You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book provides a comprehensive analysis of Brooks-Iyengar Distributed Sensing Algorithm, which brings together the power of Byzantine Agreement and sensor fusion in building a fault-tolerant distributed sensor network. The authors analyze its long-term impacts, advances, and future prospects. The book starts by discussing the Brooks-Iyengar algorithm, which has made significant impact since its initial publication in 1996. The authors show how the technique has been applied in many domains such as software reliability, distributed systems and OS development, etc. The book exemplifies how the algorithm has enhanced new real-time features by adding fault-tolerant capabilities for many applications. The authors posit that the Brooks-Iyengar Algorithm will to continue to be used where fault-tolerant solutions are needed in redundancy system scenarios. This book celebrates S.S. Iyengar's accomplishments that led to his 2019 Institute of Electrical and Electronics Engineers' (IEEE) Cybermatics Congress "Test of Time Award" for his work on creating Brooks-Iyengar Algorithm and its impact in advancing modern computing.
This book presents an overview on security and privacy issues in dynamic sensor networks and Internet of Things (IoT) networks and provides a novel tamper evident technique to counter and defend against these security related issues. The mission of this book is to explain the evolution of techniques and strategies in securing information transfer and storage thus facilitating a digital transition towards the modern tamper evident systems. The goal is also to aid business organizations that are dependent on the analysis of the large volumes of generated data in securing and addressing the associated growing threat of attackers relentlessly waging attacks and the challenges in protecting the confidentiality, integrity and provenance of data. The book also provides a comprehensive insight into the secure communication techniques and tools that have evolved and the impact they have had in supporting and flourishing the business through the cyber era. This book also includes chapters that discuss the most primitive encryption schemes to the most recent use of homomorphism in ensuring the privacy of the data thus leveraging greater use of new technologies like cloud computing and others.
This book contains extended and revised versions of the best papers presented at the 25th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2017, held in Abu Dhabi, United Arab Emirates, in August 2017. The 11 papers included in this book were carefully reviewed and selected from the 33 full papers presented at the conference. The papers cover a wide range of topics in VLSI technology and advanced research. They address the latest scientific and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) Design. On the occasion of the silver jubilee of the VLSI-SoC conference series the book also includes a special chapter that presents the history of the VLSI-SoC series of conferences and its relation with VLSI-SoC evolution since the early 80s up to the present.
In recent years, soft computing techniques have emerged as a successful tool to understand and analyze the collective behavior of service- oriented computing software. Algorithms and mechanisms of self- organization of complex natural systems have been used to solve problems, particularly in complex systems, which are adaptive, ever- evolving, and distributed in nature across the globe. What fits more perfectly into this scenario other than the rapidly developing era of Fog, IoT, and Edge computing environment? Service- oriented computing can be enhanced with soft computing techniques embedded inside the Cloud, Fog, and IoT systems. Soft Computing Principles and Integration for Real-Time Ser...
The use of Unmanned Aerial Vehicles (UAVs) or ‘drones’ continues to increase, and keeping up to date with technological, legal and commercial developments related to this domain is important, particularly with regard to safety and security in regional and border security operations. This book presents edited contributions from the NATO Advanced Training Course (ATC) entitled “Modern technologies enabling safe and secure UAV operation in urban airspace”, held in Agadir, Morocco, from 25 to 30 November 2019. Participants included experienced scientists and industry engineers involved in UAV development and activity, and the aim of the ATC was to increase awareness among all NATO and pa...
This book contains extended and revised versions of the best papers presented at the 24th IFIP WG 10.5/IEEE International Conference on Very Large Scale Integration, VLSI-SoC 2016, held in Tallinn, Estonia, in September 2016. The 11 papers included in the book were carefully reviewed and selected from the 36 full papers presented at the conference. The papers cover a wide range of topics in VLSI technology and advanced research. They address the latest scientific and industrial results and developments as well as future trends in the field of System-on-Chip (SoC) Design.
None
This book constitutes the refereed proceedings of the 17th Conference on Artificial Intelligence in Medicine, AIME 2019, held in Poznan, Poland, in June 2019. The 22 revised full and 31 short papers presented were carefully reviewed and selected from 134 submissions. The papers are organized in the following topical sections: deep learning; simulation; knowledge representation; probabilistic models; behavior monitoring; clustering, natural language processing, and decision support; feature selection; image processing; general machine learning; and unsupervised learning.
This book introduces social manufacturing, the next generation manufacturing paradigm that covers product life cycle activities that deal with Internet-based organizational and interactive mechanisms under the context of socio-technical systems in the fields of industrial and production engineering. Like its subject, the book's approach is multi-disciplinary, including manufacturing systems, operations management, computational social sciences and information systems applications. It reports on the latest research findings regarding the social manufacturing paradigm, the architecture, configuration and execution of social manufacturing systems and more. Further, it describes the individual t...