![]() |
![]() |
Your cart is empty |
||
Showing 1 - 25 of 243 matches in All Departments
Today, computation is an essential component of every technology. However, there has not been much research on quantum computing, even though it has the capability to solve complex problems in an efficient way. Further study is required to fully understand the uses and benefits of this technology. The Handbook of Research on Quantum Computing for Smart Environments presents investigating physical realizations of quantum computers, encoders, and decoders, including photonic quantum realization, cavity quantum electrodynamics, and many more topics on Bits to Qubits. Covering key topics such as machine learning, software, quantum algorithms, and neural networks, this major reference work is ideal for engineers, computer scientists, physicists, mathematicians, researchers, academicians, scholars, practitioners, instructors, and students.
Blockchain was first conceptualized as a method of building trust in machines and has grown into a vital aspect of many different sectors of the economy. Recently, attention has shifted to the field of autonomous vehicles, and the added value blockchain can provide for the future of this sector by building next generation secure decentralized, distributed, and trusted automated environments and enhancing the productivity of several autonomous applications. Opportunities and Challenges for Blockchain Technology in Autonomous Vehicles is a critical reference source that explores the applications of blockchain in automated industries. Featuring coverage on a wide range of topics including privacy, risk assessment, and performance optimization, this book is ideally designed for design engineers, industry professionals, cryptographers, service designers, entrepreneurs, government officials, consultants, researchers, academicians, and students.
This contributed volume brings out a comprehensive collection of changes from cellular to molecular levels in medicinal plants under extreme environments. The focus of this book is to address the molecular changes in medicinal plants under different abiotic stresses. Medicinal plants are regarded as rich resources of components that can be used for drug development in the pharmaceutical industry. A few medicinal plants are considered vital sources of nutrients and solicited for their therapeutic properties. Therefore, it is essential to understand medicinal plants' interaction under abiotic stresses as compounds obtained from these plants play an important role in human health. This book is of interest to students, teachers, researchers, scientists, medicinal plant experts, and policymakers. Also, the book provides study material for undergraduate and graduate students of botany, environmental sciences, medicinal and aromatic plants, biochemistry, and biotechnology. National and international scientists working in the area of medicinal plants, drug development, and policymakers will also find this a useful read
More individuals than ever are utilizing internet technologies to work from home, teach and learn, shop, interact with peers, review medical records, and more. While it is certainly convenient to conduct such tasks via the internet, this increased internet presence has also led to a rise in the search and availability of personal information, which in turn is resulting in more cyber-attacks, privacy breaches, and information leaks. Cyber criminals are using such opportunities to attack governments, organizations, and individuals, making it necessary to anticipate, assess, and mitigate privacy and security threats during this infodemic. The Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World discusses the design and development of different machine learning systems, including next generation applications, in order to mitigate cyber-attacks and address security challenges in everyday technologies. It further explores select methods and algorithms of learning for implementing better security methods in fields such as business and healthcare. It recognizes the future of privacy and the importance of preserving data through recommended practice, feedback loops, and smart agents. Covering topics such as face mask detection, gesture recognition, and botnet attacks and detection, this major reference work is a dynamic resource for medical professionals, healthcare administrators, government officials, business executives and managers, IT managers, students and faculty of higher education, librarians, researchers, and academicians.
This book provides recent developments and future perspectives of pulp and paper processing based on biotechnology to replace conventional environmental unfriendly chemical processes. The use of microorganism and microbial enzymes in various processes such as bleaching, deinking, refining, dissolving pulp, debarking & pitch removal, slime control, wastewater treatment and waste material valorisation are discussed.
This book includes the original, peer reviewed research articles from the 2nd International Conference on Cybernetics, Cognition and Machine Learning Applications (ICCCMLA 2020), held in August, 2020 at Goa, India. It covers the latest research trends or developments in areas of data science, artificial intelligence, neural networks, cognitive science and machine learning applications, cyber physical systems and cybernetics.
This book presents applications of machine learning techniques in processing multimedia large-scale data. Multimedia such as text, image, audio, video, and graphics stands as one of the most demanding and exciting aspects of the information era. The book discusses new challenges faced by researchers in dealing with these large-scale data and also presents innovative solutions to address several potential research problems, e.g., enabling comprehensive visual classification to fill the semantic gap by exploring large-scale data, offering a promising frontier for detailed multimedia understanding, as well as extract patterns and making effective decisions by analyzing the large collection of data.
