Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 10 of 10 matches in All Departments
This book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking paradigm. The book starts with an introduction to the new promising concept of ICN and its origin along with the reason behind this interesting innovation. Different architectures proposed so far in support of implementing the ICN is also discussed in details. Few of the challenges of ICN implementation are enlisted as caching, naming, routing, and security. Each of these challenges with recent development is covered in individual chapters. Moreover, integration of current trends in communication and computing like software defined networking and machine learning approach are another area that this book is focusing. All these chapters highlight the recent developments reported in the area and also discusses the future trends. The book provides an overview of the recent developments in future internet technologies, bringing together the advancements that have been made in ICN. The book includes three unique chapters in the field of ICN research. The first, is the SDN framework for implementing ICN by decoupling data and control plan. The machine learning models for predicting future trends in network traffic and other management activities is another important chapter. This chapter includes the possibilities of using machine learning models for trend prediction to help network administrators and service providers to take care of unexpected sudden change traffic pattern and user behaviour. The third most vital chapter is the security issues in ICN. This chapter includes various facts that influences the security of ICN. Issues involved in naming, caching and routing are discussed separately along with few recent works in these areas. Various types of attacks in ICN are also part of the discussion. The stated book would be useful for researchers in this area and will work as a reference for future work. Moreover, the content of the book would also be suitable as a supporting material for undergraduate and graduate level courses in computer science and electrical engineering.
This book presents the outcomes of the Third National Conference on Communication, Cloud and Big Data (CCB) held on November 2-3, 2018, at Sikkim Manipal Institute of Technology, Majitar, Sikkim. Featuring a number of papers from the conference, it explores various aspects of communication, computation, cloud, and big data, including routing in cognitive radio wireless sensor networks, big data security issues, routing in ad hoc networks, routing protocol for Internet of things (IoT), and algorithm for imaging quality enhancement.
This book is an outcome of the second national conference on Communication, Cloud and Big Data (CCB) held during November 10-11, 2016 at Sikkim Manipal Institute of Technology. The nineteen chapters of the book are some of the accepted papers of CCB 2016. These chapters have undergone review process and then subsequent series of improvements. The book contains chapters on various aspects of communication, computation, cloud and big data. Routing in wireless sensor networks, modulation techniques, spectrum hole sensing in cognitive radio networks, antenna design, network security, Quality of Service issues in routing, medium access control protocol for Internet of Things, and TCP performance over different routing protocols used in mobile ad-hoc networks are some of the topics discussed in different chapters of this book which fall under the domain of communication. Moreover, there are chapters in this book discussing topics like applications of geographic information systems, use of radar for road safety, image segmentation and digital media processing, web content management system, human computer interaction, and natural language processing in the context of Bodo language. These chapters may fall under broader domain of computation. Issues like robot navigation exploring cloud technology, and application of big data analytics in higher education are also discussed in two different chapters. These chapters fall under the domains of cloud and big data, respectively.
This book presents various areas related to cybersecurity. Different techniques and tools used by cyberattackers to exploit a system are thoroughly discussed and analyzed in their respective chapters. The content of the book provides an intuition of various issues and challenges of cybersecurity that can help readers to understand and have awareness about it. It starts with a very basic introduction of security, its varied domains, and its implications in any working organization; moreover, it will talk about the risk factor of various attacks and threats. The concept of privacy and anonymity has been taken into consideration in consecutive chapters. Various topics including, The Onion Router (TOR) and other anonymous services, are precisely discussed with a practical approach. Further, chapters to learn the importance of preventive measures such as intrusion detection system (IDS) are also covered. Due to the existence of severe cyberattacks, digital forensics is a must for investigating the crime and to take precautionary measures for the future occurrence of such attacks. A detailed description of cyberinvestigation is covered in a chapter to get readers acquainted with the need and demands. This chapter deals with evidence collection from the victim's device and the system that has importance in the context of an investigation. Content covered in all chapters is foremost and reported in the current trends in several journals and cybertalks. The proposed book is helpful for any reader who is using a computer or any such electronic gadget in their daily routine. The content of the book is prepared to work as a resource to any undergraduate and graduate-level student to get aware about the concept of cybersecurity, various cyberattacks, and threats in the security. In addition to that, it aimed at assisting researchers and developers to build a strong foundation for security provisioning in any newer technology which they are developing.
This book features new and innovative research on the positive contributions of IoT and cloud technology healthcare information systems for the improvement of patient care and disease management. Highlighting the challenges and difficulties in implementing IoT and cloud technology in the healthcare field, the volume focuses on theories, systems, methods, algorithms, and applications. The chapters showcase the interface between e-health and communication technologies and their beneficial contribution to building efficient and secure healthcare information systems. Healthcare information systems involve data generation, compilation, arrangement, examination and synthesis, and communication and use. This incorporates frameworks that gather, store, maintain, and protect patients’ electronic medical information and records, providing an invaluable resource for supporting medical services strategies and choices. IoT and Cloud Computing-Based Healthcare Information Systems discusses a multitude of diverse new information technologies in telemedicine, in security for healthcare systems, for medical image authentication, in pulse oximetry via Bluetooth, for virus detection via smartphones, for tumor extraction via extreme learning machine and k-means clustering, for detect cancerous cells, for music therapy for mental health purposes, and much more. This informative volume will be a valuable resource for academicians, professionals, engineers, technology designers, analysts, and students involved in the various fields that are involved with information technology and biomedical engineering in healthcare and medicine.
