You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"This book focuses on wireless sensor networks and their operation, covering topics including routing, energy efficiency and management"--
This book delves into the history of biometrics, the different systems that have been developed to date, problems that have arisen from these systems, the necessity of AI-based biometrics systems, different AI techniques developed to date (including machine learning, deep learning, natural language processing, and pattern recognition), their potential uses and applications, security and privacy issues in AI-based Biometric systems, current trends in AI-based biometrics, and presents case studies of AI-based biometrics.
IT policies are set in place to streamline the preparation and development of information communication technologies in a particular setting. IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications is a comprehensive collection of research on the features of modern organizations in order to advance the understanding of IT standards. This is an essential reference source for researchers, scholars, policymakers, and IT managers as well as organizations interested in carrying out research in IT policies.
This book discusses the outcome of the ICSCPS 2024 conference proceedings which provide a comprehensive exploration of Smart Cyber-Physical Systems (CPS), delivering deep into the intersection of the physical and digital worlds. The book is a must-read for researchers, engineers, students, and professionals seeking to understand and harness the power of CPS in today's technology-driven landscape. This conference's main topics encompass CPS's foundational principles, from mathematical modeling and control theory to real-time systems and cyber-security. It unravels the intricacies of sensors and actuators, shedding light on their design and applications in various domains. With a focus on communication and networks, readers will gain insights into the critical aspects of data exchange and connectivity in CPS, including wireless communication, IoT integration, and network security.
Explore the future of logistics and disaster management with this essential guide to the design, applications, and challenges of integrating advanced drone technology into intelligent transportation systems. Drones are quickly becoming an essential technology for navigating inaccessible areas, especially during emergency situations. However, the implementation of these drones requires strict standards, policies, and procedures. Currently, drones are being used in several industrial and service sectors, extending the possibilities of handling transportation and logistics. The future of transportation is based on unmanned vehicles, and it is important to identify their challenges and futuristi...
The international conference on Advances in Computing and Information technology (ACITY 2012) provides an excellent international forum for both academics and professionals for sharing knowledge and results in theory, methodology and applications of Computer Science and Information Technology. The Second International Conference on Advances in Computing and Information technology (ACITY 2012), held in Chennai, India, during July 13-15, 2012, covered a number of topics in all major fields of Computer Science and Information Technology including: networking and communications, network security and applications, web and internet computing, ubiquitous computing, algorithms, bioinformatics, digital image processing and pattern recognition, artificial intelligence, soft computing and applications. Upon a strength review process, a number of high-quality, presenting not only innovative ideas but also a founded evaluation and a strong argumentation of the same, were selected and collected in the present proceedings, that is composed of three different volumes.
This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI. This book brings together, in one resource, information security across multiple domains. Information Security Handbook addresses the knowledge for emerging multidisciplinary research. It explores basic and high-level concepts and serves as a manual for industry while also helping beginners to understand both basic and advanced aspects in security-related issues. The handbook explores security and privacy issues through the IoT ecosystem and implications to the real world and, at the same time, explains the concepts of IoT-related technologies, trends, and future directions. University graduates and postgraduates, as well as research scholars, developers, and end-users, will find this handbook very useful.