You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book explores opportunities and challenges in the field of Internet of Everything (IoE) security and privacy under the umbrella of distributed ledger technologies and blockchain technology including distributed consensus mechanisms, crypto-sensors, encryption algorithms, and fault tolerance mechanisms for devices and systems. It focusses on the applicability of blockchain technology, including architectures and platforms for blockchain and IoE, authentication and encryption algorithms for IoE, malicious transactions detection, blockchain for forensics, and so forth. Outlines the major benefits as well as challenges associated with integration of blockchain with IoE; Describes detailed f...
Researchers, academicians and professionals expone in this book their research in the application of intelligent computing techniques to software engineering. As software systems are becoming larger and complex, software engineering tasks become increasingly costly and prone to errors. Evolutionary algorithms, machine learning approaches, meta-heuristic algorithms, and others techniques can help the effi ciency of software engineering.
This book covers computer vision-based applications in digital healthcare industry 4.0, including different computer vision techniques, image classification, image segmentations, and object detection. Various application case studies from domains such as science, engineering, and social networking are introduced, along with their architecture and how they leverage various technologies, such as edge computing and cloud computing. It also covers applications of computer vision in tumor detection, cancer detection, combating COVID-19, and patient monitoring. Features: Provides a state-of-the-art computer vision application in the digital health care industry Reviews advances in computer vision ...
Ruby Gupta- heiress, social worker, mother of two has built, brick by brick, a wall around herself to soak up the fire within. It is her granddaughter, Kadambari, who manages to connect with her precious Nani. They live individual lives, die fleeting deaths, trying all the while to grasp the silences in between. And then a stranger comes into Rubydi s life
This comprehensive yet accessible text provides a good introduction to the fundamental concepts of Information Technology and skillfully elaborates on their applications, covering in the process the entire spectrum of IT related topics. Organized into three parts, the book offers an insightful analysis of the subject, explaining the concepts through suitable illustrations. Part I covers basic issues and concepts of Internet and the techniques of acquiring, storing, structuring and managing information that may involve images, text files and video data. The reader is exposed to both centralized and distributed database systems. Part II deals with the core topics in developing information syst...
Computation intelligence (CI) paradigms, including artificial neural networks, fuzzy systems, evolutionary computing techniques, and intelligent agents, form the basis of making clinical decisions. This book explains different aspects of the current research on CI technologies applied in the field of medical diagnosis. It discusses critical issues related to medical diagnosis, like uncertainties in the medical domain, problems in the medical data, especially dealing with time-stamped data, and knowledge acquisition. Features: Introduces recent applications of new computational intelligence technologies focusing on medical diagnosis issues. Reviews multidisciplinary research in health care, l...
This book provides in-depth knowledge to solve engineering, geometrical, mathematical, and scientific problems with the help of advanced computational methods with a focus on mechanical and materials engineering. Divided into three subsections covering design and fluids, thermal engineering and materials engineering, each chapter includes exhaustive literature review along with thorough analysis and future research scope. Major topics covered pertains to computational fluid dynamics, mechanical performance, design, and fabrication including wide range of applications in industries as automotive, aviation, electronics, nuclear and so forth. Covers computational methods in design and fluid dyn...
This book provides insights of World Conference on Smart Trends in Systems, Security and Sustainability (WS4 2021) which is divided into different sections such as Smart IT Infrastructure for Sustainable Society; Smart Management prospective for Sustainable Society; Smart Secure Systems for Next Generation Technologies; Smart Trends for Computational Graphics and Image Modeling; and Smart Trends for Biomedical and Health Informatics. The proceedings is presented in two volumes. The book is helpful for active researchers and practitioners in the field.
The book intends to cover various problematic aspects of emerging smart computing and self-adapting technologies comprising of machine learning, artificial intelligence, deep learning, robotics, cloud computing, fog computing, data mining algorithms, including emerging intelligent and smart applications related to these research areas. Further coverage includes implementation of self-adaptation architecture for smart devices, self-adaptive models for smart cities and self-driven cars, decentralized self-adaptive computing at the edge networks, energy-aware AI-based systems, M2M networks, sensors, data analytics, algorithms and tools for engineering self-adaptive systems, and so forth. Acts a...
Security systems have become an integral part of the building and large complex setups, and intervention of the computational intelligence (CI) paradigm plays an important role in security system architecture. This book covers both theoretical contributions and practical applications in security system design by applying the Internet of Things (IoT) and CI. It further explains the application of IoT in the design of modern security systems and how IoT blended with computational intel- ligence can make any security system improved and realizable. Key features: Focuses on the computational intelligence techniques of security system design Covers applications and algorithms of discussed computational intelligence techniques Includes convergence-based and enterprise integrated security systems with their applications Explains emerging laws, policies, and tools affecting the landscape of cyber security Discusses application of sensors toward the design of security systems This book will be useful for graduate students and researchers in electrical, computer engineering, security system design and engineering.