|
Showing 1 - 25 of
262 matches in All Departments
Today, computation is an essential component of every technology.
However, there has not been much research on quantum computing,
even though it has the capability to solve complex problems in an
efficient way. Further study is required to fully understand the
uses and benefits of this technology. The Handbook of Research on
Quantum Computing for Smart Environments presents investigating
physical realizations of quantum computers, encoders, and decoders,
including photonic quantum realization, cavity quantum
electrodynamics, and many more topics on Bits to Qubits. Covering
key topics such as machine learning, software, quantum algorithms,
and neural networks, this major reference work is ideal for
engineers, computer scientists, physicists, mathematicians,
researchers, academicians, scholars, practitioners, instructors,
and students.
Blockchain was first conceptualized as a method of building trust
in machines and has grown into a vital aspect of many different
sectors of the economy. Recently, attention has shifted to the
field of autonomous vehicles, and the added value blockchain can
provide for the future of this sector by building next generation
secure decentralized, distributed, and trusted automated
environments and enhancing the productivity of several autonomous
applications. Opportunities and Challenges for Blockchain
Technology in Autonomous Vehicles is a critical reference source
that explores the applications of blockchain in automated
industries. Featuring coverage on a wide range of topics including
privacy, risk assessment, and performance optimization, this book
is ideally designed for design engineers, industry professionals,
cryptographers, service designers, entrepreneurs, government
officials, consultants, researchers, academicians, and students.
This book provides a holistic compilation on applications of carbon
nanostructures, especially in advanced healthcare
applications. It comprises chapters on utility of
diverse multifunctional nanocarriers in drug delivery and
biomedical applications, especially emphasizing on the synthesis
and characterizations of nanosystems along with surface engineering
approaches used for active targeting of the drugs. Moreover, the
chapters also include the recent updates on the applications of the
nanocarriers to fulfill the needs of various healthcare systems.
More individuals than ever are utilizing internet technologies to
work from home, teach and learn, shop, interact with peers, review
medical records, and more. While it is certainly convenient to
conduct such tasks via the internet, this increased internet
presence has also led to a rise in the search and availability of
personal information, which in turn is resulting in more
cyber-attacks, privacy breaches, and information leaks. Cyber
criminals are using such opportunities to attack governments,
organizations, and individuals, making it necessary to anticipate,
assess, and mitigate privacy and security threats during this
infodemic. The Handbook of Research on Technical, Privacy, and
Security Challenges in a Modern World discusses the design and
development of different machine learning systems, including next
generation applications, in order to mitigate cyber-attacks and
address security challenges in everyday technologies. It further
explores select methods and algorithms of learning for implementing
better security methods in fields such as business and healthcare.
It recognizes the future of privacy and the importance of
preserving data through recommended practice, feedback loops, and
smart agents. Covering topics such as face mask detection, gesture
recognition, and botnet attacks and detection, this major reference
work is a dynamic resource for medical professionals, healthcare
administrators, government officials, business executives and
managers, IT managers, students and faculty of higher education,
librarians, researchers, and academicians.
This book describes a set of methods for finding more-for-less
solutions of various kind of fuzzy transportation problems.
Inspired by more-for-less approaches to the basic transportation
problem initiated by Abraham Charnes and his collaborators during
1960s and 1970s, this book describes new methods developed by the
authors to solve different types of problems, including symmetric
balanced fuzzy transportation problems, symmetric intuitionistic
fuzzy transportation problems with mixed constraints, and
symmetric intuitionistic fuzzy linear fractional
transportation problems with mixed constraints. It offers extensive
details on their applications to some representative problems, and
discusses some future research directions
Dosage Forms, Formulation Developments and Regulations, Volume One
in the Recent and Future Trends in Pharmaceutics series, explores
aspects of pharmaceutics, with an original approach focused on
technology, novelties and future trends in the field. The book
discusses the most recent developments in pharmaceutical
preformulation and formulation studies, biopharmaceutics and novel
pharmaceutical formulations, regulatory affairs, and good
manufacturing practices. Exciting areas such as formulation
strategies, optimization techniques, the biopharmaceutical
classification system, and pharmaceutical aerosols are included.
The field of pharmaceutics is highly dynamic and rapidly expanding
day-by-day, so it demands a variety of amplified efforts for
designing and developing pharmaceutical processes and formulation
strategies. This is an essential reference for researchers in
academia and industry as well as advanced graduate students in
pharmaceutics.
