: recent trends in AI, machine learning, and network security
First Statement of Responsibility
/ edited by Karan Singh, Latha Banda, Manisha Manjul.
.PUBLICATION, DISTRIBUTION, ETC
Place of Publication, Distribution, etc.
Palm Bay, FL, USA
Name of Publisher, Distributor, etc.
: Apple Academic Press,
Date of Publication, Distribution, etc.
, 2024.
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
1 online resource.
SERIES
Series Title
AAP research notes on optimization and decision making theories
INTERNAL BIBLIOGRAPHIES/INDEXES NOTE
Text of Note
Includes bibliographical references and index.
CONTENTS NOTE
Text of Note
Part I: Machine learning algorithms in security analytics -- 1. Speculative pararalelism on multicore chip architecture strengthen green computing concept : a survey / Sudhakar Kumar, Sunil Kr. Singh, and Naveen Aggarwal -- 2. Measuring perceived quality of software ecosystem based on transactions in customer management tools / R. Rajaraman, P. K. Kapur, Deepak Kumar, and K. Velmurugan -- 3. Moving object detection in video, captured by static camera : a survey / Sneha Mishra and Dileep Kumar Yadav --
0
SUMMARY OR ABSTRACT
Text of Note
"Artificial intelligence (AI) and machine learning (ML) are two areas of computer science that have seen drastic advancement in recent years. Keeping track of this rapid development, this book, Advanced Computer Science Applications: Recent Trends in AI, Machine Learning, and Network Security, brings together the most recent trends related to AI, ML and Network Security. The book consists of three parts with each part focusing on a specific aspect of AI, machine learning, and network security. The chapters cover such diverse topics including machine learning algorithms and security analytics, AI and machine learning, and network security applications. The book presents a variety of design algorithms including convolutional neural networks (CNN), random forest algorithm, k-nearest neighbor (KNN), Apriori algorithm, MapReduce algorithm, and the Genetic Algorithm used in IoT applications. The volume presents a survey of speculative parallelism techniques, performance reviews, and efficient power consumption. It discusses measuring perceived quality of software ecosystems based on transactions in customer management tools and offers a study of the background modelling and background subtraction along with various other literature studies that justify the role of moving object detection in computer vision. The book also covers the concepts of IoT, security early detections for COVID-19, multimetric geographical routing in VANETs, V2X communication in VANET, and optimization of congestion control scheme for VANETs"--
TYPE OF ELECTRONIC RESOURCE NOTE
Text of Note
PDF file.
TOPICAL NAME USED AS SUBJECT
Entry Element
Computer science
Entry Element
Computer networks
Entry Element
Machine learning.
Entry Element
Artificial intelligence.
Topical Subdivision
Technological innovations.
Topical Subdivision
Security measures.
DEWEY DECIMAL CLASSIFICATION
Edition
23/eng/20230905
PERSONAL NAME - SECONDARY RESPONSIBILITY
Entry Element
Singh, Karan,
Entry Element
Banda, Latha,
Entry Element
Manjul, Manisha,
Dates
1981-
Dates
1983-
Dates
1982-
Relator Code
Editor
Relator Code
Editor
Relator Code
Editor
ORIGINATING SOURCE
Country
Iran
Agency
University of Tehran. Library of College of Science