Bits Pilani Computer Science

Advertisement



  bits pilani computer science: Computer Science and Convergence James (Jong Hyuk) Park, Han-Chieh Chao, Mohammad S. Obaidat, Jongsung Kim, 2011-12-07 Computer Science and Convergence is proceedings of the 3rd FTRA International Conference on Computer Science and its Applications (CSA-11) and The 2011 FTRA World Convergence Conference (FTRA WCC 2011). The topics of CSA and WCC cover the current hot topics satisfying the world-wide ever-changing needs. CSA-11 will be the most comprehensive conference focused on the various aspects of advances in computer science and its applications and will provide an opportunity for academic and industry professionals to discuss the latest issues and progress in the area of CSA. In addition, the conference will publish high quality papers which are closely related to the various theories and practical applications in CSA. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject. The main scope of CSA-11 is as follows: - Mobile and ubiquitous computing - Dependable, reliable and autonomic computing - Security and trust management - Multimedia systems and services - Networking and communications - Database and data mining - Game and software engineering - Grid, cloud and scalable computing - Embedded system and software - Artificial intelligence - Distributed and parallel algorithms - Web and internet computing - IT policy and business management WCC-11 is a major conference for scientists, engineers, and practitioners throughout the world to present the latest research, results, ideas, developments and applications in all areas of convergence technologies. The main scope of WCC-11 is as follows: - Cryptography and Security for Converged environments - Wireless sensor network for Converged environments - Multimedia for Converged environments - Advanced Vehicular Communications Technology for Converged environments - Human centric computing, P2P, Grid and Cloud computing for Converged environments - U-Healthcare for Converged environments - Strategic Security Management for Industrial Technology - Advances in Artificial Intelligence and Surveillance Systems
  bits pilani computer science: Perspective of DNA Computing in Computer Science , 2023-02-21 DNA or Deoxyribonucleic Acid computing is an emerging branch of computing that uses DNA sequence, biochemistry, and hardware for encoding genetic information in computers. Here, information is represented by using the four genetic alphabets or DNA bases, namely A (Adenine), G (Guanine), C (Cytosine), and T (Thymine), instead of the binary representation (1 and 0) used by traditional computers. This is achieved because short DNA molecules of any arbitrary sequence of A, G, C, and T can be synthesized to order. DNA computing is mainly popular for three reasons: (i) speed (ii) minimal storage requirements, and (iii) minimal power requirements. There are many applications of DNA computing in the field of computer science. Nowadays, DNA computing is widely used in cryptography for achieving a strong security technique, so that unauthorized users are unable to retrieve the original data content. In DNA-based encryption, data are encrypted by using DNA bases (A, T, G, and C) instead of 0 and 1. As four DNA bases are used in the encryption process, DNA computing supports more randomness and makes it more complex for attackers or malicious users to hack the data. DNA computing is also used for data storage because a large number of data items can be stored inside the condensed volume. One gram of DNA holds approx DNA bases or approx 700 TB. However, it takes approx 233 hard disks to store the same data on 3 TB hard disks, and the weight of all these hard disks can be approx 151 kilos. In a cloud environment, the Data Owner (DO) stores their confidential encrypted data outside of their own domain, which attracts many attackers and hackers. DNA computing can be one of the best solutions to protect the data of a cloud server. Here, the DO can use DNA bases to encrypt the data by generating a long DNA sequence. Another application of DNA computing is in Wireless Sensor Network (WSN). Many researchers are trying to improve the security of WSN by using DNA computing. Here, DNA cryptography is used along with Secure Socket Layer (SSL) that supports a secure medium to exchange information. However, recent research shows some limitations of DNA computing. One of the critical issues is that DNA cryptography does not have a strong mathematical background like other cryptographic systems. This edited book is being planned to bring forth all the information of DNA computing. Along with the research gaps in the currently available books/literature, this edited book presents many applications of DNA computing in the fields of computer science. Moreover, research challenges and future work directions in DNA computing are also provided in this edited book. - This edited book gives an overall detail of DNA computing and the fundamentals of cryptography - Many applications of DNA computing in computer science fields, such as cryptography, cloud computing, big data storage, Wireless Sensor Network (WSN) security, and many more, are presented in different chapters of this edited book - Research challenges along with many future work directions in DNA computing are presented in this edited book
  bits pilani computer science: Computationally Intelligent Systems and their Applications Jagdish Chand Bansal, Marcin Paprzycki, Monica Bianchini, Sanjoy Das, 2021-04-24 This book covers all core technologies like neural networks, fuzzy systems, and evolutionary computation and their applications in the systems. Computationally intelligent system is a new concept for advanced information processing. The objective of this system is to realize a new approach for analyzing and creating flexible information processing of sensing, learning, recognizing, and action taking. Computational intelligent is a part of artificial intelligence (AI) which includes the study of versatile components to empower or encourage savvy practices in intricate and evolving situations. The computationally intelligent system highly relies on numerical information supplied by manufacturers unlike AI.
