You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Because of the growing reliance on software, concerns are growing as to how reliable a system is before it is commissioned for use, how high the level of reliability is in the system, and how many vulnerabilities exist in the system before its operationalization. Equally pressing issues include how to secure the system from internal and external security threats that may exist in the face of resident vulnerabilities. These two problems are considered increasingly important because they necessitate the development of tools and techniques capable of analyzing dependability and security aspects of a system. These concerns become more pronounced in the cases of safety-critical and mission-critic...
Advanced IoT based wireless communication has recently received a lot of attention due to a wide range of industry 4.0 applications such as security solutions of CPS in vehicular communication, E_Healthcare over secure wireless communication, privacy issues of E_Learning via cost and energy efficient wireless network communication, etc. In these applications, physical data is continuously monitored by the IoT-based sensor nodes to facilitate the current situations, 5G network management, security solutions, etc. in industry 4.0 environment. Despite the many security issues considered in existing wireless communication in the industry 4.0 applications, IoT based 5G and 5G+ wireless communicat...
This book gathers selected high-quality research papers presented at the Fourth International Congress on Information and Communication Technology, held at Brunel University, London, on February 27–28, 2019. It discusses emerging topics pertaining to information and communication technology (ICT) for managerial applications, e-governance, e-agriculture, e-education and computing technologies, the Internet of things (IoT), and e-mining. Written by respected experts and researchers working on ICT, the book offers a valuable asset for young researchers involved in advanced studies.
The internet of things (IoT) has drawn great attention from both academia and industry, since it offers a challenging notion of creating a world where all things around us are connected to the internet and communicate with each other with minimal human intervention. Another component for helping IoT to succeed is cloud computing. The combination of cloud computing and IoT will enable new monitoring services and powerful processing of sensory data streams. These applications, alongside implementation details and challenges, should also be explored for successful mainstream adoption. IoT is also fueled by the advancement of digital technologies, and the next generation era will be cloud-based ...
The Social Internet of Things (SIoT) has become a hot topic in academic research. It employs the theory of social networks into the different levels of the Internet of Things (IoTs) and has brought new possibilities for the development of IoTs. Essentially, the SIoT is a subset of IoTs. It uses intelligent hardware and humans as the node, a social network as the organization type, the social relationship between things, things and humans, and between humans, formatting research methods and models with social network characteristics to realize the connection, service, and application of the IoTs. Moreover, SIoT is a form of realization of technology, architecture, and application of the IoTs ...
The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.
This book features high-quality research papers presented at Second Doctoral Symposium on Computational Intelligence (DoSCI-2021), organized by Institute of Engineering and Technology (IET), AKTU, Lucknow, India, on 6 March 2021. This book discusses the topics such as computational intelligence, artificial intelligence, deep learning, evolutionary algorithms, swarm intelligence, fuzzy sets and vague sets, rough set theoretic approaches, quantum-inspired computational intelligence, hybrid computational intelligence, machine learning, computer vision, soft computing, distributed computing, parallel and grid computing, cloud computing, high-performance computing, biomedical computing, decision support and decision making.
An essential textbook for graduate courses on magnetism and an important source of practical reference data.
This book gathers the latest advances, innovations, and applications in the field of information technology in civil and building engineering, presented at the 18th International Conference on Computing in Civil and Building Engineering (ICCCBE), São Paulo, Brazil, August 18-20, 2020. It covers highly diverse topics such as BIM, construction information modeling, knowledge management, GIS, GPS, laser scanning, sensors, monitoring, VR/AR, computer-aided construction, product and process modeling, big data and IoT, cooperative design, mobile computing, simulation, structural health monitoring, computer-aided structural control and analysis, ICT in geotechnical engineering, computational mechanics, asset management, maintenance, urban planning, facility management, and smart cities. Written by leading researchers and engineers, and selected by means of a rigorous international peer-review process, the contributions highlight numerous exciting ideas that will spur novel research directions and foster multidisciplinary collaborations.