You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
MACHINE LEARNING TECHNIQUES AND ANALYTICS FOR CLOUD SECURITY This book covers new methods, surveys, case studies, and policy with almost all machine learning techniques and analytics for cloud security solutions The aim of Machine Learning Techniques and Analytics for Cloud Security is to integrate machine learning approaches to meet various analytical issues in cloud security. Cloud security with ML has long-standing challenges that require methodological and theoretical handling. The conventional cryptography approach is less applied in resource-constrained devices. To solve these issues, the machine learning approach may be effectively used in providing security to the vast growing cloud ...
MATHEMATICS AND COMPUTER SCIENCE This second volume in a new multi-volume set builds on the basic concepts and fundamentals laid out in the previous volume, presenting the reader with more advanced and cutting-edge topics being developed in this exciting field. This second volume in a new series from Wiley-Scrivener is the first of its kind to present scientific and technological innovations by leading academicians, eminent researchers, and experts around the world in the areas of mathematical sciences and computing. Building on what was presented in volume one, the chapters focus on more advanced topics in computer science, mathematics, and where the two intersect to create value for end us...
MATHEMATICS AND COMPUTER SCIENCE This first volume in a new multi-volume set gives readers the basic concepts and applications for diverse ideas and innovations in the field of computing together with its growing interactions with mathematics. This new edited volume from Wiley-Scrivener is the first of its kind to present scientific and technological innovations by leading academicians, eminent researchers, and experts around the world in the areas of mathematical sciences and computing. The chapters focus on recent advances in computer science, and mathematics, and where the two intersect to create value for end users through practical applications of the theory. The chapters herein cover s...
DATA WRANGLING Written and edited by some of the world’s top experts in the field, this exciting new volume provides state-of-the-art research and latest technological breakthroughs in data wrangling, its theoretical concepts, practical applications, and tools for solving everyday problems. Data wrangling is the process of cleaning and unifying messy and complex data sets for easy access and analysis. This process typically includes manually converting and mapping data from one raw form into another format to allow for more convenient consumption and organization of the data. Data wrangling is increasingly ubiquitous at today’s top firms. Data cleaning focuses on removing inaccurate data...
CONVERGENCE OF DEEP LEARNING IN CYBER-IOT SYSTEMS AND SECURITY In-depth analysis of Deep Learning-based cyber-IoT systems and security which will be the industry leader for the next ten years. The main goal of this book is to bring to the fore unconventional cryptographic methods to provide cyber security, including cyber-physical system security and IoT security through deep learning techniques and analytics with the study of all these systems. This book provides innovative solutions and implementation of deep learning-based models in cyber-IoT systems, as well as the exposed security issues in these systems. The 20 chapters are organized into four parts. Part I gives the various approaches...
This interdisciplinary book incorporates various aspects of environment, ecology, and natural disaster management including cognitive informatics and computing. It fosters research innovation and discovery on basic science and information technology for addressing various environmental problems, while providing the right solutions in environment, ecology, and disaster management. This book is a unique resource for researchers and practitioners of energy informatics in various scientific, technological, engineering, and social fields to disseminate original research on the application of digital technology and information management theory and practice to facilitate the global transition toward sustainable and resilient energy systems. Cognitive informatics is also the need of the hour and deals with cutting-edge and multidisciplinary research area that tackles the fundamental problems shared by modern informatics, computation, software engineering, AI, cybernetics, cognitive science, neuropsychology, medical science, systems science, philosophy, linguistics, economics, management science, and life sciences, which this book also presents.
The book presents a collection of peer-reviewed articles from the International Conference on Innovations in Cyber Physical Systems (ICICPS 2020). The conference provided opportunities for the presentation of new research results and discussion about them. It was also an opportunity to generation of new ideas in all CPS aspects, including theory, tools, applications, systems, test-beds and field deployments. The range of topics explored is wide, and covers security, control, optimization, machine learning, game theory, mechanism design, mobile and cloud computing, model-based design, verification, data mining/analytics, signal processing, and human-in-the-loop shared or supervisory control. This book will be useful to researchers, students, industrialist, developers, and practitioners alike.
The book includes original unpublished contributions presented at the Seventh International Conference on Emerging Applications of Information Technology (EAIT 2022), organized by Computer Society of India, Kolkata, Chapter during March 30–31, 2022. The book covers the topics such as image processing for smart healthcare applications, computer vision and pattern recognition for health care, Internet of Health Things, 5G and beyond in smart health care for sustainable cities.
This book pioneers the synergy between state-of-the-art edge computing technologies and the power of operations research. It comprehensively explores real-world applications, demonstrating how various operations' research techniques enhance edge computing’s efficiency, reliability and resource allocation. Innovative solutions for dynamic task scheduling, load balancing and data management, all tailored to the unique challenges of edge environments, are displayed. Starting with operation research methodologies with foundations, applications and research challenges in edge computing and an overview of digital education, this book continues with an exploration of applications in the health sector using IoT, intelligent payment procedures and performance measurement of edge computing, using edge computing and operation research. Smart or AI-based applications are also explored further on and the book ends with insight into ultralightweight and security protocols with solutions for IoT using blockchain.
Blockchain: Principles and Applications in IoT covers all the aspects of Blockchain and its application in IOT. The book focuses on Blockchain, its features, and the core technologies that are used to build the Blockchain network. The gradual flow of chapters traces the history of blockchain from cryptocurrencies to blockchain technology platforms and applications that are adopted by mainstream financial and industrial domains worldwide due to their ease of use, increased security and transparency. • Focuses on application of Blockchain on IoT domain • Focuses on Blockchain as a data repository • Most books on Blockchain cover bitcoins and crypto currency. This book will also cover blockchain in other areas like healthcare, supply chain management, etc • Covers consensus algorithms like PAROX, RAFT etc. and its applications This book is primarily aimed at graduates and researchers in computer science and IT.