Information Security, Privacy and Digital Forensics
Select Proceedings of the International Conference, ICISPD 2022
Chapter and Conference Paper
Although the Internet of Things (IoT) devices simplify and automate everyday tasks, they also introduce a tremendous amount of security flaws. The current insufficient security measures for smart device protec...
Chapter
Artificial Intelligence engineering aims to provide a framework of tools to proactively design AI systems to function in environments characterized by computational complexity and ambiguity and uses restricted...
Chapter
This chapter proceeds to engage the previous section learning to empower the advanced hardware system knowledge that powers a sturdy performance to train the deep learning networks. A detailed hardware environ...
Chapter
The field of machine learning is witnessing an important era as deep learning slowly becomes an important discipline. This book in general presents facets of deep learning networks, design, development, and de...
Chapter
This chapter presents tool sets for deep learning applications and primarily focuses to illustrate the instructions to configure the environment step by step with data, operating system, application, hardware,...
Chapter
In this section, the book reveals the most tricky and advanced data processing techniques in the easiest way for the readers. More importantly, the book chapter reveals how to read data from audio, speech, ima...
Chapter
This section of the book details on training Deep Learning Networks. PyTorch is one of the popular AI framework to model Deep Learning Networks and also train, test and deploy Deep Learning Networks. TensorFlo...
Chapter
The interesting aspect of this chapter of the book is in deploying deep learning networks. This section provides hands-on experience for designing and deploying deep learning networks.
Chapter
This section of the book primarily addresses the deep learning model designing and development. Deep learning network is emerging as an another tool set to model given physical process (16,17,18). Observed dat...
Chapter
The surge on the Internet and data has led to advanced deep learning systems and hence the book also presents techniques for Internet of Things (IoT) in association with deep learning networks. This section di...
Book and Conference Proceedings
Select Proceedings of the International Conference, ICISPD 2022
Chapter and Conference Paper
Boltzmann Machine (BM) and Brooks–Iyengar (BI) algorithm are solving similar problems in sensor fusion. Relationships between these two are established in detail. During 1984, BM was used as a toolset to solve...
Book
Article
The high demand for user-centric applications such as secure cloud storage laid the foundation for the development of user-centric security schemes with multiple security features in recent years. But, the cur...
Chapter and Conference Paper
With the surge in the videos over the internet and the spread of digital communications, the attackers are greatly benefited by creating and publishing the fake distorted videos and images known as Deepfakes. ...
Book
Article
This study aims to investigate the heat transfer and magnetohydrodynamics flow of fractional Oldroyd-B nanofluid in a porous medium with radiation effect. The Caputo time-fractional derivative model is introdu...
Chapter
Angiotensin receptor blockers (ARBs) are among the most widely used classes of antihypertensive drugs. In addition to their established efficacy and safety, ARBs are well tolerated and have a lower discontinua...
Chapter
The greatest requirement in the modern age is the need for empowering security that will provide tamper evident information exchange. This brings up a prominent need for techniques that integrate modern crypto...
Chapter
There are many applications that can benefit from the adoption of homomorphic encryption schemes. However, one of the front runners in terms of consideration for adoption is cloud computing systems.