This book provides recent developments and future perspectives of
pulp and paper processing based on biotechnology to replace
conventional environmental unfriendly chemical processes. The use
of microorganism and microbial enzymes in various processes such as
bleaching, deinking, refining, dissolving pulp, debarking &
pitch removal, slime control, wastewater treatment and waste
material valorisation are discussed.
This book presents applications of machine learning techniques in
processing multimedia large-scale data. Multimedia such as text,
image, audio, video, and graphics stands as one of the most
demanding and exciting aspects of the information era. The book
discusses new challenges faced by researchers in dealing with these
large-scale data and also presents innovative solutions to address
several potential research problems, e.g., enabling comprehensive
visual classification to fill the semantic gap by exploring
large-scale data, offering a promising frontier for detailed
multimedia understanding, as well as extract patterns and making
effective decisions by analyzing the large collection of data.
This book introduces readers to the fundamentals of transportation
problems under the fuzzy environment and its extensions. It also
discusses the limitations and drawbacks of (1) recently proposed
aggregation operators under the fuzzy environment and its various
extensions; (2) recently proposed methods for solving
transportation problems under the fuzzy environment; and (3)
recently proposed methods for solving transportation problems under
the intuitionistic fuzzy environment. In turn, the book proposes
simplified methods to overcome these limitations.
This handbook is organized under three major parts. The first part
of this handbook deals with multimedia security for emerging
applications. The chapters include basic concepts of multimedia
tools and applications, biological and behavioral biometrics,
effective multimedia encryption and secure watermarking techniques
for emerging applications, an adaptive face identification approach
for android mobile devices, and multimedia using chaotic and
perceptual hashing function. The second part of this handbook
focuses on multimedia processing for various potential
applications. The chapter includes a detail survey of image
processing based automated glaucoma detection techniques and role
of de-noising, recent study of dictionary learning based image
reconstruction techniques for analyzing the big medical data, brief
introduction of quantum image processing and it applications, a
segmentation-less efficient Alzheimer detection approach, object
recognition, image enhancements and de-noising techniques for
emerging applications, improved performance of image compression
approach, and automated detection of eye related diseases using
digital image processing. The third part of this handbook
introduces multimedia applications. The chapter includes the
extensive survey on the role of multimedia in medicine and
multimedia forensics classification, a finger based authentication
system for e-health security, analysis of recently developed deep
learning techniques for emotion and activity recognition. Further,
the book introduce a case study on change of ECG according to time
for user identification, role of multimedia in big data, cloud
computing, the Internet of things (IoT) and blockchain environment
in detail for real life applications. This handbook targets
researchers, policy makers, programmers and industry professionals
in creating new knowledge for developing efficient
techniques/framework for multimedia applications. Advanced level
students studying computer science, specifically security and
multimedia will find this book useful as a reference.
Reliability is one of the fundamental criteria in engineering
systems. Design and maintenance serve to support it throughout the
systems life. As such, maintenance acts in parallel to production
and can have a great impact on the availability and capacity of
production and the quality of the products. The authors describe
current and innovative methods useful to industry and society.
This book contains high-quality research articles and reviews that
promote research and reflect the most recent advances in
intelligent wavelet based techniques for advanced multimedia
applications as well as other emerging areas. In recent time,
wavelet transforms have become useful in many signal, image and
video processing applications, especially for multimedia security
and surveillance. A few applications of wavelets in security and
surveillance are watermarking, fusion, steganography, object
detection, tracking, motion recognition and intention recognition,
etc. Wavelets are well capable of analyzing signal, image and video
at different resolution levels, popularly known as multiresolution
analysis. The multiresolution analysis is advantageous in
multimedia security and surveillance applications. It provides
flexibility in selection of different resolution levels that leads
to better accuracy. Furthermore, recently sparse representation has
become an advancement to analyze wavelet coefficients. It is
observed that wavelet transforms possess the invariance property
which makes them suitable for many vision applications. This book
provides a concise overview of the current state of the art and
disseminates some of the novel and exciting ideas and techniques.
In addition, it is also helpful for the senior undergraduate and
graduate students, researcher, academicians, IT professional and
providers, citizens, customers as well as policy makers working in
this area as well as other emerging applications demanding
state-of-the-art wavelet based multimedia applications.
