|
|
Books > Computing & IT > Applications of computing
The security of an organizational information system with the
invention of next-generation technologies is a prime focus these
days. The industries and institutions in the field of computing and
communication, especially in internet of things, cloud computing,
mobile networks, next-generation networks, the energy market,
banking sector, government sector, and many more, are primarily
focused on these security and privacy issues. Blockchain is a new
technology that has changed the scenario when it comes to
addressing security concerns and resolving traditional safety
issues. These industries have started developing applications based
on the blockchain underlying platform to tap into this unlimited
potential. Blockchain technologies have a great future, but there
are still many challenges and issues to resolve for optimal design
and utilization of the technology. Revolutionary Applications of
Blockchain-Enabled Privacy and Access Control focuses on the recent
challenges, design, and issues in the field of blockchain
technologies-enabled privacy and advanced security practices in
computing and communication. This book provides the latest research
findings, solutions, and relevant theoretical frameworks in
blockchain technologies, information security, and privacy in
computing and communication. While highlighting the technology
itself along with its applications and future outlook, this book is
ideal for IT specialists, security analysts, cybersecurity
professionals, researchers, academicians, students, scientists, and
IT sector industry practitioners looking for research exposure and
new ideas in the field of blockchain.
This guidance covers the practical application of photogrammetry in
recording cultural heritage, with particular reference to structure
from motion (SfM) techniques. Our audience for this document
includes survey contractors, archaeological contractors, voluntary
organisations and specialists. Photogrammetric image acquisition
and processing, until recently requiring a considerable investment
in hardware and software, are now possible at a fraction of their
former cost. This has led to a huge increase in the use of
photogrammetry in cultural heritage recording. The skills required
to apply the techniques successfully and accurately are discussed,
and background information on how various parts of the process work
is provided so that better results can be achieved through better
understanding. Photogrammetry is characterised by its versatility,
and is applicable over a wide range of scales, from landscapes to
small objects. The particular requirements needed at these
different scales are outlined, and both imaging techniques and
useful ancillary equipment are described. The different types of
outputs are discussed, including their suitability for further
interrogation using a range of established analytical techniques
and the presentation options available. A range of case studies
illustrates the application of photogrammetry across a variety of
projects that broadly reflect the areas discussed in the text. This
document is one of a number of Historic England technical advice
documents on how to survey historic places.
This book highlights recent research advances on biometrics using
new methods such as deep learning, nonlinear graph embedding, fuzzy
approaches, and ensemble learning. Included are special biometric
technologies related to privacy and security issues, such as
cancellable biometrics and soft biometrics. The book also focuses
on several emerging topics such as big data issues, internet of
things, medical biometrics, healthcare, and robot-human
interactions. The authors show how these new applications have
triggered a number of new biometric approaches. They show, as an
example, how fuzzy extractor has become a useful tool for key
generation in biometric banking, and vein/heart rates from medical
records can also be used to identify patients. The contributors
cover the topics, their methods, and their applications in depth.
The amalgamation of post-quantum cryptography in cyber-physical
systems makes the computing system secure and also generates
opportunities in areas like smart contracts, quantum blockchain,
and smart security solutions. Sooner or later, all computing and
security systems are going to adopt quantum-proof cryptography to
safeguard these systems from quantum attacks. Post-quantum
cryptography has tremendous potential in various domains and must
be researched and explored further to be utilized successfully.
Advancements in Quantum Blockchain With Real-Time Applications
considers various concepts of computing such as quantum computing,
post-quantum cryptography, quantum attack-resistant blockchain,
quantum blockchains, and multidisciplinary applications and
real-world use cases. The book also discusses solutions to various
real-world problems within the industry. Covering key topics such
as cybersecurity, data management, and smart society, this
reference work is ideal for computer scientists, industry
professionals, academicians, practitioners, scholars, researchers,
instructors, and students.
Machine Learning and Data Science in the Power Generation Industry
explores current best practices and quantifies the value-add in
developing data-oriented computational programs in the power
industry, with a particular focus on thoughtfully chosen real-world
case studies. It provides a set of realistic pathways for
organizations seeking to develop machine learning methods, with a
discussion on data selection and curation as well as organizational
implementation in terms of staffing and continuing
operationalization. It articulates a body of case study-driven best
practices, including renewable energy sources, the smart grid, and
the finances around spot markets, and forecasting.
