You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Digital twin technology is becoming important for the realization of Industry 4.0 using cyber-physical systems (CPS) and information technology. CPS form the backbone to support the creation of a network for decentralized and autonomous decision-making. The design principles for Industry 4.0 serve as guidelines for virtualization concepts that are virtual copies of the physical world and create a link between the real and virtual worlds to collect data and monitor processes, the so-called digital twin. In this book, a theoretical digital twin-driven decision-making model has been developed that combines corporate data quality management, a process digital twin, and a model-driven decision support system. It leverages the benefits of the digital twin to create, test and build a process in the virtual world that supports decision making by combining data, analytics and visualization of insights to help managers make better decisions
In today’s digital age, the risks to data and infrastructure have increased in both range and complexity. As a result, companies need to adopt cutting-edge artificial intelligence (AI) solutions to effectively detect and counter potential threats. This handbook fills the existing knowledge gap by bringing together a team of experts to discuss the latest advancements in security systems powered by AI. The handbook offers valuable insights on proactive strategies, threat mitigation techniques, and comprehensive tactics for safeguarding sensitive data. Handbook of AI-Driven Threat Detection and Prevention: A Holistic Approach to Security explores AI-driven threat detection and prevention, and...
This book includes selected papers presented at the 3rd International Conference on Data Engineering and Communication Technology (ICDECT-2K19), held at Stanley College of Engineering and Technology for Women, Hyderabad, from 15 to 16 March 2019. It features advanced, multidisciplinary research towards the design of smart computing, information systems, and electronic systems. It also focuses on various innovation paradigms in system knowledge, intelligence, and sustainability which can be applied to provide viable solutions to diverse problems related to society, the environment, and industry.
This book constitutes revised and selected papers from the Sixteenth International Conference on Information Processing, ICInPro 2021, held in Bangaluru, India in October 2021. The 33 full and 9 short papers presented in this volume were carefully reviewed and selected from a total of 177 submissions. The papers are organized in the following thematic blocks: Computing & Network Security; Data Science; Intelligence & IoT.
As the Web grows and expands into ever more remote parts of the world, the availability of resources over the Internet increases exponentially. Making use of this widely prevalent tool, organizations and individuals can share and store knowledge like never before. Cloud Technology: Concepts, Methodologies, Tools, and Applications investigates the latest research in the ubiquitous Web, exploring the use of applications and software that make use of the Internet’s anytime, anywhere availability. By bringing together research and ideas from across the globe, this publication will be of use to computer engineers, software developers, and end users in business, education, medicine, and more.
This 2-Volume-Set, CCIS 0269-CCIS 0270, constitutes the refereed proceedings of the International Conference on Global Trends in Computing and Communication (CCIS 0269) and the International Conference on Global Trends in Information Systems and Software Applications (CCIS 0270), ObCom 2011, held in Vellore, India, in December 2011. The 173 full papers presented together with a keynote paper and invited papers were carefully reviewed and selected from 842 submissions. The conference addresses issues associated with computing, communication and information. Its aim is to increase exponentially the participants' awareness of the current and future direction in the domains and to create a platform between researchers, leading industry developers and end users to interrelate.
The growth of the Internet of Things (IoT) technology has indeed led to an increase in cybersecurity issues. While the Internet of Things enhances accessibility, integrity, availability, scalability, confidentiality, and interoperability among devices, it also faces vulnerabilities due to its diverse attack sources and lack of standardization in security protocols. This makes Internet of Things systems particularly susceptible to cyberattacks. It is essential to ensure proper security measures are in place to protect Internet of Things devices and networks, given their critical role in modern communications and the evolving threat landscape. Always remember to verify important security infor...
This two-volume set, CCIS 0269-CCIS 0270, constitutes the refereed post-conference proceedings of the International Conference on Global Trends in Computing and Communication, ObCom 2011, held in Vellore, India, in December 2011. The 173 full papers presented together with a keynote paper and invited papers were carefully reviewed and selected from 842 submissions. The conference addresses all current issues associated with computing, communication and information. The proceedings consists of invited papers dealing with the review of performance models of computer and communication systems and contributed papers that feature topics such as networking, cloud computing, fuzzy logic, mobile communication, image processing, navigation systems, biometrics and Web services covering literally all the vital areas of the computing domains.
Edge computing is quickly becoming an important technology throughout a number of fields as businesses and industries alike embrace the benefits it can have in their companies. The streamlining of data is crucial for the development and evolution of businesses in order to keep up with competition and improve functions overall. In order to appropriately utilize edge computing to its full potential, further study is required to examine the potential pitfalls and opportunities of this innovative technology. The Research Anthology on Edge Computing Protocols, Applications, and Integration establishes critical research on the current uses, innovations, and challenges of edge computing across disciplines. The text highlights the history of edge computing and how it has been adapted over time to improve industries. Covering a range of topics such as bandwidth, data centers, and security, this major reference work is ideal for industry professionals, computer scientists, engineers, practitioners, researchers, academicians, scholars, instructors, and students.
800x600 The Concise Introduction to Modern SOA: High-Value Approaches, Innovative Technologies, Proven Use Cases After a decade of innovation in technology and practice, SOA is now a mainstream computing discipline, capable of transforming IT enterprises and optimizing business automation. In Next Generation SOA, top-selling SOA author Thomas Erl and a team of experts present a plain-English tour of SOA, service-orientation, and the key service technologies being used to build sophisticated contemporary service-oriented solutions. The starting point for today’s IT professionals, this concise guide distills the increasingly growing and diverse field of service-oriented architecture and the ...