You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book sonstitutes selected papers from the first International Conference on Cyber Warfare, Security and Space Research, SpacSec 2021, held in Jaipur, India, in December 2021. The 19 full and 6 short papers were thoroughly reviewed and selected from the 98 submissions. The papers present research on cyber warfare, cyber security, and space research area, including the understanding of threats and risks to systems, the development of a strong innovative culture, and incident detection and post-incident investigation.
This book presents high-quality, peer-reviewed papers from the International Conference on “Innovations in Computational Intelligence and Computer Vision (ICICV 2020),” hosted by Manipal University Jaipur, Rajasthan, India, on January 17–19, 2020. Offering a collection of innovative ideas from researchers, scientists, academics, industry professionals and students, the book covers a variety of topics, such as artificial intelligence and computer vision, image processing and video analysis, applications and services of artificial intelligence and computer vision, interdisciplinary areas combining artificial intelligence and computer vision, and other innovative practices.
This book gathers the proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS), held at the Military Engineering Institute, Rio de Janeiro, Brazil, from 8 to 10th May 2019. It covers a variety of topics in systems, communication and defense; strategy and political-administrative vision in defense; and engineering and technologies applied to defense. Given its scope, it offers a valuable resource for practitioners, researchers, and students alike.
The term learning analytics is used in the context of the use of analytics in e-learning environments. Learning analytics is used to improve quality. It uses data about students and their activities to provide better understanding and to improve student learning. The use of learning management systems, where the activity of the students can be easily accessed, potentiated the use of learning analytics to understand their route during the learning process, help students be aware of their progress, and detect situations where students can give up the course before its completion, which is a growing problem in e-learning environments. Advancing the Power of Learning Analytics and Big Data in Ed...
In today’s world, the use of technology is growing rapidly, and people need effective solutions for their real-life problems. This book discusses smart applications of associated technologies to develop cohesive and comprehensive solutions for the betterment of humankind. It comprehensively covers the effective use of the Internet of Things (IoT), wireless sensor network, wearable sensors, body area network, cloud computing, and distributed computing methodologies. The book comprehensively covers IoT and fog computing sensor supported technologies or protocols including web of things, near-field communication, 6LoWPAN, LoRAWAN, XMPP, DDS, LwM2M, Mesh Protocol, and radio-frequency identific...
The integration of AI with software is an essential enabler for science and the new economy, creating new markets and opportunities for a more reliable, flexible and robust society. Current software methodologies, tools and techniques often fall short of expectations, however, and much software remains insufficiently robust and reliable for a constantly changing and evolving market. This book presents 54 papers delivered at the 20th edition of the International Conference on New Trends in Intelligent Software Methodology Tools, and Techniques (SoMeT_21), held in Cancun, Mexico, from 21–23 September 2021. The aim of the conference was to capture the essence of a new state-of-the-art in soft...
Mobile forensics has grown from a relatively obscure tradecraft to a crucial part of many criminal investigations, and is now used daily by examiners and analysts within local, state, and federal law enforcement as well as within the military, US government organizations, and the private “e-Discovery” industry. Developments in forensic research, tools, and processes over the past decade have been very successful and continue to change at a rapid pace. Forensic Investigations and Risk Management in Mobile and Wireless Communications is a collection of innovative research on the methods and applications of analyzing mobile devices and data for collection of information pertaining to the legal evidence related to various security breaches and intrusion detection. While highlighting topics including cybercrime, neural networks, and smartphone security, this book is ideally designed for security analysts, IT professionals, researchers, practitioners, academicians, and students currently investigating the up-and-coming aspects surrounding network security, computer science, and security engineering.
As technology advances, the emergence of 5G has become an essential discussion moving forward as its applications and benefits are expected to enhance many areas of life. The introduction of 5G technology to society will improve communication speed, the efficiency of information transfer, and end-user experience to name only a few of many future improvements. These new opportunities offered by 5G networks will spread across industry, government, business, and personal user experiences leading to widespread innovation and technological advancement. What stands at the very core of 5G becoming an integral part of society is the very fact that it is expected to enrich society in a multifaceted w...
There is rapid development and change in the field of computer science today. These affect all areas of life. Emerging topics in computer science are covered in this book. In the first chapter, there is a log data analysis case study that aims to understand Hadoop and MapReduce by example. In the second chapter, encrypted communication has been tried to be provided on IoT devices performing edge computing. In this way, it is aimed to make communication secure. Arduino is used as an IoT device. In the encryption process, AES encryption is used with 128-bit and 256-bit key lengths. The third chapter presents a more secure connection between the NodemCU and Blynk, using the AES algorithm. it is aimed to prevent a vulnerability in the connection of Google Home devices with IoT during the Blynk IoT connection phase. The next chapter presents a methodological tool based on an evaluation framework for integration of digital games into education (MEDGE), expanded by adding additional information from the students, MEDGE+. The fifth and last chapter proposes a disaster management system utilising machine learning called DTDMS that is used to support decision-making mechanisms.