  bits pilani computer science: Artificial Intelligence Technologies for Computational Biology Ranjeet Kumar Rout, Saiyed Umer, Sabha Sheikh, Amrit Lal Sangal, 2022-11-10 This text emphasizes the importance of artificial intelligence techniques in the field of biological computation. It also discusses fundamental principles that can be applied beyond bio-inspired computing. It comprehensively covers important topics including data integration, data mining, machine learning, genetic algorithms, evolutionary computation, evolved neural networks, nature-inspired algorithms, and protein structure alignment. The text covers the application of evolutionary computations for fractal visualization of sequence data, artificial intelligence, and automatic image interpretation in modern biological systems. The text is primarily written for graduate students and academic researchers in areas of electrical engineering, electronics engineering, computer engineering, and computational biology. This book: • Covers algorithms in the fields of artificial intelligence, and machine learning useful in biological data analysis. • Discusses comprehensively artificial intelligence and automatic image interpretation in modern biological systems. • Presents the application of evolutionary computations for fractal visualization of sequence data. • Explores the use of genetic algorithms for pair-wise and multiple sequence alignments. • Examines the roles of efficient computational techniques in biology.
  bits pilani computer science: Advances in Computer Science, Engineering and Applications David C. Wyld, Jan Zizka, Dhinaharan Nagamalai, 2012-05-17 The International conference series on Computer Science, Engineering & Applications (ICCSEA) aims to bring together researchers and practitioners from academia and industry to focus on understanding computer science, engineering and applications and to establish new collaborations in these areas. The Second International Conference on Computer Science, Engineering & Applications (ICCSEA-2012), held in Delhi, India, during May 25-27, 2012 attracted many local and international delegates, presenting a balanced mixture of intellect and research both from the East and from the West. Upon a strenuous peer-review process the best submissions were selected leading to an exciting, rich and a high quality technical conference program, which featured high-impact presentations in the latest developments of various areas of computer science, engineering and applications research.
  bits pilani computer science: Artificial Intelligence and Soft Computing Leszek Rutkowski, Rafał Scherer, Marcin Korytkowski, Witold Pedrycz, Ryszard Tadeusiewicz, Jacek M. Zurada, 2021-10-05 The two-volume set LNAI 12854 and 12855 constitutes the refereed proceedings of the 20th International Conference on Artificial Intelligence and Soft Computing, ICAISC 2021, held in Zakopane, Poland, in June 2021. Due to COVID 19, the conference was held virtually. The 89 full papers presented were carefully reviewed and selected from 195 submissions. The papers included both traditional artificial intelligence methods and soft computing techniques as well as follows: · Neural Networks and Their Applications · Fuzzy Systems and Their Applications · Evolutionary Algorithms and Their Applications · Artificial Intelligence in Modeling and Simulation · Computer Vision, Image and Speech Analysis · Data Mining · Various Problems of Artificial Intelligence · Bioinformatics, Biometrics and Medical Applications
  bits pilani computer science: MTG BITSAT Sample Papers with Solutions For 2024 Exam – Physics, Chemistry & Mathematics MTG Learning Media, MTG has launched BITSAT 10 MOCK TEST PAPERS, the ultimate book for final practice for BITSAT 2024. This edition covers all subjects and follows the updated syllabus, providing the latest practice materials to keep you updated. With exam-like practice, it familiarizes you with the latest exam pattern and ensures thorough clarity of all concepts. These fully solved model test papers are the perfect finishing touch to help you succeed in BITSAT 2024.
  bits pilani computer science: The Career Dr. Raghvendra Dwivedi, 2020-10-05 A life changing guide for professional greatness. This book is very helpful for the youngsters for the better career planning and selecting the right goal to make their life. This book also containing the admission processes of various best colleges and after that courses what will be their requirement of work nature of their job. It has been concise and beautiful, but the information is inextricably inextricable and needs to be expressed in details; You will be able to know – Various type of the courses available in India and abroad. Nature of courses, personality required Best colleges for different courses in India How to get scholarship to study in USA, UK and AustReasons and Laughteria and many more.
  bits pilani computer science: Indian Computer Science (CS) & Information Technology (IT) Academic Reform (Past) Activism Blog Book Ravi S. Iyer, 2020-03-10 Main author Ravi S. Iyer created the eklavyasai.blogspot.com blog and used it from September 2011 to play a part-time, peaceful and amicable, Indian Computer Science (CS) and Information Technology (IT) academic reform, Internet-based activist role. His focus was on improving the practice of software development in Indian CS & IT academia. But he thought that it is such a vital part of the CS & IT field and that it is so poor in many parts of Indian CS & IT academia, that he referred to his efforts as Indian CS & IT academic reform activism. Other contributors to the blog have given their views on certain topics. Main work period has been from 2011 to 2014 with a little work later, off & on. The main author is no longer active in this area. This book is aimed at helping other activists involved in improving the practice of software development in Indian CS and IT academia to get the views of the blog in a convenient form. The book may also be of interest to similar activists in other countries. About the author: Main author Ravi S. Iyer is a Physics graduate from Ruia college, University of Bombay (Mumbai) who was industry trained and later self-taught in software development. He worked in the international software industry (US, Europe, Japan, South Korea, India etc.) developing systems as well as applications software (CS & IT) for over 18 years after which he retired from commercial work. Later, mainly as a visiting faculty, he offered free service of teaching programming courses (lab. courses) and being a technical consultant for student projects in a Maths & Computer Science department of a deemed university in India for 9 years.
