You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book aims to bring together Researchers, Scientists, Engineers, Scholars and Students in the areas of computer engineering and information technology, and provides a forum for the dissemination of original research results, new ideas, Research and development, practical experiments, which concentrate on both theory and practices, for the benefit of the society. The book also provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered and solutions adopted in the fields of Computer Science and Information Technology in the context of Distribu...
This Research Topic is a follow on from the Topic Editors' successful volume I. Artificial Intelligence (AI) has the ability to perform automated/case-based reasoning, constraint processing, deep learning, and deep reinforcement learning. Recent advancements in AI techniques and GPU (graphics processing unit) computing capabilities have made it possible to process large volumes of data and extract valuable insights within a short period. Digital public health data are enormous, and harnessing AI's power can lead to exciting and ground-breaking research. Due to the current COVID-19 pandemic, AI can assist in disease surveillance methods, infectious disease modeling, non-contact temperature screening, intelligent contact tracking, detecting social/economic factors on transmission, effective health communication and misinformation detection, identifying factors that affect the mental and emotional health of the public.
The wide gap between the existing security solutions and the actual practical deployment in smart manufacturing, smart home, and remote environments (with respect to wireless robotics) is one of the major reasons why we require novel strategies, mechanisms, architectures, and frameworks. Furthermore, it is also important to access and understand the different level of vulnerabilities and attack vectors in Wireless Sensor Network (WSN) and Wireless Robotics. This book includes an in-depth explanation of a secure and dependable Wireless Robotics (WR) architecture, to ensure confidentiality, authenticity, and availability. Features Blockchain technology for securing data at end/server side Emer...
Blockchain technology is an emerging distributed, decentralized architecture and computing paradigm, which has accelerated the development and application of cloud, fog and edge computing; artificial intelligence; cyber physical systems; social networking; crowdsourcing and crowdsensing; 5g; trust management and finance; and other many useful sectors. Nowadays, the primary blockchain technology uses are in information systems to keep information secure and private. However, many threats and vulnerabilities are facing blockchain in the past decade such 51% attacks, double spending attacks, etc. The popularity and rapid development of blockchain brings many technical and regulatory challenges ...
Software methodologies, tools and techniques have become an ever more important part of our lives, and are crucial to the decision-making processes that affect us every day. This book presents papers from the 19th International Conference on New Trends in Intelligent Software Methodology Tools, and Techniques (SoMeT20), held in Kitakyushu, Japan from 22–24 September 2020. The SoMeT conferences bring together researchers and practitioners to share their original research results and experience of practical developments in software science and related new technologies, and this book explores new trends and theories that highlight the direction and development of intelligent software methodol...
This book provides an account of the latest developments in IoT and cloud computing, and their practical applications in various industrial, scientific, business, education, and government domains. The book covers the advanced research and state of the art review of the latest developments in IoT and cloud computing and how they might be employed post-COVID era. The book also identifies challenges and their solutions in this era, shaping the direction for future research and offering emerging topics to investigate further. The book serves as a reference for a broader audience such as researchers, application designers, solution architects, teachers, graduate students, enthusiasts, practitioners, IT managers, decision-makers and policymakers. The book editors are pioneers in the fields of IoT and Cloud computing. Provides an account of the latest developments in IoT and cloud computing and how it can aid in a COVID-19 Era in a variety of applications; Identifies IoT and cloud computing challenges and their solutions, shaping the direction for future research; Serves as a reference for researchers, application designers, solution architects, teachers, and graduate students.
The book is a collection of high-quality research papers presented at Intelligent Communication Technologies and Virtual Mobile Networks (ICICV 2023), held at Francis Xavier Engineering College, Tirunelveli, Tamil Nadu, India, during February 16–17, 2023. The book shares knowledge and results in theory, methodology, and applications of communication technology and mobile networks. The book covers innovative and cutting-edge work of researchers, developers, and practitioners from academia and industry working in the area of computer networks, network protocols and wireless networks, data communication technologies, and network security.
In recent years, the transformation of devices and systems into intelligent, interconnected entities has given rise to concepts widely recognized as the Internet of Things (IoT) and cyber-physical systems (CPSs). The integration of social networks with CPSs leads to an innovative paradigm known as cyber-physical-social systems (CPSSs). The CPSS, harmonizing the cyber, physical, and social spaces, constitutes the next evolution of intelligent systems. It is founded on the integration of embedded systems, computer networks, control theory, and sensor networks. A typical CPSS is comprised of sensors, controllers, actuators, and communication networks. Its salience is found in the seamless conne...