Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 24 of 24 matches in All Departments
This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers' goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains. This book is motivating to address privacy threats in new inventions for a wide range of stakeholders like layman to educated users, villages to metros and national to global levels. This book contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols. The main endeavour of this book is threat analysis and activity modelling of attacks in order to give an actual view of the ubiquitous computing applications. The unique approach will help readers for a better understanding.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fourth International Conference on Information and Communication Technology for Intelligent Systems, which was held in Ahmedabad, India. Divided into two volumes, the book discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fourth International Conference on Information and Communication Technology for Intelligent Systems, which was held in Ahmedabad, India. Divided into two volumes, the book discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.
This book contains 74 papers presented at ICTCS 2017: Third International Conference on Information and Communication Technology for Competitive Strategies. The conference was held during 16-17 December 2017, Udaipur, India and organized by Association of Computing Machinery, Udaipur Professional Chapter in association with The Institution of Engineers (India), Udaipur Local Center and Global Knowledge Research Foundation. This book contains papers mainly focused on ICT for Computation, Algorithms and Data Analytics and IT Security etc.
This book presents some of the most advanced leading-edge technology for the fourth Industrial Revolution -- known as “Industry 4.0.†The book provides a comprehensive understanding of the interconnections of AI, IoT, big data and cloud computing as integral to the technologies that revolutionize the way companies produce and distribute products and the way local governments deliver their services. The book emphasizes that at every phase of the supply chain, manufactures are found to be interweaving AI, robotics, IoT, big data/machine learning, and cloud computing into their production facilities and throughout their distribution networks. Equally important, the authors show how their research can be applied to computer vision, cyber security, database and compiler theory, natural language processing, healthcare, education and agriculture. Presents the fundamentals of AI, IoT, and cloud computing and how they can be incorporated in Industry 4.0 applications Motivates readers to address challenges in the areas of speech communication and signal processing Provides numerous examples, case studies, technical descriptions, and approaches of AI/ML
This book addresses a broad range of topics concerning machine learning, big data, the Internet of things (IoT), and security in the IoT. Its goal is to bring together several innovative studies on these areas, in order to help researchers, engineers, and designers in several interdisciplinary domains pursue related applications. It presents an overview of the various algorithms used, focusing on the advantages and disadvantages of each in the fields of machine learning and big data. It also covers next-generation computing paradigms that are expected to support wireless networking with high data transfer rates and autonomous decision-making capabilities. In turn, the book discusses IoT applications (e.g. healthcare applications) that generate a huge amount of sensor data and imaging data that must be handled correctly for further processing. In the traditional IoT ecosystem, cloud computing offers a solution for the efficient management of huge amounts of data, thanks to its ability to access shared resources and provide a common infrastructure in a ubiquitous manner. Though these new technologies are invaluable, they also reveal serious IoT security challenges. IoT applications are vulnerable to various types of attack such as eavesdropping, spoofing and false data injection, the man-in-the-middle attack, replay attack, denial-of-service attack, jamming attack, flooding attack, etc. These and other security issues in the Internet of things are explored in detail. In addition to highlighting outstanding research and recent advances from around the globe, the book reports on current challenges and future directions in the IoT. Accordingly, it offers engineers, professionals, researchers, and designers an applied-oriented resource to support them in a broad range of interdisciplinary areas.
This book gives a comprehensive view of graph theory in informational retrieval (IR) and natural language processing(NLP). This book provides number of graph techniques for IR and NLP applications with examples. It also provides understanding of graph theory basics, graph algorithms and networks using graph. The book is divided into three parts and contains nine chapters. The first part gives graph theory basics and graph networks, and the second part provides basics of IR with graph-based information retrieval. The third part covers IR and NLP recent and emerging applications with case studies using graph theory. This book is unique in its way as it provides a strong foundation to a beginner in applying mathematical structure graph for IR and NLP applications. All technical details that include tools and technologies used for graph algorithms and implementation in Information Retrieval and Natural Language Processing with its future scope are explained in a clear and organized format.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fifth International Conference on Information and Communication Technology for Intelligent Systems (ICTIS 2021), held in Ahmedabad, India. The book is divided into two volumes. It discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.
This book covers the topic of data science in a comprehensive manner and synthesizes both fundamental and advanced topics of a research area that has now reached its maturity. The book starts with the basic concepts of data science. It highlights the types of data and their use and importance, followed by a discussion on a wide range of applications of data science and widely used techniques in data science. Key Features * Provides an internationally respected collection of scientific research methods, technologies and applications in the area of data science. * Presents predictive outcomes by applying data science techniques to real-life applications. * Provides readers with the tools, techniques and cases required to excel with modern artificial intelligence methods. * Gives the reader a variety of intelligent applications that can be designed using data science and its allied fields. The book is aimed primarily at advanced undergraduates and graduates studying machine learning and data science. Researchers and professionals will also find this book useful.