This book describes a set of methods for finding more-for-less solutions of various kind of fuzzy transportation problems. Inspired by more-for-less approaches to the basic transportation problem initiated by Abraham Charnes and his collaborators during 1960s and 1970s, this book describes new methods developed by the authors to solve different types of problems, including symmetric balanced fuzzy transportation problems, symmetric intuitionistic fuzzy transportation problems with mixed constraints, and symmetric intuitionistic fuzzy linear fractional transportation problems with mixed constraints. It offers extensive details on their applications to some representative problems, and discusses some future research directions
This book introduces readers to the fundamentals of transportation problems under the fuzzy environment and its extensions. It also discusses the limitations and drawbacks of (1) recently proposed aggregation operators under the fuzzy environment and its various extensions; (2) recently proposed methods for solving transportation problems under the fuzzy environment; and (3) recently proposed methods for solving transportation problems under the intuitionistic fuzzy environment. In turn, the book proposes simplified methods to overcome these limitations.
This book summarizes various tools and techniques used to provide insights into the cellular and molecular pathophysiology of stroke. It also presents rodent animal models to help shed light on the pathophysiology of ischemic stroke. Presenting the latest information on the different types of stroke, including embolic, filament, photothrombotic, and bilateral common carotid artery, the book also describes techniques that are used for confirmation of stroke surgery, such as laser speckle imaging (LSI) and laser Doppler flowmetry (LDF), and discusses the non-human primates that are used in stroke surgery, cerebral venous sinuous thrombosis, and neurobehavioral assessment. Lastly, it analyzes various neuroprotective agents to treat and prevent ischemic stroke, and examines the challenges and advances in treating and preventing acute ischemic stroke.
This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic and perceptual hashing function. The second part of this handbook focuses on multimedia processing for various potential applications. The chapter includes a detail survey of image processing based automated glaucoma detection techniques and role of de-noising, recent study of dictionary learning based image reconstruction techniques for analyzing the big medical data, brief introduction of quantum image processing and it applications, a segmentation-less efficient Alzheimer detection approach, object recognition, image enhancements and de-noising techniques for emerging applications, improved performance of image compression approach, and automated detection of eye related diseases using digital image processing. The third part of this handbook introduces multimedia applications. The chapter includes the extensive survey on the role of multimedia in medicine and multimedia forensics classification, a finger based authentication system for e-health security, analysis of recently developed deep learning techniques for emotion and activity recognition. Further, the book introduce a case study on change of ECG according to time for user identification, role of multimedia in big data, cloud computing, the Internet of things (IoT) and blockchain environment in detail for real life applications. This handbook targets researchers, policy makers, programmers and industry professionals in creating new knowledge for developing efficient techniques/framework for multimedia applications. Advanced level students studying computer science, specifically security and multimedia will find this book useful as a reference.
This book contains high-quality research articles and reviews that promote research and reflect the most recent advances in intelligent wavelet based techniques for advanced multimedia applications as well as other emerging areas. In recent time, wavelet transforms have become useful in many signal, image and video processing applications, especially for multimedia security and surveillance. A few applications of wavelets in security and surveillance are watermarking, fusion, steganography, object detection, tracking, motion recognition and intention recognition, etc. Wavelets are well capable of analyzing signal, image and video at different resolution levels, popularly known as multiresolution analysis. The multiresolution analysis is advantageous in multimedia security and surveillance applications. It provides flexibility in selection of different resolution levels that leads to better accuracy. Furthermore, recently sparse representation has become an advancement to analyze wavelet coefficients. It is observed that wavelet transforms possess the invariance property which makes them suitable for many vision applications. This book provides a concise overview of the current state of the art and disseminates some of the novel and exciting ideas and techniques. In addition, it is also helpful for the senior undergraduate and graduate students, researcher, academicians, IT professional and providers, citizens, customers as well as policy makers working in this area as well as other emerging applications demanding state-of-the-art wavelet based multimedia applications.
Reliability is one of the fundamental criteria in engineering systems. Design and maintenance serve to support it throughout the systems life. As such, maintenance acts in parallel to production and can have a great impact on the availability and capacity of production and the quality of the products. The authors describe current and innovative methods useful to industry and society.
