|
|
Books > Computing & IT > General theory of computing
The amalgamation of post-quantum cryptography in cyber-physical
systems makes the computing system secure and also generates
opportunities in areas like smart contracts, quantum blockchain,
and smart security solutions. Sooner or later, all computing and
security systems are going to adopt quantum-proof cryptography to
safeguard these systems from quantum attacks. Post-quantum
cryptography has tremendous potential in various domains and must
be researched and explored further to be utilized successfully.
Advancements in Quantum Blockchain With Real-Time Applications
considers various concepts of computing such as quantum computing,
post-quantum cryptography, quantum attack-resistant blockchain,
quantum blockchains, and multidisciplinary applications and
real-world use cases. The book also discusses solutions to various
real-world problems within the industry. Covering key topics such
as cybersecurity, data management, and smart society, this
reference work is ideal for computer scientists, industry
professionals, academicians, practitioners, scholars, researchers,
instructors, and students.
Structured Light for Optical Communication highlights principles
and applications in the rapidly evolving field of structured light
in wide-ranging contexts, from classical forms of communication to
new frontiers of quantum communication. Besides the basic
principles and applications, the book covers the background of
structured light in its most common forms, as well as
state-of-the-art developments. Structured light has been hailed as
affording outstanding prospects for the realization of high
bandwidth communication, enhanced tools for more highly secure
cryptography, and exciting opportunities for providing a reliable
platform for quantum computing. This book is a valuable resource
for graduate students and other active researchers, as well as
others who may be interested in learning about this cutting-edge
research field.
Quantum technology has arrived as one of the most important new
topics of research, as it is the newest way to create computing
power, harness secure communications, and use sensitive measurement
methods that surpass the capabilities of modern supercomputers. If
successfully developed, quantum computers and technology will be
able to perform algorithms at impressively quick rates and solve
problems that were previously deemed impossible. This technology
will disrupt what is already known about computing and will be able
to reach new heights, speeds, and problem-solving capabilities not
yet seen. Beyond its inherent benefits comes the fact that quantum
technology will create improvements in many everyday gadgets as
well, spanning many industries. The Research Anthology on
Advancements in Quantum Technology presents the latest discoveries
in quantum technology itself along with providing its essential
uses, applications, and technologies that will impact computing in
modern times and far into the future. Along with this overview
comes a look at quantum technology in many different fields such as
healthcare, communications, aviation, automotive, forecasting, and
more. These industries will be looked at from the perspective of
data analytics, pattern matching, cryptography, algorithms, and
more. This book is essential for computer scientists, engineers,
professionals, researchers, students, and practitioners interested
in the latest information on quantum technology.
Due to the ubiquity of social media and digital information, the
use of digital images in today's digitized marketplace is
continuously rising throughout enterprises. Organizations that want
to offer their content through the internet confront plenty of
security concerns, including copyright violation. Advanced
solutions for the security and privacy of digital data are
continually being developed, yet there is a lack of current
research in this area. The Handbook of Research on Multimedia
Forensics and Content Integrity features a collection of innovative
research on the approaches and applications of current techniques
for the privacy and security of multimedia and their secure
transportation. It provides relevant theoretical frameworks and the
latest empirical research findings in the area of multimedia
forensics and content integrity. Covering topics such as 3D data
security, copyright protection, and watermarking, this major
reference work is a comprehensive resource for security analysts,
programmers, technology developers, IT professionals, students and
educators of higher education, librarians, researchers, and
academicians.
This book serves as a guide to help the reader develop an awareness
of security vulnerabilities and attacks, and encourages them to be
circumspect when using the various computer resources and tools
available today. For experienced users, Computer Science Security
presents a wide range of tools to secure legacy software and
hardware. Computing has infiltrated all fields nowadays. No one can
escape this wave and be immune to security attacks, which continue
to evolve, gradually reducing the level of expertise needed by
hackers. It is high time for each and every user to acquire basic
knowledge of computer security, which would enable them to mitigate
the threats they may face both personally and professionally. It is
this combined expertise of individuals and organizations that will
guarantee a minimum level of security for families, schools, the
workplace and society in general.
