Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 25 of 42 matches in All Departments
Digital transformation in organizations optimizes the business processes but also brings additional challenges in the form of security threats and vulnerabilities. Cyberattacks incur financial losses for organizations and can affect their reputations. Due to this, cybersecurity has become critical for business enterprises. Extensive technological adoption in businesses and the evolution of FinTech applications require reasonable cybersecurity measures to protect organizations from internal and external security threats. Recent advances in the cybersecurity domain such as zero trust architecture, application of machine learning, and quantum and post-quantum cryptography have colossal potential to secure technological infrastructures. Cybersecurity Issues and Challenges for Business and FinTech Applications discusses theoretical foundations and empirical studies of cybersecurity implications in global digital transformation and considers cybersecurity challenges in diverse business areas. Covering essential topics such as artificial intelligence, social commerce, and data leakage, this reference work is ideal for cybersecurity professionals, business owners, managers, policymakers, researchers, scholars, academicians, practitioners, instructors, and students.
Wireless communication is continuously evolving to improve and be a part of our daily communication. This leads to improved quality of services and applications supported by networking technologies. We are now able to use LTE, LTE-Advanced, and other emerging technologies due to the enormous efforts that are made to improve the quality of service in cellular networks. As the future of networking is uncertain, the use of deep learning and big data analytics is a point of focus as it can work in many capacities at a variety of levels for wireless communications. Implementing Data Analytics and Architectures for Next Generation Wireless Communications addresses the existing and emerging theoretical and practical challenges in the design, development, and implementation of big data algorithms, protocols, architectures, and applications for next generation wireless communications and their applications in smart cities. The chapters of this book bring together academics and industrial practitioners to exchange, discuss, and implement the latest innovations and applications of data analytics in advanced networks. Specific topics covered include key encryption techniques, smart home appliances, fog communication networks, and security in the internet of things. This book is valuable for technologists, data analysts, networking experts, practitioners, researchers, academicians, and students.
The concept of quantum computing is based on two fundamental principles of quantum mechanics: superposition and entanglement. Instead of using bits, qubits are used in quantum computing, which is a key indicator in the high level of safety and security this type of cryptography ensures. If interfered with or eavesdropped in, qubits will delete or refuse to send, which keeps the information safe. This is vital in the current era where sensitive and important personal information can be digitally shared online. In computer networks, a large amount of data is transferred worldwide daily, including anything from military plans to a country's sensitive information, and data breaches can be disastrous. This is where quantum cryptography comes into play. By not being dependent on computational power, it can easily replace classical cryptography. Limitations and Future Applications of Quantum Cryptography is a critical reference that provides knowledge on the basics of IoT infrastructure using quantum cryptography, the differences between classical and quantum cryptography, and the future aspects and developments in this field. The chapters cover themes that span from the usage of quantum cryptography in healthcare, to forensics, and more. While highlighting topics such as 5G networks, image processing, algorithms, and quantum machine learning, this book is ideally intended for security professionals, IoT developers, computer scientists, practitioners, researchers, academicians, and students interested in the most recent research on quantum computing.
This book addresses the issues with privacy and security in Internet of things (IoT) networks which are susceptible to cyber-attacks and proposes deep learning-based approaches using artificial neural networks models to achieve a safer and more secured IoT environment. Due to the inadequacy of existing solutions to cover the entire IoT network security spectrum, the book utilizes artificial neural network models, which are used to classify, recognize, and model complex data including images, voice, and text, to enhance the level of security and privacy of IoT. This is applied to several IoT applications which include wireless sensor networks (WSN), meter reading transmission in smart grid, vehicular ad hoc networks (VANET), industrial IoT and connected networks. The book serves as a reference for researchers, academics, and network engineers who want to develop enhanced security and privacy features in the design of IoT systems.
This book presents intelligent data analysis as a tool to fight against COVID-19 pandemic. The intelligent data analysis includes machine learning, natural language processing, and computer vision applications to teach computers to use big data-based models for pattern recognition, explanation, and prediction. These functions are discussed in detail in the book to recognize (diagnose), predict, and explain (treat) COVID-19 infections, and help manage socio-economic impacts. It also discusses primary warnings and alerts; tracking and prediction; data dashboards; diagnosis and prognosis; treatments and cures; and social control by the use of intelligent data analysis. It provides analysis reports, solutions using real-time data, and solution through web applications details.
The development of software system with acceptable level of reliability and quality within available time frame and budget becomes a challenging objective. This objective could be achieved to some extent through early prediction of number of faults present in the software, which reduces the cost of development as it provides an opportunity to make early corrections during development process. The book presents an early software reliability prediction model that will help to grow the reliability of the software systems by monitoring it in each development phase, i.e. from requirement phase to testing phase. Different approaches are discussed in this book to tackle this challenging issue. An important approach presented in this book is a model to classify the modules into two categories (a) fault-prone and (b) not fault-prone. The methods presented in this book for assessing expected number of faults present in the software, assessing expected number of faults present at the end of each phase and classification of software modules in fault-prone or no fault-prone category are easy to understand, develop and use for any practitioner. The practitioners are expected to gain more information about their development process and product reliability, which can help to optimize the resources used.
