Browse Results

Showing 7,201 through 7,225 of 83,302 results

Artificial Intelligence and Global Society: Impact and Practices

by Puneet Kumar

In the constant battle between human intelligence and machine intelligence, machines are close to surpassing human intelligence. The unrestrained use of digital technologies in automating processes is one of the prime advantages of the third industrial revolution. As a result, all developed and developing nations have started to digitalize mundane tasks. Thus, digital technologies for information and communication technologies (ICT) have achieved high market space in terms of infrastructure building, employment generation, education sector reforms, funds mobilization, electronic governance, hardware manufacturing, software development, etc. Hence, it is evident that every segment of society has been penetrated by ICT or digitalization. This book attempts to spotlight areas where AI is thriving. FEATURES Impact of digitalization and AI on governance Novel AI practices being followed across the global community in security, healthcare, crime prevention and detection, education, agriculture, sensor networks, etc. Innovative techniques that can be adopted to ensure better quality and better delivery of services to the society Avenues for further research by the research community and student fraternity This book is a guide for university students (especially those from technical backgrounds), industries, NGOs, and policy makers.

Visual Perception and Control of Underwater Robots

by Junzhi Yu Xingyu Chen Shihan Kong

Visual Perception and Control of Underwater Robots covers theories and applications from aquatic visual perception and underwater robotics. Within the framework of visual perception for underwater operations, image restoration, binocular measurement, and object detection are addressed. More specifically, the book includes adversarial critic learning for visual restoration, NSGA-II-based calibration for binocular measurement, prior knowledge refinement for object detection, analysis of temporal detection performance, as well as the effect of the aquatic data domain on object detection. With the aid of visual perception technologies, two up-to-date underwater robot systems are demonstrated. The first system focuses on underwater robotic operation for the task of object collection in the sea. The second is an untethered biomimetic robotic fish with a camera stabilizer, its control methods based on visual tracking. The authors provide a self-contained and comprehensive guide to understand underwater visual perception and control. Bridging the gap between theory and practice in underwater vision, the book features implementable algorithms, numerical examples, and tests, where codes are publicly available. Additionally, the mainstream technologies covered in the book include deep learning, adversarial learning, evolutionary computation, robust control, and underwater bionics. Researchers, senior undergraduate and graduate students, and engineers dealing with underwater visual perception and control will benefit from this work.

Visual Perception and Control of Underwater Robots

by Junzhi Yu Xingyu Chen Shihan Kong

Visual Perception and Control of Underwater Robots covers theories and applications from aquatic visual perception and underwater robotics. Within the framework of visual perception for underwater operations, image restoration, binocular measurement, and object detection are addressed. More specifically, the book includes adversarial critic learning for visual restoration, NSGA-II-based calibration for binocular measurement, prior knowledge refinement for object detection, analysis of temporal detection performance, as well as the effect of the aquatic data domain on object detection. With the aid of visual perception technologies, two up-to-date underwater robot systems are demonstrated. The first system focuses on underwater robotic operation for the task of object collection in the sea. The second is an untethered biomimetic robotic fish with a camera stabilizer, its control methods based on visual tracking. The authors provide a self-contained and comprehensive guide to understand underwater visual perception and control. Bridging the gap between theory and practice in underwater vision, the book features implementable algorithms, numerical examples, and tests, where codes are publicly available. Additionally, the mainstream technologies covered in the book include deep learning, adversarial learning, evolutionary computation, robust control, and underwater bionics. Researchers, senior undergraduate and graduate students, and engineers dealing with underwater visual perception and control will benefit from this work.

Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures

by Brij B. Gupta Amrita Dahiya

The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them. Features: Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classification of defensive mechanisms on the basis of deployment location, the types of defensive action, and the solutions offering economic incentives. Introduces chapters discussing the various types of DDoS attack associated with different layers of security, an attacker’s motivations, and the importance of incentives and liabilities in any defensive solution. Illustrates the role of fair resource-allocation schemes, separate payment mechanisms for attackers and legitimate users, negotiation models on cost and types of resources, and risk assessments and transfer mechanisms. DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures is designed for the readers who have an interest in the cybersecurity domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals who are focusing on developing defensive schemes and applications for detecting or mitigating the DDoS attacks, and faculty members across different universities.

