You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This volume gathers the latest advances, innovations, and applications in the field of geographic information systems and unmanned aerial vehicle (UAV) technologies, as presented by leading researchers and engineers at the 1st International Conference on Unmanned Aerial System in Geomatics (UASG), held in Roorkee, India on April 6-7, 2019. It covers highly diverse topics, including photogrammetry and remote sensing, surveying, UAV manufacturing, geospatial data sensing, UAV processing, visualization, and management, UAV applications and regulations, geo-informatics and geomatics. The contributions, which were selected by means of a rigorous international peer-review process, highlight numerous exciting ideas that will spur novel research directions and foster multidisciplinary collaboration among different specialists.
None
Evolution of open-source web GIS technology in integration with contemporary commercial solutions not only provides an immediate solution at every level of small and medium-sized industry but also attracted students/scholars from a diverse background (Computer Science, Information Technology, Electronics, Civil Engineering, Geography, Geomatics, Earth Sciences, Hydrology etc) who are interested in making their carrier in different government (ISRO, DRDO, NIC, State Disaster Mitigation Centers, State Remote Sensing Centers etc) and private organisations (ESRI, Hexagon, Wipro, TCS etc). Proposed publication Concepts and Application of Web GIS emphasises both the basic principles and practical ...
This book provides readers with up-to-date research of emerging cyber threats and defensive mechanisms, which are timely and essential. It covers cyber threat intelligence concepts against a range of threat actors and threat tools (i.e. ransomware) in cutting-edge technologies, i.e., Internet of Things (IoT), Cloud computing and mobile devices. This book also provides the technical information on cyber-threat detection methods required for the researcher and digital forensics experts, in order to build intelligent automated systems to fight against advanced cybercrimes. The ever increasing number of cyber-attacks requires the cyber security and forensic specialists to detect, analyze and def...