Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Energy-Efficient Underwater Wireless Communications and Networking
  • Language: en
  • Pages: 339

Energy-Efficient Underwater Wireless Communications and Networking

  • Type: Book
  • -
  • Published: 2020-09-04
  • -
  • Publisher: IGI Global

Underwater wireless sensor networks (UWSN) are envisioned as an aquatic medium for a variety of applications including oceanographic data collection, disaster management or prevention, assisted navigation, attack protection, and pollution monitoring. Similar to terrestrial wireless sensor networks (WSN), UWSNs consist of sensor nodes that collect the information and pass it to a base station; however, researchers have to face many challenges in executing the network in an aquatic medium. Energy-Efficient Underwater Wireless Communications and Networking is a crucial reference source that covers existing and future possibilities of the area as well as the current challenges presented in the implementation of underwater sensor networks. While highlighting topics such as digital signal processing, underwater localization, and acoustic channel modeling, this publication is ideally designed for machine learning experts, IT specialists, government agencies, oceanic engineers, communication experts, researchers, academicians, students, and environmental agencies concerned with optimized data flow in communication network, securing assets, and mitigating security attacks.

Proceedings of Data Analytics and Management
  • Language: en
  • Pages: 850

Proceedings of Data Analytics and Management

This book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2021), held at Jan Wyzykowski University, Poland, during June 2021. The book covers the topics in data analytics, data management, big data, computational intelligence, and communication networks. The book presents innovative work by leading academics, researchers, and experts from industry which is useful for young researchers and students.

Internet of Things and Cyber Physical Systems
  • Language: en
  • Pages: 241

Internet of Things and Cyber Physical Systems

  • Type: Book
  • -
  • Published: 2022-12-30
  • -
  • Publisher: CRC Press

The quantity, diversity, and sophistication of Internet of Things (IoT) items are rapidly increasing, posing significant issues but also innovative solutions for forensic science. Such systems are becoming increasingly common in public locations, businesses, universities, residences, and other shared offices, producing enormous amounts of data at rapid speeds in a variety of forms. IoT devices can be used as suspects, digital witnesses, or instruments of crime and cyberattacks, posing new investigation problems, forensic issues, security threats, legal concerns, privacy concerns, and ethical dilemmas. A cyberattack on IoT devices might target the device itself or associated systems, particul...

Security Implementation in Internet of Medical Things
  • Language: en
  • Pages: 205

Security Implementation in Internet of Medical Things

  • Type: Book
  • -
  • Published: 2023-09-13
  • -
  • Publisher: CRC Press

Security implementation is crucial in the Internet of Medical Things (IoMT) as it ensures the protection of sensitive medical data and prevents unauthorized access to or manipulation of devices and systems. This book covers different aspects of security implementations and challenges in IoMT and aims to bring researchers together to contribute their findings to recommend new methodologies and feasible solutions for implementing security and novel architectures in artificial intelligence, machine learning, and data science in the field of healthcare and IoT. IoMT includes a wide range of connected medical devices and systems, such as wearable devices, medical sensors, and electronic health records, that collect, store, and share sensitive medical information. Without proper security measures, this information could be compromised, leading to serious privacy breaches, financial fraud, and even physical harm to patients.

Cyber Forensics and Investigation on Smart Devices
  • Language: en
  • Pages: 152

Cyber Forensics and Investigation on Smart Devices

This book offers comprehensive insights into digital forensics, guiding readers through analysis methods and security assessments. Expert contributors cover a range of forensic investigations on computer devices, making it an essential resource for professionals, scholars, and students alike. Chapter 1 explores smart home forensics, detailing IoT forensic analysis and examination of different smart home devices. Chapter 2 provides an extensive guide to digital forensics, covering its origin, objectives, tools, challenges, and legal considerations. Chapter 3 focuses on cyber forensics, including secure chat application values and experimentation. Chapter 4 delves into browser analysis and exp...

