You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
There is rapid development and change in the field of computer science today. These affect all areas of life. Emerging topics in computer science are covered in this book. In the first chapter, there is a log data analysis case study that aims to understand Hadoop and MapReduce by example. In the second chapter, encrypted communication has been tried to be provided on IoT devices performing edge computing. In this way, it is aimed to make communication secure. Arduino is used as an IoT device. In the encryption process, AES encryption is used with 128-bit and 256-bit key lengths. The third chapter presents a more secure connection between the NodemCU and Blynk, using the AES algorithm. it is aimed to prevent a vulnerability in the connection of Google Home devices with IoT during the Blynk IoT connection phase. The next chapter presents a methodological tool based on an evaluation framework for integration of digital games into education (MEDGE), expanded by adding additional information from the students, MEDGE+. The fifth and last chapter proposes a disaster management system utilising machine learning called DTDMS that is used to support decision-making mechanisms.
There is rapid development and change in the field of computer science today. These affect all areas of life. Emerging topics in computer science are covered in this book. In the first chapter, a specific IoT application called a smart mailbox with face recognition, which uses cellular connectivity and image processing to securely deliver valuable documents. The prototype for this system includes a fingerprint reader, camera, electromagnetic lock, and various other components connected to an Arduino Uno and a Raspberry Pi, and uses OpenCV and Python software for face detection and recognition. In the second chapter, authors compares and evaluates the main characteristics of 5G channels and t...
Clinical Chemistry considers what happens to the body’s chemistry when affected by disease. It provides introductory coverage of the scientific basis for biochemistry tests routinely used in medicine - including tests for the assessment of organ function, diagnosis and monitoring disease activity and therapy efficacy. Each topic area begins with a concise description of the underlying physiological and biochemical principles and then applies them to patient investigation and management. The regular use of case histories helps further emphasise clinical relevance and chapter key points, as well as provide a useful starting point for examination revision. The clear and engaging writing style...
The big data era is upon us: data are being generated, analyzed, and used at an unprecedented scale, and data-driven decision making is sweeping through all aspects of society. Since the value of data explodes when it can be linked and fused with other data, addressing the big data integration (BDI) challenge is critical to realizing the promise of big data. BDI differs from traditional data integration along the dimensions of volume, velocity, variety, and veracity. First, not only can data sources contain a huge volume of data, but also the number of data sources is now in the millions. Second, because of the rate at which newly collected data are made available, many of the data sources a...
Hakkında: Bu çalışmada krizlerin dünya ekonomi tarihindeki yerini farklı disiplinler açısından değerlendirmeye çalışılmıştır. Dünya krizler tarihine bakıldığı zaman çıkış sebepleriyle yarattığı etki bakımından her bir krizin farklı bir özelliğe sahip olduğu görülmektedir. Literatürde krizlerle ilgili yapılan çalışmaların zaman zaman döneme odaklandığını zaman zaman ise sektörel bir bakış açısının ön plana çıktığı görülmektedir. Bu çalışmada literatürde oluşan kavramsal yaklaşımların hem süreç analizlerini hem de güncel olayları kapsayıcı bir boyutta toplamaya çalışılmıştır. Bu perspektifte bir takım spesifik sektörlerin krizlerden etkilenmelerini analiz ederken diğer bir perspektiften de dünya tarihine geçmiş, 1929 Buhranı, Petrol şoku, 2008 Küresel Finans krizi gibi krizlerin analizlerine de yer verilmiştir.
Human resource management (HRM) systems are an under-researched area in family business studies even though they arguably play an important role. To exploit their entrepreneurial orientation and achieve their goals, family firms must be willing to adopt a specific configuration of the organizational variables to succeed in the competitive environment of today. Designing and Implementing HR Management Systems in Family Businesses is a pivotal reference source that focuses on HRM in family businesses aiming at clarifying what HRM topics are relevant in family firms given their distinctive features, what the role of HR choices in family firms is, and how they differ in these organizations. While highlighting topics such as quality of work, generational workforce, and leadership management, this publication explores the relationship between HRM systems and the organization as well as why certain theories would be more dominant for family firms. This book is ideally designed for family businesses, managers, executives, entrepreneurs, business professionals, academicians, students, and researchers.
This book constitutes the thoroughly refereed post-worksop proceedings of the 7th International Workshop Radio Frequency Identification: Security and Privacy Issues. RFIDSec 2011, held in Amherst, Massachusetts, USA, in June 2011. The 12 revised full papers presented were carefully reviewed and selected from 21 initial submissions for inclusion in the book. The papers focus on minimalism in cryptography, on-tag cryptography, securing RFID with physics, and protocol-level security in RFID.
For centuries autonomy has been a public policy tool used to provide stability and cohesion to multicultural societies. Examining case studies on non-territorial autonomy arrangements in comparison with territorial autonomy examples, this volume seeks to inform both design and decision making on managing diversity.
IoT is empowered by various technologies used to detect, gather, store, act, process, transmit, oversee, and examine information. The combination of emergent technologies for information processing and distributed security, such as Cloud computing, Artificial intelligence, and Blockchain, brings new challenges in addressing distributed security methods that form the foundation of improved and eventually entirely new products and services. As systems interact with each other, it is essential to have an agreed interoperability standard, which is safe and valid. This book aims at providing an introduction by illustrating state-of-the-art security challenges and threats in IoT and the latest developments in IoT with Cloud, AI, and Blockchain security challenges. Various application case studies from domains such as science, engineering, and healthcare are introduced, along with their architecture and how they leverage various technologies Cloud, AI, and Blockchain. This book provides a comprehensive guide to researchers and students to design IoT integrated AI, Cloud, and Blockchain projects and to have an overview of the next generation challenges that may arise in the coming years.
Addresses an Emerging Shift in Developing CountriesThe authors and contributors of Ambient Assisted Living have recognized that the demographic profile is changing in many developing countries and have factored in an inversion of the demographic pyramid. The technology of ambient assisted living (AAL), supports the elderly and disabled in their dai