Distributed Denial of Service (DDoS) Attacks: Classification, Attacks, Challenges and Countermeasures

by Brij B. Gupta Amrita Dahiya

The complexity and severity of the Distributed Denial of Service (DDoS) attacks are increasing day-by-day. The Internet has a highly inconsistent structure in terms of resource distribution. Numerous technical solutions are available, but those involving economic aspects have not been given much consideration. The book, DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures, provides an overview of both types of defensive solutions proposed so far, exploring different dimensions that would mitigate the DDoS effectively and show the implications associated with them. Features: Covers topics that describe taxonomies of the DDoS attacks in detail, recent trends and classification of defensive mechanisms on the basis of deployment location, the types of defensive action, and the solutions offering economic incentives. Introduces chapters discussing the various types of DDoS attack associated with different layers of security, an attacker’s motivations, and the importance of incentives and liabilities in any defensive solution. Illustrates the role of fair resource-allocation schemes, separate payment mechanisms for attackers and legitimate users, negotiation models on cost and types of resources, and risk assessments and transfer mechanisms. DDoS Attacks – Classification, Attacks, Challenges, and Countermeasures is designed for the readers who have an interest in the cybersecurity domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals who are focusing on developing defensive schemes and applications for detecting or mitigating the DDoS attacks, and faculty members across different universities.

Online Social Networks Security: Principles, Algorithm, Applications, and Perspectives

by Brij B. Gupta Somya Ranjan Sahoo

In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs). These help users to build both social and professional links on a worldwide scale. The sharing of information and opinions are important features of OSNs. Users can describe recent activities and interests, share photos, videos, applications, and much more. The use of OSNs has increased at a rapid rate. Google+, Facebook, Twitter, LinkedIn, Sina Weibo, VKontakte, and Mixi are all OSNs that have become the preferred way of communication for a vast number of daily active users. Users spend substantial amounts of time updating their information, communicating with other users, and browsing one another’s accounts. OSNs obliterate geographical distance and can breach economic barrier. This popularity has made OSNs a fascinating test bed for cyberattacks comprising Cross-Site Scripting, SQL injection, DDoS, phishing, spamming, fake profile, spammer, etc. OSNs security: Principles, Algorithm, Applications, and Perspectives describe various attacks, classifying them, explaining their consequences, and offering. It also highlights some key contributions related to the current defensive approaches. Moreover, it shows how machine-learning and deep-learning methods can mitigate attacks on OSNs. Different technological solutions that have been proposed are also discussed. The topics, methodologies, and outcomes included in this book will help readers learn the importance of incentives in any technical solution to handle attacks against OSNs. The best practices and guidelines will show how to implement various attack-mitigation methodologies.

Online Social Networks Security: Principles, Algorithm, Applications, and Perspectives

by Brij B. Gupta Somya Ranjan Sahoo

In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs). These help users to build both social and professional links on a worldwide scale. The sharing of information and opinions are important features of OSNs. Users can describe recent activities and interests, share photos, videos, applications, and much more. The use of OSNs has increased at a rapid rate. Google+, Facebook, Twitter, LinkedIn, Sina Weibo, VKontakte, and Mixi are all OSNs that have become the preferred way of communication for a vast number of daily active users. Users spend substantial amounts of time updating their information, communicating with other users, and browsing one another’s accounts. OSNs obliterate geographical distance and can breach economic barrier. This popularity has made OSNs a fascinating test bed for cyberattacks comprising Cross-Site Scripting, SQL injection, DDoS, phishing, spamming, fake profile, spammer, etc. OSNs security: Principles, Algorithm, Applications, and Perspectives describe various attacks, classifying them, explaining their consequences, and offering. It also highlights some key contributions related to the current defensive approaches. Moreover, it shows how machine-learning and deep-learning methods can mitigate attacks on OSNs. Different technological solutions that have been proposed are also discussed. The topics, methodologies, and outcomes included in this book will help readers learn the importance of incentives in any technical solution to handle attacks against OSNs. The best practices and guidelines will show how to implement various attack-mitigation methodologies.

