You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Blockchain technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in the blocking chain, the industry does not matter. Blockchain technology has infiltrated all areas of our lives, from manufacturing to healthcare and beyond. Cybersecurity is an industry that has been significantly affected by this technology and may be more so in the future. Blockchain for Cybersecurity and Privacy: Architectures, Challenges, and Applications is an invaluable resource to discover the blockchain applications for cybersecurity ...
This work using neutrosophic cognitive maps proves mathematically how these indeterminate and unknown factors are responsible for the spread of COVID-19 in India. The Neutrosophic Cognitive Map (NCM) is an enhanced version of Fuzzy Cognitive Map (FCM) since it takes into account the concept of indeterminacy and uncertainty, which is not addressed by FCMs. The obtained results not only show the importance of determinate factors (measures taken by the government bodies) in containing the spread of this deadly virus but also show how indeterminate and uncertain factors such as poverty, negligence, ineffectual healthcare, age, immunity, unscientific practices on religious grounds and illiteracy play a vital role in this regard. This model, in general, helps policymakers and government agencies to represent any complicated situation mathematically thereby helping them in responding appropriately and forming new policies for dealing with such pandemics. This work also signifies how neutrosophic theories can be applied in the analysis of the situation for dealing with real life problems..
The book titled 'Use of Internet of Things in Real Life' covers complete case study of Internet of Things Life in real life. The Book contains better concept of understanding to Use of Internet of Things in Real Life.. This Book will also guide on the job reference for IT practitioners in lo T environments.
This book gathers the proceedings of the 10th International Conference on Frontier Computing, held in Singapore, on July 10–13, 2020, and provides comprehensive coverage of the latest advances and trends in information technology, science, and engineering. It addresses a number of broad themes, including communication networks, business intelligence and knowledge management, web intelligence, and related fields that inspire the development of information technology. The respective contributions cover a wide range of topics: database and data mining, networking and communications, web and Internet of things, embedded systems, soft computing, social network analysis, security and privacy, optical communication, and ubiquitous/pervasive computing. Many of the papers outline promising future research directions, and the book benefits students, researchers, and professionals alike. Further, it offers a useful reference guide for newcomers to the field.
This handbook is organized under three major parts. The first part of this handbook deals with multimedia security for emerging applications. The chapters include basic concepts of multimedia tools and applications, biological and behavioral biometrics, effective multimedia encryption and secure watermarking techniques for emerging applications, an adaptive face identification approach for android mobile devices, and multimedia using chaotic and perceptual hashing function. The second part of this handbook focuses on multimedia processing for various potential applications. The chapter includes a detail survey of image processing based automated glaucoma detection techniques and role of de-n...
The developing peculiarity of the Internet of Things (IoT), which is that any thing equipped for being associated with the Internet will be, presents a remarkable chance for organizations. Utilizing a broad writing audit, the flow research analyzes the critical change in showcasing techniques that need to happen to focus on the millennial age of as they embrace IoT. Most examination characterizes the Millennial age as those brought into the world from the mid 1980s to the mid 2000s. As people in this age become older, there are two social ramifications: 1) their acknowledgment of innovation proposes they will rush to embrace IoT, and 2) their developing buying power and purchaser conduct make them an optimal objective for advertisers. Recent college grads who take on IoT offer their information all the more eagerly to advertisers and firms, which makes it simpler for advertisers to exactly gather information and target clients more. Furthermore, IoT gadgets will empower different stages for content promoting that are fundamentally unique in relation to and more successful than a 30 second TV plug or an advanced pennant notice. Advertising messages will
Technologies in today’s society are rapidly developing at a pace that is challenging to stay up to date with. As an increasing number of global regions are implementing smart methods and strategies for sustainable development, they are continually searching for modern advancements within computer science, sensor networks, software engineering, and smart technologies. A compilation of research is needed that displays current applications of computing methodologies in the progression of global cities and how smart technologies are being utilized. Sensor Network Methodologies for Smart Applications is a collection of innovative research on the methods of intelligent systems and technologies and their various applications within sustainable development practices. While highlighting topics including machine learning, network security, and optimization algorithms, this book is ideally designed for researchers, scientists, developers, programmers, engineers, educators, policymakers, geographers, planners, and students seeking current research on smart technologies and sensor networks.
Intelligent Edge Computing for Cyber Physical Applications introduces state-of-the-art research methodologies, tools and techniques, challenges, and solutions with further research opportunities in the area of edge-based cyber-physical systems. The book presents a comprehensive review of recent literature and analysis of different techniques for building edge-based CPS. In addition, it describes how edge-based CPS can be built to seamlessly interact with physical machines for optimal performance, covering various aspects of edge computing architectures for dynamic resource provisioning, mobile edge computing, energy saving scenarios, and different security issues. Sections feature practical ...
Metaheuristics Algorithms for Medical Applications: Methods and Applications provides readers with the most complete reference for developing Metaheuristics techniques with Machine Learning for solving biomedical problems. The book is organized to present a stepwise progression beginning with the basics of Metaheuristics, leading into methods and practices, and concluding with advanced topics. The first section of the book presents the fundamental concepts of Metaheuristics and Machine Learning, and also provides a comprehensive taxonomic view of Metaheuristics methods according to a variety of criteria such as data type, scope, method, and so forth. The second section of the book explains h...
Applications of Computational Intelligence in Multi-Disciplinary Research provides the readers with a comprehensive handbook for applying the powerful principles, concepts, and algorithms of computational intelligence to a wide spectrum of research cases. The book covers the main approaches used in computational intelligence, including fuzzy logic, neural networks, evolutionary computation, learning theory, and probabilistic methods, all of which can be collectively viewed as soft computing. Other key approaches included are swarm intelligence and artificial immune systems. These approaches provide researchers with powerful tools for analysis and problem-solving when data is incomplete and w...