science and Applications (ICDSA 2025), organized by Soft Computing Research Society (SCRS) and Malaviya National Institute of Technology Jaipur, India, from 16 to 18 July 2025.
This book gathers outstanding papers presented at the 6th International Conference on Data Science and Applications (ICDSA 2025), organized by Soft Computing Research Society (SCRS) and Malaviya National Institute of Technology Jaipur, India, from 16 to 18 July 2025.
This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center.
This book presents selected papers from NIELIT’s International Conference on Communication, Electronics, and Digital Technology (NICEDT 2025) held at NIELIT Ropar, Punjab, India, during 14–15 February 2025.
This book presents a general approach to block and recursive filtering, identification, and control, using signal observations processing techniques, and among others provides to the reader these results:The new version of least square algorithm that is speeded up without changing its adaptive characteristics, increasing the parallelism in algorithm.
This book presents key technologies and applications of smart cities, covering a wide range of areas including smart transportation, autonomous driving, wireless communication, artificial intelligence, the Internet of Things (IoT), cybersecurity, digital twins, disaster management, environmental monitoring, and smart buildings.
This book offers readers an innovative perspective on how intelligent networks can evolve beyond simple device-to-device communication, enabling social interaction, adaptive learning, and predictive intelligence across various domains.
This book represents a comprehensive exploration of the most recent advancements and applications at the intersection of machine learning, cyber-physical systems, and industrial processes.
This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security.
This book compiles the proceedings of the 16th International Conference on Complex Networks (CompleNet 2025), a distinguished gathering that has united researchers and practitioners from diverse fields since 2009.
This book seeks to examine the profound transformations brought about by the convergence of human-centered principles and advancing cyber-technologies across diverse fields, including industry, environment, healthcare, and interactive media.
This book compiles select articles presented during the Fifth Meeting for Dissemination and Research in the Study of Complex Systems and their Applications (EDIESCA 2024).
This book compiles select articles presented during the Fifth Meeting for Dissemination and Research in the Study of Complex Systems and their Applications (EDIESCA 2024).
This book presents a general approach to block and recursive filtering, identification, and control, using signal observations processing techniques, and among others provides to the reader these results:The new version of least square algorithm that is speeded up without changing its adaptive characteristics, increasing the parallelism in algorithm.
This book includes peer-reviewed high-quality articles presented at the 7th International Conference on Communications and Cyber-Physical Engineering (ICCCE 2024), held on July 19 and 20, 2024, at G Narayanamma Institute of Technology & Science, Hyderabad, India.
This book compiles the proceedings of the 16th International Conference on Complex Networks (CompleNet 2025), a distinguished gathering that has united researchers and practitioners from diverse fields since 2009.
This book presents a comprehensive exploration of the dynamical system approach in numerical linear algebra, with a special focus on computing generalized inverses, solving systems of linear equations, and addressing linear matrix equations.
Model Predictive Control (MPC), the classic textbook for students and practitioners seeking deep understanding of advanced control systems, is now revised, updated and reorganized in a streamlined third edition.
This book demonstrates how information security requires a deep understanding of organizations assets, threats, and processes, combined with security measures that can best protect their information security.
This book includes peer-reviewed high-quality articles presented at the 7th International Conference on Communications and Cyber-Physical Engineering (ICCCE 2024), held on July 19 and 20, 2024, at G Narayanamma Institute of Technology & Science, Hyderabad, India.
This book offers readers an innovative perspective on how intelligent networks can evolve beyond simple device-to-device communication, enabling social interaction, adaptive learning, and predictive intelligence across various domains.
This book is a comprehensive exploration of the fundamental principles and contemporary applications of cyber-physical systems (CPS) in various engineering disciplines.
Forensic Pathology of Unexpected and Unexplained Deaths addresses one of the most complex challenges in forensic medicine-sudden, unexpected, and unexplained deaths.
Forensic Pathology of Unexpected and Unexplained Deaths addresses one of the most complex challenges in forensic medicine-sudden, unexpected, and unexplained deaths.
The industrial internet has the characteristics of "e;change"e;, "e;integration"e; and "e;new"e;, and the security risks it faces are greatly different from the traditional Internet.
This book presents a comprehensive exploration of the dynamical system approach in numerical linear algebra, with a special focus on computing generalized inverses, solving systems of linear equations, and addressing linear matrix equations.
Model Predictive Control (MPC), the classic textbook for students and practitioners seeking deep understanding of advanced control systems, is now revised, updated and reorganized in a streamlined third edition.
This book seeks to examine the profound transformations brought about by the convergence of human-centered principles and advancing cyber-technologies across diverse fields, including industry, environment, healthcare, and interactive media.
The industrial internet has the characteristics of "e;change"e;, "e;integration"e; and "e;new"e;, and the security risks it faces are greatly different from the traditional Internet.
This book is a comprehensive exploration of the fundamental principles and contemporary applications of cyber-physical systems (CPS) in various engineering disciplines.
This book focuses on the integration of Artificial Intelligence (AI) technology for securing IoT next systems, exploring a comprehensive collection of recent techniques and strategies aimed at protecting these complex networks.
This book covers knowledge and skills needed to successfully handle the tasks, duties, and responsibilities of an associate-level Security Analyst working in a Security Operations Center.
This book constitutes the refereed proceedings of the 5th International Conference on Dynamic Data Driven Applications Systems, DDDAS/Infosymbiotics for Reliable AI 2024, held in New Brunswick, NJ, USA, during November 6–8, 2024.