|
Books > Computing & IT
The Blockchain Technology for Secure and Smart Applications across
Industry Verticals, Volume 121, presents the latest information on
a type of distributed ledger used for maintaining a permanent and
tamper-proof record of transactional data. The book presents a
novel compendium of existing and budding Blockchain technologies
for various smart applications. Chapters in this new release
include the Basics of Blockchain, The Blockchain History,
Architecture of Blockchain, Core components of Blockchain,
Blockchain 2.0: Smart Contracts, Empowering Digital Twins with
Blockchain, Industrial Use Cases at the Cusp of the IoT and
Blockchain Paradigms, Blockchain Components and Concepts, Digital
Signatures, Accumulators, Financial Systems, and more. This book is
a unique effort to illuminate various techniques to represent,
improve and authorize multi-institutional and multidisciplinary
research in a different type of smart applications, like the
financial system, smart grid, transportation system, etc. Readers
in identity-privacy, traceability, immutability, transparency,
auditability, and security will find it to be a valuable resource.
AI and Cloud Computing, Volume 120 in the Advances in Computers
series, highlights new advances in the field, with this updated
volume presenting interesting chapters on topics including A
Deep-forest based Approach for Detecting Fraudulent Online
Transaction, Design of Cyber-Physical-Social Systems with
Forensic-awareness Based on Deep Learning, Review on
Privacy-preserving Data Comparison Protocols in Cloud Computing,
Fingerprint Liveness Detection Using an Improved CNN with the
Spatial Pyramid Pooling Structure, Protecting Personal Sensitive
Data Security in the Cloud with Blockchain, and more.
The way we live and work is about to change forever. Welcome to the age of AI!
The most incredible transformation in the history of humankind. Never before has it been so critical to understand the great challenges and the even greater opportunities we face.
In What The Future you will discover:
When AI is likely to take your job and how to get a better one
The human advantage and how to capitalise on it
The chance of an AI apocalypse destroying humankind
Through an array of detailed case studies, this book explores the
vibrant digital expressions of diverse groups of Muslim cybernauts:
religious clerics and Sufis, feminists and fashionistas, artists
and activists, hajj pilgrims and social media influencers. These
stories span a vast cultural and geographic landscape—from
Indonesia, Iran, and the Arab Middle East to North America. These
granular case studies contextualize cyber Islam within broader
social trends: racism and Islamophobia, gender dynamics, celebrity
culture, identity politics, and the shifting terrain of
contemporary religious piety and practice. The book’s authors
examine an expansive range of digital multimedia technologies as
primary “texts.” These include websites, podcasts, blogs,
Twitter, Facebook, Instagram, YouTube channels, online magazines
and discussion forums, and religious apps. The contributors also
draw on a range of methodological and theoretical models from
multiple academic disciplines, including communication and media
studies, anthropology, history, global studies, religious studies,
and Islamic studies.
This book takes the reader through the actual manufacturing process
of making a typical chip, from start to finish, including a
detailed discussion of each step, in plain language. The evolution
of today's technology is added to the story, as seen through the
eyes of the engineers who solved some of the problems. The authors
are well suited to that discussion since they are three of those
same engineers. They have a broad exposure to the industry and its
technology that extends all the way back to Shockley Laboratories,
the first semiconductor manufacturer in Silicon Valley.
The CMOS (Complementary Metal-Oxide-Semiconductor) process flow is
the focus of the discussion and is covered in ten chapters. The
vast majority of chips made today are fabricated using this general
method. In order to ensure that all readers are comfortable with
the vocabulary, the first chapter carefully and clearly introduces
the science concepts found in later chapters. A chapter is devoted
to pointing out the differences in other manufacturing methods,
such as the gallium arsenide technology that produces chips for
cell phones. In addition, a chapter describing the nature of the
semiconductor industry from a business perspective is included.
"The entire process of making a chip is surprisingly easy to
understand. The part of the story that defies belief is the tiny
dimensions: the conducting wires and other structures on a chip are
more than a hundred times thinner than a hair - and getting thinner
with every new chip design."