  bits pilani computer science: 10 Practice TESTS BITSAT Cengage India, 2022-02-25 The Birla institute of technology and science (bits), pilani conducts bits admission test (bitsat); An online test of total three hours duration; For admission into the first degree programmes at its pilani, goa and Hyderabad centre. The test consists of four parts: Physics, chemistry, English proficiency and logical reasoning and mathematics. All questions are of objective type (multiple choice questions) and each question appears with choice of four answers, only one being correct. Each correct answer fetches three marks, while each incorrect answer has a penalty of 1 mark. The total number of questions is generally 150. The syllabus prescribed for bitsat is set on the basis of NCERT curriculum for class XI and XII. Cengage exam crack series presents 10 practice tests bitsat; A book made for bits aspirants to help them practice for bitsat in a more systematic and focused way so as to optimize their resources in the best possible manner. The practice tests designed strictly on bitsat pattern will not only help aspirants master basic concepts and solve relevant multiple choice questions with great ease but also give them a crisp clear self-assessment image of the level of preparation for the upcoming examination. The last practice test has been churned from previous year's Bitsat questions (based on memory) in order to give the aspirants a feel of the type and difficulty of the questions asked in the examination. Detailed solutions are also provided for all the questions at the end of the book. The book has also been supplemented with an android/windows app containing 5 practice tests. Aspirants can familiarize themselves with the online testing experience by practicing these tests. After attempting these tests, they can check the overall test analysis, their rank by synchronizing the scores online and solutions of the questions present in the tests.
  bits pilani computer science: Smart Agritech Santosh Kumar Srivastava, Durgesh Srivastava, Korhan Cengiz, Pramod Gaur, 2024-10-08 Agriculture has always been a vital sector of the global economy, providing food and raw materials for industries and households. However, with the growing population, changing climate conditions, and limited resources, the agriculture sector is facing numerous challenges. To address these challenges, farmers and agricultural companies are turning to advanced technologies such as Robotics, Artificial Intelligence (AI), and the Internet of Things (IoT). This exciting new volume provides a comprehensive overview of the latest technological advances in agriculture, focusing on the use of these three cutting-edge technologies. The book will explore the potential benefits of these technologies in improving agricultural efficiency, productivity, and sustainability. Whether for the veteran engineer, scientist in the lab, student, or faculty, this groundbreaking new volume is a valuable resource for researchers and other industry professionals interested in the intersection of technology and agriculture.
  bits pilani computer science: Confluence of AI, Machine, and Deep Learning in Cyber Forensics Misra, Sanjay, Arumugam, Chamundeswari, Jaganathan, Suresh, S., Saraswathi, 2020-12-18 Developing a knowledge model helps to formalize the difficult task of analyzing crime incidents in addition to preserving and presenting the digital evidence for legal processing. The use of data analytics techniques to collect evidence assists forensic investigators in following the standard set of forensic procedures, techniques, and methods used for evidence collection and extraction. Varieties of data sources and information can be uniquely identified, physically isolated from the crime scene, protected, stored, and transmitted for investigation using AI techniques. With such large volumes of forensic data being processed, different deep learning techniques may be employed. Confluence of AI, Machine, and Deep Learning in Cyber Forensics contains cutting-edge research on the latest AI techniques being used to design and build solutions that address prevailing issues in cyber forensics and that will support efficient and effective investigations. This book seeks to understand the value of the deep learning algorithm to handle evidence data as well as the usage of neural networks to analyze investigation data. Other themes that are explored include machine learning algorithms that allow machines to interact with the evidence, deep learning algorithms that can handle evidence acquisition and preservation, and techniques in both fields that allow for the analysis of huge amounts of data collected during a forensic investigation. This book is ideally intended for forensics experts, forensic investigators, cyber forensic practitioners, researchers, academicians, and students interested in cyber forensics, computer science and engineering, information technology, and electronics and communication.
  bits pilani computer science: Computer Education in India Utpal Kumar Banerjee, 1996 Contributed articles.
  bits pilani computer science: Soft Computing: Theories and Applications Kanad Ray, Tarun K. Sharma, Sanyog Rawat, R. K. Saini, Anirban Bandyopadhyay, 2018-08-30 The book focuses on soft computing and its applications to solve real-world problems occurring in different domains ranging from medicine and healthcare, and supply chain management to image processing and cryptanalysis. It includes high-quality papers presented in the International Conference on Soft Computing: Theories and Applications (SoCTA 2017), organized by Bundelkhand University, Jhansi, India. Offering significant insights into soft computing for teachers and researchers alike, the book inspires more researchers to work in the field of soft computing.