Advanced Healthcare Systems
  • Language: en
  • Pages: 388

Advanced Healthcare Systems

ADVANCED HEALTHCARE SYSTEMS This book offers a complete package involving the incubation of machine learning, AI, and IoT in healthcare that is beneficial for researchers, healthcare professionals, scientists, and technologists. The applications and challenges of machine learning and artificial intelligence in the Internet of Things (IoT) for healthcare applications are comprehensively covered in this book. IoT generates big data of varying data quality; intelligent processing and analysis of this big data are the keys to developing smart IoT applications, thereby making space for machine learning (ML) applications. Due to its computational tools that can substitute for human intelligence in...

Security Incidents & Response Against Cyber Attacks
  • Language: en
  • Pages: 242

Security Incidents & Response Against Cyber Attacks

This book provides use case scenarios of machine learning, artificial intelligence, and real-time domains to supplement cyber security operations and proactively predict attacks and preempt cyber incidents. The authors discuss cybersecurity incident planning, starting from a draft response plan, to assigning responsibilities, to use of external experts, to equipping organization teams to address incidents, to preparing communication strategy and cyber insurance. They also discuss classifications and methods to detect cybersecurity incidents, how to organize the incident response team, how to conduct situational awareness, how to contain and eradicate incidents, and how to cleanup and recover. The book shares real-world experiences and knowledge from authors from academia and industry.

Enabling Technologies for Effective Planning and Management in Sustainable Smart Cities
  • Language: en
  • Pages: 409

Enabling Technologies for Effective Planning and Management in Sustainable Smart Cities

With the rapid penetration of technology in varied application domains, the existing cities are getting connected more seamlessly. Cities becomes smart by inducing ICT in the classical city infrastructure for its management. According to McKenzie Report, about 68% of the world population will migrate towards urban settlements in near future. This migration is largely because of the improved Quality of Life (QoL) and livelihood in urban settlements. In the light of urbanization, climate change, democratic flaws, and rising urban welfare expenditures, smart cities have emerged as an important approach for society’s future development. Smart cities have achieved enhanced QoL by giving smart i...

Artificial Intelligence and IoT-Based Technologies for Sustainable Farming and Smart Agriculture
  • Language: en
  • Pages: 400

Artificial Intelligence and IoT-Based Technologies for Sustainable Farming and Smart Agriculture

  • Type: Book
  • -
  • Published: 2021-01-08
  • -
  • Publisher: IGI Global

As technology continues to saturate modern society, agriculture has started to adopt digital computing and data-driven innovations. This emergence of “smart” farming has led to various advancements in the field, including autonomous equipment and the collection of climate, livestock, and plant data. As connectivity and data management continue to revolutionize the farming industry, empirical research is a necessity for understanding these technological developments. Artificial Intelligence and IoT-Based Technologies for Sustainable Farming and Smart Agriculture provides emerging research exploring the theoretical and practical aspects of critical technological solutions within the farming industry. Featuring coverage on a broad range of topics such as crop monitoring, precision livestock farming, and agronomic data processing, this book is ideally designed for farmers, agriculturalists, product managers, farm holders, manufacturers, equipment suppliers, industrialists, governmental professionals, researchers, academicians, and students seeking current research on technological applications within agriculture and farming.

Advanced Techniques and Applications of Cybersecurity and Forensics
  • Language: en
  • Pages: 366

Advanced Techniques and Applications of Cybersecurity and Forensics

  • Type: Book
  • -
  • Published: 2024-07-22
  • -
  • Publisher: CRC Press

The book showcases how advanced cybersecurity and forensic techniques can be applied to various computational issues. It further covers the advanced exploitation tools that are used in the domain of ethical hacking and penetration testing. • Focuses on tools used in performing mobile and SIM forensics, static and dynamic memory analysis, and deep web forensics • Covers advanced tools in the domain of data hiding and steganalysis • Discusses the role and application of artificial intelligence and big data in cybersecurity • Elaborates on the use of advanced cybersecurity and forensics techniques in computational issues • Includes numerous open-source tools such as NMAP, Autopsy, and Wireshark used in the domain of digital forensics The text is primarily written for senior undergraduates, graduate students, and academic researchers, in the fields of computer science, electrical engineering, cybersecurity, and forensics.