|
|
Books > Computing & IT
Handbook of Research on Blockchain Technology presents the latest
information on the adaptation and implementation of Blockchain
technologies in real world business, scientific, healthcare and
biomedical applications. The book's editors present the rapid
advancements in existing business models by applying Blockchain
techniques. Novel architectural solutions in the deployment of
Blockchain comprise the core aspects of this book. Several use
cases with IoT, biomedical engineering, and smart cities are also
incorporated. As Blockchain is a relatively new technology that
exploits decentralized networks and is used in many sectors for
reliable, cost-effective and rapid business transactions, this book
is a welcomed addition on existing knowledge. Financial services,
retail, insurance, logistics, supply chain, public sectors and
biomedical industries are now investing in Blockchain research and
technologies for their business growth. Blockchain prevents double
spending in financial transactions without the need of a trusted
authority or central server. It is a decentralized ledger platform
that facilitates verifiable transactions between parties in a
secure and smart way.
The application of artificial intelligence technology to 5G
wireless communications is now appropriate to address the design of
optimized physical layers, complicated decision-making, network
management, and resource optimization tasks within networks. In
exploring 5G wireless technologies and communication systems,
artificial intelligence is a powerful tool and a research topic
with numerous potential fields of application that require further
study. Applications of Artificial Intelligence in Wireless
Communication Systems explores the applications of artificial
intelligence for the optimization of wireless communication
systems, including channel models, channel state estimation,
beamforming, codebook design, signal processing, and more. Covering
key topics such as neural networks, deep learning, and wireless
systems, this reference work is ideal for computer scientists,
industry professionals, researchers, academicians, scholars,
practitioners, instructors, and students.
Due to the growing prevalence of artificial intelligence
technologies, schools, museums, and art galleries will need to
change traditional ways of working and conventional thought
processes to fully embrace their potential. Integrating virtual and
augmented reality technologies and wearable devices into these
fields can promote higher engagement in an increasingly digital
world. Virtual and Augmented Reality in Education, Art, and Museums
is an essential research book that explores the strategic role and
use of virtual and augmented reality in shaping visitor experiences
at art galleries and museums and their ability to enhance
education. Highlighting a range of topics such as online learning,
digital heritage, and gaming, this book is ideal for museum
directors, tour developers, educational software designers, 3D
artists, designers, curators, preservationists, conservationists,
education coordinators, academicians, researchers, and students.
In the computer science industry, high levels of performance remain
the focal point in software engineering. This quest has made
current systems exceedingly complex, as practitioners strive to
discover novel approaches to increase the capabilities of modern
computer structures. A prevalent area of research in recent years
is scalable transaction processing and its usage in large databases
and cloud computing. Despite its popularity, there remains a need
for significant research in the understanding of scalability and
its performance within distributed databases. Handling Priority
Inversion in Time-Constrained Distributed Databases provides
emerging research exploring the theoretical and practical aspects
of database transaction processing frameworks and improving their
performance using modern technologies and algorithms. Featuring
coverage on a broad range of topics such as consistency mechanisms,
real-time systems, and replica management, this book is ideally
designed for IT professionals, computing specialists, developers,
researchers, data engineers, executives, academics, and students
seeking research on current trends and developments in distributed
computing and databases.
The Digital Twin Paradigm for Smarter Systems and Environments: The
Industry Use Cases, Volume 117, the latest volume in the Advances
in Computers series, presents detailed coverage of new advancements
in computer hardware, software, theory, design and applications.
Chapters vividly illustrate how the emerging discipline of digital
twin is strategically contributing to various digital
transformation initiatives. Specific chapters cover Demystifying
the Digital Twin Paradigm, Digital Twin Technology for "Smarter
Manufacturing", The Fog Computing/ Edge Computing to leverage
Digital Twin, The industry use cases for the Digital Twin idea,
Enabling Digital Twin at the Edge, The Industrial Internet of
Things (IIOT), and much more.
Cybersecurity has been gaining serious attention and recently has
become an important topic of concern for organizations, government
institutions, and largely for people interacting with digital
online systems. As many individual and organizational activities
continue to grow and are conducted in the digital environment, new
vulnerabilities have arisen which have led to cybersecurity
threats. The nature, source, reasons, and sophistication for
cyberattacks are not clearly known or understood, and many times
invisible cyber attackers are never traced or can never be found.
Cyberattacks can only be known once the attack and the destruction
have already taken place long after the attackers have left.
Cybersecurity for computer systems has increasingly become
important because the government, military, corporate, financial,
critical infrastructure, and medical organizations rely heavily on
digital network systems, which process and store large volumes of
data on computer devices that are exchanged on the internet, and
they are vulnerable to ""continuous"" cyberattacks. As
cybersecurity has become a global concern, it needs to be clearly
understood, and innovative solutions are required. Advancing
Cybersecurity for Digital Transformation: Opportunities and
Challenges looks deeper into issues, problems, and innovative
solutions and strategies that are linked to cybersecurity. This
book will provide important knowledge that can impact the
improvement of cybersecurity, which can add value in terms of
innovation to solving cybersecurity threats. The chapters cover
cybersecurity challenges, technologies, and solutions in the
context of different industries and different types of threats.