  bits pilani computer science: Databases Theory and Applications Miao Qiao, Gottfried Vossen, Sen Wang, Lei Li, 2021-02-09 This book constitutes the refereed proceedings of the 32nd Australasian Database Conference, ADC 2021, held in Dunedin, New Zealand, in January/February 2021. The 17 full papers presented were carefully reviewed and selected from 21 submissions. The Australasian Database Conference is an annual international forum for sharing the latest research advancements and novel applications of database systems, data-driven applications, and data analytics between researchers and practitioners from around the globe, particularly Australia and New Zealand. ADC shares novel research solutions to problems of todays information society that fullfil the needs of heterogeneous applications and environments and to identify new issues and directions for future research and development work.
  bits pilani computer science: Handbook of Machine Learning for Computational Optimization Vishal Jain, Sapna Juneja, Abhinav Juneja, Ramani Kannan, 2021-11-02 Technology is moving at an exponential pace in this era of computational intelligence. Machine learning has emerged as one of the most promising tools used to challenge and think beyond current limitations. This handbook will provide readers with a leading edge to improving their products and processes through optimal and smarter machine learning techniques. This handbook focuses on new machine learning developments that can lead to newly developed applications. It uses a predictive and futuristic approach, which makes machine learning a promising tool for processes and sustainable solutions. It also promotes newer algorithms that are more efficient and reliable for new dimensions in discovering other applications, and then goes on to discuss the potential in making better use of machines in order to ensure optimal prediction, execution, and decision-making. Individuals looking for machine learning-based knowledge will find interest in this handbook. The readership ranges from undergraduate students of engineering and allied courses to researchers, professionals, and application designers.
  bits pilani computer science: Recommender Systems P. Pavan Kumar, S. Vairachilai, Sirisha Potluri, Sachi Nadan Mohanty, 2021-06-01 Recommender systems use information filtering to predict user preferences. They are becoming a vital part of e-business and are used in a wide variety of industries, ranging from entertainment and social networking to information technology, tourism, education, agriculture, healthcare, manufacturing, and retail. Recommender Systems: Algorithms and Applications dives into the theoretical underpinnings of these systems and looks at how this theory is applied and implemented in actual systems. The book examines several classes of recommendation algorithms, including Machine learning algorithms Community detection algorithms Filtering algorithms Various efficient and robust product recommender systems using machine learning algorithms are helpful in filtering and exploring unseen data by users for better prediction and extrapolation of decisions. These are providing a wider range of solutions to such challenges as imbalanced data set problems, cold-start problems, and long tail problems. This book also looks at fundamental ontological positions that form the foundations of recommender systems and explain why certain recommendations are predicted over others. Techniques and approaches for developing recommender systems are also investigated. These can help with implementing algorithms as systems and include A latent-factor technique for model-based filtering systems Collaborative filtering approaches Content-based approaches Finally, this book examines actual systems for social networking, recommending consumer products, and predicting risk in software engineering projects.
  bits pilani computer science: Encyclopedia of Data Science and Machine Learning Wang, John, 2023-01-20 Big data and machine learning are driving the Fourth Industrial Revolution. With the age of big data upon us, we risk drowning in a flood of digital data. Big data has now become a critical part of both the business world and daily life, as the synthesis and synergy of machine learning and big data has enormous potential. Big data and machine learning are projected to not only maximize citizen wealth, but also promote societal health. As big data continues to evolve and the demand for professionals in the field increases, access to the most current information about the concepts, issues, trends, and technologies in this interdisciplinary area is needed. The Encyclopedia of Data Science and Machine Learning examines current, state-of-the-art research in the areas of data science, machine learning, data mining, and more. It provides an international forum for experts within these fields to advance the knowledge and practice in all facets of big data and machine learning, emphasizing emerging theories, principals, models, processes, and applications to inspire and circulate innovative findings into research, business, and communities. Covering topics such as benefit management, recommendation system analysis, and global software development, this expansive reference provides a dynamic resource for data scientists, data analysts, computer scientists, technical managers, corporate executives, students and educators of higher education, government officials, researchers, and academicians.
  bits pilani computer science: Handbook of Research on Ubiquitous Computing Technology for Real Time Enterprises Mhlh„user, Max, Gurevych, Iryna, 2008-01-31 This book combines the fundamental methods, algorithms, and concepts of pervasive computing with current innovations and solutions to emerging challenges. It systemically covers such topics as network and application scalability, wireless network connectivity, adaptability and context-aware computing, information technology security and liability, and human-computer interaction--Provided by publisher.
  bits pilani computer science: Advances in Data-driven Computing and Intelligent Systems Swagatam Das, Snehanshu Saha, Carlos A. Coello Coello, Jagdish Chand Bansal, 2023-06-21 The volume is a collection of best selected research papers presented at International Conference on Advances in Data-driven Computing and Intelligent Systems (ADCIS 2022) held at BITS Pilani, K K Birla Goa Campus, Goa, India during 23 – 25 September 2022. It includes state-of-the art research work in the cutting-edge technologies in the field of data science and intelligent systems. The book presents data-driven computing; it is a new field of computational analysis which uses provided data to directly produce predictive outcomes. The book will be useful for academicians, research scholars, and industry persons.
