the proceedings contain 60 papers. the topics discussed include: nonlinear rule-based convolution for refocusing using adaptivethresholds;intelligent model for cyber-attack detection and prevention;neural network mod...
ISBN:
(纸本)9781618398376
the proceedings contain 60 papers. the topics discussed include: nonlinear rule-based convolution for refocusing using adaptivethresholds;intelligent model for cyber-attack detection and prevention;neural network modeling of financial markets;protecting mobile rule-based agents through rete obfuscation;story visualization for interactive virtual environment;framework for phonetic name matching of Romanized Arabic names;image and data logging systems for environmental studies and research;evidence of scale-free topology and dynamics in gene regulatory networks;extracting information about proper nouns to support classifier systems;building adaptive information retrieval systems for organizational memories: a case study;and advanced simulation architecture for intelligent autonomous robots.
the proceedings contain 56 papers. the topics discussed include: a model for multi-relational data mining on demand forecasting;efficient modeling the Sloan digital sky survey data using P-orchards;improved software r...
ISBN:
(纸本)9781618398383
the proceedings contain 56 papers. the topics discussed include: a model for multi-relational data mining on demand forecasting;efficient modeling the Sloan digital sky survey data using P-orchards;improved software reliability prediction through fuzzy logic modeling;fuzzy routing in communication networks;network security intrusion detection using data mining and fuzzy logic;a digital blind watermarking system using adaptive quantization;semi-fragile watermarking image authentication using real symmetric matrix;a comparison of intelligent admission control schemes for next generation wireless systems with simulated annealing;low cost fault detection isolation and recovery implemented on an autonomous unmanned ground vehicle;and using intelligent agents to assist in daily activities of patients with dementia.
this proceedings contains 48 papers. the key terms of this proceedings include anomaly resolution, launch decision, weapon discharge, indifference based judgment, addiction based judgment, probability based judgment, ...
ISBN:
(纸本)9781604234558
this proceedings contains 48 papers. the key terms of this proceedings include anomaly resolution, launch decision, weapon discharge, indifference based judgment, addiction based judgment, probability based judgment, fact based judgment, intentions, decisions, outcomes, decision significance, consequence, uncertainty and amputation. the key terms of this proceedings include data clustering, multi-dimensional data, stochastic process, Markov chain, cryptography, image processing, steganalysis, P-trees, biometrics, symmetry pattern, software development, mathematical models, artificial intelligence, integration architecture and semantic web.
A collective adaptive system is made up of cooperating entities that can adjust in real time to evolving, open environments and shifting requirements. To ensure such a system meets its intended goals, rigorous enginee...
详细信息
ISBN:
(纸本)9783031751066;9783031751073
A collective adaptive system is made up of cooperating entities that can adjust in real time to evolving, open environments and shifting requirements. To ensure such a system meets its intended goals, rigorous engineering must employ suitable methods and tools. this introduction offers a short overview of the 5(th) edition of the track "Rigorous engineering of Collective adaptivesystems" and briefly presents the 20 scientific contributions, organised into seven thematic sections. Large Ensembles and Collective Dynamics, Knowledge, Consciousness and Emergence, Automated Reasoning for Better Interaction, Modelling and engineering Collective adaptivesystems, Analysing Collective adaptivesystems.
the integration of Distributed Generation (DG) systems, particularly wind turbine generators (WTGs), into power grids presents significant challenges in protection and coordination due to their unique characteristics....
详细信息
Project Portfolio Management (PPM) is essential for organizations aiming to align projects with strategic goals. Different organizations adopt diverse PPM frameworks and standards to manage project portfolios each emp...
详细信息
Enterprise systems are complex solutions to diverse needs of companies, but their extent does not typically span firm boundaries. Instead, there are different ways to handle inter-organizational IT requirements, inclu...
详细信息
the main objective of this paper is to demonstrate the complexity and perils of communication patterns between all parties involved throughout the software development life phases. Such communication takes place from ...
详细信息
Optimizing renewable energy harvesting in DC microgrid systems is achieved through the application of intelligent control strategies. By integrating solar photovoltaic (PV) systems, wind energy conversion systems (WEC...
详细信息
Traditional methods of responding to cybersecurity incidents often use set playbooks or routines that don’t change, which might not work well withthe constantly changing nature of modern cyber dangers. the idea behi...
详细信息
ISBN:
(纸本)9789819601462
Traditional methods of responding to cybersecurity incidents often use set playbooks or routines that don’t change, which might not work well withthe constantly changing nature of modern cyber dangers. the idea behind this paper is to create and use decision systemsthat are specifically designed for adapting how to handle hacking incidents. Advanced artificial intelligence (AI) methods, such as machine learning and natural language processing, are used by these decision systems to analyze security events in real time and help people make quick, well-informed decisions. these systems improve the speed and efficiency of hacking reaction by constantly learning from past events and responding to new threats. Automatic danger recognition, risk assessment, and reaction planning are important parts of the suggested decision systems. Automated systemsthat look for threats use AI algorithms to look for signs of bad behavior in network traffic, system logs, and other relevant data sources. the risk assessment tools look at the dangers and how bad they could be, considering things like how sensitive the data is, how important the system is, and the rules that need to be followed. Decision systems actively plan responses based on danger recognition and risk assessment results. these responses may include separating affected systems, blocking suspicious IP addresses, or sending events to human experts for further study. Over time, these systems get better at making decisions by using adaptive learning methods and constant feedback loops. this makes it easier for them to spot and stop new cyber threats. the creating and using decision systems for adaptive cybersecurity incident reaction is a big step toward making organizations’ defenses more resilient and effective in the face of changing cyber dangers. By using AI and machine learning, these systems stop threats before they happen, giving cybersecurity teams the tools they need to stay ahead of attackers in the ongoing battl
暂无评论