"This book brings together research on the latest trends and patterns of data mining tools and techniques in dynamic social networks and fuzzy systems"--Provided by publisher
"This book investigates various challenges faced by the Engineering sector concerning disruptive technologies and society 5.0. It explores these technologies in different industries and settings and addresses the challenges and obstacles confronted along with the practical implementation or adoption of them. Disruptive Technologies for Society 5.0: Exploration of New Ideas, Techniques, and Tools highlights the important role of disruptive technologies such as Artificial Intelligence, Internet of Things, Blockchain, and Cloud Computing and the part they play in the current industrial environment. Current research trends in this field as well as case studies are also included. This book is intended for researchers and academicians and will enable them to explore new ideas, techniques, and tools"--
"This book investigates various challenges faced by the Engineering sector concerning disruptive technologies and society 5.0. It explores these technologies in different industries and settings and addresses the challenges and obstacles confronted along with the practical implementation or adoption of them. Disruptive Technologies for Society 5.0: Exploration of New Ideas, Techniques, and Tools highlights the important role of disruptive technologies such as Artificial Intelligence, Internet of Things, Blockchain, and Cloud Computing and the part they play in the current industrial environment. Current research trends in this field as well as case studies are also included. This book is intended for researchers and academicians and will enable them to explore new ideas, techniques, and tools"--
Zugriffsoptionen:
Die folgenden Links führen aus den jeweiligen lokalen Bibliotheken zum Volltext:
The main target of this book is to raise the awareness about social networking systems design, implementation, security requirements, and approaches. The book entails related issues including computing, engineering, security, management, and organization policy. It interprets the design, implementation and security threats in the social networks and offers some solutions in this concern. It clarifies the authentication concept between servers to identity users. Most of the models that focus on protecting users' information are also included. This book introduces the Human-Interactive Security Protocols (HISPs) efficiently. Presenting different types of the social networking systems including the internet and mobile devices is one of the main targets of this book. This book includes the social network performance evaluation metrics. It compares various models and approaches used in the design of the social networks. This book includes various applications for the use of the social networks in the healthcare, e-commerce, crisis management, and academic applications. The book provides an extensive background for the development of social network science and its challenges. This book discusses the social networks integration to offer online services, such as instant messaging, email, file sharing, transferring patients' medical reports/images, location-based recommendations and many other functions. This book provides users, designers, engineers and managers with the valuable knowledge to build a better secured information transfer over the social networks. The book gathers remarkable materials from an international experts' panel to guide the readers during the analysis, design, implementation and security achievement for the social network systems. In this book, theories, practical guidance, and challenges are included to inspire designers and researchers. The book guides the engineers, designers, and researchers to exploit the intrinsic design of the social network systems.