|
Showing 1 - 25 of
42 matches in All Departments
Digital transformation in organizations optimizes the business
processes but also brings additional challenges in the form of
security threats and vulnerabilities. Cyberattacks incur financial
losses for organizations and can affect their reputations. Due to
this, cybersecurity has become critical for business enterprises.
Extensive technological adoption in businesses and the evolution of
FinTech applications require reasonable cybersecurity measures to
protect organizations from internal and external security threats.
Recent advances in the cybersecurity domain such as zero trust
architecture, application of machine learning, and quantum and
post-quantum cryptography have colossal potential to secure
technological infrastructures. Cybersecurity Issues and Challenges
for Business and FinTech Applications discusses theoretical
foundations and empirical studies of cybersecurity implications in
global digital transformation and considers cybersecurity
challenges in diverse business areas. Covering essential topics
such as artificial intelligence, social commerce, and data leakage,
this reference work is ideal for cybersecurity professionals,
business owners, managers, policymakers, researchers, scholars,
academicians, practitioners, instructors, and students.
Wireless communication is continuously evolving to improve and be a
part of our daily communication. This leads to improved quality of
services and applications supported by networking technologies. We
are now able to use LTE, LTE-Advanced, and other emerging
technologies due to the enormous efforts that are made to improve
the quality of service in cellular networks. As the future of
networking is uncertain, the use of deep learning and big data
analytics is a point of focus as it can work in many capacities at
a variety of levels for wireless communications. Implementing Data
Analytics and Architectures for Next Generation Wireless
Communications addresses the existing and emerging theoretical and
practical challenges in the design, development, and implementation
of big data algorithms, protocols, architectures, and applications
for next generation wireless communications and their applications
in smart cities. The chapters of this book bring together academics
and industrial practitioners to exchange, discuss, and implement
the latest innovations and applications of data analytics in
advanced networks. Specific topics covered include key encryption
techniques, smart home appliances, fog communication networks, and
security in the internet of things. This book is valuable for
technologists, data analysts, networking experts, practitioners,
researchers, academicians, and students.
The concept of quantum computing is based on two fundamental
principles of quantum mechanics: superposition and entanglement.
Instead of using bits, qubits are used in quantum computing, which
is a key indicator in the high level of safety and security this
type of cryptography ensures. If interfered with or eavesdropped
in, qubits will delete or refuse to send, which keeps the
information safe. This is vital in the current era where sensitive
and important personal information can be digitally shared online.
In computer networks, a large amount of data is transferred
worldwide daily, including anything from military plans to a
country's sensitive information, and data breaches can be
disastrous. This is where quantum cryptography comes into play. By
not being dependent on computational power, it can easily replace
classical cryptography. Limitations and Future Applications of
Quantum Cryptography is a critical reference that provides
knowledge on the basics of IoT infrastructure using quantum
cryptography, the differences between classical and quantum
cryptography, and the future aspects and developments in this
field. The chapters cover themes that span from the usage of
quantum cryptography in healthcare, to forensics, and more. While
highlighting topics such as 5G networks, image processing,
algorithms, and quantum machine learning, this book is ideally
intended for security professionals, IoT developers, computer
scientists, practitioners, researchers, academicians, and students
interested in the most recent research on quantum computing.
This book addresses the issues with privacy and security in
Internet of things (IoT) networks which are susceptible to
cyber-attacks and proposes deep learning-based approaches using
artificial neural networks models to achieve a safer and more
secured IoT environment. Due to the inadequacy of existing
solutions to cover the entire IoT network security spectrum, the
book utilizes artificial neural network models, which are used to
classify, recognize, and model complex data including images,
voice, and text, to enhance the level of security and privacy of
IoT. This is applied to several IoT applications which include
wireless sensor networks (WSN), meter reading transmission in smart
grid, vehicular ad hoc networks (VANET), industrial IoT and
connected networks. The book serves as a reference for researchers,
academics, and network engineers who want to develop enhanced
security and privacy features in the design of IoT systems.
