![]() |
![]() |
Your cart is empty |
||
Originating from papers presented at the 18th International Conference on Railway Engineering Design and Operation, this book provides up-to-date research on the use of advanced systems, promoting their general awareness throughout the management, design, manufacture and operation of railways and other emerging passenger, freight and transit systems. A key emphasis is placed on the use of computer systems in advanced railway engineering. The included works are compiled from a variety of specialists interested in the development of railways, including managers, consultants, railway engineers, designers of advanced train control systems and computer specialists. Topics covered include: Traffic safety, security and monitoring; Train and railways analysis; Operation of rail networks; Advanced train control; Energy-efficient design; Traffic modelling and simulation.
Due to the ubiquity of social media and digital information, the use of digital images in today's digitized marketplace is continuously rising throughout enterprises. Organizations that want to offer their content through the internet confront plenty of security concerns, including copyright violation. Advanced solutions for the security and privacy of digital data are continually being developed, yet there is a lack of current research in this area. The Handbook of Research on Multimedia Forensics and Content Integrity features a collection of innovative research on the approaches and applications of current techniques for the privacy and security of multimedia and their secure transportation. It provides relevant theoretical frameworks and the latest empirical research findings in the area of multimedia forensics and content integrity. Covering topics such as 3D data security, copyright protection, and watermarking, this major reference work is a comprehensive resource for security analysts, programmers, technology developers, IT professionals, students and educators of higher education, librarians, researchers, and academicians.
Would you like to fully understand the NFT world, and be able to
consciously invest in it to generate huge profits?
...And Much More! Combining simple instructions and beginner-friendly advice with advanced trading strategies, this guide will teach you how one with zero experience can start investing in NFT and see real results.
In healthcare, a digital twin is a digital representation of a patient or healthcare system using integrated simulations and service data. The digital twin tracks a patient's records, crosschecks them against registered patterns and analyses any diseases or contra indications. The digital twin uses adaptive analytics and algorithms to produce accurate prognoses and suggest appropriate interventions. A digital twin can run various medical scenarios before treatment is initiated on the patient, thus increasing patient safety as well as providing the most appropriate treatments to meet the patient's requirements. Digital Twin Technologies for Healthcare 4.0 discusses how the concept of the digital twin can be merged with other technologies, such as artificial intelligence (AI), machine learning (ML), big data analytics, IoT and cloud data management, for the improvement of healthcare systems and processes. The book also focuses on the various research perspectives and challenges in implementation of digital twin technology in terms of data analysis, cloud management and data privacy issues. With chapters on visualisation techniques, prognostics and health management, this book is a must-have for researchers, engineers and IT professionals in healthcare as well as those involved in using digital twin technology, AI, IoT & big data analytics for novel applications.
With the growing maturity and stability of digitization and edge technologies, vast numbers of digital entities, connected devices, and microservices interact purposefully to create huge sets of poly-structured digital data. Corporations are continuously seeking fresh ways to use their data to drive business innovations and disruptions to bring in real digital transformation. Data science (DS) is proving to be the one-stop solution for simplifying the process of knowledge discovery and dissemination out of massive amounts of multi-structured data. Supported by query languages, databases, algorithms, platforms, analytics methods and machine and deep learning (ML and DL) algorithms, graphs are now emerging as a new data structure for optimally representing a variety of data and their intimate relationships. Compared to traditional analytics methods, the connectedness of data points in graph analytics facilitates the identification of clusters of related data points based on levels of influence, association, interaction frequency and probability. Graph analytics is being empowered through a host of path-breaking analytics techniques to explore and pinpoint beneficial relationships between different entities such as organizations, people and transactions. This edited book aims to explain the various aspects and importance of graph data science. The authors from both academia and industry cover algorithms, analytics methods, platforms and databases that are intrinsically capable of creating business value by intelligently leveraging connected data. This book will be a valuable reference for ICTs industry and academic researchers, scientists and engineers, and lecturers and advanced students in the fields of data analytics, data science, cloud/fog/edge architecture, internet of things, artificial intelligence/machine and deep learning, and related fields of applications. It will also be of interest to analytics professionals in industry and IT operations teams.
