You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The book is a collection of papers presented at First Doctoral Symposium on Natural Computing Research (DSNCR 2020), held during 8 August 2020 in Pune, India. The book covers different topics of applied and natural computing methods having applications in physical sciences and engineering. The book focuses on computer vision and applications, soft computing, security for Internet of Things, security in heterogeneous networks, signal processing, intelligent transportation system, VLSI design and embedded systems, privacy and confidentiality, big data and cloud computing, bioinformatics and systems biology, remote healthcare, software security, mobile and pervasive computing, biometrics-based authentication, natural language processing, analysis and verification techniques, large scale networking, distributed systems, digital forensics, and human–computer interaction.
The Novel Is One Of The Most Significant Works Of Modern Bengali Fiction. It Presents An Arresting Picture Of The Turmoil Going On In Bengali Muslim Society At The Closing End Of The Nineteenth Century. The Setting Is Rural North Bengal, Which The Author Knows Well.
5G, the emerging technology in mobile communication, is expected to deliver an important and decisive impact on several of the UN’s Sustainable Development Goals where universal accessibility to ICTs remains a serious concern. However, cyber security has emerged as a serious challenge, not least because of the increased accessibility and broader usage with associated vulnerability. Developing countries have additional challenges associated with both the expected faster build-up of accessibility and lack of qualified competencies within cyber security. Discussion of these challenges is the overall theme and motivation for this book. Technical topics discussed in the book include: 5G in rural networks Critical infrastructures Open RAN Protection of privacy Cybersecurity and machine learning Cybersecurity and disaster monitoring
This book focus on key component required for building predictive maintenance model. The current trend of Maintenance 4.0 leans towards the preventive mechanism enabled by predictive approach and condition-based smart maintenance. The intelligent decision support, earlier detection of spare part failure, fatigue detection is the main slices of intelligent and predictive maintenance system (PMS) leading towards Maintenance 4.0 This book presents prominent use cases of mechanical engineering using PMS along with the benefits. Basic understanding of data preparation is required for development of any AI application; in view of this, the types of the data and data preparation processes, and tools are also presented in this book.
The book presents high-quality papers from the Sixth International Conference on Microelectronics and Telecommunication Engineering (ICMETE 2022). It discusses the latest technological trends and advances in major research areas such as microelectronics, wireless communications, optical communication, signal processing, image processing, big data, cloud computing, artificial intelligence, and sensor network applications. This book includes the contributions of national and international scientists, researchers, and engineers from both academia and the industry. The contents of this book are useful to researchers, professionals, and students alike.
This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers’ goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains. This book is motivating to address privacy threats in new inventions for a wide range of stakeholders like layman to educated users, villages to metros and national to global levels. This book contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols. The main endeavour of this book is threat analysis and activity modelling of attacks in order to give an actual view of the ubiquitous computing applications. The unique approach will help readers for a better understanding.
This book helps to enhance the application of fuzzy logic optimization in the areas of science and engineering. It includes implementation and models and paradigms, such as path planning and routing design for different wireless networks, organization behavior strategies models, and so forth. It also: Explains inventory control management, uncertainties management, loss minimization, game optimization, data analysis and prediction, different decision-making system and management, and so forth Describes applicability of fuzzy optimization techniques in areas of science and management Resolves several issues based on uncertainty using member function Helps map different problems based on mathematical models Includes issues and problems based on linear and nonlinear optimizations Focuses on management science such as manpower management and inventory planning This book is aimed at researchers and graduate students in signal processing, power systems, systems and industrial engineering, and computer networks.