Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Cyber Warfare, Security and Space Research
  • Language: en
  • Pages: 339

Cyber Warfare, Security and Space Research

This book sonstitutes selected papers from the first International Conference on Cyber Warfare, Security and Space Research, SpacSec 2021, held in Jaipur, India, in December 2021. The 19 full and 6 short papers were thoroughly reviewed and selected from the 98 submissions. The papers present research on cyber warfare, cyber security, and space research area, including the understanding of threats and risks to systems, the development of a strong innovative culture, and incident detection and post-incident investigation.

Innovations in Computational Intelligence and Computer Vision
  • Language: en
  • Pages: 623

Innovations in Computational Intelligence and Computer Vision

This book presents high-quality, peer-reviewed papers from the International Conference on “Innovations in Computational Intelligence and Computer Vision (ICICV 2020),” hosted by Manipal University Jaipur, Rajasthan, India, on January 17–19, 2020. Offering a collection of innovative ideas from researchers, scientists, academics, industry professionals and students, the book covers a variety of topics, such as artificial intelligence and computer vision, image processing and video analysis, applications and services of artificial intelligence and computer vision, interdisciplinary areas combining artificial intelligence and computer vision, and other innovative practices.

Developments and Advances in Defense and Security
  • Language: en
  • Pages: 509

Developments and Advances in Defense and Security

  • Type: Book
  • -
  • Published: 2019-06-13
  • -
  • Publisher: Springer

This book gathers the proceedings of the Multidisciplinary International Conference of Research Applied to Defense and Security (MICRADS), held at the Military Engineering Institute, Rio de Janeiro, Brazil, from 8 to 10th May 2019. It covers a variety of topics in systems, communication and defense; strategy and political-administrative vision in defense; and engineering and technologies applied to defense. Given its scope, it offers a valuable resource for practitioners, researchers, and students alike.

Computational Intelligence for Signal and Image Processing
  • Language: en
  • Pages: 134

Computational Intelligence for Signal and Image Processing

None

Advancing the Power of Learning Analytics and Big Data in Education
  • Language: en
  • Pages: 296

Advancing the Power of Learning Analytics and Big Data in Education

  • Type: Book
  • -
  • Published: 2021-03-19
  • -
  • Publisher: IGI Global

The term learning analytics is used in the context of the use of analytics in e-learning environments. Learning analytics is used to improve quality. It uses data about students and their activities to provide better understanding and to improve student learning. The use of learning management systems, where the activity of the students can be easily accessed, potentiated the use of learning analytics to understand their route during the learning process, help students be aware of their progress, and detect situations where students can give up the course before its completion, which is a growing problem in e-learning environments. Advancing the Power of Learning Analytics and Big Data in Ed...

Internet of Things and Fog Computing-Enabled Solutions for Real-Life Challenges
  • Language: en
  • Pages: 205

Internet of Things and Fog Computing-Enabled Solutions for Real-Life Challenges

  • Type: Book
  • -
  • Published: 2022-12-29
  • -
  • Publisher: CRC Press

In today’s world, the use of technology is growing rapidly, and people need effective solutions for their real-life problems. This book discusses smart applications of associated technologies to develop cohesive and comprehensive solutions for the betterment of humankind. It comprehensively covers the effective use of the Internet of Things (IoT), wireless sensor network, wearable sensors, body area network, cloud computing, and distributed computing methodologies. The book comprehensively covers IoT and fog computing sensor supported technologies or protocols including web of things, near-field communication, 6LoWPAN, LoRAWAN, XMPP, DDS, LwM2M, Mesh Protocol, and radio-frequency identific...

New Trends in Intelligent Software Methodologies, Tools and Techniques
  • Language: en
  • Pages: 728

New Trends in Intelligent Software Methodologies, Tools and Techniques

  • Type: Book
  • -
  • Published: 2021-09-28
  • -
  • Publisher: IOS Press

The integration of AI with software is an essential enabler for science and the new economy, creating new markets and opportunities for a more reliable, flexible and robust society. Current software methodologies, tools and techniques often fall short of expectations, however, and much software remains insufficiently robust and reliable for a constantly changing and evolving market. This book presents 54 papers delivered at the 20th edition of the International Conference on New Trends in Intelligent Software Methodology Tools, and Techniques (SoMeT_21), held in Cancun, Mexico, from 21–23 September 2021. The aim of the conference was to capture the essence of a new state-of-the-art in soft...

Forensic Investigations and Risk Management in Mobile and Wireless Communications
  • Language: en
  • Pages: 337

Forensic Investigations and Risk Management in Mobile and Wireless Communications

  • Type: Book
  • -
  • Published: 2019-07-26
  • -
  • Publisher: IGI Global

Mobile forensics has grown from a relatively obscure tradecraft to a crucial part of many criminal investigations, and is now used daily by examiners and analysts within local, state, and federal law enforcement as well as within the military, US government organizations, and the private “e-Discovery” industry. Developments in forensic research, tools, and processes over the past decade have been very successful and continue to change at a rapid pace. Forensic Investigations and Risk Management in Mobile and Wireless Communications is a collection of innovative research on the methods and applications of analyzing mobile devices and data for collection of information pertaining to the legal evidence related to various security breaches and intrusion detection. While highlighting topics including cybercrime, neural networks, and smartphone security, this book is ideally designed for security analysts, IT professionals, researchers, practitioners, academicians, and students currently investigating the up-and-coming aspects surrounding network security, computer science, and security engineering.

Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society
  • Language: en
  • Pages: 1085

Research Anthology on Developing and Optimizing 5G Networks and the Impact on Society

  • Type: Book
  • -
  • Published: 2020-11-27
  • -
  • Publisher: IGI Global

As technology advances, the emergence of 5G has become an essential discussion moving forward as its applications and benefits are expected to enhance many areas of life. The introduction of 5G technology to society will improve communication speed, the efficiency of information transfer, and end-user experience to name only a few of many future improvements. These new opportunities offered by 5G networks will spread across industry, government, business, and personal user experiences leading to widespread innovation and technological advancement. What stands at the very core of 5G becoming an integral part of society is the very fact that it is expected to enrich society in a multifaceted w...

Emerging Computer Technologies
  • Language: en
  • Pages: 77

Emerging Computer Technologies

There is rapid development and change in the field of computer science today. These affect all areas of life. Emerging topics in computer science are covered in this book. In the first chapter, there is a log data analysis case study that aims to understand Hadoop and MapReduce by example. In the second chapter, encrypted communication has been tried to be provided on IoT devices performing edge computing. In this way, it is aimed to make communication secure. Arduino is used as an IoT device. In the encryption process, AES encryption is used with 128-bit and 256-bit key lengths. The third chapter presents a more secure connection between the NodemCU and Blynk, using the AES algorithm. it is aimed to prevent a vulnerability in the connection of Google Home devices with IoT during the Blynk IoT connection phase. The next chapter presents a methodological tool based on an evaluation framework for integration of digital games into education (MEDGE), expanded by adding additional information from the students, MEDGE+. The fifth and last chapter proposes a disaster management system utilising machine learning called DTDMS that is used to support decision-making mechanisms.