- 19 Novembre 2020
Resource optimization has always been a thrust area of research, and as the Internet of Things (IoT) is the most talked about topic of the current era of technology, it has become the need of the hour. Therefore, the idea behind this book was to simplify the journey of those who aspire to understand resource optimization in the IoT. To this end, included in this book are various real-time/offline applications and algorithms/case studies in the fields of engineering, computer science, information security, and cloud computing, along with the modern tools and various technologies used in systems, leaving the reader with a high level of understanding of various techniques and algorithms used in resource optimization.
- 15 Juillet 2021
This book covers a variety of smart IoT applications for industry and research. For industry, the book is a guide for considering the real-time aspects of automation of application domains. The main topics covered in the industry section include real-time tracking and navigation, smart transport systems and application for GPS domains, modern electric grid control for electricity industry, IoT prospectives for modern society, IoT for modern medical science, and IoT automation for Industry 4.0. The book then provides a summary of existing IoT research that underlines enabling technologies, such as fog computing, wireless sensor networks, data mining, context awareness, real-time analytics, virtual reality, and cellular communications. The book pertains to researchers, outcome-based academic leaders, as well as industry leaders.
- 11 Août 2021
ARTIFICIAL INTELLIGENCE AND DATA MINING IN SECURITY FRAMEWORKS Written and edited by a team of experts in the field, this outstanding new volume offers solutions to the problems of security, outlining the concepts behind allowing computers to learn from experience and understand the world in terms of a hierarchy of concepts, with each concept de?ned through its relation to simpler concepts. Artificial intelligence (AI) and data mining is the fastest growing field in computer science. AI and data mining algorithms and techniques are found to be useful in different areas like pattern recognition, automatic threat detection, automatic problem solving, visual recognition, fraud detection, detecting developmental delay in children, and many other applications. However, applying AI and data mining techniques or algorithms successfully in these areas needs a concerted effort, fostering integrative research between experts ranging from diverse disciplines from data science to artificial intelligence. Successful application of security frameworks to enable meaningful, cost effective, personalized security service is a primary aim of engineers and researchers today. However realizing this goal requires effective understanding, application and amalgamation of AI and data mining and several other computing technologies to deploy such a system in an effective manner. This book provides state of the art approaches of artificial intelligence and data mining in these areas. It includes areas of detection, prediction, as well as future framework identification, development, building service systems and analytical aspects. In all these topics, applications of AI and data mining, such as artificial neural networks, fuzzy logic, genetic algorithm and hybrid mechanisms, are explained and explored. This book is aimed at the modeling and performance prediction of efficient security framework systems, bringing to light a new dimension in the theory and practice. This groundbreaking new volume presents these topics and trends, bridging the research gap on AI and data mining to enable wide-scale implementation. Whether for the veteran engineer or the student, this is a must-have for any library. This groundbreaking new volume: Clarifies the understanding of certain key mechanisms of technology helpful in the use of artificial intelligence and data mining in security frameworks Covers practical approaches to the problems engineers face in working in this field, focusing on the applications used every day Contains numerous examples, offering critical solutions to engineers and scientists Presents these new applications of AI and data mining that are of prime importance to human civilization as a whole
- 13 Avril 2021
This book is targeted towards cybersecurity professionals (especially those dealing with cloud security) or any stakeholders dealing with cybersecurity who want to understand the next level of security infrastructure using blockchain. The book's security and privacy analysis help with an understanding of the basics of blockchain, and it explores the quantifying impact of the new attack surfaces introduced by blockchain technologies and platforms. In addition, the book contains relevant and current updates on the topic. It follows a practical approach to help understand how blockchain technology is used to transform cybersecurity solutions.
- 28 Octobre 2021
This book focuses on sustainability issues post COVID-19 outbreak, discusses ways to restrict global spread of the pandemic, and also how to survive holistically in the environment. It also discusses the economic impacts on the world due to the coronavirus outbreak. There is a strong need for monitoring and analysis of pandemics for sustainability like epidemic risk analysis by using pattern recognition or the mental health challenges during an outbreak. This book presents ways to find solutions and gives insights to explore innovative methods and predictive modeling techniques, such that masses are prevented from pandemics.?
- 24 Juillet 2023
This book provides an introduction to the key concepts of Fully Homomorphic Encryption (FHE)-based computing, and discusses the challenges associated with architecting FHE-based computing systems. Readers will see that due to FHE's ability to compute on encrypted data, it is a promising solution to address privacy concerns arising from cloud-based services commonly used for a variety of applications including healthcare, financial, transportation, and weather forecasting. This book explains the fundamentals of the FHE operations and then presents an architectural analysis of the FHE-based computing. The authors also highlight challenges associated with accelerating FHE on various commodity platforms and argue that the FPGA platform provides a sweet spot in making privacy-preserving computing plausible.