This book is ideal for cybersecurity researchers, professionals,
scientists, scholars, and managers, as well as practitioners,
stakeholders, researchers, academicians, and students interested in
the latest advancements in cybersecurity for digital
transformation.
Many processes in nature arise from the interaction of periodic
phenomena with random phenomena. The results are processes that are
not periodic, but whose statistical functions are periodic
functions of time. These processes are called cyclostationary and
are an appropriate mathematical model for signals encountered in
many fields including communications, radar, sonar, telemetry,
acoustics, mechanics, econometrics, astronomy, and biology.
Cyclostationary Processes and Time Series: Theory, Applications,
and Generalizations addresses these issues and includes the
following key features.
Software engineering has surfaced as an industrial field that is
continually evolving due to the emergence of advancing technologies
and innovative methodologies. Scrum is the most recent revolution
that is transforming traditional software procedures, which has
researchers and practitioners scrambling to find the best
techniques for implementation. The continued development of this
agile process requires an extensive level of research on up-to-date
findings and applicable practices. Agile Scrum Implementation and
Its Long-Term Impact on Organizations is a collection of innovative
research on the methods and applications of scrum practices in
developing agile software systems. The book combines perspectives
from both the academic and professional communities as the
challenges and solutions expressed by each group can create a
better understanding of how practice must be applied in the real
world of software development. While highlighting topics including
scrum adoption, iterative deployment, and human impacts, this book
is ideally designed for researchers, developers, engineers,
practitioners, academicians, programmers, students, and educators
seeking current research on practical improvements in agile
software progression using scrum methodologies.
Handbook of Medical Image Computing and Computer Assisted
Intervention presents important advanced methods and state-of-the
art research in medical image computing and computer assisted
intervention, providing a comprehensive reference on current
technical approaches and solutions, while also offering proven
algorithms for a variety of essential medical imaging applications.
This book is written primarily for university researchers, graduate
students and professional practitioners (assuming an elementary
level of linear algebra, probability and statistics, and signal
processing) working on medical image computing and computer
assisted intervention.
In recent years, falsification and digital modification of video
clips, images, as well as textual contents have become widespread
and numerous, especially when deepfake technologies are adopted in
many sources. Due to adopted deepfake techniques, a lot of content
currently cannot be recognized from its original sources. As a
result, the field of study previously devoted to general multimedia
forensics has been revived. The Handbook of Research on Advanced
Practical Approaches to Deepfake Detection and Applications
discusses the recent techniques and applications of illustration,
generation, and detection of deepfake content in multimedia. It
introduces the techniques and gives an overview of deepfake
applications, types of deepfakes, the algorithms and applications
used in deepfakes, recent challenges and problems, and practical
applications to identify, generate, and detect deepfakes. Covering
topics such as anomaly detection, intrusion detection, and security
enhancement, this major reference work is a comprehensive resource
for cyber security specialists, government officials, law
enforcement, business leaders, students and faculty of higher
education, librarians, researchers, and academicians.
Phishing is one of the most widely-perpetrated forms of cyber
attack, used to gather sensitive information such as credit card
numbers, bank account numbers, and user logins and passwords, as
well as other information entered via a web site. The authors of A
Machine-Learning Approach to Phishing Detetion and Defense have
conducted research to demonstrate how a machine learning algorithm
can be used as an effective and efficient tool in detecting
phishing websites and designating them as information security
threats. This methodology can prove useful to a wide variety of
businesses and organizations who are seeking solutions to this
long-standing threat. A Machine-Learning Approach to Phishing
Detetion and Defense also provides information security researchers
with a starting point for leveraging the machine algorithm approach
as a solution to other information security threats.
The transition towards exascale computing has resulted in major
transformations in computing paradigms. The need to analyze and
respond to such large amounts of data sets has led to the adoption
of machine learning (ML) and deep learning (DL) methods in a wide
range of applications. One of the major challenges is the fetching
of data from computing memory and writing it back without
experiencing a memory-wall bottleneck. To address such concerns,
in-memory computing (IMC) and supporting frameworks have been
introduced. In-memory computing methods have ultra-low power and
high-density embedded storage. Resistive Random-Access Memory
(ReRAM) technology seems the most promising IMC solution due to its
minimized leakage power, reduced power consumption and smaller
hardware footprint, as well as its compatibility with CMOS
technology, which is widely used in industry. In this book, the
authors introduce ReRAM techniques for performing distributed
computing using IMC accelerators, present ReRAM-based IMC
architectures that can perform computations of ML and
data-intensive applications, as well as strategies to map ML
designs onto hardware accelerators. The book serves as a bridge
between researchers in the computing domain (algorithm designers
for ML and DL) and computing hardware designers.
|
|