This book presents intelligent data analysis as a tool to fight
against COVID-19 pandemic. The intelligent data analysis includes
machine learning, natural language processing, and computer vision
applications to teach computers to use big data-based models for
pattern recognition, explanation, and prediction. These functions
are discussed in detail in the book to recognize (diagnose),
predict, and explain (treat) COVID-19 infections, and help manage
socio-economic impacts. It also discusses primary warnings and
alerts; tracking and prediction; data dashboards; diagnosis and
prognosis; treatments and cures; and social control by the use of
intelligent data analysis. It provides analysis reports, solutions
using real-time data, and solution through web applications
details.
The development of software system with acceptable level of
reliability and quality within available time frame and budget
becomes a challenging objective. This objective could be achieved
to some extent through early prediction of number of faults present
in the software, which reduces the cost of development as it
provides an opportunity to make early corrections during
development process. The book presents an early software
reliability prediction model that will help to grow the reliability
of the software systems by monitoring it in each development phase,
i.e. from requirement phase to testing phase. Different approaches
are discussed in this book to tackle this challenging issue. An
important approach presented in this book is a model to classify
the modules into two categories (a) fault-prone and (b) not
fault-prone. The methods presented in this book for assessing
expected number of faults present in the software, assessing
expected number of faults present at the end of each phase and
classification of software modules in fault-prone or no fault-prone
category are easy to understand, develop and use for any
practitioner. The practitioners are expected to gain more
information about their development process and product
reliability, which can help to optimize the resources used.
Defining a new development life-cycle methodology, together with
a set of associated techniques and tools to develop highly critical
systems using formal techniques, this book adopts a rigorous safety
assessment approach explored via several layers (from requirements
analysis to automatic source code generation).
This is assessed and evaluated via a standard case study: the
cardiac pacemaker. Additionally a formalisation of an
Electrocardiogram (ECG) is used to identify anomalies in order to
improve existing medical protocols. This allows the key issue -
that formal methods are not currently integrated into established
critical systems development processes - to be discussed in a
highly effective and informative way.
"Using Event-B for Critical Device Software Systems" serves as a
valuable resource for researchers and students of formal methods.
The assessment of critical systems development is applicable to all
industries, but engineers and physicians from the health domain
will find the cardiac pacemaker case study of particular value.
Hospitals, medical practices and healthcare organizations are
implementing new technologies at breakneck speed. Yet privacy and
security considerations are often an afterthought, putting
healthcare organizations at risk of data security and privacy
issues, fines, damage to their reputations, with serious potential
consequences for the patients. Electronic Health Record systems
(EHRs) consist of clinical notes, patient listings, lab results,
imaging results and screening tests. EHRs are growing in complexity
over time and requiring increasing amounts of data storage. With
the development of the IoT, the Cloud and Smart Cities frameworks,
new privacy and security methods are being pursued to secure
healthcare-based systems and platforms. Presenting a detailed
framework as well as comparative case studies for security
protection, data integrity, privacy preservation, scalability, and
healthcare legislation, this edited volume covers state of the art
research and addresses privacy and security methods and
technologies for EHRs.
This book focuses on recent developments in the field of
two-dimensional nanomaterials for environmental applications. Due
to their high surface area and tunable surface chemistry,
two-dimensional nanomaterials are currently garnering great
interest for environmental remediation applications. This book
compiles contributed chapters from active international researchers
dealing with the development of state-of-the-art two-dimensional
nanomaterials in environmental applications such as water and
wastewater treatment, adsorption, photocatalysis, membrane
separation, desalination, deionization, environmental pollutants
sensing/detection, carbon-dioxide capture and catalytic conversion,
microbial treatment, and electrochemical remediation. Each
chapter provides an essential and comprehensive overview of the
recent advances in material development and application, giving
special attention to preparation methods, tunning of physiochemical
properties, surface and interface chemistry, structural porosity,
assemblies integration for fabrication of devices, and their
relationship with overall efficiency. It offers a valuable
reference guide for environmental and materials scientists,
engineers, and policymakers working towards environmental
sustainability.
This book brings together insights for cancer management from
emerging sophisticated information and communication technologies
such as artificial intelligence, data science, and big data
analytics. It focuses on targeted disease treatment using big data
analytics, providing information about targeted treatment in
oncology, challenges and application of big data in cancer therapy.
