|
Books > Computing & IT > Internet
This book features research presented and discussed during the
Research & Innovation Forum (Rii Forum) 2020. As such, this
book offers a unique insight into emerging topics, issues and
developments pertinent to the fields of technology, innovation and
education and their social impact. Papers included in this book
apply inter- and multi-disciplinary approaches to query such issues
as technology-enhanced teaching and learning, smart cities,
information systems, cognitive computing and social networking.
What brings these threads of the discussion together is the
question of how advances in computer science - which are otherwise
largely incomprehensible to researchers from other fields - can be
effectively translated and capitalized on so as to make them
beneficial for society as a whole. In this context, Rii Forum and
Rii Forum proceedings offer an essential venue where diverse
stakeholders, including academics, the think tank sector and
decision-makers, can engage in a meaningful dialogue with a view to
improving the applicability of advances in computer science.
Over one million people write political blogs, yet a select few
wield enormous power within the political blogosphere and over
politics in general. Known as the "political blogging A-list",
these bloggers command the majority of blogging traffic; set the
agenda for the rest of the political blogosphere; and have a strong
influence on politics, whether it is directly through blogging, or
indirectly through influencing mainstream news media. In Making it
in the Political Blogosphere, Tanni Haas profiles and interviews
twenty of the world's top political bloggers, who share the secrets
of their success. Despite the partisan nature of blogging, in which
Liberals, Conservatives and Libertarians share the same space, the
twenty bloggers are in surprising agreement about what makes a
successful blogger. In securing access to the political blogging
A-list, Haas has provided us with an entertaining sequence of
interviews, which are invaluable to any aspiring political blogger.
This book studies the vulnerability of wireless communications
under line-of-sight (LoS) and non-LoS correlated fading
environments. The authors theoretically and practically provide
physical layer security analyses for several technologies and
networks such as Fifth-Generation (5G) networks, Internet of Things
(IoT) applications, and Non-orthogonal multiple access (NOMA). The
authors have provided these under various practical scenarios, and
developed theoretical aspects to validate their proposed
applications. Presents physical layer security (PLS) under
correlated fading environments, 5G wireless networks, and NOMA
networks; Provides end-to-end analyses, combination of channel
correlation and outdated CSI and their effects on PL; Includes
contributions of PLS research written by global experts in academia
and industry.
Smart Homes (SH) offer a promising approach to assisted living for
the ageing population. Yet the main obstacle to the rapid
development and deployment of Smart Home (SH) solutions essentially
arises from the nature of the SH field, which is multidisciplinary
and involves diverse applications and various stakeholders.
Accordingly, an alternative to a one-size-fits-all approach is
needed in order to advance the state of the art towards an open SH
infrastructure. This book makes a valuable and critical
contribution to smart assisted living research through the
development of new effective, integrated, and interoperable SH
solutions. It focuses on four underlying aspects: (1) Sensing and
Monitoring Technologies; (2) Context Interference and Behaviour
Analysis; (3) Personalisation and Adaptive Interaction, and (4)
Open Smart Home and Service Infrastructures, demonstrating how
fundamental theories, models and algorithms can be exploited to
solve real-world problems. This comprehensive and timely book
offers a unique and essential reference guide for policymakers,
funding bodies, researchers, technology developers and managers,
end users, carers, clinicians, healthcare service providers,
educators and students, helping them adopt and implement smart
assisted living systems.
To develop and sustain competitive advantage in the marketplace,
organizations depend critically on competence and resources,
knowledge and information exchanged both within and across partner
organizations, and on process integration and management.
""Semantic Web Technologies and E-Business: Toward the Integrated
Virtual Organization and Business Process Automation"" presents
research related to the application of semantic Web technologies,
including semantic service-oriented architecture, semantic content
management, and semantic knowledge sharing in e-business processes.
""Semantic Web Technologies and E-Business: Toward the Integrated
Virtual Organization and Business Process Automation"" compiles
research from experts around the globe, bringing business,
managerial, technological, and implementation issues surrounding
the application of semantic Web technologies in e-business to the
forefront.