This book presents a novel approach to the formulation and solution
of three classes of problems: the fully fuzzy transportation
problem, the fully fuzzy transshipment problem, and fully fuzzy
solid transportation problem. It points out some limitations of the
existing formulations and approaches, indicating some possible,
conceptually and algorithmically attractive solutions to alleviate
them. In particular, the book describes new conceptual and
algorithmic solutions for finding the fuzzy optimal solutions of
the single-objective fully fuzzy transportation problems, the fully
fuzzy transshipment problems and the fully fuzzy solid
transportation problems. Moreover, based on the novel concepts and
solutions proposed by combining the concept of a fully fuzzy solid
transportation problem and a fully fuzzy transshipment problem, it
describes a new class of problems, i.e. the fully fuzzy solid
trans-shipment problem, together with its fuzzy linear programming
formulation and some methods to find its fuzzy optimal solution.
The book offers the readers a timely piece of literature in the
field of fuzzy linear programming, and is expected to act as a
source of inspiration for future research and applications.
This book presents medical image watermarking techniques and
algorithms for telemedicine and other emerging applications. This
book emphasizes on medical image watermarking to ensure the
authenticity of transmitted medical information. It begins with an
introduction of digital watermarking, important characteristics,
novel applications, different watermarking attacks and standard
benchmark tools. This book also covers spatial and transform domain
medical image watermarking techniques and their merits and
limitations. The authors have developed improved/novel watermarking
techniques for telemedicine applications that offer higher
robustness, better perceptual quality and increased embedding
capacity and secure watermark. The suggested methods may find
potential applications in the prevention of patient identity theft
and health data management issues which is a growing concern in
telemedicine applications. This book provides a sound platform for
understanding the medical image watermarking paradigm for
researchers in the field and advanced-level students. Industry
professionals working in this field, as well as other emerging
applications demanding robust and secure watermarking will find
this book useful as a reference.
This book details some of the major developments in the
implementation of compressive sensing in radio applications for
electronic defense and warfare communication use. It provides a
comprehensive background to the subject and at the same time
describes some novel algorithms. It also investigates application
value and performance-related parameters of compressive sensing in
scenarios such as direction finding, spectrum monitoring,
detection, and classification.
This book provides stepwise discussion, exhaustive literature
review, detailed analysis and discussion, rigorous experimentation
results (using several analytics tools), and an
application-oriented approach that can be demonstrated with respect
to data analytics using artificial intelligence to make systems
stronger (i.e., impossible to breach). We can see many serious
cyber breaches on Government databases or public profiles at online
social networking in the recent decade. Today artificial
intelligence or machine learning is redefining every aspect of
cyber security. From improving organizations' ability to anticipate
and thwart breaches, protecting the proliferating number of threat
surfaces with Zero Trust Security frameworks to making passwords
obsolete, AI and machine learning are essential to securing the
perimeters of any business. The book is useful for researchers,
academics, industry players, data engineers, data scientists,
governmental organizations, and non-governmental organizations.
This book offers a critical perspective on the issues related to
women's empowerment, microfinance, and entrepreneurship in India.
Written by distinguishing experts in this field, this book
highlights women's empowerment, which is a process of entrusting
power to an individual on the control over resources and decisions.
However, these two factors are less effective in a society where
religion and cultural dominance is high. The book sheds light on
the social security measures undertaken by the government aiming to
the right to work helped women who are bounded by social
restrictions. Over time there is a shift in rural occupational
structure towards non-farm activities, which is largely distress
driven self-employment. Access to credit is a great source to
provide self-employment that develops self-esteem among women and
uplift their position. The book highlights the discrimination
against women entrepreneurs in access to credit led to gender
biased entrepreneurial society. Association with self-help groups
(SHGs) has made women more socially empowered. SHG members help
them to change their life in a positive manner through
micro-entrepreneurial activities. The book has emphasized on the
role of microfinance, which has served the poor to become
financially self-reliant. It is observed that for second generation
borrowers, the impact of microfinance seems to fizzle out, where
MFIs who are gaining efficiency are diverting their objective of
servicing poor, signalling a sign of mission drift.
|
You may like...
Endless Love
Alex Pettyfer, Gabriella Wilde, …
Blu-ray disc
(1)
R51
Discovery Miles 510
|