|
|
Books > Computing & IT > General theory of computing > General
The amalgamation of post-quantum cryptography in cyber-physical
systems makes the computing system secure and also generates
opportunities in areas like smart contracts, quantum blockchain,
and smart security solutions. Sooner or later, all computing and
security systems are going to adopt quantum-proof cryptography to
safeguard these systems from quantum attacks. Post-quantum
cryptography has tremendous potential in various domains and must
be researched and explored further to be utilized successfully.
Advancements in Quantum Blockchain With Real-Time Applications
considers various concepts of computing such as quantum computing,
post-quantum cryptography, quantum attack-resistant blockchain,
quantum blockchains, and multidisciplinary applications and
real-world use cases. The book also discusses solutions to various
real-world problems within the industry. Covering key topics such
as cybersecurity, data management, and smart society, this
reference work is ideal for computer scientists, industry
professionals, academicians, practitioners, scholars, researchers,
instructors, and students.
Advances in Mathematics for Industry 4.0 examines key tools,
techniques, strategies, and methods in engineering applications. By
covering the latest knowledge in technology for engineering design
and manufacture, chapters provide systematic and comprehensive
coverage of key drivers in rapid economic development. Written by
leading industry experts, chapter authors explore managing big data
in processing information and helping in decision-making, including
mathematical and optimization techniques for dealing with large
amounts of data in short periods.
As technology continues to develop, the healthcare industry must
adapt and implement new technologies and services. Recent
advancements, opportunities, and challenges for bio-medical image
processing and authentication in telemedicine must be considered to
ensure patients receive the best possible care. Advancements in
Bio-Medical Image Processing and Authentication in Telemedicine
introduces recent advancements, opportunities, and challenges for
bio-medical image processing and authentication in telemedicine and
discusses the design of high-accuracy decision support systems.
Covering key topics such as artificial intelligence, medical
imaging, telemedicine, and technology, this premier reference
source is ideal for medical professionals, nurses, policymakers,
researchers, scholars, academicians, practitioners, instructors,
and students.
Quantum technology has arrived as one of the most important new
topics of research, as it is the newest way to create computing
power, harness secure communications, and use sensitive measurement
methods that surpass the capabilities of modern supercomputers. If
successfully developed, quantum computers and technology will be
able to perform algorithms at impressively quick rates and solve
problems that were previously deemed impossible. This technology
will disrupt what is already known about computing and will be able
to reach new heights, speeds, and problem-solving capabilities not
yet seen. Beyond its inherent benefits comes the fact that quantum
technology will create improvements in many everyday gadgets as
well, spanning many industries. The Research Anthology on
Advancements in Quantum Technology presents the latest discoveries
in quantum technology itself along with providing its essential
uses, applications, and technologies that will impact computing in
modern times and far into the future. Along with this overview
comes a look at quantum technology in many different fields such as
healthcare, communications, aviation, automotive, forecasting, and
more. These industries will be looked at from the perspective of
data analytics, pattern matching, cryptography, algorithms, and
more. This book is essential for computer scientists, engineers,
professionals, researchers, students, and practitioners interested
in the latest information on quantum technology.
This book presents research on recent developments in collective
decision-making. With contributions from leading scholars from a
variety of disciplines, it provides an up-to-date overview of
applications in social choice theory, welfare economics, and
industrial organization. The contributions address, amongst others,
topics such as measuring power, the manipulability of collective
decisions, and experimental approaches. Applications range from
analysis of the complicated institutional rules of the European
Union to responsibility-based allocation of cartel
damages or the design of webpage rankings. With its
interdisciplinary focus, the book seeks to bridge the gap between
different disciplinary approaches by pointing to open questions
that can only be resolved through collaborative efforts.
This book serves as a guide to help the reader develop an awareness
of security vulnerabilities and attacks, and encourages them to be
circumspect when using the various computer resources and tools
available today. For experienced users, Computer Science Security
presents a wide range of tools to secure legacy software and
hardware. Computing has infiltrated all fields nowadays. No one can
escape this wave and be immune to security attacks, which continue
to evolve, gradually reducing the level of expertise needed by
hackers. It is high time for each and every user to acquire basic
knowledge of computer security, which would enable them to mitigate
the threats they may face both personally and professionally. It is
this combined expertise of individuals and organizations that will
guarantee a minimum level of security for families, schools, the
workplace and society in general.
The advent of connected, smart technologies for the built
environment may promise a significant value that has to be reached
to develop digital city models. At the international level, the
role of digital twin is strictly related to massive amounts of data
that need to be processed, which proposes several challenges in
terms of digital technologies capability, computing,
interoperability, simulation, calibration, and representation. In
these terms, the development of 3D parametric models as digital
twins to evaluate energy assessment of private and public buildings
is considered one of the main challenges of the last years. The
ability to gather, manage, and communicate contents related to
energy saving in buildings for the development of smart cities must
be considered a specificity in the age of connection to increase
citizen awareness of these fields. The Handbook of Research on
Developing Smart Cities Based on Digital Twins contains in-depth
research focused on the description of methods, processes, and
tools that can be adopted to achieve smart city goals. The book
presents a valid medium for disseminating innovative data
management methods related to smart city topics. While highlighting
topics such as data visualization, a web-based ICT platform, and
data-sharing methods, this book is ideally intended for researchers
in the building industry, energy, and computer science fields;
public administrators; building managers; and energy professionals
along with practitioners, stakeholders, researchers, academicians,
and students interested in the implementation of smart technologies
for the built environment.