Access to government information faces many roadblocks in
developing and emerging economies due to lack of appropriate legal
frameworks and other requisite information laws. However, there is
hope that many countries are now recognizing the importance of
providing access to public information resources. Digital Access
and E-Government: Perspectives from Developing and Emerging
Countries explores the relationships that exist between access to
information laws and e-government. It shares the strategies used in
encouraging access to information in a variety of jurisdictions and
environments, to be of use to e-government designers and
practitioners, policymakers, and university professors.
This book provides the reader with the most up-to-date knowledge of
blockchain in mainstream areas of security, trust, and privacy in
the decentralized domain, which is timely and essential (this is
due to the fact that the distributed and P2P applications is
increasing day-by-day, and the attackers adopt new mechanisms to
threaten the security and privacy of the users in those
environments). This book also provides the technical information
regarding blockchain-oriented software, applications, and tools
required for the researcher and developer experts in both computing
and software engineering to provide solutions and automated systems
against current security, trust and privacy issues in the
cyberspace. Cybersecurity, trust and privacy (CTP) are pressing
needs for governments, businesses, and individuals, receiving the
utmost priority for enforcement and improvement in almost any
societies around the globe. Rapid advances, on the other hand, are
being made in emerging blockchain technology with broadly diverse
applications that promise to better meet business and individual
needs. Blockchain as a promising infrastructural technology seems
to have the potential to be leveraged in different aspects of
cybersecurity promoting decentralized cyberinfrastructure.
Blockchain characteristics such as decentralization, verifiability
and immutability may revolve current cybersecurity mechanisms for
ensuring the authenticity, reliability, and integrity of data.
Almost any article on the blockchain points out that the
cybersecurity (and its derivatives) could be revitalized if it is
supported by blockchain technology. Yet, little is known about
factors related to decisions to adopt this technology, and how it
can systemically be put into use to remedy current CTP's issues in
the digital world. Topics of interest for this book include but not
limited to: Blockchain-based authentication, authorization and
accounting mechanisms Applications of blockchain technologies in
digital forensic and threat hunting Blockchain-based threat
intelligence and threat analytics techniques Formal specification
of smart contracts Automated tools for outsmarting smart contracts
Security and privacy aspects of blockchain technologies
Vulnerabilities of smart contracts Blockchain for securing cyber
infrastructure and internet of things networks Blockchain-based
cybersecurity education systems This book provides information for
security and privacy experts in all the areas of blockchain,
cryptocurrency, cybersecurity, forensics, smart contracts, computer
systems, computer networks, software engineering, applied
artificial intelligence for computer security experts, big data
analysts, and decentralized systems. Researchers, scientists and
advanced level students working in computer systems, computer
networks, artificial intelligence, big data will find this book
useful as well.
Social media is arguably one of the most powerful
technology-enabled innovations since the Internet itself. This
single-volume book provides a broad and easily understandable
discussion of the evolution of social media; related problems and
controversies, especially for youth; key people and organizations;
and useful social media data. Social media is an integral part of
people's lives. More than half of the world's 2.4 billion Internet
users sign in to a social network regularly-a figure that continues
to grow. More than half of online adults now use two or more social
media sites; 71 percent of Internet users are on Facebook. This
book surveys the history of social media, addresses the power of
social media for positive change, describes the problems and
controversies social media have caused, and suggests potential
solutions to these issues. Geared toward students and general
readers, this accessibly written book covers such topics as the
link between social media and body image, the psychological affects
of social media use, online conversations about sexual assault,
corporate use of social media data, political campaigning through
social media, fan tweeting during television shows, and crisis
communication through social media. Readers will also gain insights
into the range of serious problems related to social media,
including privacy concerns, social media addiction, social media
hoaxes and scams, the pressure to project an ideal self, the
curation of content presented on social media, cyberbullying,
sexting, Facebook depression and envy, online shaming, and the
impact of social media use on communication skills. Provides
readers with a clearly written overview of the impacts of social
media worldwide that highlights key people and companies in the
development of social media Presents up-to-date information on the
range of problems related to social media and presents potential
solutions Offers a variety of voices from social media experts,
supplying perspectives from creators to users
Fog computing is rapidly expanding in its applications and
capabilities through various parts of society. Utilizing different
types of virtualization technologies can push this branch of
computing to even greater heights. Fog Computing: Breakthroughs in
Research and Practice contains a compendium of the latest academic
material on the evolving theory and practice related to fog
computing. Including innovative studies on distributed fog
computing environments, programming models, and access control
mechanisms, this publication is an ideal source for programmers, IT
professionals, students, researchers, and engineers.