The advent of the emerging fifth generation (5G) networks has
changed the paradigm of how computing, electronics, and electrical
(CEE) systems are interconnected. CEE devices and systems, with the
help of the 5G technology, can now be seamlessly linked in a way
that is rapidly turning the globe into a digital world. Smart
cities and internet of things have come to stay but not without
some challenges, which must be discussed. The Handbook of Research
on 5G Networks and Advancements in Computing, Electronics, and
Electrical Engineering focuses on current technological innovations
as the world rapidly heads towards becoming a global smart city. It
covers important topics such as power systems, electrical
engineering, mobile communications, network, security, and more.
This book examines vast types of technologies and their roles in
society with a focus on how each works, the impacts it has, and the
future for developing a global smart city. This book is ideal for
both industrial and academic researchers, scientists, engineers,
educators, practitioners, developers, policymakers, scholars, and
students interested in 5G technology and the future of engineering,
computing, and technology in human society.
Semantic computing is critical for the development of semantic
systems and applications that must utilize semantic analysis,
semantic description, semantic interfaces, and semantic integration
of data and services to deliver their objectives. Semantic
computing has enormous capabilities to enhance the efficiency and
throughput of systems that are based on key emerging concepts and
technologies such as semantic web, internet of things, blockchain
technology, and knowledge graphs. Thus, research that expounds
advanced concepts, methods, technologies, and applications of
semantic computing for solving challenges in real-world domains is
vital. Advanced Concepts, Methods, and Applications in Semantic
Computing is a scholarly reference book that provides a sound
theoretical foundation for the application of semantic methods,
concepts, and technologies for practical problem solving. It is
designed as a comprehensive and reliable resource on how
semantic-oriented approaches can be used to aid new emergent
technologies and tackle real-world problems. Covering topics that
include deep learning, machine learning, blockchain technology, and
semantic web services, this book is ideal for professionals,
academicians, researchers, and students working in the field of
semantic computing in various disciplines, including but not
limited to software engineering, systems engineering, knowledge
engineering, electronic commerce, computer science, and information
technology.
Most of our everyday life experiences are multisensory in nature;
that is, they consist of what we see, hear, feel, taste, smell, and
much more. Almost any experience you can think of, such as eating a
meal or going to the cinema, involves a magnificent sensory world.
In recent years, many of these experiences have been increasingly
transformed and capitalised on through advancements that adapt the
world around us - through technology, products, and services - to
suit our ever more computerised environment. Multisensory
Experiences: Where the senses meet technology looks at this trend
and offers a comprehensive introduction to the dynamic world of
multisensory experiences and design. It takes the reader from the
fundamentals of multisensory experiences, through the relationship
between the senses and technology, to finally what the future of
those experiences may look like, and our responsibility in it. This
book empowers you to shape your own and other people's experiences
by considering the multisensory worlds that we live in through a
journey that marries science and practice. It also shows how we can
take advantage of the senses and how they shape our experiences
through intelligent technological design.
The Definitive Guide to Arm (R) Cortex (R)-M23 and Cortex-M33
Processors focuses on the Armv8-M architecture and the features
that are available in the Cortex-M23 and Cortex- M33 processors.
This book covers a range of topics, including the instruction set,
the programmer's model, interrupt handling, OS support, and debug
features. It demonstrates how to create software for the Cortex-M23
and Cortex-M33 processors by way of a range of examples, which will
enable embedded software developers to understand the Armv8-M
architecture. This book also covers the TrustZone (R) technology in
detail, including how it benefits security in IoT applications, its
operations, how the technology affects the processor's hardware
(e.g., memory architecture, interrupt handling, etc.), and various
other considerations in creating secure software.
In order to study living organisms, scientists not only study them
at an overall macroscopic scale but also on a more detailed
microscopic scale. This observation, pushed to its limits, consists
of investigating the very center of each cell, where we find the
molecules that determine the way it functions: DNA
(deoxyribonucleic acid) and RNA (ribonucleic acid). In an organism,
DNA carries the genetic information, which is called the genome. It
is represented as four-letter sequences using the letters A, C, G
and T; based on these sequences, computer methods described in this
book can answer fundamental questions in bioinformatics. This book
explores how to quickly find sequences of a few hundred nucleotides
within a genome that may be made up of several billion, how to
compare those sequences and how to reconstruct the complete
sequence of a genome. It also discusses the problems of identifying
bacteria in a given environment and predicting the structure of RNA
based on its sequence.
|
|