Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Pervasive Healthcare
  • Language: en
  • Pages: 382

Pervasive Healthcare

This book provides in depth knowledge about critical factors involved in the success of pervasive healthcare. The book first presents critical components and importance of pervasive healthcare. The authors then give insight into the pervasive healthcare information systems and key consideration related to remote patient monitoring and safety. The book provides in-depth discussion about the security issues and protocols for pervasive healthcare. This book explores concepts and techniques behind the successive pervasive healthcare systems by providing in-depth knowledge about patient empowerment, remote patient monitoring, network establishment and protocols for effective pervasive healthcare. The book also provides case studies in the field. It is an ideal resource for researchers, students and healthcare organizations to get insight about the state of the art in pervasive healthcare systems. Provides current research, developments, and applications in pervasive healthcare; Includes technologies such as machine learning, cryptography, fog computing, and big data in the advancement of e-healthcare; Pertinent for researchers, students, practitioners and healthcare decision makers.

Handbook of Research on AI-Based Technologies and Applications in the Era of the Metaverse
  • Language: en
  • Pages: 554

Handbook of Research on AI-Based Technologies and Applications in the Era of the Metaverse

  • Type: Book
  • -
  • Published: 2023-07-03
  • -
  • Publisher: IGI Global

The recent advancements in the field of the internet of things (IoT), AI, big data, blockchain, augmented reality (AR)/virtual reality (VR), cloud platforms, quantum computing, cybersecurity, and telecommunication technology enabled the promotion of conventional computer-aided industry to the metaverse ecosystem that is powered by AR/VR-driven technologies. In this paradigm shift, the integrated technologies of IoT and AI play a vital role to connect the cyberspace of computing systems and virtual environments. AR/VR supports a huge range of industrial applications such as logistics, the food industry, and manufacturing utilities. AI-Based Technologies and Applications in the Era of the Metaverse discusses essential components of the metaverse ecosystem such as concepts, methodologies, technologies, modeling, designs, statistics, implementation, and maintenance. Covering key topics such as machine learning, deep learning, quantum computing, and blockchain, this premier reference source is ideal for computer scientists, industry professionals, researchers, academicians, scholars, practitioners, instructors, and students.

Data-Driven Mining, Learning and Analytics for Secured Smart Cities
  • Language: en
  • Pages: 390

Data-Driven Mining, Learning and Analytics for Secured Smart Cities

This book provides information on data-driven infrastructure design, analytical approaches, and technological solutions with case studies for smart cities. This book aims to attract works on multidisciplinary research spanning across the computer science and engineering, environmental studies, services, urban planning and development, social sciences and industrial engineering on technologies, case studies, novel approaches, and visionary ideas related to data-driven innovative solutions and big data-powered applications to cope with the real world challenges for building smart cities.

Advanced Techniques and Applications of Cybersecurity and Forensics
  • Language: en
  • Pages: 366

Advanced Techniques and Applications of Cybersecurity and Forensics

  • Type: Book
  • -
  • Published: 2024-07-22
  • -
  • Publisher: CRC Press

The book showcases how advanced cybersecurity and forensic techniques can be applied to various computational issues. It further covers the advanced exploitation tools that are used in the domain of ethical hacking and penetration testing. • Focuses on tools used in performing mobile and SIM forensics, static and dynamic memory analysis, and deep web forensics • Covers advanced tools in the domain of data hiding and steganalysis • Discusses the role and application of artificial intelligence and big data in cybersecurity • Elaborates on the use of advanced cybersecurity and forensics techniques in computational issues • Includes numerous open-source tools such as NMAP, Autopsy, and Wireshark used in the domain of digital forensics The text is primarily written for senior undergraduates, graduate students, and academic researchers, in the fields of computer science, electrical engineering, cybersecurity, and forensics.