This book presents and discusses innovative ideas in the design,
modelling, implementation, and optimization of hardware platforms
for neural networks. The rapid growth of server, desktop, and
embedded applications based on deep learning has brought about a
renaissance in interest in neural networks, with applications
including image and speech processing, data analytics, robotics,
healthcare monitoring, and IoT solutions. Efficient implementation
of neural networks to support complex deep learning-based
applications is a complex challenge for embedded and mobile
computing platforms with limited computational/storage resources
and a tight power budget. Even for cloud-scale systems it is
critical to select the right hardware configuration based on the
neural network complexity and system constraints in order to
increase power- and performance-efficiency. Hardware Architectures
for Deep Learning provides an overview of this new field, from
principles to applications, for researchers, postgraduate students
and engineers who work on learning-based services and hardware
platforms.
Advances in Geophysics, Volume 61 - Machine Learning and Artificial
Intelligence in Geosciences, the latest release in this
highly-respected publication in the field of geophysics, contains
new chapters on a variety of topics, including a historical review
on the development of machine learning, machine learning to
investigate fault rupture on various scales, a review on machine
learning techniques to describe fractured media, signal
augmentation to improve the generalization of deep neural networks,
deep generator priors for Bayesian seismic inversion, as well as a
review on homogenization for seismology, and more.
Security in IoT Social Networks takes a deep dive into security
threats and risks, focusing on real-world social and financial
effects. Mining and analyzing enormously vast networks is a vital
part of exploiting Big Data. This book provides insight into the
technological aspects of modeling, searching, and mining for
corresponding research issues, as well as designing and analyzing
models for resolving such challenges. The book will help start-ups
grow, providing research directions concerning security mechanisms
and protocols for social information networks. The book covers
structural analysis of large social information networks,
elucidating models and algorithms and their fundamental properties.
Moreover, this book includes smart solutions based on artificial
intelligence, machine learning, and deep learning for enhancing the
performance of social information network security protocols and
models. This book is a detailed reference for academicians,
professionals, and young researchers. The wide range of topics
provides extensive information and data for future research
challenges in present-day social information networks.
Vehicular traffic congestion and accidents remain universal issues
in today's world. Due to the continued growth in the use of
vehicles, optimizing traffic management operations is an immense
challenge. To reduce the number of traffic accidents, improve the
performance of transportation systems, enhance road safety, and
protect the environment, vehicular ad-hoc networks have been
introduced. Current developments in wireless communication,
computing paradigms, big data, and cloud computing enable the
enhancement of these networks, equipped with wireless communication
capabilities and high-performance processing tools. Cloud-Based Big
Data Analytics in Vehicular Ad-Hoc Networks is a pivotal reference
source that provides vital research on cloud and data analytic
applications in intelligent transportation systems. While
highlighting topics such as location routing, accident detection,
and data warehousing, this publication addresses future challenges
in vehicular ad-hoc networks and presents viable solutions. This
book is ideally designed for researchers, computer scientists,
engineers, automobile industry professionals, IT practitioners,
academicians, and students seeking current research on cloud
computing models in vehicular networks.
Advances in Imaging and Electron Physics, Volume 216, merges two
long-running serials, Advances in Electronics and Electron Physics
and Advances in Optical and Electron Microscopy. The series
features extended articles on the physics of electron devices
(especially semiconductor devices), particle optics at high and low
energies, microlithography, image science, digital image
processing, electromagnetic wave propagation, electron microscopy
and the computing methods used in all these domains.
Trends in Deep Learning Methodologies: Algorithms, Applications,
and Systems covers deep learning approaches such as neural
networks, deep belief networks, recurrent neural networks,
convolutional neural networks, deep auto-encoder, and deep
generative networks, which have emerged as powerful computational
models. Chapters elaborate on these models which have shown
significant success in dealing with massive data for a large number
of applications, given their capacity to extract complex hidden
features and learn efficient representation in unsupervised
settings. Chapters investigate deep learning-based algorithms in a
variety of application, including biomedical and health
informatics, computer vision, image processing, and more. In recent
years, many powerful algorithms have been developed for matching
patterns in data and making predictions about future events. The
major advantage of deep learning is to process big data analytics
for better analysis and self-adaptive algorithms to handle more
data. Deep learning methods can deal with multiple levels of
representation in which the system learns to abstract higher level
representations of raw data. Earlier, it was a common requirement
to have a domain expert to develop a specific model for each
specific application, however, recent advancements in
representation learning algorithms allow researchers across various
subject domains to automatically learn the patterns and
representation of the given data for the development of specific
models.