Covers different technologies like AI, IoT and Signal Processing in the context of biomedical applications Reviews medical image analysis, disease detection, and prediction Comprehends the advantage of recent technologies for medical record keeping through electronics health records (EHRs) Presents state of art research in the field of biomedical engineering using various physiological signals Explores different Bio Sensors used in Healthcare Applications using IoT
Provides overview of security challenges of IoT and mitigation techniques with a focus on authorization and access control mechanisms Discusses behavioural analysis of threats and attacks using UML base modelling Covers use of Oauth2.0 Protocol and UMA for connecting web applications Includes Role Based Access Control (RBAC), Discretionary Access Control (DAC), Mandatory Access Control (MAC), and Permission Based Access Control (PBAC) Explores how to provide access to third party web applications through resource server by use of secured and reliable Oauth2.0 framework
VANET (vehicular ad hoc network) is a subgroup of MANET (mobile ad hoc network). It enables communication among vehicles on the road and between related infrastructures. This book addresses the basic elements of VANET along with components involved in the communication with their functionalities and configurations. It contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms, and protocols, and addresses the different services provided by VANET with the help of a scenario showing a network tackling an emergency. Features: * Covers all important concepts of VANET for beginners and different road scenarios in VANET * Covers essential communication protocols in VANET * Introduces approaches for VANET implementation using simulators * Provides a classification of messages and a priority-based message forwarding strategy This book is aimed at undergraduates, postgraduates, industry, researchers, and research scholars in information and communications technology.
Epidemic trend analysis, timeline progression, prediction, and recommendation are critical for initiating effective public health control strategies, and AI and data analytics play an important role in epidemiology, diagnostic, and clinical fronts. The focus of this book is data analytics for COVID-19, which includes an overview of COVID-19 in terms of epidemic/pandemic, data processing and knowledge extraction. Data sources, storage and platforms are discussed along with discussions on data models, their performance, different big data techniques, tools and technologies. This book also addresses the challenges in applying analytics to pandemic scenarios, case studies and control strategies. Aimed at Data Analysts, Epidemiologists and associated researchers, this book: discusses challenges of AI model for big data analytics in pandemic scenarios; explains how different big data analytics techniques can be implemented; provides a set of recommendations to minimize infection rate of COVID-19; summarizes various techniques of data processing and knowledge extraction; enables users to understand big data analytics techniques required for prediction purposes.
Artificial Intelligence in Information and Communication Technologies, Healthcare and Education: A Roadmap Ahead is designed as a reference text and discusses inter-dependability, communication and effective control for the betterment of services through artificial intelligence (AI), as well as the challenges and path ahead for AI in computing and control across different domains of business and human life. The book accommodates technologies and application domains including backbone hardware, systems and methods for deployment, which help incorporating intelligence through different supervised and probabilistic learning approaches. Features The book attempts to establish a connection between hardware, software technologies and algorithmic intelligence for data analysis and decision support in domains such as healthcare, education and other aspects of business and mobility. It presents various recent applications of artificial intelligence in information and communication technologies such as search and optimization methods, machine learning, data representation and ontologies, and multi-agent systems. The book provides a collection of different case studies with experimentation results than mere theoretical and generalized approaches. Covers most of the applications using the trending technologies like machine learning (ML), data science (DS), Internet of Things (IoT), and underlying information and communication technologies. The book is aimed primarily at advanced undergraduates and postgraduate students studying computer science, computer applications, and information technology. Researchers and professionals will also find this book useful.
The Internet of Things is a wide-reaching network of devices, and these devices can intercommunicate and collaborate with each other to produce variety of services at any time, any place, and in any way. Maintaining access control, authentication and managing the identity of devices while they interact with other devices, services and people is an important challenge for identity management. The identity management presents significant challenges in the current Internet communication. These challenges are exacerbated in the internet of things by the unbound number of devices and expected limitations in constrained resources. Current identity management solutions are mainly concerned with identities that are used by end users, and services to identify themselves in the networked world. However, these identity management solutions are designed by considering that significant resources are available and applicability of these identity management solutions to the resource constrained internet of things needs a thorough analysis. Technical topics discussed in the book include: * Internet of Things; * Identity Management; * Identity models in Internet of Things; * Identity management and trust in the Internet of Things context; * Authentication and access control; Identitymanagement for Internet of Things contributes to the area of identity management for ubiquitous devices in the Internet of Things. It initially presents the motivational factors together with the identity management problems in the context of Internet of Things and proposes an identity management framework. Following this, it refers to the major challenges for Identitymanagement and presents different identity management models. This book also presents relationship between identity and trust, different approaches for trust management, authentication and access control.Key milestones identified for Identitymanagement are clustering with hierarchical addressing, trust management, mutual authentication and access control. Identitymanagement for Internet of Things is ideal forpersonnel in computer/communication industries as well as academic staff and master/research students in wireless communication, computer science, operational research, electrical engineering andtelecommunication systems Internet, and cloud computing.