The concept of autonomic computing seeks to reduce the complexity of pervasively ubiquitous system management and maintenance by shifting the responsibility for low-level tasks from humans to the system while allowing humans to concentrate on high-level tasks. This is achieved by building self-managing systems that are generally capable of self-configuring, self-healing, self-optimising, and self-protecting. Trustworthy autonomic computing technologies are being applied in datacentre and cloud management, smart cities and autonomous systems including driverless cars. However, there are still significant challenges to achieving trustworthiness. This book covers challenges and solutions in autonomic computing trustworthiness from methods and techniques to achieve consistent and reliable system self-management. Researchers, developers and users need to be confident that an autonomic self-managing system will remain correct in the face of any possible contexts and environmental inputs. The book is aimed at researchers in autonomic computing, autonomics and trustworthy autonomics. This will be a go-to book for foundational knowledge, proof of concepts and novel trustworthy autonomic techniques and approaches. It will be useful to lecturers and students of autonomic computing, autonomics and multi-agent systems who need an easy-to-use text with sample codes, exercises, use-case demonstrations. This is also an ideal tutorial guide for independent study with simple and well documented diagrams to explain techniques and processes.
Present the computer concepts and Microsoft (R) Office 2016 skills perfect for your Introduction to Computing course with ILLUSTRATED COMPUTER CONCEPTS AND MICROSOFT (R) OFFICE 365 & OFFICE 2016. This all-in-one book makes the computer concepts and skills your students need to know easily accessible. The user-friendly two-page spread found throughout this and other popular Illustrated Microsoft (R) Office 2016 books clearly demonstrates key application skills. Today's most up-to-date technology developments and concepts are clarified using the distinctive step-by-step approach and the latest content from COMPUTER CONCEPTS ILLUSTRATED BRIEF. This edition highlights new Office features with a new module covering Productivity Apps. You'll find a wealth of instructional support and resources, including MindTap customized learning paths to reinforce the important skills and theories found in ILLUSTRATED COMPUTER CONCEPTS AND MICROSOFT (R) OFFICE 365 & OFFICE 2016.
Advances in Imaging and Electron Physics, Volume 224 highlights new advances in the field, with this new volume presenting interesting chapters on Measuring elastic deformation and orientation gradients by scanning electron microscopy - conventional, new and emerging methods, Development of an alternative global method with high angular resolution, Implementing the new global method, Numerical validation of the method and influence of optical distortions, and Applications of the method.
Recent years have seen a proliferation of cybersecurity guidance in the form of government regulations and standards with which organizations must comply. As society becomes more heavily dependent on cyberspace, increasing levels of security measures will need to be established and maintained to protect the confidentiality, integrity, and availability of information; the privacy of consumers; and the continuity of economic activity. Compliance is a measure of the extent to which a current state is in conformance with a desired state. The desired state is commonly operationalized through specific business objectives, professional standards, and regulations. Assurance services provide a means of evaluating the level of compliance with various cybersecurity requirements. The proposed book will summarize current cybersecurity guidance and provide a compendium of innovative and state-of-the-art compliance and assurance practices and tools that can function both as a reference and pedagogical source for practitioners and educators. This publication will provide a synopsis of current cybersecurity guidance that organizations should consider in establishing and updating their cybersecurity systems. Assurance services will also be addressed so that management and their auditors can regularly evaluate their extent of compliance. This book should be published because its theme will provide company management, practitioners, and academics with a good summary of current guidance and how to conduct assurance of appropriate compliance.
