You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Our Anthology "A SLICE OF LIFE" contains marvellous literary work of various authors across the whole Bharat. It is a compiled to give a platform to the budding writers of our great nation and help them in coming forward and present their literary work in front of the whole world.
This book is a printed edition of the Special Issue "Spatial Audio" that was published in Applied Sciences
This four volume set LNCS 9528, 9529, 9530 and 9531 constitutes the refereed proceedings of the 15th International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2015, held in Zhangjiajie, China, in November 2015. The 219 revised full papers presented together with 77 workshop papers in these four volumes were carefully reviewed and selected from 807 submissions (602 full papers and 205 workshop papers). The first volume comprises the following topics: parallel and distributed architectures; distributed and network-based computing and internet of things and cyber-physical-social computing. The second volume comprises topics such as big data and its applications and parallel and distributed algorithms. The topics of the third volume are: applications of parallel and distributed computing and service dependability and security in distributed and parallel systems. The covered topics of the fourth volume are: software systems and programming models and performance modeling and evaluation.
Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. This book explores algorithms, protocols, and system design principles of key smart technologies including cloud computing and the internet of things. • Discusses the system design principles in cloud computing along with artificial intelligence, machine learning, and data analytics applications • Presents blockchain-based solutions, cyber-physical system applications, and deep learning approaches to solving practical problems • Highlights important concepts including the cloud of things architecture, cloud service manage...
This two-volume set, LNCS 11317 and 12318, constitutes the thoroughly refereed proceedings of the 4th International Joint Conference, APWeb-WAIM 2020, held in Tianjin, China, in September 2020. Due to the COVID-19 pandemic the conference was organizedas a fully online conference. The 42 full papers presented together with 17 short papers, and 6 demonstration papers were carefully reviewed and selected from 180 submissions. The papers are organized around the following topics: Big Data Analytics; Graph Data and Social Networks; Knowledge Graph; Recommender Systems; Information Extraction and Retrieval; Machine Learning; Blockchain; Data Mining; Text Analysis and Mining; Spatial, Temporal and Multimedia Databases; Database Systems; and Demo.
In the dynamic intersection of cutting-edge technology and evolving business strategies, the fusion of Artificial Intelligence (AI) and the Internet of Things (IoT) has given rise to a revolutionary paradigm known as Artificial Intelligence of Things (AIoT). This emerging technological powerhouse offers boundless possibilities while presenting formidable challenges, and organizations worldwide are wrestling with its integration into their core operations. Artificial Intelligence of Things (AIoT) for Productivity and Organizational Transition introduces the fundamental concepts underpinning AIoT integration and the evolving landscape of AIoT research and development, then delves deep into the theoretical foundations of AIoT, examining it through the lenses of economics, behavioral science, technology, psychology, and organizational theory. Within its pages, readers will discover insights into the tools, methods, design factors, user interfaces, and techniques driving AIoT innovation.
These proceedings focus on various aspects of computer science and its applications, thus providing an opportunity for academic and industry professionals to discuss the latest issues and progress in this and related areas. The book includes theory and applications alike.
The two-volume set LNCS 12385 + 12386 constitutes the proceedings of the 15th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2020, which was held during September 13-15, 2020. The conference was planned to take place in Qingdao, China; due to the COVID-19 pandemic it was held virtually. The 67 full and 14 short papers presented in these proceedings were carefully reviewed and selected from 216 submissions. These submissions cover many hot research topics, including machine-learning algorithms for wireless systems and applications, Internet of Things (IoTs) and related wireless solutions, wireless networking for cyber-physical systems (CPSs), security and privacy solutions for wireless applications, blockchain solutions for mobile applications, mobile edge computing, wireless sensor networks, distributed and localized algorithm design and analysis, wireless crowdsourcing, mobile cloud computing, vehicular networks, wireless solutions for smart cities, wireless algorithms for smart grids, mobile social networks, mobile system security, storage systems for mobile applications, etc.
This volume constitutes the proceedings of the Forth International Conference on Cyberspace Data and Intelligence, Cyber DI 2020, and the International Conference on Cyber-Living, Cyber-Syndrome, and Cyber-Health, CyberLife 2020, held under the umbrella of the 2020 Cyberspace Congress, held in Beijing, China, in December 2020.* The 13 full papers presented were carefully reviewed and selected from 36 submissions. The papers are grouped in the following topics: machine learning and ubiquitous and intelligent computing. * The conference was held virtually due to the COVID-19 pandemic.
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations. With everything becoming increasingly interconnected via the Internet, data security becomes paramount. As technology advances, people need to secure their data communication processes. Personal data security, including data integrity and confidentiality, is particularly vulnerable. Therefore, the concept of cyber security forensics emerges to ensure data security for everyone, addressing issues such as data control, hijacking, and threats to personal devices such as mobile phones, laptops, and other smart...