  bits pilani computer science: High Dynamic Range Imaging Erik Reinhard, Greg Ward, Sumanta Pattanaik, Paul Debevec, 2005-11-21 High dynamic range imaging produces images with a much greater range of light and color than conventional imaging. The effect is stunning, as great as the difference between black-and-white and color television. High Dynamic Range Imaging is the first book to describe this exciting new field that is transforming the media and entertainment industries. Written by the foremost researchers in HDRI, it will explain and define this new technology for anyone who works with images, whether it is for computer graphics, film, video, photography, or lighting design. * Written by the leading researchers in HDRI * Covers all the areas of high dynamic range imaging including capture devices, display devices, file formats, dynamic range reduction, and image-based lighting * Includes a DVD with over 4 GB of HDR images as well as source code and binaries for numerous tone reproduction operators for Windows, Linux, and Mac OS X
  bits pilani computer science: Blockchain Applications in IoT Security Patel, Harshita, Thakur, Ghanshyam Singh, 2020-09-18 Like many other scientific innovations, scientists are looking to protect the internet of things (IoT) from unfortunate losses, theft, or misuse. As one of the current hot trends in the digital world, blockchain technology could be the solution for securing the IoT. Blockchain Applications in IoT Security presents research for understanding IoT-generated data security issues, existing security facilities and their limitations and future possibilities, and the role of blockchain technology. Featuring coverage on a broad range of topics such as cryptocurrency, remote monitoring, and smart computing, this book is ideally designed for security analysts, IT specialists, entrepreneurs, business professionals, academicians, researchers, students, and industry professionals seeking current studies on the limitations and possibilities behind competitive blockchain technologies.
  bits pilani computer science: Emerging Research in Electronics, Computer Science and Technology V Sridhar, Holalu Seenappa Sheshadri, M C Padma, 2013-09-13 PES College of Engineering is organizing an International Conference on Emerging Research in Electronics, Computer Science and Technology (ICERECT-12) in Mandya and merging the event with Golden Jubilee of the Institute. The Proceedings of the Conference presents high quality, peer reviewed articles from the field of Electronics, Computer Science and Technology. The book is a compilation of research papers from the cutting-edge technologies and it is targeted towards the scientific community actively involved in research activities.
  bits pilani computer science: Web Service Composition and New Frameworks in Designing Semantics: Innovations Hung, Patrick, 2012-06-30 Detailing the functions, issues and trends of service composition, this book offers the most relevant research and models pertaining to the design and maturity of semantic use--Provided by publisher.
  bits pilani computer science: Artificial Neural Networks and Machine Learning – ICANN 2023 Lazaros Iliadis, Antonios Papaleonidas, Plamen Angelov, Chrisina Jayne, 2023-09-21 The 10-volume set LNCS 14254-14263 constitutes the proceedings of the 32nd International Conference on Artificial Neural Networks and Machine Learning, ICANN 2023, which took place in Heraklion, Crete, Greece, during September 26–29, 2023. The 426 full papers, 9 short papers and 9 abstract papers included in these proceedings were carefully reviewed and selected from 947 submissions. ICANN is a dual-track conference, featuring tracks in brain inspired computing on the one hand, and machine learning on the other, with strong cross-disciplinary interactions and applications.
  bits pilani computer science: Progress in Intelligent Computing Techniques: Theory, Practice, and Applications Pankaj Kumar Sa, Manmath Narayan Sahoo, M. Murugappan, Yulei Wu, Banshidhar Majhi, 2017-08-03 The book focuses on both theory and applications in the broad areas of communication technology, computer science and information security. This two volume book contains the Proceedings of 4th International Conference on Advanced Computing, Networking and Informatics. This book brings together academic scientists, professors, research scholars and students to share and disseminate information on knowledge and scientific research works related to computing, networking, and informatics to discuss the practical challenges encountered and the solutions adopted. The book also promotes translation of basic research into applied investigation and convert applied investigation into practice.
  bits pilani computer science: Change Request Impacts in Software Maintenance Madapuri Rudra Kumar, Kalli Srinivasa Nageswara Prasad, Annaluri Sreenivasa Rao, Vinit Kumar Gunjan, 2020-08-06 This book discusses Change Management Impact Analysis and how this method is used to analysis the risks and benefits of a change management initiative when it pertains to obtaining critical insight into how the change management program budget should be allotted. The process also offers useful indicators for what areas within the system should be monitored during the change management process. This book presents theoretical analysis of practical implications and surveys, along with analysis. It covers the functions aimed at identifying various stakeholders associated with the software such as requirement component, design component, and class component. The book talks about the interrelationship between the change and the effects on the rest of the system and dives deeper to include the critical role that the analysis places on the existing multiple functions such as estimating the development costs, the project overhead costs, cost for the modification of the system, and system strength or detecting errors in the system during the process. Case studies are also included to help researchers and practitioners to absorb the material presented. This book is useful to graduate students, researchers, academicians, institutions, and professionals that interested in exploring the areas of Impact Analysis.