* Included CD gives the reader a much greater comprehension of the
process than a strictly print book with static illustrations
provides
* Authors are actual engineers who have a broad range of exposure
and experience with chip technology
* Contains a unique chapter describing the nature of the
semiconductor industry from a business perspective
The internet of things (IoT) has drawn great attention from both
academia and industry, since it offers a challenging notion of
creating a world where all things around us are connected to the
internet and communicate with each other with minimal human
intervention. Another component for helping IoT to succeed is cloud
computing. The combination of cloud computing and IoT will enable
new monitoring services and powerful processing of sensory data
streams. These applications, alongside implementation details and
challenges, should also be explored for successful mainstream
adoption. IoT is also fueled by the advancement of digital
technologies, and the next generation era will be cloud-based IoT
systems. Integration and Implementation of the Internet of Things
Through Cloud Computing studies, analyzes, and presents cloud-based
IoT-related technologies, protocols, and standards along with
recent research and development in cloud-based IoT. It also
presents recent emerging trends and technological advances of
cloud-based IoT, innovative applications, and the challenges and
implications for society. The chapters included take a strong look
at the societal and social aspects of this technology along with
its implementations and technological analyses. This book is
intended for IT specialists, technologists, practitioners,
researchers, academicians, and students who are interested in the
next era of IoT through cloud computing.
Interest in big data has swelled within the scholarly community as
has increased attention to the internet of things (IoT). Algorithms
are constructed in order to parse and analyze all this data to
facilitate the exchange of information. However, big data has
suffered from problems in connectivity, scalability, and privacy
since its birth. The application of deep learning algorithms has
helped process those challenges and remains a major issue in
today's digital world. Advanced Deep Learning Applications in Big
Data Analytics is a pivotal reference source that aims to develop
new architecture and applications of deep learning algorithms in
big data and the IoT. Highlighting a wide range of topics such as
artificial intelligence, cloud computing, and neural networks, this
book is ideally designed for engineers, data analysts, data
scientists, IT specialists, programmers, marketers, entrepreneurs,
researchers, academicians, and students.
The book aims to integrate the aspects of IoT, Cloud computing and
data analytics from diversified perspectives. The book also plans
to discuss the recent research trends and advanced topics in the
field which will be of interest to academicians and researchers
working in this area. Thus, the book intends to help its readers to
understand and explore the spectrum of applications of IoT, cloud
computing and data analytics. Here, it is also worth mentioning
that the book is believed to draw attention on the applications of
said technology in various disciplines in order to obtain enhanced
understanding of the readers. Also, this book focuses on the
researches and challenges in the domain of IoT, Cloud computing and
Data analytics from perspectives of various stakeholders.
The key parameter that needs to be considered when planning the
management of resources in futuristic wireless networks is a
balanced approach to resource distribution. A balanced approach is
necessary to provide an unbiased working environment for the
distribution, sharing, allocation, and supply of resources among
the devices of the wireless network. Equal resource distribution
also maintains balance and stability between the operations of
communication systems and thus improves the performance of wireless
networks. Managing Resources for Futuristic Wireless Networks is a
pivotal reference source that presents research related to the
control and management of key parameters of bandwidth, spectrum
sensing, channel selection, resource sharing, and task scheduling,
which is necessary to ensure the efficient operation of wireless
networks. Featuring topics that include vehicular ad-hoc networks,
resource management, and the internet of things, this publication
is ideal for professionals and researchers working in the field of
networking, information and knowledge management, and communication
sciences. Moreover, the book will provide insights and support
executives concerned with the management of expertise, knowledge,
information, and organizational development in different types of
work communities and environments.
The Definitive Guide to Arm (R) Cortex (R)-M23 and Cortex-M33
Processors focuses on the Armv8-M architecture and the features
that are available in the Cortex-M23 and Cortex- M33 processors.
This book covers a range of topics, including the instruction set,
the programmer's model, interrupt handling, OS support, and debug
features. It demonstrates how to create software for the Cortex-M23
and Cortex-M33 processors by way of a range of examples, which will
enable embedded software developers to understand the Armv8-M
architecture. This book also covers the TrustZone (R) technology in
detail, including how it benefits security in IoT applications, its
operations, how the technology affects the processor's hardware
(e.g., memory architecture, interrupt handling, etc.), and various
other considerations in creating secure software.
