Rough set theory is a new soft computing tool which deals with vagueness and uncertainty. It has attracted the attention of researchers and practitioners worldwide, and has been successfully applied to many fields such as knowledge discovery, decision support, pattern recognition, and machine learning. Rough Computing: Theories, Technologies and Applications offers the most comprehensive coverage of key rough computing research, surveying a full range of topics from granular computing to pansystems theory. With its unique coverage of the defining issues of the field, this commanding research...
Rough set theory is a new soft computing tool which deals with vagueness and uncertainty. It has attracted the attention of researchers and practition...
Aboul Ella Hassanien Ajith Abraham Janusz Kacprzyk
In recent decades Multimedia processing has emerged as an important technology to generate content based on images, video, audio, graphics, and text. This book is a compilation of the latest trends and developments in the field of computational intelligence in multimedia processing. The edited book presents a large number of interesting applications to intelligent multimedia processing of various Computational Intelligence techniques including neural networks and fuzzy logic.
In recent decades Multimedia processing has emerged as an important technology to generate content based on images, video, audio, graphics, and tex...
High Internet penetration in regions such as North America, Australia, and Europe, has proven the World Wide Web as an important medium for e-commerce transaction. Despite the soaring adoption statistics for those already developed societies, diffusion rates still remain low for the less developed countries, with e-commerce in its infancy. Emerging Markets and E-Commerce in Developing Economies enhances understanding of e-commerce models and practices in less developed countries, and extends the growing literature on e-commerce. An essential addition to worldwide library collections in...
High Internet penetration in regions such as North America, Australia, and Europe, has proven the World Wide Web as an important medium for e-commerce...
"Developing Advanced Web Services through P2P Computing and Autonomous Agents: Trends and Innovations" establishes an understanding of autonomous peer-to-peer Web Service models and developments as well as extends growing literature on emerging technologies. This scholarly publication is an important reference for researchers and academics working in the fields of peer-to-peer computing, Web and grid services, and agent technologies.
"Developing Advanced Web Services through P2P Computing and Autonomous Agents: Trends and Innovations" establishes an understanding of autonomous peer...
This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, Sec Net 2013, held in Cairo, Egypt, in September 2013. The 21 revised full papers presented were carefully reviewed and selected from 62 submissions. The papers are organized in topical sections on networking security; data and information security; authentication and privacy; security applications.
This book constitutes the refereed proceedings of the International Conference on Advances in Security of Information and Communication Networks, S...
This book constitutes the refereed proceedings of the First International Conference on Advanced Machine Learning Technologies and Applications, AMLTA 2012, held in Cairo, Egypt, in December 2012. The 58 full papers presented were carefully reviewed and selected from 99 intial submissions. The papers are organized in topical sections on rough sets and applications, machine learning in pattern recognition and image processing, machine learning in multimedia computing, bioinformatics and cheminformatics, data classification and clustering, cloud computing and recommender systems.
This book constitutes the refereed proceedings of the First International Conference on Advanced Machine Learning Technologies and Applications, AMLTA...
This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2013, held in Cairo, Egypt, in June 2013. The 26 papers presented were carefully reviewed and selected from 77 submissions. They cover the following topics: secret-key and public-key cryptography and cryptanalysis, efficient implementation, cryptographic protocols, design of cryptographic schemes, security proofs, foundations and complexity theory, information theory, multi-party computation, elliptic curves, and lattices.
This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application of Cryptographic Techniques in Africa...
This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different security techniques in real-world scenarios. The volume provides reviews of cutting-edge technologies, algorithms, applications and insights for bio-inspiring cyber security-based systems. The book will be a valuable companion and comprehensive reference for both postgraduate and senior undergraduate students who are taking a course in cyber security. The volume is organized in self-contained chapters to provide greatest reading flexibility.
This volume presents recent research in cyber security and reports how organizations can gain competitive advantages by applying the different secu...
The success of a BCI system depends as much on the system itself as on the user's ability to produce distinctive EEG activity. BCI systems can be divided into two groups according to the placement of the electrodes used to detect and measure neurons firing in the brain. These groups are: invasive systems, electrodes are inserted directly into the cortex are used for single cell or multi unit recording, and electrocorticography (EcoG), electrodes are placed on the surface of the cortex (or dura); noninvasive systems, they are placed on the scalp and use electroencephalography (EEG) or...
The success of a BCI system depends as much on the system itself as on the user's ability to produce distinctive EEG activity. BCI systems can be divi...
This book constitutes the refereed proceedings of the Second International Conference on Advanced Machine Learning Technologies and Applications, AMLTA 2014, held in Cairo, Egypt, in November 2014. The 49 full papers presented were carefully reviewed and selected from 101 initial submissions. The papers are organized in topical sections on machine learning in Arabic text recognition and assistive technology; recommendation systems for cloud services; machine learning in watermarking/authentication and virtual machines; features extraction and classification; rough/fuzzy sets and applications;...
This book constitutes the refereed proceedings of the Second International Conference on Advanced Machine Learning Technologies and Applications, AMLT...