You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
In today's world, the pressing challenges of sustainable development and societal progress demand innovative solutions that harness the power of science and technology. From climate change to resource depletion and social inequalities, the urgency to find sustainable, intelligent, and ethical approaches has never been greater. Academic scholars and researchers play a crucial role in driving these advancements but often struggle to find comprehensive resources that bridge the gap between theory and real-world applications. The need of the hour is a definitive guide that unites expertise from diverse disciplines and offers practical insights into leveraging sustainable science and intelligent ...
Quantum computing is radically different from the conventional approach of transforming bit-strings from one set of zeros and ones to another. With quantum computing, everything changes. The physics used to understand bits of information and the devices that manipulate them are vastly different. Quantum engineering is a revolutionary approach to quantum technology. Technology Road Mapping for Quantum Computing and Engineering explores all the aspects of quantum computing concepts, engineering, technologies, operations, and applications from the basics to future advancements. Covering topics such as machine learning, quantum software technology, and technology road mapping, this book is an excellent resource for data scientists, engineers, students and professors of higher education, computer scientists, researchers, and academicians.
The digital age is ripe with emerging advances and applications in technological innovations. Mimicking the structure of complex systems in nature can provide new ideas on how to organize mechanical and personal systems. The Handbook of Research on Modeling, Analysis, and Application of Nature-Inspired Metaheuristic Algorithms is an essential scholarly resource on current algorithms that have been inspired by the natural world. Featuring coverage on diverse topics such as cellular automata, simulated annealing, genetic programming, and differential evolution, this reference publication is ideal for scientists, biological engineers, academics, students, and researchers that are interested in discovering what models from nature influence the current technology-centric world.
The book contains several new concepts, techniques, applications and case studies for cyber securities in parallel and distributed computing The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. Also included are various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information concerning various topics relating to cybersecurity technologies is organized within the sixteen chapters of this book. Some of the important topics covered include: Research and solutions for the problem of hidd...
Through expanded intelligence, the use of robotics has fundamentally transformed a variety of fields, including manufacturing, aerospace, medicine, social services, and agriculture. Continued research on robotic design is critical to solving various dynamic obstacles individuals, enterprises, and humanity at large face on a daily basis. Robotic Systems: Concepts, Methodologies, Tools, and Applications is a vital reference source that delves into the current issues, methodologies, and trends relating to advanced robotic technology in the modern world. Highlighting a range of topics such as mechatronics, cybernetics, and human-computer interaction, this multi-volume book is ideally designed for robotics engineers, mechanical engineers, robotics technicians, operators, software engineers, designers, programmers, industry professionals, researchers, students, academicians, and computer practitioners seeking current research on developing innovative ideas for intelligent and autonomous robotics systems.
The book presents new approaches and methods for solving real-world problems. It highlights, in particular, innovative research in the fields of Cognitive Informatics, Cognitive Computing, Computational Intelligence, Advanced Computing, and Hybrid Intelligent Models and Applications. New algorithms and methods in a variety of fields are presented, together with solution-based approaches. The topics addressed include various theoretical aspects and applications of Computer Science, Artificial Intelligence, Cybernetics, Automation Control Theory, and Software Engineering.
This comprehensive book focuses on better big-data security for healthcare organizations. Following an extensive introduction to the Internet of Things (IoT) in healthcare including challenging topics and scenarios, it offers an in-depth analysis of medical body area networks with the 5th generation of IoT communication technology along with its nanotechnology. It also describes a novel strategic framework and computationally intelligent model to measure possible security vulnerabilities in the context of e-health. Moreover, the book addresses healthcare systems that handle large volumes of data driven by patients’ records and health/personal information, including big-data-based knowledge...
There are a lot of e-business security concerns. Knowing about e-business security issues will likely help overcome them. Keep in mind, companies that have control over their e-business are likely to prosper most. In other words, setting up and maintaining a secure e-business is essential and important to business growth. This book covers state-of-the art practices in e-business security, including privacy, trust, security of transactions, big data, cloud computing, social network, and distributed systems.
Security concerns around the rapid growth and variety of devices that are controlled and managed over the Internet is an immediate potential threat to all who own or use them. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problems, investigating the roots of the problems and how programming and attention to good security practice can combat the threats today that are a result of lax security processes on the Internet of Things, cloud computing and social media.