  bits pilani computer science: Adversarial Machine Learning Aneesh Sreevallabh Chivukula, Xinghao Yang, Bo Liu, Wei Liu, Wanlei Zhou, 2023-03-06 A critical challenge in deep learning is the vulnerability of deep learning networks to security attacks from intelligent cyber adversaries. Even innocuous perturbations to the training data can be used to manipulate the behaviour of deep networks in unintended ways. In this book, we review the latest developments in adversarial attack technologies in computer vision; natural language processing; and cybersecurity with regard to multidimensional, textual and image data, sequence data, and temporal data. In turn, we assess the robustness properties of deep learning networks to produce a taxonomy of adversarial examples that characterises the security of learning systems using game theoretical adversarial deep learning algorithms. The state-of-the-art in adversarial perturbation-based privacy protection mechanisms is also reviewed. We propose new adversary types for game theoretical objectives in non-stationary computational learning environments. Proper quantification of the hypothesis set in the decision problems of our research leads to various functional problems, oracular problems, sampling tasks, and optimization problems. We also address the defence mechanisms currently available for deep learning models deployed in real-world environments. The learning theories used in these defence mechanisms concern data representations, feature manipulations, misclassifications costs, sensitivity landscapes, distributional robustness, and complexity classes of the adversarial deep learning algorithms and their applications. In closing, we propose future research directions in adversarial deep learning applications for resilient learning system design and review formalized learning assumptions concerning the attack surfaces and robustness characteristics of artificial intelligence applications so as to deconstruct the contemporary adversarial deep learning designs. Given its scope, the book will be of interest to Adversarial Machine Learning practitioners and Adversarial Artificial Intelligence researchers whose work involves the design and application of Adversarial Deep Learning.
  bits pilani computer science: Big data analytics for smart healthcare applications Celestine Iwendi, Thippa Reddy Gadekallu, Ali Kashif Bashir, 2023-04-17
  bits pilani computer science: Advanced Topics in Database Research, Volume 5 Siau, Keng, 2006-04-30 Advanced Topics in Database Research is a series of books on the fields of database, software engineering, and systems analysis and design. They feature the latest research ideas and topics on how to enhance current database systems, improve information storage, refine existing database models, and develop advanced applications. Advanced Topics in Database Research, Volume 5 is a part of this series. Advanced Topics in Database Research, Volume 5 presents the latest research ideas and topics on database systems and applications, and provides insights into important developments in the field of database and database management. This book describes the capabilities and features of new technologies and methodologies, and presents state-of-the-art research ideas, with an emphasis on theoretical issues regarding databases and database management.
  bits pilani computer science: Algorithmic Strategies for Solving Complex Problems in Cryptography Balasubramanian, Kannan, Rajakani, M., 2017-08-16 Cryptography is a field that is constantly advancing, due to exponential growth in new technologies within the past few decades. Applying strategic algorithms to cryptic issues can help save time and energy in solving the expanding problems within this field. Algorithmic Strategies for Solving Complex Problems in Cryptography is an essential reference source that discusses the evolution and current trends in cryptology, and it offers new insight into how to use strategic algorithms to aid in solving intricate difficulties within this domain. Featuring relevant topics such as hash functions, homomorphic encryption schemes, two party computation, and integer factoring, this publication is ideal for academicians, graduate students, engineers, professionals, and researchers interested in expanding their knowledge of current trends and techniques within the cryptology field.
  bits pilani computer science: Proceedings of International Conference on Data, Electronics and Computing Nibaran Das,
  bits pilani computer science: Handling Priority Inversion in Time-Constrained Distributed Databases Shanker, Udai, Pandey, Sarvesh, 2020-02-14 In the computer science industry, high levels of performance remain the focal point in software engineering. This quest has made current systems exceedingly complex, as practitioners strive to discover novel approaches to increase the capabilities of modern computer structures. A prevalent area of research in recent years is scalable transaction processing and its usage in large databases and cloud computing. Despite its popularity, there remains a need for significant research in the understanding of scalability and its performance within distributed databases. Handling Priority Inversion in Time-Constrained Distributed Databases provides emerging research exploring the theoretical and practical aspects of database transaction processing frameworks and improving their performance using modern technologies and algorithms. Featuring coverage on a broad range of topics such as consistency mechanisms, real-time systems, and replica management, this book is ideally designed for IT professionals, computing specialists, developers, researchers, data engineers, executives, academics, and students seeking research on current trends and developments in distributed computing and databases.
  bits pilani computer science: Advanced Automated Software Testing: Frameworks for Refined Practice Alsmadi, Izzat, 2012-01-31 This book discusses the current state of test automation practices, as it includes chapters related to software test automation and its validity and applicability in different domains--Provided by publisher.