This book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking paradigm. The book starts with an introduction to the new promising concept of ICN and its origin along with the reason behind this interesting innovation. Different architectures proposed so far in support of implementing the ICN is also discussed in details. Few of the challenges of ICN implementation are enlisted as caching, naming, routing, and security. Each of these challenges with recent development is covered in individual chapters. Moreover, integration of current trends in communication and computing like software defined networking and machine learning approach are another area that this book is focusing. All these chapters highlight the recent developments reported in the area and also discusses the future trends. The book provides an overview of the recent developments in future internet technologies, bringing together the advancements that have been made in ICN. The book includes three unique chapters in the field of ICN research. The first, is the SDN framework for implementing ICN by decoupling data and control plan. The machine learning models for predicting future trends in network traffic and other management activities is another important chapter. This chapter includes the possibilities of using machine learning models for trend prediction to help network administrators and service providers to take care of unexpected sudden change traffic pattern and user behaviour. The third most vital chapter is the security issues in ICN. This chapter includes various facts that influences the security of ICN. Issues involved in naming, caching and routing are discussed separately along with few recent works in these areas. Various types of attacks in ICN are also part of the discussion. The stated book would be useful for researchers in this area and will work as a reference for future work. Moreover, the content of the book would also be suitable as a supporting material for undergraduate and graduate level courses in computer science and electrical engineering.
This book presents the outcomes of the Third National Conference on Communication, Cloud and Big Data (CCB) held on November 2-3, 2018, at Sikkim Manipal Institute of Technology, Majitar, Sikkim. Featuring a number of papers from the conference, it explores various aspects of communication, computation, cloud, and big data, including routing in cognitive radio wireless sensor networks, big data security issues, routing in ad hoc networks, routing protocol for Internet of things (IoT), and algorithm for imaging quality enhancement.
This book presents various areas related to cybersecurity. Different techniques and tools used by cyberattackers to exploit a system are thoroughly discussed and analyzed in their respective chapters. The content of the book provides an intuition of various issues and challenges of cybersecurity that can help readers to understand and have awareness about it. It starts with a very basic introduction of security, its varied domains, and its implications in any working organization; moreover, it will talk about the risk factor of various attacks and threats. The concept of privacy and anonymity has been taken into consideration in consecutive chapters. Various topics including, The Onion Router (TOR) and other anonymous services, are precisely discussed with a practical approach. Further, chapters to learn the importance of preventive measures such as intrusion detection system (IDS) are also covered. Due to the existence of severe cyberattacks, digital forensics is a must for investigating the crime and to take precautionary measures for the future occurrence of such attacks. A detailed description of cyberinvestigation is covered in a chapter to get readers acquainted with the need and demands. This chapter deals with evidence collection from the victim's device and the system that has importance in the context of an investigation. Content covered in all chapters is foremost and reported in the current trends in several journals and cybertalks. The proposed book is helpful for any reader who is using a computer or any such electronic gadget in their daily routine. The content of the book is prepared to work as a resource to any undergraduate and graduate-level student to get aware about the concept of cybersecurity, various cyberattacks, and threats in the security. In addition to that, it aimed at assisting researchers and developers to build a strong foundation for security provisioning in any newer technology which they are developing.
This book presents the outcomes of the First International Conference on Communication, Cloud, and Big Data (CCB) held on December 18-19, 2020, at Sikkim Manipal Institute of Technology, Majitar, Sikkim, India. This book contains research papers and articles in the latest topics related to the fields like communication networks, cloud computing, big data analytics, and on various computing techniques. Research papers addressing security issues in above-mentioned areas are also included in the book. The research papers and articles discuss latest issues in the above-mentioned topics. The book is very much helpful and useful for the researchers, engineers, practitioners, research students, and interested readers.
This book is an outcome of the second national conference on Communication, Cloud and Big Data (CCB) held during November 10-11, 2016 at Sikkim Manipal Institute of Technology. The nineteen chapters of the book are some of the accepted papers of CCB 2016. These chapters have undergone review process and then subsequent series of improvements. The book contains chapters on various aspects of communication, computation, cloud and big data. Routing in wireless sensor networks, modulation techniques, spectrum hole sensing in cognitive radio networks, antenna design, network security, Quality of Service issues in routing, medium access control protocol for Internet of Things, and TCP performance over different routing protocols used in mobile ad-hoc networks are some of the topics discussed in different chapters of this book which fall under the domain of communication. Moreover, there are chapters in this book discussing topics like applications of geographic information systems, use of radar for road safety, image segmentation and digital media processing, web content management system, human computer interaction, and natural language processing in the context of Bodo language. These chapters may fall under broader domain of computation. Issues like robot navigation exploring cloud technology, and application of big data analytics in higher education are also discussed in two different chapters. These chapters fall under the domains of cloud and big data, respectively.
|
You may like...
We Were Perfect Parents Until We Had…
Vanessa Raphaely, Karin Schimke
Paperback
|