|
|
Books > Computing & IT
Cloud computing can provide virtually unlimited scalable high
performance computing resources. Cloud workflows often underlie
many large scale data/computation intensive e-science applications
such as earthquake modelling, weather forecasting and astrophysics.
During application modelling, these sophisticated processes are
redesigned as cloud workflows, and at runtime, the models are
executed by employing the supercomputing and data sharing ability
of the underlying cloud computing infrastructures.
"Temporal QOS Management in Scientific Cloud Workflow Systems"
focuses on real world scientific applications which often must be
completed by satisfying a set of temporal constraints such as
milestones and deadlines. Meanwhile, activity duration, as a
measurement of system performance, often needs to be monitored and
controlled. This book demonstrates how to guarantee on-time
completion of most, if not all, workflow applications. Offering a
comprehensive framework to support the lifecycle of
time-constrained workflow applications, this book will enhance the
overall performance and usability of scientific cloud workflow
systems.
Explains how to reduce the cost to detect and handle temporal
violations while delivering high quality of service (QoS) Offers
new concepts, innovative strategies and algorithms to support
large-scale sophisticatedapplications in the cloud Improves the
overall performance and usability of cloud workflow systems"
In today's modern age of information, new technologies are quickly
emerging and being deployed into the field of information
technology. Cloud computing is a tool that has proven to be a
versatile piece of software within IT. Unfortunately, the high
usage of Cloud has raised many concerns related to privacy,
security, and data protection that have prevented cloud computing
solutions from becoming the prevalent alternative for mission
critical systems. Up-to-date research and current techniques are
needed to help solve these vulnerabilities in cloud computing.
Modern Principles, Practices, and Algorithms for Cloud Security is
a pivotal reference source that provides vital research on the
application of privacy and security in cloud computing. While
highlighting topics such as chaos theory, soft computing, and cloud
forensics, this publication explores present techniques and
methodologies, as well as current trends in cloud protection. This
book is ideally designed for IT specialists, scientists, software
developers, security analysts, computer engineers, academicians,
researchers, and students seeking current research on the defense
of cloud services.
In a world dependent on digital technologies, business corporations
continually try to stay ahead of their competitors by adopting the
most updated technology into their business processes. Many
companies are adopting digital transformation models, data
analytics, big data, data empowerment, and data sharing as key
strategies and as service disruptors for information delivery and
record management. Higher education institutions have adopted
digital service innovation as a core to driving their business
processes. Such services are key to ensuring efficiency and
improving organizational performance. Digital Transformation and
Innovative Services for Business and Learning is a collection of
innovative research on the latest digital services and their role
in supporting the digital transformation of businesses and
education. While highlighting topics including brand equality,
digital banking, and generational workforce, this book is ideally
designed for managers, executives, IT consultants, industry
professionals, academicians, researchers, and students.
A Handbook of Artificial Intelligence in Drug Delivery explores the
use of Artificial Intelligence (AI) in drug delivery strategies.
The book covers pharmaceutical AI and drug discovery challenges,
Artificial Intelligence tools for drug research, AI enabled
intelligent drug delivery systems and next generation novel
therapeutics, broad utility of AI for designing novel
micro/nanosystems for drug delivery, AI driven personalized
medicine and Gene therapy, 3D Organ printing and tissue
engineering, Advanced nanosystems based on AI principles
(nanorobots, nanomachines), opportunities and challenges using
artificial intelligence in ADME/Tox in drug development,
commercialization and regulatory perspectives, ethics in AI, and
more. This book will be useful to academic and industrial
researchers interested in drug delivery, chemical biology,
computational chemistry, medicinal chemistry and bioinformatics.
The massive time and costs investments in drug research and
development necessitate application of more innovative techniques
and smart strategies.
Continual advancements in web technology have highlighted the need
for formatted systems that computers can utilize to easily read and
sift through the hundreds of thousands of data points across the
internet. Therefore, having the most relevant data in the least
amount of time to optimize the productivity of users becomes a
priority. Semantic Web Science and Real-World Applications provides
emerging research exploring the theoretical and practical aspects
of semantic web science and real-world applications within the area
of big data. Featuring coverage on a broad range of topics such as
artificial intelligence, social media monitoring, and microblogging
recommendation systems, this book is ideally designed for IT
consultants, academics, professionals, and researchers of web
science seeking the current developments, requirements and
standards, and technology spaces presented across academia and
industries.
Cyber-attacks are rapidly becoming one of the most prevalent issues
globally, and as they continue to escalate, it is imperative to
explore new approaches and technologies that help ensure the
security of the online community. Beyond cyber-attacks, personal
information is now routinely and exclusively housed in cloud-based
systems. The rising use of information technologies requires
stronger information security and system procedures to reduce the
risk of information breaches. Advanced Methodologies and
Technologies in System Security, Information Privacy, and Forensics
presents emerging research and methods on preventing information
breaches and further securing system networks. While highlighting
the rising concerns in information privacy and system security,
this book explores the cutting-edge methods combatting digital
risks and cyber threats. This book is an important resource for
information technology professionals, cybercrime researchers,
network analysts, government agencies, business professionals,
academicians, and practitioners seeking the most up-to-date
information and methodologies on cybercrime, digital terrorism,
network security, and information technology ethics.
SECURITY AND PRIVACY VISION IN 6G Prepare for the future of mobile
communication with this comprehensive study 6G is the next frontier
in mobile communication, with development of 6G standards slated to
begin as early as 2026. As telecommunications networks become
faster and more intelligent, security and privacy concerns are
critical. In an increasingly connected world, there is an urgent
need for user data to be safeguarded and system security enhanced
against a new generation of threats. Security and Privacy Vision in
6G provides a comprehensive survey of these threats and the
emerging techniques for safeguarding against them. It includes
mechanisms for prediction, detection, mitigation, and prevention,
such that threats to privacy and security can be forestalled at any
stage. Fully engaged with proposed 6G architectures, it is an
essential resource for mobile communications professionals looking
for a head start on the technology of the future. Security and
Privacy Vision in 6G readers will also find: Detailed coverage of
topics including edge intelligence and cloudification, industrial
automation, collaborative robots, and more Treatment balancing the
practical and the theoretical An editorial team with decades of
international network technology experience in both industry and
academia Security and Privacy Vision in 6G is a vital reference for
network security professionals and for postgraduate and advanced
undergraduate students in mobile communications and network
security-related fields.
Before the modern age of medicine, the chance of surviving a
terminal disease such as cancer was minimal at best. After
embracing the age of computer-aided medical analysis technologies,
however, detecting and preventing individuals from contracting a
variety of life-threatening diseases has led to a greater survival
percentage and increased the development of algorithmic
technologies in healthcare. Deep Learning Applications in Medical
Imaging is a pivotal reference source that provides vital research
on the application of generating pictorial depictions of the
interior of a body for medical intervention and clinical analysis.
While highlighting topics such as artificial neural networks,
disease prediction, and healthcare analysis, this publication
explores image acquisition and pattern recognition as well as the
methods of treatment and care. This book is ideally designed for
diagnosticians, medical imaging specialists, healthcare
professionals, physicians, medical researchers, academicians, and
students.
|
|