This book presents a novel approach to the formulation and solution of three classes of problems: the fully fuzzy transportation problem, the fully fuzzy transshipment problem, and fully fuzzy solid transportation problem. It points out some limitations of the existing formulations and approaches, indicating some possible, conceptually and algorithmically attractive solutions to alleviate them. In particular, the book describes new conceptual and algorithmic solutions for finding the fuzzy optimal solutions of the single-objective fully fuzzy transportation problems, the fully fuzzy transshipment problems and the fully fuzzy solid transportation problems. Moreover, based on the novel concepts and solutions proposed by combining the concept of a fully fuzzy solid transportation problem and a fully fuzzy transshipment problem, it describes a new class of problems, i.e. the fully fuzzy solid trans-shipment problem, together with its fuzzy linear programming formulation and some methods to find its fuzzy optimal solution. The book offers the readers a timely piece of literature in the field of fuzzy linear programming, and is expected to act as a source of inspiration for future research and applications.
This book presents medical image watermarking techniques and algorithms for telemedicine and other emerging applications. This book emphasizes on medical image watermarking to ensure the authenticity of transmitted medical information. It begins with an introduction of digital watermarking, important characteristics, novel applications, different watermarking attacks and standard benchmark tools. This book also covers spatial and transform domain medical image watermarking techniques and their merits and limitations. The authors have developed improved/novel watermarking techniques for telemedicine applications that offer higher robustness, better perceptual quality and increased embedding capacity and secure watermark. The suggested methods may find potential applications in the prevention of patient identity theft and health data management issues which is a growing concern in telemedicine applications. This book provides a sound platform for understanding the medical image watermarking paradigm for researchers in the field and advanced-level students. Industry professionals working in this field, as well as other emerging applications demanding robust and secure watermarking will find this book useful as a reference.
This book details some of the major developments in the implementation of compressive sensing in radio applications for electronic defense and warfare communication use. It provides a comprehensive background to the subject and at the same time describes some novel algorithms. It also investigates application value and performance-related parameters of compressive sensing in scenarios such as direction finding, spectrum monitoring, detection, and classification.
This book offers a critical perspective on the issues related to women's empowerment, microfinance, and entrepreneurship in India. Written by distinguishing experts in this field, this book highlights women's empowerment, which is a process of entrusting power to an individual on the control over resources and decisions. However, these two factors are less effective in a society where religion and cultural dominance is high. The book sheds light on the social security measures undertaken by the government aiming to the right to work helped women who are bounded by social restrictions. Over time there is a shift in rural occupational structure towards non-farm activities, which is largely distress driven self-employment. Access to credit is a great source to provide self-employment that develops self-esteem among women and uplift their position. The book highlights the discrimination against women entrepreneurs in access to credit led to gender biased entrepreneurial society. Association with self-help groups (SHGs) has made women more socially empowered. SHG members help them to change their life in a positive manner through micro-entrepreneurial activities. The book has emphasized on the role of microfinance, which has served the poor to become financially self-reliant. It is observed that for second generation borrowers, the impact of microfinance seems to fizzle out, where MFIs who are gaining efficiency are diverting their objective of servicing poor, signalling a sign of mission drift.
This book offers an essential guide to IoT Security, Smart Cities, IoT Applications, etc. In addition, it presents a structured introduction to the subject of destination marketing and an exhaustive review on the challenges of information security in smart and intelligent applications, especially for IoT and big data contexts. Highlighting the latest research on security in smart cities, it addresses essential models, applications, and challenges. Written in plain and straightforward language, the book offers a self-contained resource for readers with no prior background in the field. Primarily intended for students in Information Security and IoT applications (including smart cities systems and data heterogeneity), it will also greatly benefit academic researchers, IT professionals, policymakers and legislators. It is well suited as a reference book for both undergraduate and graduate courses on information security approaches, the Internet of Things, and real-world intelligent applications. |
![]() ![]() You may like...
Virtual and Augmented Reality…
Yiyu Cai, Wouter van Joolingen, …
Hardcover
R4,316
Discovery Miles 43 160
Transforming Enterprise Cloud Services
William Y Chang, Hosame Abu-Amara, …
Hardcover
R4,772
Discovery Miles 47 720
Applications in Ubiquitous Computing
Raman Kumar, Sara Paiva
Hardcover
R1,626
Discovery Miles 16 260
ZIF-8 Based Materials for Pharmaceutical…
Awais Ahmad, Muhammad Pervaiz, …
Hardcover
R5,202
Discovery Miles 52 020
Technology-Augmented Perception and…
Tilman Dingler, Evangelos Niforatos
Hardcover
R4,607
Discovery Miles 46 070
|