You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book aims at improving the mathematical modelling skills of users by enhancing the ability to understand, connect, apply and use the mathematical concepts to the problem at hand. This book provides the readers with an in-depth knowledge of the various categories/classes of research problems that professionals, researchers and students might encounter following which the applications of appropriate mathematical models is explained with the help of case studies. The book is targeted at academicians, researchers, students and professionals who belong to all engineering disciplines.
This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers’ goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains. This book is motivating to address privacy threats in new inventions for a wide range of stakeholders like layman to educated users, villages to metros and national to global levels. This book contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols. The main endeavour of this book is threat analysis and activity modelling of attacks in order to give an actual view of the ubiquitous computing applications. The unique approach will help readers for a better understanding.
Considering the overall situation of the current pandemic and pertinent recommendations, this book focuses on the use of augmented reality (AR) applications for preventing COVID-19 outbreaks along with techniques, tools, and platforms to achieve social distancing.and sanitization. COVID-19 Public Health Measures: An Augmented Reality Perspective contains theoretical and practical knowledge of AR and remedies on how to cope with the pandemic, including multiple use cases along with a set of recommendations. This book illustrates application building using open-source software with an interactive interface to aid impaired users. The initial part of this book emphasizes the basic knowledge of A...
This book explores the intricate interplay between burgeoning energy demands and the imperatives of ecological sustainability. The first section, Electric Power Engineering, explores critical innovations in the generation, transmission, and distribution of electric power. As global energy demands rise, the development of efficient and reliable electric power systems becomes essential. This section includes studies on optimizing grid performance, enhancing resilience, and integrating smart grid technologies. Advances in grid automation, energy storage, and demand response are examined, reflecting the shift toward adaptive, efficient, and secure power systems. The second section, Heat Power En...
This book presents the know-how of the real-time IoT application development activity including a basic understanding of the IoT architecture, use cases, smart computing, and the associated challenges in design and development of the IoT system. All the technical details related to protocol stack, technologies, and platforms used for the implementation are explained. It further includes techniques and case studies that include smart computing on the IoT–Cloud models along with test beds for experimentation purposes. The book aims at setting up the groundwork for the creation of applications that can help make day-to-day tasks simpler by meeting the needs of varied sectors like education, h...
The industry has been experiencing the deployment of cloud computing models varying from Private Cloud, Hybrid Cloud to an evolution of InterCloud. There are cloud security implications for each model; and within InterCloud a notion of federation may be implied. How do we define cloud bursting and cloud brokering functions and the security requirements therein? What are the use cases? What is the impact of cloud and virtualization on mobile networks and its services? What is the status of standards activities related to cloud security and these scenarios? Authors were inviteded to submit papers, on these topics for the special issue. Today's Cloud services are deployed by Cloud Service Provi...