Interest in big data has swelled within the scholarly community as
has increased attention to the internet of things (IoT). Algorithms
are constructed in order to parse and analyze all this data to
facilitate the exchange of information. However, big data has
suffered from problems in connectivity, scalability, and privacy
since its birth. The application of deep learning algorithms has
helped process those challenges and remains a major issue in
today's digital world. Advanced Deep Learning Applications in Big
Data Analytics is a pivotal reference source that aims to develop
new architecture and applications of deep learning algorithms in
big data and the IoT. Highlighting a wide range of topics such as
artificial intelligence, cloud computing, and neural networks, this
book is ideally designed for engineers, data analysts, data
scientists, IT specialists, programmers, marketers, entrepreneurs,
researchers, academicians, and students.
Most of our everyday life experiences are multisensory in nature;
that is, they consist of what we see, hear, feel, taste, smell, and
much more. Almost any experience you can think of, such as eating a
meal or going to the cinema, involves a magnificent sensory world.
In recent years, many of these experiences have been increasingly
transformed and capitalised on through advancements that adapt the
world around us - through technology, products, and services - to
suit our ever more computerised environment. Multisensory
Experiences: Where the senses meet technology looks at this trend
and offers a comprehensive introduction to the dynamic world of
multisensory experiences and design. It takes the reader from the
fundamentals of multisensory experiences, through the relationship
between the senses and technology, to finally what the future of
those experiences may look like, and our responsibility in it. This
book empowers you to shape your own and other people's experiences
by considering the multisensory worlds that we live in through a
journey that marries science and practice. It also shows how we can
take advantage of the senses and how they shape our experiences
through intelligent technological design.
The Internet of Medical Things (IoMT) allows clinicians to monitor
patients remotely via a network of wearable or implantable devices.
The devices are embedded with software or sensors to enable them to
send and receive data via the internet so that healthcare
professionals can monitor health data such as vital statistics,
metabolic rates or drug delivery regimens, and can provide advice
or treatment plans based on this real-world, real-time data. This
edited book discusses key IoT technologies that facilitate and
enhance this process, such as computer algorithms, network
architecture, wireless communications, and network security.
Providing a systemic review of trends, challenges and future
directions of IoMT technologies, the book examines applications
such as breast cancer monitoring systems, patient-centric systems
for handling, tracking and monitoring virus variants, and
video-based solutions for monitoring babies. The book discusses
machine learning techniques for the management of clinical data and
includes security issues such as the use of blockchain technology.
Written by a range of international researchers, this book is a
great resource for computer engineering researchers and
practitioners in the fields of data mining, machine learning,
artificial intelligence and the IoT in the healthcare sector.
Up-to-date coverage of every topic on the CEH v11 exam This
effective self-study guide covers 100% of the EC Council's
Certified Ethical Hacker Version 11 exam objectives. The book
discusses the latest ethical hacking tools, techniques, and
exploits. Readers will find learning objectives at the beginning of
each chapter, step-by-step exercises, exam tips, practice exam
questions, and in-depth explanations. An integrated test
preparation system based on proven pedagogy, CEH Certified Ethical
Hacker All-in-One Exam Guide, Fifth Edition covers all five phases
of ethical hacking: reconnaissance, gaining access, enumeration,
maintaining access, and covering tracks. Readers will learn about
malware, hacking Web applications and mobile platforms, cloud
computing vulnerabilities, and more. Designed to help candidates
pass the exam with ease, this authoritative resource also serves as
an essential on-the-job reference. Complete coverage of all CEH v11
exam objectives Includes online access to the Total Tester
customizable practice exam software containing 300 practice
questions Written by an experienced educator with more than 20
years of experience in the field
In order to study living organisms, scientists not only study them
at an overall macroscopic scale but also on a more detailed
microscopic scale. This observation, pushed to its limits, consists
of investigating the very center of each cell, where we find the
molecules that determine the way it functions: DNA
(deoxyribonucleic acid) and RNA (ribonucleic acid). In an organism,
DNA carries the genetic information, which is called the genome. It
is represented as four-letter sequences using the letters A, C, G
and T; based on these sequences, computer methods described in this
book can answer fundamental questions in bioinformatics. This book
explores how to quickly find sequences of a few hundred nucleotides
within a genome that may be made up of several billion, how to
compare those sequences and how to reconstruct the complete
sequence of a genome. It also discusses the problems of identifying
bacteria in a given environment and predicting the structure of RNA
based on its sequence.
Advances in Computers carries on a tradition of excellence,
presenting detailed coverage of innovations in computer hardware,
software, theory, design, and applications. The book provides
contributors with a medium in which they can explore their subjects
in greater depth and breadth than journal articles typically allow.
The articles included in this book will become standard references,
with lasting value in this rapidly expanding field.
|
|