|
|
Books > Computing & IT > Applications of computing
Handbook of Research on Blockchain Technology presents the latest
information on the adaptation and implementation of Blockchain
technologies in real world business, scientific, healthcare and
biomedical applications. The book's editors present the rapid
advancements in existing business models by applying Blockchain
techniques. Novel architectural solutions in the deployment of
Blockchain comprise the core aspects of this book. Several use
cases with IoT, biomedical engineering, and smart cities are also
incorporated. As Blockchain is a relatively new technology that
exploits decentralized networks and is used in many sectors for
reliable, cost-effective and rapid business transactions, this book
is a welcomed addition on existing knowledge. Financial services,
retail, insurance, logistics, supply chain, public sectors and
biomedical industries are now investing in Blockchain research and
technologies for their business growth. Blockchain prevents double
spending in financial transactions without the need of a trusted
authority or central server. It is a decentralized ledger platform
that facilitates verifiable transactions between parties in a
secure and smart way.
In the computer science industry, high levels of performance remain
the focal point in software engineering. This quest has made
current systems exceedingly complex, as practitioners strive to
discover novel approaches to increase the capabilities of modern
computer structures. A prevalent area of research in recent years
is scalable transaction processing and its usage in large databases
and cloud computing. Despite its popularity, there remains a need
for significant research in the understanding of scalability and
its performance within distributed databases. Handling Priority
Inversion in Time-Constrained Distributed Databases provides
emerging research exploring the theoretical and practical aspects
of database transaction processing frameworks and improving their
performance using modern technologies and algorithms. Featuring
coverage on a broad range of topics such as consistency mechanisms,
real-time systems, and replica management, this book is ideally
designed for IT professionals, computing specialists, developers,
researchers, data engineers, executives, academics, and students
seeking research on current trends and developments in distributed
computing and databases.
Dielectric Metamaterials: Fundamentals, Designs, and Applications
links fundamental Mie scattering theory with the latest dielectric
metamaterial research, providing a valuable reference for new and
experienced researchers in the field. The book begins with a
historical, evolving overview of Mie scattering theory. Next, the
authors describe how to apply Mie theory to analytically solve the
scattering of electromagnetic waves by subwavelength particles.
Later chapters focus on Mie resonator-based metamaterials, starting
with microwaves where particles are much smaller than the free
space wavelengths. In addition, several chapters focus on
wave-front engineering using dielectric metasurfaces and the
nonlinear optical effects, spontaneous emission manipulation,
active devices, and 3D effective media using dielectric
metamaterials.
In recent years, falsification and digital modification of video
clips, images, as well as textual contents have become widespread
and numerous, especially when deepfake technologies are adopted in
many sources. Due to adopted deepfake techniques, a lot of content
currently cannot be recognized from its original sources. As a
result, the field of study previously devoted to general multimedia
forensics has been revived. The Handbook of Research on Advanced
Practical Approaches to Deepfake Detection and Applications
discusses the recent techniques and applications of illustration,
generation, and detection of deepfake content in multimedia. It
introduces the techniques and gives an overview of deepfake
applications, types of deepfakes, the algorithms and applications
used in deepfakes, recent challenges and problems, and practical
applications to identify, generate, and detect deepfakes. Covering
topics such as anomaly detection, intrusion detection, and security
enhancement, this major reference work is a comprehensive resource
for cyber security specialists, government officials, law
enforcement, business leaders, students and faculty of higher
education, librarians, researchers, and academicians.
The transition towards exascale computing has resulted in major
transformations in computing paradigms. The need to analyze and
respond to such large amounts of data sets has led to the adoption
of machine learning (ML) and deep learning (DL) methods in a wide
range of applications. One of the major challenges is the fetching
of data from computing memory and writing it back without
experiencing a memory-wall bottleneck. To address such concerns,
in-memory computing (IMC) and supporting frameworks have been
introduced. In-memory computing methods have ultra-low power and
high-density embedded storage. Resistive Random-Access Memory
(ReRAM) technology seems the most promising IMC solution due to its
minimized leakage power, reduced power consumption and smaller
hardware footprint, as well as its compatibility with CMOS
technology, which is widely used in industry. In this book, the
authors introduce ReRAM techniques for performing distributed
computing using IMC accelerators, present ReRAM-based IMC
architectures that can perform computations of ML and
data-intensive applications, as well as strategies to map ML
designs onto hardware accelerators. The book serves as a bridge
between researchers in the computing domain (algorithm designers
for ML and DL) and computing hardware designers.
With recent advancements in electronics, specifically nanoscale
devices, new technologies are being implemented to improve the
properties of automated systems. However, conventional materials
are failing due to limited mobility, high leakage currents, and
power dissipation. To mitigate these challenges, alternative
resources are required to advance electronics further into the
nanoscale domain. Carbon nanotube field-effect transistors are a
potential solution yet lack the information and research to be
properly utilized. Major Applications of Carbon Nanotube
Field-Effect Transistors (CNTFET) is a collection of innovative
research on the methods and applications of converting
semiconductor devices from micron technology to nanotechnology. The
book provides readers with an updated status on existing CNTs,
CNTFETs, and their applications and examines practical applications
to minimize short channel effects and power dissipation in
nanoscale devices and circuits. While highlighting topics including
interconnects, digital circuits, and single-wall CNTs, this book is
ideally designed for electrical engineers, electronics engineers,
students, researchers, academicians, industry professionals, and
practitioners working in nanoscience, nanotechnology, applied
physics, and electrical and electronics engineering.