Artificial Intelligence-Enabled Digital Twin for Smart Manufacturing
  • Language: en
  • Pages: 628

Artificial Intelligence-Enabled Digital Twin for Smart Manufacturing

An essential book on the applications of AI and digital twin technology in the smart manufacturing sector. In the rapidly evolving landscape of modern manufacturing, the integration of cutting-edge technologies has become imperative for businesses to remain competitive and adaptive. Among these technologies, Artificial Intelligence (AI) stands out as a transformative force, revolutionizing traditional manufacturing processes and making the way for the era of smart manufacturing. At the heart of this technological revolution lies the concept of the Digital Twin—an innovative approach that bridges the physical and digital realms of manufacturing. By creating a virtual representation of physi...

Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World
  • Language: en
  • Pages: 502

Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World

  • Type: Book
  • -
  • Published: 2022-06-30
  • -
  • Publisher: IGI Global

More individuals than ever are utilizing internet technologies to work from home, teach and learn, shop, interact with peers, review medical records, and more. While it is certainly convenient to conduct such tasks via the internet, this increased internet presence has also led to a rise in the search and availability of personal information, which in turn is resulting in more cyber-attacks, privacy breaches, and information leaks. Cyber criminals are using such opportunities to attack governments, organizations, and individuals, making it necessary to anticipate, assess, and mitigate privacy and security threats during this infodemic. The Handbook of Research on Technical, Privacy, and Secu...

Quantum Computing in Cybersecurity
  • Language: en
  • Pages: 440

Quantum Computing in Cybersecurity

Machine learning, deep learning, probabilistic neural networks, blockchain, and other new technologies all demand extremely high processing speeds. A quantum computer is an example of such a system. Quantum computers may be accessed over the internet. This technology poses a significant risk, since quantum terrorists, or cyber criminals, coul be able to cause many problems, including bringing down the internet. The principles of quantum mechanics might be used by evil doers to destroy quantum information on a global scale, and an entire class of suspicious codes could destroy data or eavesdrop on communication. Quantum physics, however, safeguards against data eavesdropping. A significant am...

Perspectives on Ethical Hacking and Penetration Testing
  • Language: en
  • Pages: 465

Perspectives on Ethical Hacking and Penetration Testing

  • Type: Book
  • -
  • Published: 2023-09-11
  • -
  • Publisher: IGI Global

Cybersecurity has emerged to address the need for connectivity and seamless integration with other devices and vulnerability assessment to find loopholes. However, there are potential challenges ahead in meeting the growing need for cybersecurity. This includes design and implementation challenges, application connectivity, data gathering, cyber-attacks, and cyberspace analysis. Perspectives on Ethical Hacking and Penetration Testing familiarizes readers with in-depth and professional hacking and vulnerability scanning subjects. The book discusses each of the processes and tools systematically and logically so that the reader can see how the data from each tool may be fully exploited in the ...

Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenario's
  • Language: en
  • Pages: 722

Handbook of Wireless Sensor Networks: Issues and Challenges in Current Scenario's

This book explores various challenging problems and applications areas of wireless sensor networks (WSNs), and identifies the current issues and future research challenges. Discussing the latest developments and advances, it covers all aspects of in WSNs, from architecture to protocols design, and from algorithm development to synchronization issues. As such the book is an essential reference resource for undergraduate and postgraduate students as well as scholars and academics working in the field.

Origin and Branding in International Market Entry Processes
  • Language: en
  • Pages: 313

Origin and Branding in International Market Entry Processes

  • Type: Book
  • -
  • Published: 2023-09-07
  • -
  • Publisher: IGI Global

In today's globalized economy, selecting the right entry strategy is critical for companies looking to expand into foreign markets. This decision has a significant impact on a company's performance and its ability to collaborate with global supply chains. Moreover, with consumers becoming increasingly aware of the origins of products and brands, it is essential for companies to use the origin as a means to add value to their offerings. Edited by Dr. Carlos Silva, this book brings together global professionals and researchers who provide the latest empirical research findings and relevant theoretical frameworks on the subject, spanning multiple industries. Origin and Branding in International...