|
Showing 1 - 10 of
10 matches in All Departments
This book features new and innovative research on the positive
contributions of IoT and cloud technology healthcare information
systems for the improvement of patient care and disease management.
Highlighting the challenges and difficulties in implementing IoT
and cloud technology in the healthcare field, the volume focuses on
theories, systems, methods, algorithms, and applications. The
chapters showcase the interface between e-health and communication
technologies and their beneficial contribution to building
efficient and secure healthcare information systems. Healthcare
information systems involve data generation, compilation,
arrangement, examination and synthesis, and communication and use.
This incorporates frameworks that gather, store, maintain, and
protect patients’ electronic medical information and records,
providing an invaluable resource for supporting medical services
strategies and choices. IoT and Cloud Computing-Based Healthcare
Information Systems discusses a multitude of diverse new
information technologies in telemedicine, in security for
healthcare systems, for medical image authentication, in pulse
oximetry via Bluetooth, for virus detection via smartphones, for
tumor extraction via extreme learning machine and k-means
clustering, for detect cancerous cells, for music therapy for
mental health purposes, and much more. This informative volume will
be a valuable resource for academicians, professionals, engineers,
technology designers, analysts, and students involved in the
various fields that are involved with information technology and
biomedical engineering in healthcare and medicine.
This book aimed at bringing an insight to the ICN network,
particularly various architectures, issues and challenges in the
new networking paradigm. The book starts with an introduction to
the new promising concept of ICN and its origin along with the
reason behind this interesting innovation. Different architectures
proposed so far in support of implementing the ICN is also
discussed in details. Few of the challenges of ICN implementation
are enlisted as caching, naming, routing, and security. Each of
these challenges with recent development is covered in individual
chapters. Moreover, integration of current trends in communication
and computing like software defined networking and machine learning
approach are another area that this book is focusing. All these
chapters highlight the recent developments reported in the area and
also discusses the future trends. The book provides an overview of
the recent developments in future internet technologies, bringing
together the advancements that have been made in ICN. The book
includes three unique chapters in the field of ICN research. The
first, is the SDN framework for implementing ICN by decoupling data
and control plan. The machine learning models for predicting future
trends in network traffic and other management activities is
another important chapter. This chapter includes the possibilities
of using machine learning models for trend prediction to help
network administrators and service providers to take care of
unexpected sudden change traffic pattern and user behaviour. The
third most vital chapter is the security issues in ICN. This
chapter includes various facts that influences the security of ICN.
Issues involved in naming, caching and routing are discussed
separately along with few recent works in these areas. Various
types of attacks in ICN are also part of the discussion. The stated
book would be useful for researchers in this area and will work as
a reference for future work. Moreover, the content of the book
would also be suitable as a supporting material for undergraduate
and graduate level courses in computer science and electrical
engineering.
This book aimed at bringing an insight to the ICN network,
particularly various architectures, issues and challenges in the
new networking paradigm. The book starts with an introduction to
the new promising concept of ICN and its origin along with the
reason behind this interesting innovation. Different architectures
proposed so far in support of implementing the ICN is also
discussed in details. Few of the challenges of ICN implementation
are enlisted as caching, naming, routing, and security. Each of
these challenges with recent development is covered in individual
chapters. Moreover, integration of current trends in communication
and computing like software defined networking and machine learning
approach are another area that this book is focusing. All these
chapters highlight the recent developments reported in the area and
also discusses the future trends. The book provides an overview of
the recent developments in future internet technologies, bringing
together the advancements that have been made in ICN. The book
includes three unique chapters in the field of ICN research. The
first, is the SDN framework for implementing ICN by decoupling data
and control plan. The machine learning models for predicting future
trends in network traffic and other management activities is
another important chapter. This chapter includes the possibilities
of using machine learning models for trend prediction to help
network administrators and service providers to take care of
unexpected sudden change traffic pattern and user behaviour. The
third most vital chapter is the security issues in ICN. This
chapter includes various facts that influences the security of ICN.
Issues involved in naming, caching and routing are discussed
separately along with few recent works in these areas. Various
types of attacks in ICN are also part of the discussion. The stated
book would be useful for researchers in this area and will work as
a reference for future work. Moreover, the content of the book
would also be suitable as a supporting material for undergraduate
and graduate level courses in computer science and electrical
engineering.
This book presents the outcomes of the Third National Conference on
Communication, Cloud and Big Data (CCB) held on November 2-3, 2018,
at Sikkim Manipal Institute of Technology, Majitar, Sikkim.
Featuring a number of papers from the conference, it explores
various aspects of communication, computation, cloud, and big data,
including routing in cognitive radio wireless sensor networks, big
data security issues, routing in ad hoc networks, routing protocol
for Internet of things (IoT), and algorithm for imaging quality
enhancement.
This book presents the outcomes of the Third National Conference on
Communication, Cloud and Big Data (CCB) held on November 2-3, 2018,
at Sikkim Manipal Institute of Technology, Majitar, Sikkim.
Featuring a number of papers from the conference, it explores
various aspects of communication, computation, cloud, and big data,
including routing in cognitive radio wireless sensor networks, big
data security issues, routing in ad hoc networks, routing protocol
for Internet of things (IoT), and algorithm for imaging quality
enhancement.
This book is an outcome of the second national conference on
Communication, Cloud and Big Data (CCB) held during November 10-11,
2016 at Sikkim Manipal Institute of Technology. The nineteen
chapters of the book are some of the accepted papers of CCB 2016.