Defining a new development life-cycle methodology, together with a set of associated techniques and tools to develop highly critical systems using formal techniques, this book adopts a rigorous safety assessment approach explored via several layers (from requirements analysis to automatic source code generation). This is assessed and evaluated via a standard case study: the cardiac pacemaker. Additionally a formalisation of an Electrocardiogram (ECG) is used to identify anomalies in order to improve existing medical protocols. This allows the key issue - that formal methods are not currently integrated into established critical systems development processes - to be discussed in a highly effective and informative way. "Using Event-B for Critical Device Software Systems" serves as a valuable resource for researchers and students of formal methods. The assessment of critical systems development is applicable to all industries, but engineers and physicians from the health domain will find the cardiac pacemaker case study of particular value.
This book focuses on recent developments in the field of two-dimensional nanomaterials for environmental applications. Due to their high surface area and tunable surface chemistry, two-dimensional nanomaterials are currently garnering great interest for environmental remediation applications. This book compiles contributed chapters from active international researchers dealing with the development of state-of-the-art two-dimensional nanomaterials in environmental applications such as water and wastewater treatment, adsorption, photocatalysis, membrane separation, desalination, deionization, environmental pollutants sensing/detection, carbon-dioxide capture and catalytic conversion, microbial treatment, and electrochemical remediation. Each chapter provides an essential and comprehensive overview of the recent advances in material development and application, giving special attention to preparation methods, tunning of physiochemical properties, surface and interface chemistry, structural porosity, assemblies integration for fabrication of devices, and their relationship with overall efficiency. It offers a valuable reference guide for environmental and materials scientists, engineers, and policymakers working towards environmental sustainability.
Hospitals, medical practices and healthcare organizations are implementing new technologies at breakneck speed. Yet privacy and security considerations are often an afterthought, putting healthcare organizations at risk of data security and privacy issues, fines, damage to their reputations, with serious potential consequences for the patients. Electronic Health Record systems (EHRs) consist of clinical notes, patient listings, lab results, imaging results and screening tests. EHRs are growing in complexity over time and requiring increasing amounts of data storage. With the development of the IoT, the Cloud and Smart Cities frameworks, new privacy and security methods are being pursued to secure healthcare-based systems and platforms. Presenting a detailed framework as well as comparative case studies for security protection, data integrity, privacy preservation, scalability, and healthcare legislation, this edited volume covers state of the art research and addresses privacy and security methods and technologies for EHRs.
This book brings together insights for cancer management from emerging sophisticated information and communication technologies such as artificial intelligence, data science, and big data analytics. It focuses on targeted disease treatment using big data analytics, providing information about targeted treatment in oncology, challenges and application of big data in cancer therapy. Featured topics include: Recent developments in the fields of artificial intelligence, machine learning, medical imaging, personalized medicine, computing and data analytics for improved patient care. Description of the application of big data with AI to discover new targeting points for cancer treatment. Summary of several risk assessments in the field of oncology using big data. Focus on prediction of doses in oncology using big data We are in the era of large-scale science. In oncology there is a huge number of data sets grouping information on cancer genomes, transcriptomes, clinical data, and more. The challenge of big data in cancer is to integrate all this diversity of data collected into a unique platform that can be analyzed, leading to the generation of readable files. The possibility of harnessing information from all the accumulated data leads to an improvement in cancer patient treatment and outcome. Solving the big data problem in oncology has multiple facets. Big data in Oncology: Impact, Challenges, and Risk Assessment brings together insights from emerging sophisticated information and communication technologies such as artificial intelligence, data science, and big data analytics for cancer management. The book is written for academics, research scholars, health care professionals, hospital management, pharmaceutical chemist, biomedical industry, software engineers and IT professionals.
This reference text discusses recent advances in the field of nanotechnology with applications in the fields of electronics sector, agriculture, health services, smart cities, food industry, and energy sector in a comprehensive manner. The text begins by discussing important concepts including bio nanotechnology, nano electronics, nano devices, nano medicine, and nano memories. It then comprehensively covers applications of nanotechnology in different areas including healthcare, energy sector, environment, security and defense, agriculture sector, food industry, automotive sector, smart cities, and Internet of Things (IoT). Aimed at senior undergraduate, graduate students and professionals in the fields of electrical engineering, electronics engineering, nanoscience and nanotechnology, this text: Discusses nano image sensors useful for imaging in medical and for security applications. Covers advances in the field of nanotechnology with their applications. It covers important concepts including neuro simulators, nano medicine, and nano materials. Covers applications of nanotechnology in diverse fields including health sector, agriculture, energy sector, and electronics.
