|
|
Showing 1 - 10 of
10 matches in All Departments
Cloud technologies have revolutionized the way we store information
and perform various computing tasks. With the rise of this new
technology, the ability to secure information stored on the cloud
becomes a concern. The Handbook of Research on Securing Cloud-Based
Databases with Biometric Applications explores the latest
innovations in promoting cloud security through human
authentication techniques. Exploring methods of access by
identification, including the analysis of facial features,
fingerprints, DNA, dental characteristics, and voice patterns, this
publication is designed especially for IT professionals,
academicians, and upper-level students seeking current research
surrounding cloud security.
This book focuses on recent technical advancements and state-of-the
art technologies for analyzing characteristic features and
probabilistic modelling of complex social networks and
decentralized online network architectures. Such research results
in applications related to surveillance and privacy, fraud
analysis, cyber forensics, propaganda campaigns, as well as for
online social networks such as Facebook. The text illustrates the
benefits of using advanced social network analysis methods through
application case studies based on practical test results from
synthetic and real-world data. This book will appeal to researchers
and students working in these areas.
This three volume book contains the Proceedings of 5th
International Conference on Advanced Computing, Networking and
Informatics (ICACNI 2017). The book focuses on the recent
advancement of the broad areas of advanced computing, networking
and informatics. It also includes novel approaches devised by
researchers from across the globe. This book brings together
academic scientists, professors, research scholars and students to
share and disseminate information on knowledge and scientific
research works related to computing, networking, and informatics to
discuss the practical challenges encountered and the solutions
adopted. The book also promotes translation of basic research into
applied investigation and convert applied investigation into
practice.
This two-volume book focuses on both theory and applications in the
broad areas of communication technology, computer science and
information security. It brings together contributions from
scientists, professors, scholars and students, and presents
essential information on computing, networking, and informatics. It
also discusses the practical challenges encountered and the
solutions used to overcome them, the goal being to promote the
"translation" of basic research into applied research, and of
applied research into practice. The works presented here will also
demonstrate the importance of basic scientific research in a range
of fields.
This two-volume book focuses on both theory and applications in the
broad areas of communication technology, computer science and
information security. It brings together contributions from
scientists, professors, scholars and students, and presents
essential information on computing, networking, and informatics. It
also discusses the practical challenges encountered and the
solutions used to overcome them, the goal being to promote the
"translation" of basic research into applied research, and of
applied research into practice. The works presented here will also
demonstrate the importance of basic scientific research in a range
of fields.
The book focuses on both theory and applications in the broad areas
of communication technology, computer science and information
security. This two volume book contains the Proceedings of
International Conference on Advanced Computing and Intelligent
Engineering. These volumes bring together academic scientists,
professors, research scholars and students to share and disseminate
information on knowledge and scientific research works related to
computing, networking, and informatics to discuss the practical
challenges encountered and the solutions adopted. The book also
promotes translation of basic research into applied investigation
and convert applied investigation into practice.
This three volume book contains the Proceedings of 5th
International Conference on Advanced Computing, Networking and
Informatics (ICACNI 2017). The book focuses on the recent
advancement of the broad areas of advanced computing, networking
and informatics. It also includes novel approaches devised by
researchers from across the globe. This book brings together
academic scientists, professors, research scholars and students to
share and disseminate information on knowledge and scientific
research works related to computing, networking, and informatics to
discuss the practical challenges encountered and the solutions
adopted. The book also promotes translation of basic research into
applied investigation and convert applied investigation into
practice.
This three volume book contains the Proceedings of 5th
International Conference on Advanced Computing, Networking and
Informatics (ICACNI 2017). The book focuses on the recent
advancement of the broad areas of advanced computing, networking
and informatics. It also includes novel approaches devised by
researchers from across the globe. This book brings together
academic scientists, professors, research scholars and students to
share and disseminate information on knowledge and scientific
research works related to computing, networking, and informatics to
discuss the practical challenges encountered and the solutions
adopted. The book also promotes translation of basic research into
applied investigation and convert applied investigation into
practice.
This book focuses on both theory and applications in the broad
areas of computational intelligence and machine learning. The
proceedings of the Seventh International Conference on Advanced
Computing, Networking, and Informatics (ICACNI 2019) present
research papers in the areas of advanced computing, networking, and
informatics. It brings together contributions from scientists,
professors, scholars, and students and presents essential
information on the topic. It also discusses the practical
challenges encountered and the solutions used to overcome them, the
goal being to promote the "translation" of basic research into
applied research and of applied research into practice. The works
presented here also demonstrate the importance of basic scientific
research in a range of fields.
This book focuses on recent technical advancements and state-of-the
art technologies for analyzing characteristic features and
probabilistic modelling of complex social networks and
decentralized online network architectures. Such research results
in applications related to surveillance and privacy, fraud
analysis, cyber forensics, propaganda campaigns, as well as for
online social networks such as Facebook. The text illustrates the
benefits of using advanced social network analysis methods through
application case studies based on practical test results from
synthetic and real-world data. This book will appeal to researchers
and students working in these areas.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
Hampstead
Diane Keaton, Brendan Gleeson, …
DVD
R210
Discovery Miles 2 100
|