0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 2 of 2 matches in All Departments

COVID-19 - Origin, Detection and Impact Analysis Using Artificial Intelligence Computational Techniques (Hardcover): Parag... COVID-19 - Origin, Detection and Impact Analysis Using Artificial Intelligence Computational Techniques (Hardcover)
Parag Verma, Ankur Dumka, Alaknanda Ashok, Amit Dumka, Anuj Bhardwaj
R3,712 Discovery Miles 37 120 Ships in 10 - 15 working days

This book highlights progress in terms of Virus Biology and Infection Detection, Prevention, and Control, along with Screening, Testing, and Detection Techniques, that will provide learners and researchers (from basic to advanced) with the most innovative computer-driven methodologies for the fight against COVID-19. In addition, this book also covers the Pre- and Post-Impact of the COVID-19 Pandemic Crisis that will definitely provide useful content for researchers to think broadly about the analytical areas affected by COVID-19. This ultimately shows different paths to the same destination to help understand the nature of the COVID-19 pandemic and how to avoid it in the future.

Security Issues for Wireless Sensor Networks (Hardcover): Parag Verma, Ankur Dumka, Anuj Bhardwaj, Navneet Kaur, Alaknanda... Security Issues for Wireless Sensor Networks (Hardcover)
Parag Verma, Ankur Dumka, Anuj Bhardwaj, Navneet Kaur, Alaknanda Ashok, …
R2,333 R852 Discovery Miles 8 520 Save R1,481 (63%) Ships in 9 - 17 working days

Wireless sensor networks (WSNs) have attracted high interest over the last few decades in the wireless and mobile computing research community. Applications of WSNs are numerous and growing, including indoor deployment scenarios in the home and office to outdoor deployment in an adversary's territory in a tactical background. However, due to their distributed nature and deployment in remote areas, these networks are vulnerable to numerous security threats that can adversely affect their performance. This problem is more critical if the network is deployed for some mission-critical applications, such as in a tactical battlefield. Random failure of nodes is also very likely in real-life deployment scenarios. Due to resource constraints in the sensor nodes, a traditional security mechanism with high overhead of computation and communication is not feasible in WSNs. Design and implementation of secure WSNs is, therefore, a particularly challenging task. This book covers a comprehensive discussion on state-of-the-art security technologies for WSNs. It identifies various possible attacks at different layers of the communication protocol stack in a typical WSN and presents their possible countermeasures. A brief discussion on the future direction of research in WSN security is also included.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
SOHO Lower Back Lumbar Backrest Support
R879 R789 Discovery Miles 7 890
World Religions - Major and Minor World…
Rodgir L Cohen Hardcover R829 Discovery Miles 8 290
Corpus Stylistics in Heart of Darkness…
Lorenzo Mastropierro Hardcover R4,635 Discovery Miles 46 350
The Book of Enoch - Tr. From the…
Enoch Hardcover R871 Discovery Miles 8 710
Fadhil Al-Azzawi's Beautiful Creatures
Fadhil Al-Azzawi Hardcover R626 R505 Discovery Miles 5 050
Rendering Divine Names on Coins
David Bentley, Brad Yonaka Hardcover R936 R799 Discovery Miles 7 990
John Calvin's American Legacy
Thomas Davis Hardcover R1,752 Discovery Miles 17 520
The Syntax of Silence - Sluicing…
Jason Merchant Hardcover R2,044 Discovery Miles 20 440
Speak English or What? - Codeswitching…
Philipp Sebastian Angermeyer Hardcover R2,730 Discovery Miles 27 300
Thomas Aquinas on God and Evil
Brian Davies Hardcover R2,757 Discovery Miles 27 570

 

Partners