Medical internet of things (IoT)-based applications are being
utilized in several industries and have been shown to provide
significant advantages to users in critical health applications.
Artificial intelligence (AI) plays a key role in the growth and
success of medical IoT applications and IoT devices in the medical
sector. To enhance revenue, improve competitive advantage, and
increase consumer engagement, the use of AI with medical IoT should
be encouraged in the healthcare and medical arena. Revolutionizing
Healthcare Through Artificial Intelligence and Internet of Things
Applications provides greater knowledge of how AI affects
healthcare and medical efficacy in order to improve outputs. It
focuses on a thorough and comprehensive introduction to machine
learning. Covering topics such as patient treatment, cyber-physical
systems, and telemedicine, this premier reference source is a
dynamic resource for hospital administrators, medical
professionals, government officials, students and faculty of higher
education, librarians, researchers, and academicians.
The massive volume of data that some medical and biological
applications generate require special processing resources that
guarantee privacy and security, creating a crucial need for cluster
and grid computing. Biomedical Diagnostics and Clinical
Technologies: Applying High-Performance Cluster and Grid Computing
disseminates knowledge regarding high performance computing for
medical applications and bioinformatics. Containing a defining body
of research on the subject, this critical reference source includes
a valuable collection of cutting-edge research chapters for those
working in the broad field of medical informatics and
bioinformatics.
The Internet of Things has become a major influence on the
development of new technologies and innovations. When combined with
smart services, the end-user experience can be significantly
enhanced. Novel Design and the Applications of Smart-M3 Platforms
in the Internet of Things: Emerging Research and Opportunities
provides an innovative outlook on the development of open source
technology for the creation of smart spaces and services. Including
a range of relevant topics such as interoperability, system
architecture, and information processing, this book is an ideal
reference source for academics, researchers, graduate students, and
practitioners interested in the latest advancements in the Internet
of things.
|
Artificial Intelligence Applications and Innovations. AIAI 2021 IFIP WG 12.5 International Workshops
- 5G-PINE 2021, AI-BIO 2021, DAAI 2021, DARE 2021, EEAI 2021, and MHDW 2021, Hersonissos, Crete, Greece, June 25-27, 2021, Proceedings
(Hardcover, 1st ed. 2021)
Ilias Maglogiannis, John MacIntyre, Lazaros Iliadis
|
R3,363
Discovery Miles 33 630
|
Ships in 10 - 15 working days
|
|
This book constitutes the refereed proceedings of six International
Workshops held as parallel events of the 17th IFIP WG 12.5
International Conference on Artificial Intelligence Applications
and Innovations, AIAI 2021, virtually and in Hersonissos, Crete,
Greece, in June 2021: the 6th Workshop on 5G-Putting Intelligence
to the Network Edge, 5G-PINE 2021; Artificial Intelligence in
Biomedical Engineering and Informatics Workshop, AI-BIO 2021;
Workshop on Defense Applications of AI, DAAI 2021; Distributed AI
for Resource-Constrained Platforms Workshop, DARE 2021; Energy
Efficiency and Artificial Intelligence Workshop, EEAI 2021; and the
10th Mining Humanistic Data Workshop, MHDW 2021. The 24 full papers
and 16 short papers presented at these workshops were carefully
reviewed and selected from 72 submissions. The papers presented at
5G-PINE focus on the latest AI applications in the
telecommunication industry and AI in modern 5G-oriented
telecommunications infrastructures. The papers chosen for AI-BIO
2021 present research on the subject of AI, in its broadest sense,
in biomedical engineering and health informatics. The DAAI 2021
papers aim at presenting recent evolutions in artificial
intelligence applicable to defense and security applications. The
papers selected for DARE 2021 address a variety of pertinent and
challenging topics within the scope of distributed AI for
resource-constrained platforms. The papers presented at EEAI 2021
aim to bring together interdisciplinary approaches that focus on
the application of AI-driven solutions for increasing and improving
energy efficiency of residential and tertiary buildings and of
occupant behavior. The MHDW papers focus on topics such as
recommendation systems, sentiment analysis, pattern recognition,
data mining, and time series.