Developing new approaches and reliable enabling technologies in the
healthcare industry is needed to enhance our overall quality of
life and lead to a healthier, innovative, and secure society.
Further study is required to ensure these current technologies,
such as big data analytics and artificial intelligence, are
utilized to their utmost potential and are appropriately applied to
advance society. Big Data Analytics and Artificial Intelligence in
the Healthcare Industry discusses technologies and emerging topics
regarding reliable and innovative solutions applied to the
healthcare industry and considers various applications, challenges,
and issues of big data and artificial intelligence for enhancing
our quality of life. Covering a range of topics such as electronic
health records, machine learning, and e-health, this reference work
is ideal for healthcare professionals, computer scientists, data
analysts, researchers, practitioners, scholars, academicians,
instructors, and students.
Strategy, Leadership and AI in the Cyber Ecosystem investigates the
restructuring of the way cybersecurity and business leaders engage
with the emerging digital revolution towards the development of
strategic management, with the aid of AI, and in the context of
growing cyber-physical interactions (human/machine co-working
relationships). The book explores all aspects of strategic
leadership within a digital context. It investigates the
interactions from both the firm/organization strategy perspective,
including cross-functional actors/stakeholders who are operating
within the organization and the various characteristics of
operating in a cyber-secure ecosystem. As consumption and reliance
by business on the use of vast amounts of data in operations
increase, demand for more data governance to minimize the issues of
bias, trust, privacy and security may be necessary. The role of
management is changing dramatically, with the challenges of
Industry 4.0 and the digital revolution. With this intelligence
explosion, the influence of artificial intelligence technology and
the key themes of machine learning, big data, and digital twin are
evolving and creating the need for cyber-physical management
professionals.
Virtual Reality (VR) is the use of computer technology to construct
an environment that is simulated. VR places the user inside and in
the center of the experience, unlike conventional user interfaces.
Users are immersed and able to connect with 3D environments instead
of seeing a screen in front of them. The computer has to role to
provide the experiences of the user in this artificial environment
by simulating as many senses as possible, such as sight, hearing,
touch and smell. In Augmented Reality (AR) we have an enhanced
version of the real physical world that is achieved through the use
of digital visual elements, sound, or other sensory stimuli
delivered via technology. It can be seen as VR imposed into real
life. In both VR and AR the experience is composed of a virtual or
extended world, an immersion technology, sensory feedback and
interactivity. These elements use a multitude of technologies that
must work together and presented to the user seamlessly integrated
and synchronized. This book is dedicated to applications, new
technologies and emerging trends in the fields of virtual reality
and augmented reality in healthcare. It is intended to cover
technical areas as well as areas of applied intervention. It is
expected to cover hardware and software technologies while
encompassing all components of the virtual experience. The main
goal of this book is to show how to put Virtual Reality in action
by linking academic and informatics researchers with professionals
who use and need VR in their day-a-day work, with a special focus
on healthcare professionals and related areas. The idea is to
disseminate and exchange the knowledge, information and technology
provided by the international communities in the area of VR, AR and
XR throughout the 21st century. Another important goal is to
synthesize all the trends, best practices, methodologies, languages
and tools which are used to implement VR. In order to shape the
future of VR, new paradigms and technologies should be discussed,
not forgetting aspects related to regulation and certification of
VR technologies, especially in the healthcare area. These last
topics are crucial for the standardization of VR. This book will
present important achievements and will show how to use VR
technologies in a full range of settings able to provide decision
support anywhere and anytime using this new approach.
This book serves as a guide to help the reader develop an awareness
of security vulnerabilities and attacks, and encourages them to be
circumspect when using the various computer resources and tools
available today. For experienced users, Computer Science Security
presents a wide range of tools to secure legacy software and
hardware. Computing has infiltrated all fields nowadays. No one can
escape this wave and be immune to security attacks, which continue
to evolve, gradually reducing the level of expertise needed by
hackers. It is high time for each and every user to acquire basic
knowledge of computer security, which would enable them to mitigate
the threats they may face both personally and professionally. It is
this combined expertise of individuals and organizations that will
guarantee a minimum level of security for families, schools, the
workplace and society in general.
|
You may like...
Bones & All
Camille DeAngelis
Paperback
R329
R310
Discovery Miles 3 100
Raaiselsee
Troula Goosen
Paperback
R225
R201
Discovery Miles 2 010
|