Machine learning approaches has the capability to learn and adapt to the constantly evolving demands of large Internet-of-energy (IoE) network. The focus of this book is on using the machine learning approaches to present various solutions for IoE network in smart cities to solve various research gaps such as demand response management, resource management and effective utilization of the underlying ICT network. It provides in-depth knowledge to build the technical understanding for the reader to pursue various research problems in this field. Moreover, the example problems in smart cities and their solutions using machine learning are provided as relatable to the real-life scenarios. Aimed at Graduate Students, Researchers in Computer Science, Electrical Engineering, Telecommunication Engineering, Internet of Things, Machine Learning, Green computing, Smart Grid, this book: Covers all aspects of Internet of Energy (IoE) and smart cities including research problems and solutions. Points to the solutions provided by machine learning to optimize the grids within a smart city set-up. Discusses relevant IoE design principles and architecture. Helps to automate various services in smart cities for energy management. Includes case studies to show the effectiveness of the discussed schemes.
Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.
This book presents intelligent data analysis as a tool to fight against COVID-19 pandemic. The intelligent data analysis includes machine learning, natural language processing, and computer vision applications to teach computers to use big data-based models for pattern recognition, explanation, and prediction. These functions are discussed in detail in the book to recognize (diagnose), predict, and explain (treat) COVID-19 infections, and help manage socio-economic impacts. It also discusses primary warnings and alerts; tracking and prediction; data dashboards; diagnosis and prognosis; treatments and cures; and social control by the use of intelligent data analysis. It provides analysis reports, solutions using real-time data, and solution through web applications details.
Artificial Intelligence and Machine Learning for Predictive and Analytical Rendering in Edge Computing focuses on the role of AI and machine learning as it impacts and works alongside Edge Computing. Sections cover the growing number of devices and applications in diversified domains of industry, including gaming, speech recognition, medical diagnostics, robotics and computer vision and how they are being driven by Big Data, Artificial Intelligence, Machine Learning and distributed computing, may it be Cloud Computing or the evolving Fog and Edge Computing paradigms. Challenges covered include remote storage and computing, bandwidth overload due to transportation of data from End nodes to Cloud leading in latency issues, security issues in transporting sensitive medical and financial information across larger gaps in points of data generation and computing, as well as design features of Edge nodes to store and run AI/ML algorithms for effective rendering.
The Blockchain Technology for Secure and Smart Applications across Industry Verticals, Volume 121, presents the latest information on a type of distributed ledger used for maintaining a permanent and tamper-proof record of transactional data. The book presents a novel compendium of existing and budding Blockchain technologies for various smart applications. Chapters in this new release include the Basics of Blockchain, The Blockchain History, Architecture of Blockchain, Core components of Blockchain, Blockchain 2.0: Smart Contracts, Empowering Digital Twins with Blockchain, Industrial Use Cases at the Cusp of the IoT and Blockchain Paradigms, Blockchain Components and Concepts, Digital Signatures, Accumulators, Financial Systems, and more. This book is a unique effort to illuminate various techniques to represent, improve and authorize multi-institutional and multidisciplinary research in a different type of smart applications, like the financial system, smart grid, transportation system, etc. Readers in identity-privacy, traceability, immutability, transparency, auditability, and security will find it to be a valuable resource.
Stem Cells: An Alternative Therapy for COVID-19 and Cytokine Storm provides mechanistic insights into the role of stem cells to combat COVID-19 outbreak and other pathologies where cytokines storm is the cause of concern for e.g., radiation exposure, multiple organ failure and sepsis. There has been an increase in number of cases of new diseases in the last decade, including mucormycosis, Zika virus, H1N1 influenza virus, among others. These diseases can be characterized by the induction of cytokine storm, which is mainly responsible for morbidity and mortality. Stem cell therapy has emerged as a potential treatment for viral diseases, including, but not limited to, COVID-19. Interestingly, clinical trials in patients with COVID-19 complications depicted faster recovery in patients post mesenchymal stem cells therapy owing to the decreased cytokines levels, anti-viral effects and regeneration of the infected tissue.
Present book covers new paradigms in Blockchain, Big Data and Machine Learning concepts including applications and case studies. It explains dead fusion in realizing the privacy and security of blockchain based data analytic environment. Recent research of security based on big data, blockchain and machine learning has been explained through actual work by practitioners and researchers, including their technical evaluation and comparison with existing technologies. The theoretical background and experimental case studies related to real-time environment are covered as well. Aimed at Senior undergraduate students, researchers and professionals in computer science and engineering and electrical engineering, this book: Converges Blockchain, Big Data and Machine learning in one volume. Connects Blockchain technologies with the data centric applications such Big data and E-Health. Easy to understand examples on how to create your own blockchain supported by case studies of blockchain in different industries. Covers big data analytics examples using R. Includes lllustrative examples in python for blockchain creation.
This book features selected research papers presented at the First International Conference on Computing, Communications, and Cyber-Security (IC4S 2019), organized by Northwest Group of Institutions, Punjab, India, Southern Federal University, Russia, and IAC Educational Trust, India along with KEC, Ghaziabad and ITS, College Ghaziabad as an academic partner and held on 12-13 October 2019. It includes innovative work from researchers, leading innovators and professionals in the area of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues. |
You may like...
The Case for Hope - What I Learned on My…
Jennifer Laguzza Dickenson
Hardcover
The Lie Of 1652 - A Decolonised History…
Patric Mellet
Paperback
(7)
Women In Solitary - Inside The Female…
Shanthini Naidoo
Paperback
(1)
|