Blockchain has potential to revolutionize how manufacturers design, engineer, make and scale their products. Blockchain is gradually proving to be an effective "middleware" solution for enabling seamless interoperability within complex supply chains. Due to its technological nature, blockchain enables secure, transparent and fast data exchanges as well as allowing for the creation of immutable records databases The main advantage of Blockchain in Manufacturing Industries is product traceability, supply chain transparency, compliance monitoring, and auditability. Moreover, leveraging blockchain technology into a manufacturing enterprise can enhance its security and reduce the rates of systematic failures. So, blockchain is now used in various sectors of the manufacturing industry, such as automotive, aerospace, defense, pharmaceutical, consumer electronics, textile, food and beverages, and more. Hence, Blockchain should be seen as an investment in future-readiness and customer-centricity, not as an experimental technology - because, the evidence is overwhelming. This book will explore the strengths of Blockchain adaptation in Manufacturing Industries and Logistics Management, cover different use cases of Blockchain Technology for Manufacturing Industries and Logistics Management, and will discuss the role, impact and challenges of adopting Blockchain in Manufacturing industries and Logistics Management. The chapters will also provide the current open issues and future research trends of Blockchain, especially for Manufacturing Industries and Logistics, and will encapsulate quantitative and qualitative research for a wide spectrum of readers of the book.
Digital Manufacturing: The Industrialization of "Art to Part" 3D Additive Printing explains everything needed to understand how recent advances in materials science, manufacturing engineering and digital design have integrated to create exciting new capabilities. Sections discuss relevant fundamentals in mechanical engineering and materials science and complex and practical topics in additive manufacturing, such as part manufacturing, all in the context of the modern digital design environment. Being successful in today's "art to part" cyber-physical manufacturing age requires a strong grounding in science and engineering fundamentals as well as knowledge of the latest techniques, all of which readers will find here. Every chapter is developed by leading specialists and based on first-hand experiences, capturing the essential knowledge readers need to solve problems related to digital manufacturing.
Opinion Mining and Text Analytics on Literary Works and Social Media introduces the use of artificial intelligence and big data analytics techniques which can apply opinion mining and text analytics on literary works and social media. This book focuses on theories, method and approaches in which data analytic techniques can be used to analyze data from social media, literary books, novels, news, texts, and beyond to provide a meaningful pattern. The subject area of this book is multidisciplinary; related to data science, artificial intelligence, social science and humanities, and literature. This is an essential resource for scholars, Students and lecturers from various fields of data science, artificial intelligence, social science and humanities, and literature, university libraries, new agencies, and many more.
Digital transformation in organizations optimizes the business processes but also brings additional challenges in the form of security threats and vulnerabilities. Cyberattacks incur financial losses for organizations and can affect their reputations. Due to this, cybersecurity has become critical for business enterprises. Extensive technological adoption in businesses and the evolution of FinTech applications require reasonable cybersecurity measures to protect organizations from internal and external security threats. Recent advances in the cybersecurity domain such as zero trust architecture, application of machine learning, and quantum and post-quantum cryptography have colossal potential to secure technological infrastructures. Cybersecurity Issues and Challenges for Business and FinTech Applications discusses theoretical foundations and empirical studies of cybersecurity implications in global digital transformation and considers cybersecurity challenges in diverse business areas. Covering essential topics such as artificial intelligence, social commerce, and data leakage, this reference work is ideal for cybersecurity professionals, business owners, managers, policymakers, researchers, scholars, academicians, practitioners, instructors, and students. |
![]() ![]() You may like...
Centrality Metrics for Complex Network…
Natarajan Meghanathan
Hardcover
R4,709
Discovery Miles 47 090
An Introduction to Riemann Surfaces
Terrence Napier, Mohan Ramachandran
Hardcover
R1,634
Discovery Miles 16 340
Materials Phase Change PDE Control…
Shumon Koga, Miroslav Krstic
Hardcover
R3,417
Discovery Miles 34 170
Nonlinear Science and Complexity
J.A. Tenreiro Machado, Albert C.J. Luo, …
Hardcover
R4,603
Discovery Miles 46 030
Progress and Challenges in Dynamical…
Santiago Ibanez, Jesus S. Perez del Rio, …
Hardcover
Dynamic Impulse Systems - Theory and…
S.T. Zavalishchin, A.N. Sesekin
Hardcover
R3,030
Discovery Miles 30 300
Handbook of Innovation & Appropriate…
Philippe Regnier, Daniel Frey, …
Hardcover
R5,266
Discovery Miles 52 660
|