You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This is an open access book. The covid-19 pandemic today forces humans to do almost all activities from home. Consequently, inventions in many fields of engineering technology are needed to facilitate those activities. First, human activities mainly are based on information technology today and internet connection is very important. People generate, send, and receive data by their smartphones every time and everything is connected to the internet. Equipment becomes smarter to assist the owner. Second, People need powerful, efficient, and smart vehicles and machines in Industry 4.0. Third, the need for energy increases, which causes the decrease of global environmental quality. It needs new t...
In today's interconnected digital landscape, cybersecurity threats pose significant challenges to individuals, organizations, and governments worldwide. Cyberattacks, data breaches, and malicious activities continue to escalate in sophistication and frequency, jeopardizing sensitive information, financial assets, and critical infrastructure. Amidst this escalating threat landscape, there's a pressing need for comprehensive solutions to safeguard digital assets and ensure the integrity, confidentiality, and availability of data. Traditional security measures are proving inadequate in the face of evolving cyber threats, necessitating innovative approaches to cybersecurity. Innovations in Moder...
In the ever-evolving landscape of digital forensics and cybercrime investigation, staying ahead with the latest advancements is not just advantageous—it’s imperative. Digital Forensics and Cyber Crime Investigation: Recent Advances and Future Directions serves as a crucial bridge, connecting the dots between the present knowledge base and the fast-paced developments in this dynamic field. Through a collection of meticulous research and expert insights, this book dissects various facets of digital forensics and cyber security, providing readers with a comprehensive look at current trends and future possibilities. Distinguished by its in-depth analysis and forward-looking perspective, this...
This book includes proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS-2021), which took place in Asan, Korea, on July 1-3, 2021. With the proliferation of wireless technologies and electronic devices, there is a fast-growing interest in Ubiquitous and Pervasive Computing (UPC). The UPC enables to create a human-oriented computing environment where computer chips are embedded in everyday objects and interact with physical world. Through UPC, people can get online even while moving around, thus, having almost permanent access to their preferred services. With a great potential to revolutionize our lives, UPC also poses new research challenges. The aim of the book is to provide the latest research findings, methods, development techniques, challenges, and solutions from both theoretical and practical perspectives related to UPC with an emphasis on innovative, mobile, and Internet services.
As the metaverse rapidly evolves into a virtual realm where digital interactions mirror and sometimes surpass physical reality, ensuring robust security paradigms becomes critical. The complex and interconnected nature of the metaverse begs better exploration into user privacy, cyber threat prevention, and virtual asset integrity. Establishing reliable security frameworks in the metaverse involves identity management, data protection, decentralized governance models, and the mitigation of virtual and augmented reality vulnerabilities. By developing and implementing robust security paradigms, those who use the metaverse can foster trust, promote innovation, and facilitate the safe and sustain...
This book provides the latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and their applications. The networks and information systems of today are evolving rapidly. There are new trends and applications in information networking such as wireless sensor networks, ad hoc networks, peer-to-peer systems, vehicular networks, opportunistic networks, grid and cloud computing, pervasive and ubiquitous computing, multimedia systems, security, multi-agent systems, high-speed networks, and web-based systems. These kinds of networks need to manage the increasing number of users, provide support for different services, guarantee the QoS, and optimize the network resources. For these networks, there are many research issues and challenges that should be considered and find solutions.
Proceedings of the 2nd International Conference on Quran and Hadith Studies Information Technology and Media in Conjunction with the 1st International Conference on Islam, Science and Technology, ICONQUHAS & ICONIST, Bandung, October 2-4, 2018, Indonesia Now-days, Multimedia devices offer opportunities in transforming the Quran and Hadith into different forms of use, and into extended areas of studies. Technology information offers challenges as well as opportunity. Therefore, Faculty of Ushuluddin, UIN (the State Islamic University) Syarif Hidayatullah Jakarta, of UIN Sunan Gunung Djati Bandung, and UIN Maulana Malik Ibrahim Malang held jointly the 2nd International Conference on Qur’an and Hadith Studies (ICONQUHAS 2018) and the 1st International Conference on Islam, Science, and Technology (ICONIST2018), with the theme “Qur’an-Hadith, Information Technology, and Media: Challenges and Opportunities”. This conference aims at bringing together scholars and researchers to share their knowledge and their research findings. This publication resulted from the selected papers of these conferences
This is an open access book. The covid-19 pandemic today forces humans to do almost all activities from home. Consequently, inventions in many fields of engineering technology are needed to facilitate those activities. First, human activities mainly are based on information technology today and internet connection is very important. People generate, send, and receive data by their smartphones every time and everything is connected to the internet. Equipment becomes smarter to assist the owner. Second, People need powerful, efficient, and smart vehicles and machines in Industry 4.0. Third, the need for energy increases, which causes the decrease of global environmental quality. It needs new t...
Integrates the theory and practices of supply chain management. This book focuses on how to build a competitive supply chain using viable management strategies, operational models, decision-making techniques, and information technology. It also includes initiatives such as e-commerce, collaborative planning, forecasting, and replenishment (CPFR).