|
|
Books > Computing & IT
Businesses have had to face many challenges due to the COVID-19
pandemic; to survive in the changing landscape, they had to adapt
quickly and implement new tactics and best practices to stay
competitive. Networking is one of the many areas that looks vastly
different in a post-pandemic world and companies must understand
this change or risk falling behind. Further study is required to
uncover the various difficulties and potential future directions of
networking and innovation within the business landscape. The
Handbook of Research on Digital Innovation and Networking in
Post-COVID-19 Organizations provides a thorough overview of the
ways in which organizations have had to change and adapt to the new
business environments and considers how networking looks different
in a post-COVID-19 world. Covering key topics such as
organizational structures, consumer behavior, teleworking, and
collaborations, this major reference work is ideal for managers,
business owners, industry professionals, policymakers, researchers,
scholars, academicians, practitioners, instructors, and students.
The term gender is a buzz word among rural development
professionals now days. Gender mainstreaming finds its way into
various plans and programmes erected by national as well as state
government. Many organizations made the gender related training
programmes compulsory in their training agenda. The research
scholars need the secondary data for forming the base for gender
related studies. Keeping this in mind the authors have tried to put
forth some related literature from various notes and references to
formulate a book on gender mainstreaming in farm sector. 1. Status
of Farm Women and Empowerment 2. Gender Issues in Agriculture 3.
Mainstreaming Gender Through SHG 4. Rural Women and Empowerment
Intelligence-Based Cardiology and Cardiac Surgery: Artificial
Intelligence and Human Cognition in Cardiovascular Medicine
provides a comprehensive survey of artificial intelligence concepts
and methodologies with real-life applications in cardiovascular
medicine. Authored by a senior physician-data scientist, the book
presents an intellectual and academic interface between the medical
and data science domains. The book's content consists of basic
concepts of artificial intelligence and human cognition
applications in cardiology and cardiac surgery. This portfolio
ranges from big data, machine and deep learning, cognitive
computing and natural language processing in cardiac disease states
such as heart failure, hypertension and pediatric heart care. The
book narrows the knowledge and expertise chasm between the data
scientists, cardiologists and cardiac surgeons, inspiring
clinicians to embrace artificial intelligence methodologies,
educate data scientists about the medical ecosystem, and create a
transformational paradigm for healthcare and medicine.
Advances in Imaging and Electron Physics, Volume 211, merges two
long-running serials, Advances in Electronics and Electron Physics
and Advances in Optical and Electron Microscopy. The series
features extended articles on the physics of electron devices
(especially semiconductor devices), particle optics at high and low
energies, microlithography, image science, digital image
processing, electromagnetic wave propagation, electron microscopy
and the computing methods used in all these domains.
Securing Delay-Tolerant Networks with BPSec One-stop reference on
how to secure a Delay-Tolerant Network (DTN), written by
experienced industry insiders Securing Delay-Tolerant Networks with
BPSec answers the question, "How can delay-tolerant networks be
secured when operating in environments that would otherwise break
many of the common security approaches used on the terrestrial
Internet today?" The text is composed of three sections: (1)
security considerations for delay-tolerant networks, (2) the
design, implementation, and customization of the BPSec protocol,
and (3) how this protocol can be applied, combined with other
security protocols, and deployed in emerging network environments.
The text includes pragmatic considerations for deploying BPSec in
both regular and delay-tolerant networks. It also features a
tutorial on how to achieve several important security outcomes with
a combination of security protocols, BPSec included. Overall, it
covers best practices for common security functions, clearly
showing designers how to prevent network architecture from being
over-constrained by traditional security approaches. Written by the
lead author and originator of the BPSec protocol specification,
Securing Delay-Tolerant Networks (DTNs) with BPSec includes
information on: The gap between cryptography and network security,
how security requirements constrain network architectures, and why
we need something different DTN stressing conditions, covering
intermittent connectivity, congested paths, partitioned topologies,
limited link state, and multiple administrative controls Securing
the terrestrial internet, involving a layered approach to security,
the impact of protocol design on security services, and securing
the internetworking and transport layers A delay-tolerant security
architecture, including desirable properties of a DTN secure
protocol, fine-grained security services, and protocol augmentation
Securing Delay-Tolerant Networks (DTNs) with BPSec is a one-stop
reference on the subject for any professional operationally
deploying BP who must use BPSec for its security, including
software technical leads, software developers, space flight mission
leaders, network operators, and technology and product development
leaders in general.
The edited book has been prepared through collection of precious
research articles from eminent Extension scientists, which have
contributed papers on Institutional arrangements for technology
delivery, innovative Extension approaches, break through
methodologies in Extension research, the reach and effectiveness of
ICT tools in technology delivery, youth and gender inclusive
extension strategies and Extension strategies for changing scenario
of Agriculture. Papers in this book would definitely make an impact
among Extension scientists and post graduate scholars of Extension
in Agriculture, Veterinary and Fishery Sciences.The inputs that
this book offers will be of much helpful to the researchers,
administrators and policy makers. From the research findings of the
selected research papers of this book, the Extension researchers
can sharpen their future research strategies, the Extension
administrators and policy makers in the Government can get to know
about the impact and constraints of several institutional
mechanisms of technology delivery which will facilitate them in
evidence based policy making.
More individuals than ever are utilizing internet technologies to
work from home, teach and learn, shop, interact with peers, review
medical records, and more. While it is certainly convenient to
conduct such tasks via the internet, this increased internet
presence has also led to a rise in the search and availability of
personal information, which in turn is resulting in more
cyber-attacks, privacy breaches, and information leaks. Cyber
criminals are using such opportunities to attack governments,
organizations, and individuals, making it necessary to anticipate,
assess, and mitigate privacy and security threats during this
infodemic. The Handbook of Research on Technical, Privacy, and
Security Challenges in a Modern World discusses the design and
development of different machine learning systems, including next
generation applications, in order to mitigate cyber-attacks and
address security challenges in everyday technologies. It further
explores select methods and algorithms of learning for implementing
better security methods in fields such as business and healthcare.
It recognizes the future of privacy and the importance of
preserving data through recommended practice, feedback loops, and
smart agents. Covering topics such as face mask detection, gesture
recognition, and botnet attacks and detection, this major reference
work is a dynamic resource for medical professionals, healthcare
administrators, government officials, business executives and
managers, IT managers, students and faculty of higher education,
librarians, researchers, and academicians.
With new technologies, such as computer vision, internet of things,
mobile computing, e-governance and e-commerce, and wide
applications of social media, organizations generate a huge volume
of data and at a much faster rate than several years ago. Big data
in large-/small-scale systems, characterized by high volume,
diversity, and velocity, increasingly drives decision making and is
changing the landscape of business intelligence. From governments
to private organizations, from communities to individuals, all
areas are being affected by this shift. There is a high demand for
big data analytics that offer insights for computing efficiency,
knowledge discovery, problem solving, and event prediction. To
handle this demand and this increase in big data, there needs to be
research on innovative and optimized machine learning algorithms in
both large- and small-scale systems. Applications of Big Data in
Large- and Small-Scale Systems includes state-of-the-art research
findings on the latest development, up-to-date issues, and
challenges in the field of big data and presents the latest
innovative and intelligent applications related to big data. This
book encompasses big data in various multidisciplinary fields from
the medical field to agriculture, business research, and smart
cities. While highlighting topics including machine learning, cloud
computing, data visualization, and more, this book is a valuable
reference tool for computer scientists, data scientists and
analysts, engineers, practitioners, stakeholders, researchers,
academicians, and students interested in the versatile and
innovative use of big data in both large-scale and small-scale
systems.
|
|