Featured topics include: Recent developments in the fields of
artificial intelligence, machine learning, medical imaging,
personalized medicine, computing and data analytics for improved
patient care. Description of the application of big data with AI to
discover new targeting points for cancer treatment. Summary of
several risk assessments in the field of oncology using big data.
Focus on prediction of doses in oncology using big data We are in
the era of large-scale science. In oncology there is a huge number
of data sets grouping information on cancer genomes,
transcriptomes, clinical data, and more. The challenge of big data
in cancer is to integrate all this diversity of data collected into
a unique platform that can be analyzed, leading to the generation
of readable files. The possibility of harnessing information from
all the accumulated data leads to an improvement in cancer patient
treatment and outcome. Solving the big data problem in oncology has
multiple facets. Big data in Oncology: Impact, Challenges, and Risk
Assessment brings together insights from emerging sophisticated
information and communication technologies such as artificial
intelligence, data science, and big data analytics for cancer
management. The book is written for academics, research scholars,
health care professionals, hospital management, pharmaceutical
chemist, biomedical industry, software engineers and IT
professionals.
This reference text discusses recent advances in the field of
nanotechnology with applications in the fields of electronics
sector, agriculture, health services, smart cities, food industry,
and energy sector in a comprehensive manner. The text begins by
discussing important concepts including bio nanotechnology, nano
electronics, nano devices, nano medicine, and nano memories. It
then comprehensively covers applications of nanotechnology in
different areas including healthcare, energy sector, environment,
security and defense, agriculture sector, food industry, automotive
sector, smart cities, and Internet of Things (IoT). Aimed at senior
undergraduate, graduate students and professionals in the fields of
electrical engineering, electronics engineering, nanoscience and
nanotechnology, this text: Discusses nano image sensors useful for
imaging in medical and for security applications. Covers advances
in the field of nanotechnology with their applications. It covers
important concepts including neuro simulators, nano medicine, and
nano materials. Covers applications of nanotechnology in diverse
fields including health sector, agriculture, energy sector, and
electronics.
Machine learning approaches has the capability to learn and adapt
to the constantly evolving demands of large Internet-of-energy
(IoE) network. The focus of this book is on using the machine
learning approaches to present various solutions for IoE network in
smart cities to solve various research gaps such as demand response
management, resource management and effective utilization of the
underlying ICT network. It provides in-depth knowledge to build the
technical understanding for the reader to pursue various research
problems in this field. Moreover, the example problems in smart
cities and their solutions using machine learning are provided as
relatable to the real-life scenarios. Aimed at Graduate Students,
Researchers in Computer Science, Electrical Engineering,
Telecommunication Engineering, Internet of Things, Machine
Learning, Green computing, Smart Grid, this book: Covers all
aspects of Internet of Energy (IoE) and smart cities including
research problems and solutions. Points to the solutions provided
by machine learning to optimize the grids within a smart city
set-up. Discusses relevant IoE design principles and architecture.
Helps to automate various services in smart cities for energy
management. Includes case studies to show the effectiveness of the
discussed schemes.
This book covers theory and practical knowledge of Probabilistic
data structures (PDS) and Blockchain (BC) concepts. It introduces
the applicability of PDS in BC to technology practitioners and
explains each PDS through code snippets and illustrative examples.
Further, it provides references for the applications of PDS to BC
along with implementation codes in python language for various PDS
so that the readers can gain confidence using hands on experience.
Organized into five sections, the book covers IoT technology,
fundamental concepts of BC, PDS and algorithms used to estimate
membership query, cardinality, similarity and frequency, usage of
PDS in BC based IoT and so forth.
|
A Cop in Cricket
Neeraj Kumar
|
R709
Discovery Miles 7 090
|
Ships in 9 - 15 working days
|
This book presents intelligent data analysis as a tool to fight
against COVID-19 pandemic. The intelligent data analysis includes
machine learning, natural language processing, and computer vision
applications to teach computers to use big data-based models for
pattern recognition, explanation, and prediction. These functions
are discussed in detail in the book to recognize (diagnose),
predict, and explain (treat) COVID-19 infections, and help manage
socio-economic impacts. It also discusses primary warnings and
alerts; tracking and prediction; data dashboards; diagnosis and
prognosis; treatments and cures; and social control by the use of
intelligent data analysis. It provides analysis reports, solutions
using real-time data, and solution through web applications
details.