This book provides insights into recent trends and innovation of
technologies aiming to provide sustainable and energy efficient
computing. The authors discuss approaches to provide solutions to
real life societal issues and problems using sustainable and energy
efficient computing approaches. The book gathers research and state
of the art reviews on solutions for societal benefits by using
sustainable approaches of computing. The book also intends to
provide use-cases for certain real life societal problems. The book
can be used by researchers of similar areas, technologists,
environmentalists, educationists, research scholars and UG/PG
Students as well.
This book presents MOSFET-based current mode logic (CML)
topologies, which increase the speed, and lower the transistor
count, supply voltage and power consumption. The improved
topologies modify the conventional PDN, load, and the current
source sections of the basic CML gates. Electronic system
implementation involves embedding digital and analog circuits on a
single die shifting towards mixed-mode circuit design. The
high-resolution, low-power and low-voltage analog circuits are
combined with high-frequency complex digital circuits, and the
conventional static CMOS logic generates large current spikes
during the switching (also referred to as digital switching noise),
which degrade the resolution of the sensitive analog circuits via
supply line and substrate coupling. This problem is exacerbated
further with scaling down of CMOS technology due to higher
integration levels and operating frequencies. In the literature,
several methods are described to reduce the propagation of the
digital switching noise. However, in high-resolution applications,
these methods are not sufficient. The conventional CMOS static
logic is no longer an effective solution, and therefore an
alternative with reduced current spikes or that draws a constant
supply current must be selected. The current mode logic (CML)
topology, with its unique property of requiring constant supply
current, is a promising alternative to the conventional CMOS static
logic.
Tired of writing all your user IDs and passwords on sticky notes
and pieces of scrap paper? This convenient address book stores them
all in one place. This is not your typical address book There are
also special sections for online banking info and one for storing
e-mail addresses.
This handbook is organized under three major parts. The first part
of this handbook deals with multimedia security for emerging
applications. The chapters include basic concepts of multimedia
tools and applications, biological and behavioral biometrics,
effective multimedia encryption and secure watermarking techniques
for emerging applications, an adaptive face identification approach
for android mobile devices, and multimedia using chaotic and
perceptual hashing function. The second part of this handbook
focuses on multimedia processing for various potential
applications. The chapter includes a detail survey of image
processing based automated glaucoma detection techniques and role
of de-noising, recent study of dictionary learning based image
reconstruction techniques for analyzing the big medical data, brief
introduction of quantum image processing and it applications, a
segmentation-less efficient Alzheimer detection approach, object
recognition, image enhancements and de-noising techniques for
emerging applications, improved performance of image compression
approach, and automated detection of eye related diseases using
digital image processing. The third part of this handbook
introduces multimedia applications. The chapter includes the
extensive survey on the role of multimedia in medicine and
multimedia forensics classification, a finger based authentication
system for e-health security, analysis of recently developed deep
learning techniques for emotion and activity recognition. Further,
the book introduce a case study on change of ECG according to time
for user identification, role of multimedia in big data, cloud
computing, the Internet of things (IoT) and blockchain environment
in detail for real life applications. This handbook targets
researchers, policy makers, programmers and industry professionals
in creating new knowledge for developing efficient
techniques/framework for multimedia applications. Advanced level
students studying computer science, specifically security and
multimedia will find this book useful as a reference.
|
|