You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book presents selected peer-reviewed papers from the International Conference on Artificial Intelligence and Data Engineering (AIDE 2019). The topics covered are broadly divided into four groups: artificial intelligence, machine vision and robotics, ambient intelligence, and data engineering. The book discusses recent technological advances in the emerging fields of artificial intelligence, machine learning, robotics, virtual reality, augmented reality, bioinformatics, intelligent systems, cognitive systems, computational intelligence, neural networks, evolutionary computation, speech processing, Internet of Things, big data challenges, data mining, information retrieval, and natural language processing. Given its scope, this book can be useful for students, researchers, and professionals interested in the growing applications of artificial intelligence and data engineering.
Hands-on textbook for learning how to use Mathematica to solve real-life problems in physics and engineering Mathematica for Physicists and Engineers provides the basic concepts of Mathematica for scientists and engineers, highlights Mathematica's several built-in functions, demonstrates mathematical concepts that can be employed to solve problems in physics and engineering, and addresses problems in basic arithmetic to more advanced topics such as quantum mechanics. The text views mathematics and physics through the eye of computer programming, fulfilling the needs of students at master's levels and researchers from a physics and engineering background and bridging the gap between the eleme...
The rapid growth of IoT and its applications in smart cities pose significant challenges for academic scholars. The increasing number of interconnected devices and the massive amounts of data they generate strain traditional networks, leading to inefficiencies and security vulnerabilities. Additionally, the centralized control plane in Software Defined Networks (SDN) presents a single point of failure, hindering network performance, while IoT devices themselves are susceptible to attacks, compromising user data and privacy. To address these pressing issues, Network-Enabled IoT Applications for Smart City Services offers a compelling solution. Edited by Dr. K. Hemant Kumar Reddy, Dr. Diptendu...
The rise of internet and social media usage in the past couple of decades has presented a very useful tool for many different industries and fields to utilize. With much of the world’s population writing their opinions on various products and services in public online forums, industries can collect this data through various computational tools and methods. These tools and methods, however, are still being perfected in both collection and implementation. Sentiment analysis can be used for many different industries and for many different purposes, which could better business performance and even society. The Research Anthology on Implementing Sentiment Analysis Across Multiple Disciplines di...
The ubiquity of modern technologies has allowed for increased connectivity between people and devices across the globe. This connected infrastructure of networks creates numerous opportunities for applications and uses. As the applications of the internet of things continue to progress so do the security concerns for this technology. The study of threat prevention in the internet of things is necessary as security breaches in this field can ruin industries and lives. Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications is a vital reference source that examines recent developments and emerging trends in security and privacy for the internet of things through new models, practical solutions, and technological advancements related to security. Highlighting a range of topics such as cloud security, threat detection, and open source software, this multi-volume book is ideally designed for engineers, IT consultants, ICT procurement managers, network system integrators, infrastructure service providers, researchers, academics, and professionals interested in current research on security practices pertaining to the internet of things.
This book is an introduction to social data analytics along with its challenges and opportunities in the age of Big Data and Artificial Intelligence. It focuses primarily on concepts, techniques and methods for organizing, curating, processing, analyzing, and visualizing big social data: from text to image and video analytics. It provides novel techniques in storytelling with social data to facilitate the knowledge and fact discovery. The book covers a large body of knowledge that will help practitioners and researchers in understanding the underlying concepts, problems, methods, tools and techniques involved in modern social data analytics. It also provides real-world applications of social...
Businesses in today’s world are adopting technology-enabled operating models that aim to improve growth, revenue, and identify emerging markets. However, most of these businesses are not suited to defend themselves from the cyber risks that come with these data-driven practices. To further prevent these threats, they need to have a complete understanding of modern network security solutions and the ability to manage, address, and respond to security breaches. The Handbook of Research on Intrusion Detection Systems provides emerging research exploring the theoretical and practical aspects of prominent and effective techniques used to detect and contain breaches within the fields of data science and cybersecurity. Featuring coverage on a broad range of topics such as botnet detection, cryptography, and access control models, this book is ideally designed for security analysts, scientists, researchers, programmers, developers, IT professionals, scholars, students, administrators, and faculty members seeking research on current advancements in network security technology.
This book comprises selected peer-reviewed papers from the International Conference on VLSI, Signal Processing, Power Systems, Illumination and Lighting Control, Communication and Embedded Systems (VSPICE-2019). The contents are divided into five broad topics - VLSI and embedded systems, signal processing, power systems, illumination and control, and communication and networking. The book focuses on the latest innovations, trends, and challenges encountered in the different areas of electronics and communication, and electrical engineering. It also offers potential solutions and provides an insight into various emerging areas such as image fusion, bio-sensors, and underwater sensor networks. This book can prove to be useful for academics and professionals interested in the various sub-fields of electronics and communication engineering.
This book presents select proceedings of the National Conference on Sustainable Machining Strategies for Better Performance (SMSBP 2020). It examines a range of machining strategies that helps to improve sustainability in machining processes. The focus is to improve competition, reduce costs, comply with environmental regulations and address environmental concerns. The topics covered include machining of difficult-to-machine materials, developments in new cutting tool materials, modern cooling methods, use of advanced machining technologies, lubrication strategies like MQL, cryogenic cooling, use of cold compressed air, adoption of hybrid cooling strategies, hybrid machining strategies, machining of special materials including elastomers and surface integrity studies in use of cryogenic machining. The book presents the latest research developments in the domain of sustainable machining which can improve the machining practice adopted by researchers, professionals and industries. The book will be a valuable reference for researchers, professionals and people from machining and material-related industries who are interested in adopting sustainable machining strategies.
This handbook introduces the basic principles and fundamentals of cyber security towards establishing an understanding of how to protect computers from hackers and adversaries. The highly informative subject matter of this handbook, includes various concepts, models, and terminologies along with examples and illustrations to demonstrate substantial technical details of the field. It motivates the readers to exercise better protection and defense mechanisms to deal with attackers and mitigate the situation. This handbook also outlines some of the exciting areas of future research where the existing approaches can be implemented. Exponential increase in the use of computers as a means of stori...