  bits pilani computer science: Advanced Computing and Communication Technologies Ramesh K Choudhary, Jyotsna Kumar Mandal, Nitin Auluck, H A Nagarajaram, 2016-06-09 This book highlights a collection of high-quality peer-reviewed research papers presented at the Ninth International Conference on Advanced Computing & Communication Technologies (ICACCT-2015) held at Asia Pacific Institute of Information Technology, Panipat, India during 27–29 November 2015. The book discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques. Researchers from academia and industry present their original work and exchange ideas, information, techniques and applications in the field of Advanced Computing and Communication Technology.
  bits pilani computer science: Innovations in Computer Science and Engineering H. S. Saini, Rishi Sayal, A. Govardhan, Rajkumar Buyya, 2021-04-23 This book features a collection of high-quality, peer-reviewed research papers presented at the 8th International Conference on Innovations in Computer Science & Engineering (ICICSE 2020), held at Guru Nanak Institutions, Hyderabad, India, on 28–29 August 2020. It covers the latest research in data science and analytics, cloud computing, machine learning, data mining, big data and analytics, information security and privacy, wireless and sensor networks and IoT applications, artificial intelligence, expert systems, natural language processing, image processing, computer vision and artificial neural networks.
  bits pilani computer science: International Conference on Mobile Computing and Sustainable Informatics Jennifer S. Raj, 2020-11-30 Sustainability and mobile computing embraces a wide range of Information and Communication Technologies [ICT] in recent times. This book focuses more on the recent research and development works in almost all the facets of sustainable, ubiquitous computing and communication paradigm. The recent research efforts on this evolving paradigm help to advance the technologies for next-generation, where socio-economic growth and sustainability poses significant challenges to the computing and communication infrastructures. The main purpose of this book is to promote the technical advances and impacts of sustainability and mobile computing to the informatics research. The key strands of this book include green computing, predictive models, mobility, data analytics, mobile computing, optimization, Quality of Service [QoS], new communicating and computing frameworks, human computer interaction, Artificial Intelligence [AI], communication networks, risk management, Ubiquitous computing, robotics, smart city and applications. The book has also addressed myriad of sustainability challenges in various computing and information processing infrastructures.
  bits pilani computer science: Mastering Zero-knowledge Proofs Dr. Amit Dua, Gaurav Kumar, 2024-08-03 DESCRIPTION Mastering Zero-knowledge Proofs is your ultimate guide to blockchain and ZKPs. It connects blockchain's core elements, like distributed ledgers and smart contracts, to ZKPs' advanced privacy solutions, emphasizing their significance in today's digital world, and provides a robust understanding of how these cryptographic techniques can revolutionize security and privacy in various applications. In this book, you will explore the basics of blockchain and ZKPs. You will gain technical skills like group theory and elliptic curve cryptography. Each chapter covers practical applications of ZKPs in blockchain systems, addressing challenges, ongoing research, and real-world use cases across industries like healthcare and finance. You will find detailed explanations of SNARKs, STARKs, and PLONK, along with practical guidance on constructing and implementing these non-interactive proofs. You will learn about innovative solutions, zero-knowledge virtual machines, ZK-Rollups, and ZK-EVM, along with a step-by-step guide for building and deploying these technologies. By the end of this book, you will have a solid understanding of Zero-knowledge Proofs and their applications in blockchain development. You will be equipped to implement privacy-preserving solutions, enhancing security and efficiency in your projects, making you a competent contributor in the evolving blockchain space. KEY FEATURES ● In-depth exploration of Zero-knowledge Proof concepts and applications. ● Practical insights into implementing ZKP in real-world systems. ● Comprehensive coverage from blockchain basics to advanced cryptography. WHAT YOU WILL LEARN ● Understand the fundamentals of Zero-knowledge Proofs and blockchain. ● Construct and implement SNARKs, STARKs, and PLONK proofs. ● Apply Zero-knowledge Proofs to enhance security and privacy in applications. ● Utilize zero-knowledge virtual machines and ZK-Rollups. ● Integrate ZK-EVM into Ethereum for scalable solutions. ● Identify and overcome challenges in Zero-knowledge Proofs. WHO THIS BOOK IS FOR This book is ideal for blockchain developers, security professionals, and researchers with a foundational understanding of cryptography and blockchain technology. TABLE OF CONTENTS 1. Introduction to Blockchain Technology 2. Introduction to Zero-knowledge Proofs 3. Introduction to SNARKS 4. SNARK Construction: Non-interactive Proof Building 5. Advanced SNARK Paradigms and Techniques 6. SNARK versus STARK 7. SNARKs In-depth and PLONK 8. Zero-Knowledge Virtual Machines 9. ZK-Rollups: Scalability Meets Privacy 10. Conceptualizing ZK-EVM in Ethereum 11. ZK Swaps: Revolutionizing Decentralized Exchanges 12. Zero-Knowledge Identity 13. Challenges and Limitations of Zero-knowledge Proofs 14. Ongoing Research and Development in Zero-knowledge Proofs 15. Real-world Applications of Zero-knowledge Proofs
  bits pilani computer science: Applied Soft Computing and Communication Networks Sabu M. Thampi,
  bits pilani computer science: International Conference on Emerging Trends in Electrical, Communication and Information Technologies, Vol 1 ,
Birla Institute of Technology And Science, Pilani (BITS Pilani)
BITS Pilani is an all-India institute for higher education with the primary aim of training young men and women to be able and eager to create and put into action ideas, methods, techniques, …

