You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book constitutes the refereed proceedings of the 51st Annual Convention of the Computer Society of India, CSI 2016, held in Coimbatore, India, in December 2016. The 23 revised papers presented were carefully reviewed and selected from 74 submissions. The theme of CSI 2016, Digital Connectivity - Social Impact, has been selected to highlight the importance of technology in solving social problems and thereby creating a long term impact on society. The papers are organized in topical sections on information science; computational intelligence; network computing; IT for society.
With the increased functionality demand for mobile speed and access in our everyday lives, broadband wireless networks have emerged as the solution in providing high data rate communications systems to meet these growing needs. Broadband Wireless Access Networks for 4G: Theory, Application, and Experimentation presents the latest trends and research on mobile ad hoc networks, vehicular ad hoc networks, and routing algorithms which occur within various mobile networks. This publication smartly combines knowledge and experience from enthusiastic scholars and expert researchers in the area of wideband and broadband wireless networks. Students, professors, researchers, and other professionals in the field will benefit from this books practical applications and relevant studies.
Mobile forensics has grown from a relatively obscure tradecraft to a crucial part of many criminal investigations, and is now used daily by examiners and analysts within local, state, and federal law enforcement as well as within the military, US government organizations, and the private “e-Discovery” industry. Developments in forensic research, tools, and processes over the past decade have been very successful and continue to change at a rapid pace. Forensic Investigations and Risk Management in Mobile and Wireless Communications is a collection of innovative research on the methods and applications of analyzing mobile devices and data for collection of information pertaining to the legal evidence related to various security breaches and intrusion detection. While highlighting topics including cybercrime, neural networks, and smartphone security, this book is ideally designed for security analysts, IT professionals, researchers, practitioners, academicians, and students currently investigating the up-and-coming aspects surrounding network security, computer science, and security engineering.
Much remains to be known about public utilities system organization, efficiency, management, legislation, practices, and solutions worldwide, as well as the implications for sustainable development in different countries. Thus, a better understanding of the different management practices in public utilities across different contexts is needed to assess their impact on efficiency and sustainability, especially in the changed climate conditions. Transformation and Efficiency Enhancement of Public Utilities Systems: Multidimensional Aspects and Perspectives considers the necessity to transform public utilities systems towards sustainability and efficiency. This publication investigates the perf...
The REV conference aims to discuss the fundamentals, applications and experiences in remote engineering, virtual instrumentation and related new technologies, as well as new concepts for education on these topics, including emerging technologies in learning, MOOCs & MOOLs, Open Resources, and STEM pre-university education. In the last 10 years, remote solutions based on Internet technology have been increasingly deployed in numerous areas of research, science, industry, medicine and education. With the new focus on cyber-physical systems, Industry 4.0, Internet of Things and the digital transformation in industry, economy and education, the core topics of the REV conference have become indispensable elements of a future digitized society. REV 2018, which was held at the University of Applied Sciences in Duesseldorf from 21–23 March 2018, addressed these topics as well as state-of-the-art and future trends.
This book constitutes revised selected papers of the Third International Conference on Computing Science, Communication and Security, COMS2 2022, held in Gandhinagar, India, in February 2022. Due to the COVID-19 pandemic the conference was held virtually. The 22 full papers were thoroughly reveiwed and selected from 143 submissions. The papers present ideas, and research results on the aspects of computing science, network communication, and security.
There is presently a drastic growth in multimedia data. During the Covid-19 pandemic, we observed that images helped doctors immensely in the rapid detection of Covid-19 infection in patients. There are many critical applications in which images play a vital role. These applications use raw image data to extract some useful information about the world around us. The quick extraction of valuable information from raw images is one challenge that academicians and professionals face in the present day. This is where image processing comes into action. Image processing’s primary purpose is to get an enhanced image or extract some useful information from raw image data. Therefore, there is a maj...
Enhances libraries worldwide through top research compilations from over 250 international authors in the field of e-business.
Research and development surrounding the use of data queries is receiving increased attention from computer scientists and data specialists alike. Through the use of query technology, large volumes of data in databases can be retrieved, and information systems built based on databases can support problem solving and decision making across industries. The Handbook of Research on Innovative Database Query Processing Techniques focuses on the growing topic of database query processing methods, technologies, and applications. Aimed at providing an all-inclusive reference source of technologies and practices in advanced database query systems, this book investigates various techniques, including ...
This book constitutes the proceedings of the Second International Conference on E-Learning, E-Education, and Online Training, eLEOT 2015, held in Novedrate, Italy, in September 2015. The 26 revised full papers presented were carefully reviewed and selected from 52 submissions. They focus on e-learning and distance education in science, technology, engineering and math.