Present book covers new paradigms in Blockchain, Big Data and
Machine Learning concepts including applications and case studies.
It explains dead fusion in realizing the privacy and security of
blockchain based data analytic environment. Recent research of
security based on big data, blockchain and machine learning has
been explained through actual work by practitioners and
researchers, including their technical evaluation and comparison
with existing technologies. The theoretical background and
experimental case studies related to real-time environment are
covered as well. Aimed at Senior undergraduate students,
researchers and professionals in computer science and engineering
and electrical engineering, this book: Converges Blockchain, Big
Data and Machine learning in one volume. Connects Blockchain
technologies with the data centric applications such Big data and
E-Health. Easy to understand examples on how to create your own
blockchain supported by case studies of blockchain in different
industries. Covers big data analytics examples using R. Includes
lllustrative examples in python for blockchain creation.
This book features selected research papers presented at the First
International Conference on Computing, Communications, and
Cyber-Security (IC4S 2019), organized by Northwest Group of
Institutions, Punjab, India, Southern Federal University, Russia,
and IAC Educational Trust, India along with KEC, Ghaziabad and ITS,
College Ghaziabad as an academic partner and held on 12-13 October
2019. It includes innovative work from researchers, leading
innovators and professionals in the area of communication and
network technologies, advanced computing technologies, data
analytics and intelligent learning, the latest electrical and
electronics trends, and security and privacy issues.
Present book covers new paradigms in Blockchain, Big Data and
Machine Learning concepts including applications and case studies.
It explains dead fusion in realizing the privacy and security of
blockchain based data analytic environment. Recent research of
security based on big data, blockchain and machine learning has
been explained through actual work by practitioners and
researchers, including their technical evaluation and comparison
with existing technologies. The theoretical background and
experimental case studies related to real-time environment are
covered as well. Aimed at Senior undergraduate students,
researchers and professionals in computer science and engineering
and electrical engineering, this book: Converges Blockchain, Big
Data and Machine learning in one volume. Connects Blockchain
technologies with the data centric applications such Big data and
E-Health. Easy to understand examples on how to create your own
blockchain supported by case studies of blockchain in different
industries. Covers big data analytics examples using R. Includes
lllustrative examples in python for blockchain creation.
The development of software system with acceptable level of
reliability and quality within available time frame and budget
becomes a challenging objective. This objective could be achieved
to some extent through early prediction of number of faults present
in the software, which reduces the cost of development as it
provides an opportunity to make early corrections during
development process. The book presents an early software
reliability prediction model that will help to grow the reliability
of the software systems by monitoring it in each development phase,
i.e. from requirement phase to testing phase. Different approaches
are discussed in this book to tackle this challenging issue. An
important approach presented in this book is a model to classify
the modules into two categories (a) fault-prone and (b) not
fault-prone. The methods presented in this book for assessing
expected number of faults present in the software, assessing
expected number of faults present at the end of each phase and
classification of software modules in fault-prone or no fault-prone
category are easy to understand, develop and use for any
practitioner. The practitioners are expected to gain more
information about their development process and product
reliability, which can help to optimize the resources used.
This book covers the different technologies of Internet, and
machine learning capabilities involved in Cognitive Internet of
Things (CIoT). Machine learning is explored by covering all the
technical issues and various models used for data analytics during
decision making at different steps. It initiates with IoT basics,
its history, architecture and applications followed by capabilities
of CIoT in real world and description of machine learning (ML) in
data mining. Further, it explains various ML techniques and
paradigms with different phases of data pre-processing and feature
engineering. Each chapter includes sample questions to help
understand concepts of ML used in different applications. Explains
integration of Machine Learning in IoT for building an efficient
decision support system Covers IoT, CIoT, machine learning
paradigms and models Includes implementation of machine learning
models in R Help the analysts and developers to work efficiently
with emerging technologies such as data analytics, data processing,
Big Data, Robotics Includes programming codes in Python/Matlab/R
alongwith practical examples, questions and multiple choice
questions
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R369
Discovery Miles 3 690
Loot
Nadine Gordimer
Paperback
(2)
R398
R369
Discovery Miles 3 690
|