You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Smart communications are the concept in which smart appliances and devices are integrated into an application that runs in a smart hand-held device. The residents of a smart home can have complete control over their home’s electronic gadgets using wireless communications. These technologies can help people control gadgets in the home/office remotely and often simultaneously, which increases convenience and reduces time spent on these tasks. However, problems can arise in the security systems associated with these smart devices; security may be compromised when there are loopholes or human mistakes. When security credentials are lost, overall security can also be lost. This is because smart...
The Internet of things (IoT) is a network of connected physical objects or things that are working along with sensors, wireless transceiver modules, processors, and software required for connecting, processing, and exchanging data among the other devices over the Internet. These objects or things are devices ranging from simple handheld devices to complex industrial heavy machines. A thing in IoT can be any living or non-living object that can be provided capabilities to sense, process, and exchange data over a network. The IoT provides people with the ability to handle their household works to industrial tasks smartly and efficiently without the intervention of another human. The IoT provid...
The 4-volume set LNCS 11632 until LNCS 11635 constitutes the refereed proceedings of the 5th International Conference on Artificial Intelligence and Security, ICAIS 2019, which was held in New York, USA, in July 2019. The conference was formerly called “International Conference on Cloud Computing and Security” with the acronym ICCCS. The total of 230 full papers presented in this 4-volume proceedings was carefully reviewed and selected from 1529 submissions. The papers were organized in topical sections as follows: Part I: cloud computing; Part II: artificial intelligence; big data; and cloud computing and security; Part III: cloud computing and security; information hiding; IoT security; multimedia forensics; and encryption and cybersecurity; Part IV: encryption and cybersecurity.
This volume of the Lecture Notes in Mobility series contains papers written by speakers and poster presenters at the 21st International Forum on Advanced Microsystems for Automotive Applications (AMAA 2017) "Smart Systems Transforming the Automobile" that was held in Berlin, Germany in September 2017. The authors report about recent breakthroughs in electric and electronic components and systems, driver assistance and vehicle automation as well as safety and testing. Furthermore, legal aspects and impacts of connected and automated driving are covered. The target audience primarily comprises research experts and practitioners in industry and academia, but the book may also be beneficial for graduate students alike.
Black hole attack is the famous security attack in which an intruder node come in a network and behaves as friend node to steal sensitive data. In this book a complete solution to the black hole problem is discussed and implemeted in network simulator -2. This book is targeted for all those who wants to work in MANET, BLACK HOLE, NETWORK SIMULATOR-2, COMPUTER NETWORKS and many more.
None
The Internet of Things (IoT) is a technology that enables a network of physical items (things) to sense physical events, transmit data, and interact with their environment in order to make decisions or monitor certain processes and occurrences without the need for human contact. This may be accomplished through the use of the internet. The desire to make it simpler to collect data in real time and to offer automatic and remotecontrol mechanisms as a substitute for the conventional monitoring and control systems used in many sectors today was one of the most significant reasons for the development of IoT systems. This goal has been one of the most important reasons for the development of IoT...
The cultivation of crops plays a very important role in agriculture. However, proper maintenance and management are required. Lack of such management would lead to crop loss or reduced crop yields. Hence, the ability to detect and identify diseases on infected crops is a problem of increasing concern. Real-time disease detection systems do not exist in the current agricultural landscape. It requires tremendous amounts of work, expertise in plant diseases, and excessive processing time. Using precision agriculture techniques, combined with AI, a great deal of work is reduced. Contemporary Developments in Agricultural Cyber-Physical Systems provides a forum for researchers and practitioners to...
This handbook aims to serve as a one-stop, reliable source of reference, with curations of survey and expository contributions on the state-of-the-art in Blockchain technology. It covers a comprehensive range of topics, providing the technical and non-technical reader with fundamentals, applications, and deep details on a variety of topics. The readership is expected to span broadly from technologically-minded business professionals and entrepreneurs, to students, instructors, novices and seasoned researchers, in computer science, engineering, software engineering, finance, and data science. Though Blockchain technology is relatively young, its evolution as a field and a practice is booming ...
This innovative and original book explores the relationship between blockchain and antitrust, highlighting the mutual benefits that stem from cooperation between the two and providing a unique perspective on how law and technology could cooperate.