Most technologies have been harnessed to enable educators to
conduct their business remotely. However, the social context of
technology as a mediating factor needs to be examined to address
the perceptions of barriers to learning due to the lack of social
interaction between a teacher and a learner in such a setting.
Developing Technology Mediation in Learning Environments is an
essential reference source that widens the scene of STEM education
with an all-encompassing approach to technology-mediated learning,
establishing a context for technology as a mediating factor in
education. Featuring research on topics such as distance education,
digital storytelling, and mobile learning, this book is ideally
designed for teachers, IT consultants, educational software
developers, researchers, administrators, and professionals seeking
coverage on developing digital skills and professional knowledge
using technology.
Infrastructure Computer Vision delves into this field of computer
science that works on enabling computers to see, identify, process
images and provide appropriate output in the same way that human
vision does. However, implementing these advanced information and
sensing technologies is difficult for many engineers. This book
provides civil engineers with the technical detail of this advanced
technology and how to apply it to their individual projects.
Innovations in Artificial Intelligence and Human Computer
Interaction in the Digital Era investigates the interaction and
growing interdependency of the HCI and AI fields, which are not
usually addressed in traditional approaches. Chapters explore how
well AI can interact with users based on linguistics and
user-centered design processes, especially with the advances of AI
and the hype around many applications. Other sections investigate
how HCI and AI can mutually benefit from a closer association and
the how the AI community can improve their usage of HCI methods
like “Wizard of Oz” prototyping and “Thinking aloud” protocols.
Moreover, HCI can further augment human capabilities using new
technologies. This book demonstrates how an interdisciplinary team
of HCI and AI researchers can develop extraordinary applications,
such as improved education systems, smart homes, smart healthcare
and map Human Computer Interaction (HCI) for a multidisciplinary
field that focuses on the design of computer technology and the
interaction between users and computers in different domains.
To endow computers with common sense is one of the major long-term
goals of artificial intelligence research. One approach to this
problem is to formalize commonsense reasoning using mathematical
logic. Commonsense Reasoning: An Event Calculus Based Approach is a
detailed, high-level reference on logic-based commonsense
reasoning. It uses the event calculus, a highly powerful and usable
tool for commonsense reasoning, which Erik Mueller demonstrates as
the most effective tool for the broadest range of applications. He
provides an up-to-date work promoting the use of the event calculus
for commonsense reasoning, and bringing into one place information
scattered across many books and papers. Mueller shares the
knowledge gained in using the event calculus and extends the
literature with detailed event calculus solutions that span many
areas of the commonsense world. The Second Edition features new
chapters on commonsense reasoning using unstructured information
including the Watson system, commonsense reasoning using answer set
programming, and techniques for acquisition of commonsense
knowledge including crowdsourcing.
The application of artificial intelligence technology to 5G
wireless communications is now appropriate to address the design of
optimized physical layers, complicated decision-making, network
management, and resource optimization tasks within networks. In
exploring 5G wireless technologies and communication systems,
artificial intelligence is a powerful tool and a research topic
with numerous potential fields of application that require further
study. Applications of Artificial Intelligence in Wireless
Communication Systems explores the applications of artificial
intelligence for the optimization of wireless communication
systems, including channel models, channel state estimation,
beamforming, codebook design, signal processing, and more. Covering
key topics such as neural networks, deep learning, and wireless
systems, this reference work is ideal for computer scientists,
industry professionals, researchers, academicians, scholars,
practitioners, instructors, and students.
As the progression of the internet continues, society is finding
easier, quicker ways of simplifying their needs with the use of
technology. With the growth of lightweight devices, such as smart
phones and wearable devices, highly configured hardware is in
heightened demand in order to process the large amounts of raw data
that are acquired. Connecting these devices to fog computing can
reduce bandwidth and latency for data transmission when associated
with centralized cloud solutions and uses machine learning
algorithms to handle large amounts of raw data. The risks that
accompany this advancing technology, however, have yet to be
explored. Architecture and Security Issues in Fog Computing
Applications is a pivotal reference source that provides vital
research on the architectural complications of fog processing and
focuses on security and privacy issues in intelligent fog
applications. While highlighting topics such as machine learning,
cyber-physical systems, and security applications, this publication
explores the architecture of intelligent fog applications enabled
with machine learning. This book is ideally designed for IT
specialists, software developers, security analysts, software
engineers, academicians, students, and researchers seeking current
research on network security and wireless systems.
By specializing in a vertical market, companies can better
understand their customers and bring more insight to clients in
order to become an integral part of their businesses. This approach
requires dedicated tools, which is where artificial intelligence
(AI) and machine learning (ML) will play a major role. By adopting
AI software and services, businesses can create predictive
strategies, enhance their capabilities, better interact with
customers, and streamline their business processes. This edited
book explores novel concepts and cutting-edge research and
developments towards designing these fully automated advanced
digital systems. Fostered by technological advances in artificial
intelligence and machine learning, such systems potentially have a
wide range of applications in robotics, human computing, sensing
and networking. The chapters focus on models and theoretical
approaches to guarantee automation in large multi-scale
implementations of AI and ML systems; protocol designs to ensure AI
systems meet key requirements for future services such as latency;
and optimisation algorithms to leverage the trusted distributed and
efficient complex architectures. The book is of interest to
researchers, scientists, and engineers working in the fields of
ICTs, networking, AI, ML, signal processing, HCI, robotics and
sensing. It could also be used as supplementary material for
courses on AI, machine and deep learning, ICTs, networking signal
processing, robotics and sensing.
|
|