Predictive Filtering for Microsatellite Control Systems introduces
technological design, modeling, stability analysis, predictive
filtering, state estimation problem and real-time operation of
spacecraft control systems in aerospace engineering. The book gives
a systematically and almost self-contained description of the many
facets of envisaging, designing, implementing or experimentally
exploring predictive filtering for spacecraft control systems,
along with the adequate designs of integrated modeling, dynamics,
state estimation, and signal processing of spacecrafts and
nonlinear systems.
The new edition of Software Engineering presents a step-by-step
methodology that integrates Modeling and Design, UML, Patterns,
Test-Driven Development, Quality Assurance, Configuration
Management, and Agile Principles throughout the life cycle. The
overall approach is casual and easy to follow, with many practical
examples that show the theory at work. The author uses his
experiences as well as real-world stories to help the reader
understand software design principles, patterns, and other software
engineering concepts. The book also provides stimulating exercises
that go far beyond the type of question that can be answered by
simply copying portions of the text. The new edition of Software
Engineering is now available for the first time in McGraw Hill
Connect! Connect for this course features the MHeBook, Writing
Tool, Proctorio, and the Connect authoring tool that offers the
ability to create your own questions.
SECURITY AND PRIVACY VISION IN 6G Prepare for the future of mobile
communication with this comprehensive study 6G is the next frontier
in mobile communication, with development of 6G standards slated to
begin as early as 2026. As telecommunications networks become
faster and more intelligent, security and privacy concerns are
critical. In an increasingly connected world, there is an urgent
need for user data to be safeguarded and system security enhanced
against a new generation of threats. Security and Privacy Vision in
6G provides a comprehensive survey of these threats and the
emerging techniques for safeguarding against them. It includes
mechanisms for prediction, detection, mitigation, and prevention,
such that threats to privacy and security can be forestalled at any
stage. Fully engaged with proposed 6G architectures, it is an
essential resource for mobile communications professionals looking
for a head start on the technology of the future. Security and
Privacy Vision in 6G readers will also find: Detailed coverage of
topics including edge intelligence and cloudification, industrial
automation, collaborative robots, and more Treatment balancing the
practical and the theoretical An editorial team with decades of
international network technology experience in both industry and
academia Security and Privacy Vision in 6G is a vital reference for
network security professionals and for postgraduate and advanced
undergraduate students in mobile communications and network
security-related fields.
Advances in Delay-Tolerant Networks: Architecture and Enhanced
Performance, Second Edition provides an important overview of
delay-tolerant networks (DTNs) for researchers in electronics,
computer engineering, telecommunications and networking for those
in academia and R&D in industrial sectors. Part I reviews the
technology involved and the prospects for improving performance,
including different types of DTN and their applications, such as
satellite and deep-space communications and vehicular
communications. Part II focuses on how the technology can be
further improved, addressing topics, such as data bundling,
opportunistic routing, reliable data streaming, and the potential
for rapid selection and dissemination of urgent messages.
Opportunistic, delay-tolerant networks address the problem of
intermittent connectivity in a network where there are long delays
between sending and receiving messages, or there are periods of
disconnection.
Businesses have had to face many challenges due to the COVID-19
pandemic; to survive in the changing landscape, they had to adapt
quickly and implement new tactics and best practices to stay
competitive. Networking is one of the many areas that looks vastly
different in a post-pandemic world and companies must understand
this change or risk falling behind. Further study is required to
uncover the various difficulties and potential future directions of
networking and innovation within the business landscape. The
Handbook of Research on Digital Innovation and Networking in
Post-COVID-19 Organizations provides a thorough overview of the
ways in which organizations have had to change and adapt to the new
business environments and considers how networking looks different
in a post-COVID-19 world. Covering key topics such as
organizational structures, consumer behavior, teleworking, and
collaborations, this major reference work is ideal for managers,
business owners, industry professionals, policymakers, researchers,
scholars, academicians, practitioners, instructors, and students.
|
You may like...
Deep Biometrics
Richard Jiang, Chang-Tsun Li, …
Hardcover
R3,651
Discovery Miles 36 510
|