You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Smart Sensor Networks (WSNs) using AI have left a mark on the lives of all by aiding in various sectors, such as manufacturing, education, healthcare, and monitoring of the environment and industries. This book covers recent AI applications and explores aspects of modern sensor technologies and the systems needed to operate them. The book reviews the fundamental concepts of gathering, processing, and analyzing different AI-based models and methods. It covers recent WSN techniques for the purpose of effective network management on par with the standards laid out by international organizations in related fields and focuses on both core concepts along with major applicational areas. The book will be used by technical developers, academicians, data sciences, industrial professionals, researchers, and students interested in the latest innovations on problem-oriented processing techniques in sensor networks using IoT and evolutionary computer applications for Industry 4.0.
Activities and biological relationships of terpenes. An accurate assessment of where and what terpenes can lead to. Discusses how microbes, in particular the actinomycetales, have well over 400 different gene clusters that produce terpenes. Arranged by biological activities and usage. Provides information on eukaryotic enzymes that have been shown to be a source of “ethnobotanical” terpenes
Extensive experimentation and high failure rates are a well-recognized downside to the drug discovery process, with the resultant high levels of inefficiency and waste producing a negative environmental impact. Sustainable and Green Approaches in Medicinal Chemistry 2e reveals how medicinal chemistry can play a direct role in addressing this issue. After providing essential context to the growth of green chemistry in relation to drug discovery, the book goes on to identify a broad range of practical techniques and useful insights, revealing how medicinal chemistry techniques can be used to improve efficiency, mitigate failure and increase the environmental benignity of the entire drug discov...
Cyber security is a key focus in the modern world as more private information is stored and saved online. In order to ensure vital information is protected from various cyber threats, it is essential to develop a thorough understanding of technologies that can address cyber security challenges. Artificial intelligence has been recognized as an important technology that can be employed successfully in the cyber security sector. Due to this, further study on the potential uses of artificial intelligence is required. Methods, Implementation, and Application of Cyber Security Intelligence and Analytics discusses critical artificial intelligence technologies that are utilized in cyber security and considers various cyber security issues and their optimal solutions supported by artificial intelligence. Covering a range of topics such as malware, smart grid, data breachers, and machine learning, this major reference work is ideal for security analysts, cyber security specialists, data analysts, security professionals, computer scientists, government officials, researchers, scholars, academicians, practitioners, instructors, and students.
Cybersecurity threats have become ubiquitous and continue to topple every facet of the digital realm as they are a problem for anyone with a gadget or hardware device. However, there are some actions and safeguards that can assist in avoiding these threats and challenges; further study must be done to ensure businesses and users are aware of the current best practices. Cybersecurity Issues, Challenges, and Solutions in the Business World considers cybersecurity innovation alongside the methods and strategies for its joining with the business industry and discusses pertinent application zones such as smart city, e-social insurance, shrewd travel, and more. Covering key topics such as blockchain, data mining, privacy, security issues, and social media, this reference work is ideal for security analysts, forensics experts, business owners, computer scientists, policymakers, industry professionals, researchers, scholars, academicians, practitioners, instructors, and students.
Tellurium, a well-known chalcogen, finds potential applications in various fields from chemistry to other branches of science such as nanotechnology and macromolecular science. However, its safety must also be taken into consideration when exploring its industrial applications. This book explores the breadth of tellurium‘s applications, outlines strategies for industrial use, and describes the safety concerns of this element.
This book introduces recent wireless technologies and their impact on recent trends, applications, and opportunities. It explores the latest 6G, IoT, and Blockchain techniques with AI and evolutionary applications, showing how digital integration can be used to serve society. It explores the most important aspects of modern technologies, providing insights into the newest 6G technology and practices; covering the roles, responsibilities, and impact of IoT, 6G, and Blockchain practices to sustain the world economy. This book highlights the roles, responsibilities, and impact of IoT, 6G, and Blockchain and its practices. By describing the implementation strategies for Blockchain, IoT, and 6G, ...
Computational methods and understanding computational models are important in modern drug discovery. The book focuses on computational approaches that can improve the development of in silico methodologies. It includes lead hit methods, docking algorithms, computational chiral compounds, structure-based drug design, GROMACS and NAMD, structural genomics, toxicity prediction, enzyme inhibitors and peptidomimetic therapeutics
The growth of innovative cyber threats, many based on metamorphosing techniques, has led to security breaches and the exposure of critical information in sites that were thought to be impenetrable. The consequences of these hacking actions were, inevitably, privacy violation, data corruption, or information leaking. Machine learning and data mining techniques have significant applications in the domains of privacy protection and cybersecurity, including intrusion detection, authentication, and website defacement detection, that can help to combat these breaches. Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity provides machine and deep learning methods for ana...
This book addresses issues related to the integration of digital evolutionary technologies and provides solutions to various challenges encountered during the implementation process. With real-time case studies, the book explains the smart technologies available and their operational applications and benefits in the manufacturing sector. Smart Manufacturing Technologies for Industry 4.0: Integration, Benefits, and Operational Activities assists in the understanding of the shifting paradigm in the manufacturing sector towards smart manufacturing and spotlights these technologies and the effects they are having on existing industries. It showcases Industry 4.0 as a promising research area in i...