These chapters have undergone review process and then subsequent
series of improvements. The book contains chapters on various
aspects of communication, computation, cloud and big data. Routing
in wireless sensor networks, modulation techniques, spectrum hole
sensing in cognitive radio networks, antenna design, network
security, Quality of Service issues in routing, medium access
control protocol for Internet of Things, and TCP performance over
different routing protocols used in mobile ad-hoc networks are some
of the topics discussed in different chapters of this book which
fall under the domain of communication. Moreover, there are
chapters in this book discussing topics like applications of
geographic information systems, use of radar for road safety, image
segmentation and digital media processing, web content management
system, human computer interaction, and natural language processing
in the context of Bodo language. These chapters may fall under
broader domain of computation. Issues like robot navigation
exploring cloud technology, and application of big data analytics
in higher education are also discussed in two different chapters.
These chapters fall under the domains of cloud and big data,
respectively.
This book presents various areas related to cybersecurity.
Different techniques and tools used by cyberattackers to exploit a
system are thoroughly discussed and analyzed in their respective
chapters. The content of the book provides an intuition of various
issues and challenges of cybersecurity that can help readers to
understand and have awareness about it. It starts with a very basic
introduction of security, its varied domains, and its implications
in any working organization; moreover, it will talk about the risk
factor of various attacks and threats. The concept of privacy and
anonymity has been taken into consideration in consecutive
chapters. Various topics including, The Onion Router (TOR) and
other anonymous services, are precisely discussed with a practical
approach. Further, chapters to learn the importance of preventive
measures such as intrusion detection system (IDS) are also covered.
Due to the existence of severe cyberattacks, digital forensics is a
must for investigating the crime and to take precautionary measures
for the future occurrence of such attacks. A detailed description
of cyberinvestigation is covered in a chapter to get readers
acquainted with the need and demands. This chapter deals with
evidence collection from the victim's device and the system that
has importance in the context of an investigation. Content covered
in all chapters is foremost and reported in the current trends in
several journals and cybertalks. The proposed book is helpful for
any reader who is using a computer or any such electronic gadget in
their daily routine. The content of the book is prepared to work as
a resource to any undergraduate and graduate-level student to get
aware about the concept of cybersecurity, various cyberattacks, and
threats in the security. In addition to that, it aimed at assisting
researchers and developers to build a strong foundation for
security provisioning in any newer technology which they are
developing.
This book presents the outcomes of the First International
Conference on Communication, Cloud, and Big Data (CCB) held on
December 18-19, 2020, at Sikkim Manipal Institute of Technology,
Majitar, Sikkim, India. This book contains research papers and
articles in the latest topics related to the fields like
communication networks, cloud computing, big data analytics, and on
various computing techniques. Research papers addressing security
issues in above-mentioned areas are also included in the book. The
research papers and articles discuss latest issues in the
above-mentioned topics. The book is very much helpful and useful
for the researchers, engineers, practitioners, research students,
and interested readers.
This book presents various areas related to cybersecurity.
Different techniques and tools used by cyberattackers to exploit a
system are thoroughly discussed and analyzed in their respective
chapters. The content of the book provides an intuition of various
issues and challenges of cybersecurity that can help readers to
understand and have awareness about it. It starts with a very basic
introduction of security, its varied domains, and its implications
in any working organization; moreover, it will talk about the risk
factor of various attacks and threats. The concept of privacy and
anonymity has been taken into consideration in consecutive
chapters. Various topics including, The Onion Router (TOR) and
other anonymous services, are precisely discussed with a practical
approach. Further, chapters to learn the importance of preventive
measures such as intrusion detection system (IDS) are also covered.
Due to the existence of severe cyberattacks, digital forensics is a
must for investigating the crime and to take precautionary measures
for the future occurrence of such attacks. A detailed description
of cyberinvestigation is covered in a chapter to get readers
acquainted with the need and demands. This chapter deals with
evidence collection from the victim's device and the system that
has importance in the context of an investigation. Content covered
in all chapters is foremost and reported in the current trends in
several journals and cybertalks. The proposed book is helpful for
any reader who is using a computer or any such electronic gadget in
their daily routine. The content of the book is prepared to work as
a resource to any undergraduate and graduate-level student to get
aware about the concept of cybersecurity, various cyberattacks, and
threats in the security. In addition to that, it aimed at assisting
researchers and developers to build a strong foundation for
security provisioning in any newer technology which they are
developing.
This book is an outcome of the second national conference on
Communication, Cloud and Big Data (CCB) held during November 10-11,
2016 at Sikkim Manipal Institute of Technology. The nineteen
chapters of the book are some of the accepted papers of CCB 2016.
These chapters have undergone review process and then subsequent
series of improvements. The book contains chapters on various
aspects of communication, computation, cloud and big data. Routing
in wireless sensor networks, modulation techniques, spectrum hole
sensing in cognitive radio networks, antenna design, network
security, Quality of Service issues in routing, medium access
control protocol for Internet of Things, and TCP performance over
different routing protocols used in mobile ad-hoc networks are some
of the topics discussed in different chapters of this book which
fall under the domain of communication. Moreover, there are
chapters in this book discussing topics like applications of
geographic information systems, use of radar for road safety, image
segmentation and digital media processing, web content management
system, human computer interaction, and natural language processing
in the context of Bodo language. These chapters may fall under
broader domain of computation. Issues like robot navigation
exploring cloud technology, and application of big data analytics
in higher education are also discussed in two different chapters.
These chapters fall under the domains of cloud and big data,
respectively.
|
You may like...
Hampstead
Diane Keaton, Brendan Gleeson, …
DVD
R66
Discovery Miles 660
|