This book illustrates the design, development, and evaluation of personalized intelligent tutoring systems that emulate human cognitive intelligence by incorporating artificial intelligence. Artificial intelligence is an advanced field of research. It is particularly used in the field of education to increase the effectiveness of teaching and learning techniques. With the advancement of internet technology, there is a rapid growth in web based distance learning modality. This mode of learning is better known as the e-learning...
This book illustrates the design, development, and evaluation of personalized intelligent tutoring systems that emulate human c...
This book illustrates the design, development, and evaluation of personalized intelligent tutoring systems that emulate human cognitive intelligence by incorporating artificial intelligence. Artificial intelligence is an advanced field of research. It is particularly used in the field of education to increase the effectiveness of teaching and learning techniques. With the advancement of internet technology, there is a rapid growth in web based distance learning modality. This mode of learning is better known as the e-learning...
This book illustrates the design, development, and evaluation of personalized intelligent tutoring systems that emulate human c...
This book presents different stages of Industrial Revolution in artificial intelligence and its impact on industry 4.0 and Healthcare. It contains chapters prepared for the industrial landscape which is being transformed to the fourth stage with the rise of autonomous robots, contemporary automation, cyber-physical systems, the Internet of things, and the Internet of services for examining the circumstances of health care system for the future. It highlights the emerging trends in integration of different intelligent manufacturing systems and advanced information technologies. Additionally,...
This book presents different stages of Industrial Revolution in artificial intelligence and its impact on industry 4.0 and Healthcare. It contains cha...
This book provides an understanding of the evolution of digitization in our day to day life and how it has become a part of our social system. The obvious challenges faced during this process and how these challenges were overcome have been discussed. The discussions revolve around the solutions to these challenges by leveraging the use of various advanced technologies. The book mainly covers the use of these technologies in variety of areas such as smart cities, healthcare informatics, transportation automation, digital transformation of education. The book intends to be treated as...
This book provides an understanding of the evolution of digitization in our day to day life and how it has become a part of our social system. The ...
This book highlights the three pillars of data security, viz protecting data at rest, in transit, and in use. Protecting data at rest means using methods such as encryption or tokenization so that even if data is copied from a server or database, a thief cannot access the information. Protecting data in transit means making sure unauthorized parties cannot see information as it moves between servers and applications. There are well-established ways to provide both kinds of protection. Protecting data while in use, though, is especially tough because applications need to have data in the...
This book highlights the three pillars of data security, viz protecting data at rest, in transit, and in use. Protecting data at rest means using meth...
This book reviews humanitarian literature and presents the development of low-cost track & trace management system integrated with accurate GPS location data pinging using Internet of Things (IoT). The first part relates to mobile device configuration with an embedded GPS and wireless Internet connection to transmit its current location. The second part presents web server implementation and development that receives the data, parses it, and stores it for access over the Internet. The third part discusses the user interface that allows one to visually identify the current location of the...
This book reviews humanitarian literature and presents the development of low-cost track & trace management system integrated with accurate GPS locati...
This book reviews humanitarian literature and presents the development of low-cost track & trace management system integrated with accurate GPS location data pinging using Internet of Things (IoT). The first part relates to mobile device configuration with an embedded GPS and wireless Internet connection to transmit its current location. The second part presents web server implementation and development that receives the data, parses it, and stores it for access over the Internet. The third part discusses the user interface that allows one to visually identify the current location of the...
This book reviews humanitarian literature and presents the development of low-cost track & trace management system integrated with accurate GPS locati...
This book provides an understanding of the evolution of digitization in our day to day life and how it has become a part of our social system. The obvious challenges faced during this process and how these challenges were overcome have been discussed. The discussions revolve around the solutions to these challenges by leveraging the use of various advanced technologies. The book mainly covers the use of these technologies in variety of areas such as smart cities, healthcare informatics, transportation automation, digital transformation of education. The book intends to be treated as...
This book provides an understanding of the evolution of digitization in our day to day life and how it has become a part of our social system. The ...
This book highlights the three pillars of data security, viz protecting data at rest, in transit, and in use. Protecting data at rest means using methods such as encryption or tokenization so that even if data is copied from a server or database, a thief cannot access the information. Protecting data in transit means making sure unauthorized parties cannot see information as it moves between servers and applications. There are well-established ways to provide both kinds of protection. Protecting data while in use, though, is especially tough because applications need to have data in the...
This book highlights the three pillars of data security, viz protecting data at rest, in transit, and in use. Protecting data at rest means using meth...
This book highlights the connections between two technologies: artificial intelligence (AI) and Internet of things (IoT). It presents the application of these two technologies to solve various societal problems related to healthcare, agriculture, green environment, renewable energies, smart cities, etc. Each chapter in this book presents novel solutions to these problems along with the challenges in the application of AI and IoT to solve them. It discusses the adverse attacks on machine Learning models and how to protect sensitive data over the IoT networks. It also includes the security...
This book highlights the connections between two technologies: artificial intelligence (AI) and Internet of things (IoT). It presents the applicati...