Bit - Wikipedia
In information theory, one bit is the information entropy of a random binary variable that is 0 or 1 with equal probability, [3] or the information that is gained when the value of such a variable …

Bits and Bytes
At the smallest scale in the computer, information is stored as bits and bytes. In this section, we'll learn how bits and bytes encode information. Everything in a computer is 0's and 1's. The bit …

What is a bit? Bits and bytes explained - IONOS
Dec 8, 2022 · Knowing about bits is essential for understanding how much storage your hard drive has or how fast your DSL connection is. So what is a bit and how is it different from a byte? A …

What is bit (binary digit) in computing? - TechTarget
Jun 6, 2025 · What is bit (binary digit) in computing? A bit (binary digit) is the smallest unit of data that a computer can process and store. It can have only one of two values: 0 or 1. Bits are …

What are Bits and Bytes?
Bits and bytes are the smallest units of data in a computer. A bit is a single binary digit, with a value of either 0 or 1. A byte is a group of 8 bits.

How Bits and Bytes Work | HowStuffWorks
Bytes and bits are the starting point of the computer world. Find out about the Base-2 system, 8-bit bytes, the ASCII character set, byte prefixes and binary math.

What is Bit? - GeeksforGeeks
Nov 12, 2023 · Bits stand for Binary Digit. Where binary means two things or two elements. Digit means a symbol which represents a number. So, bit consists two symbols in form of numbers …

What Are Bits? Binary Data Explained (2025) - BroadbandSearch
Learn what bits are and their importance in digital systems. Discover the different types of binary bits, and data bits, and how binary data processing works.

Bit Definition - What is a bit in data storage? - TechTerms.com
Apr 20, 2013 · Bit Definition - What is a bit in data storage? A bit (short for "binary digit") is the smallest unit of measurement used to quantify computer data. It contains a single binary value …

Birla Institute of Technology And Science, Pilani (BITS Pilani)
BITS Pilani is an all-India institute for higher education with the primary aim of training young men and women to be able and eager to create and put into action ideas, methods, techniques, …

Bit - Wikipedia
In information theory, one bit is the information entropy of a random binary variable that is 0 or 1 with equal probability, [3] or the information that is gained when the value of such a variable …

Bits and Bytes
At the smallest scale in the computer, information is stored as bits and bytes. In this section, we'll learn how bits and bytes encode information. Everything in a computer is 0's and 1's. The bit …

What is a bit? Bits and bytes explained - IONOS
Dec 8, 2022 · Knowing about bits is essential for understanding how much storage your hard drive has or how fast your DSL connection is. So what is a bit and how is it different from a byte? A …

What is bit (binary digit) in computing? - TechTarget
Jun 6, 2025 · What is bit (binary digit) in computing? A bit (binary digit) is the smallest unit of data that a computer can process and store. It can have only one of two values: 0 or 1. Bits are …

What are Bits and Bytes?
Bits and bytes are the smallest units of data in a computer. A bit is a single binary digit, with a value of either 0 or 1. A byte is a group of 8 bits.

How Bits and Bytes Work | HowStuffWorks
Bytes and bits are the starting point of the computer world. Find out about the Base-2 system, 8-bit bytes, the ASCII character set, byte prefixes and binary math.

What is Bit? - GeeksforGeeks
Nov 12, 2023 · Bits stand for Binary Digit. Where binary means two things or two elements. Digit means a symbol which represents a number. So, bit consists two symbols in form of numbers …

What Are Bits? Binary Data Explained (2025) - BroadbandSearch
Learn what bits are and their importance in digital systems. Discover the different types of binary bits, and data bits, and how binary data processing works.

Bit Definition - What is a bit in data storage? - TechTerms.com
Apr 20, 2013 · Bit Definition - What is a bit in data storage? A bit (short for "binary digit") is the smallest unit of measurement used to quantify computer data. It contains a single binary value …