This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers' goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains. This book is motivating to address privacy threats in new inventions for a wide range of stakeholders like layman to educated users, villages to metros and national to global levels. This book contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols. The main endeavour of this book is threat analysis and activity modelling of attacks in order to give an actual view of the ubiquitous computing applications. The unique approach will help readers for a better understanding.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fourth International Conference on Information and Communication Technology for Intelligent Systems, which was held in Ahmedabad, India. Divided into two volumes, the book discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fourth International Conference on Information and Communication Technology for Intelligent Systems, which was held in Ahmedabad, India. Divided into two volumes, the book discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.
Covers IoT-cloud convergence with a focus on complex industrial IoT case studies Discusses the broad background of IoT-cloud convergence architectures and their fundamentals along with resource provisioning mechanisms Emphasizes the use of context in developing context aware IoT solutions Presents a novel C-model that explains the IoT application development phases Discusses a simplified convergence model that depicts the role of cloud in an IoT application
This book addresses a broad range of topics concerning machine learning, big data, the Internet of things (IoT), and security in the IoT. Its goal is to bring together several innovative studies on these areas, in order to help researchers, engineers, and designers in several interdisciplinary domains pursue related applications. It presents an overview of the various algorithms used, focusing on the advantages and disadvantages of each in the fields of machine learning and big data. It also covers next-generation computing paradigms that are expected to support wireless networking with high data transfer rates and autonomous decision-making capabilities. In turn, the book discusses IoT applications (e.g. healthcare applications) that generate a huge amount of sensor data and imaging data that must be handled correctly for further processing. In the traditional IoT ecosystem, cloud computing offers a solution for the efficient management of huge amounts of data, thanks to its ability to access shared resources and provide a common infrastructure in a ubiquitous manner. Though these new technologies are invaluable, they also reveal serious IoT security challenges. IoT applications are vulnerable to various types of attack such as eavesdropping, spoofing and false data injection, the man-in-the-middle attack, replay attack, denial-of-service attack, jamming attack, flooding attack, etc. These and other security issues in the Internet of things are explored in detail. In addition to highlighting outstanding research and recent advances from around the globe, the book reports on current challenges and future directions in the IoT. Accordingly, it offers engineers, professionals, researchers, and designers an applied-oriented resource to support them in a broad range of interdisciplinary areas.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fifth International Conference on Information and Communication Technology for Intelligent Systems (ICTIS 2021), held in Ahmedabad, India. The book is divided into two volumes. It discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.
This book covers all small details about Underwater Sensor Networks (UWSN). Researchers can use this book as a prerequisite before starting any research on underwater networks or underwater applications. This book covers the introduction, challenges, different architectural models for UWSN, various attacks on UWSN, underwater applications, and networking layers. The target audience includes professors and students in engineering, and researchers and engineers working on marine applications. In academic level, the book is helpful for students having Networking and Information Security as elective subject and doing projects in Wireless Networks. It is also helpful for spostgraduates and Ph.D. researchers to learn basics of Underwater Sensor Networks.
This book offers a basic understanding of the Internet of Things (IoT), its design issues and challenges for healthcare applications. It also provides details of the challenges of healthcare big data, role of big data in healthcare and techniques, and tools for IoT in healthcare. This book offers a strong foundation to a beginner. All technical details that include healthcare data collection unit, technologies and tools used for the big data analytics implementation are explained in a clear and organized format.
This book is focused on the impact of the COVID-19 pandemic on different sectors, i.e., education, real estate, health, and agriculture. The lockdown has been announced to control the spread of COVID-19 infections, however people/industries/organizations were not ready for lockdown and it has greatly affected their growth. The front workers in the healthcare sector suffered a lot as major responsibilities they needed to carry on. The education sector is also hampered due to the pandemic as schools, colleges were closed and teaching, examinations were carried out on online platforms. These platforms were new to teachers as well as students. The real estate sector faced tremendous loss in this pandemic as people were scared and no one ready to invest their money in such an uncertain time. The agriculture filed is also suffered as raw materials required for agriculture were not available readily due to pandemic. This book presents a survey that is conducted to understand the impact of COVID-19 on the quality of work-life in various sectors. The survey is focused majorly on four sectors, i.e. education, healthcare, real estate and agriculture. Data analysis is done based on responses of survey and mathematical modeling is provided for each case study.
|
You may like...
|