Designing Interaction and Interfaces for Automated Vehicles: User-Centred Ecological Design and Testing (Transportation Human Factors)

by Neville Stanton Kirsten M. A. Revell Patrick Langdon

Driving automation and autonomy are already upon us and the problems that were predicted twenty years ago are beginning to appear. These problems include shortfalls in expected benefits, equipment unreliability, driver skill fade, and error-inducing equipment designs. Designing Interaction and Interfaces for Automated Vehicles: User-Centred Ecological Design and Testing investigates the difficult problem of how to interface drivers with automated vehicles by offering an inclusive, human-centred design process that focusses on human variability and capability in interaction with interfaces. This book introduces a novel method that combines both systems thinking and inclusive user-centred design. It models driver interaction, provides design specifications, concept designs, and the results of studies in simulators on the test track, and in road going vehicles. This book is for designers of systems interfaces, interactions, UX, Human Factors and Ergonomics researchers and practitioners involved with systems engineering and automotive academics._ "In this book, Prof Stanton and colleagues show how Human Factors methods can be applied to the tricky problem of interfacing human drivers with vehicle automation. They have developed an approach to designing the human-automation interaction for the handovers between the driver and the vehicle. This approach has been tested in driving simulators and, most interestingly, in real vehicles on British motorways. The approach, called User-Centred Ecological Interface Design, has been validated against driver behaviour and used to support their ongoing work on vehicle automation. I highly recommend this book for anyone interested, or involved, in designing human-automation interaction in vehicles and beyond." Professor Michael A. Regan, University of NSW Sydney, AUSTRALIA

Designing Interaction and Interfaces for Automated Vehicles: User-Centred Ecological Design and Testing (Transportation Human Factors)

by Neville A. Stanton Kirsten M. A. Revell Patrick Langdon

Driving automation and autonomy are already upon us and the problems that were predicted twenty years ago are beginning to appear. These problems include shortfalls in expected benefits, equipment unreliability, driver skill fade, and error-inducing equipment designs. Designing Interaction and Interfaces for Automated Vehicles: User-Centred Ecological Design and Testing investigates the difficult problem of how to interface drivers with automated vehicles by offering an inclusive, human-centred design process that focusses on human variability and capability in interaction with interfaces. This book introduces a novel method that combines both systems thinking and inclusive user-centred design. It models driver interaction, provides design specifications, concept designs, and the results of studies in simulators on the test track, and in road going vehicles. This book is for designers of systems interfaces, interactions, UX, Human Factors and Ergonomics researchers and practitioners involved with systems engineering and automotive academics._ "In this book, Prof Stanton and colleagues show how Human Factors methods can be applied to the tricky problem of interfacing human drivers with vehicle automation. They have developed an approach to designing the human-automation interaction for the handovers between the driver and the vehicle. This approach has been tested in driving simulators and, most interestingly, in real vehicles on British motorways. The approach, called User-Centred Ecological Interface Design, has been validated against driver behaviour and used to support their ongoing work on vehicle automation. I highly recommend this book for anyone interested, or involved, in designing human-automation interaction in vehicles and beyond." Professor Michael A. Regan, University of NSW Sydney, AUSTRALIA

3ds Max Basics for Modeling Video Game Assets: Volume 2: Model, Rig and Animate Characters for Export to Unity or Other Game Engines

by William Culbertson

As a textbook for learning the fundamentals of modeling, rigging and animating 3D-modeled characters for use in video games, this step-by-step lesson book builds on the reader's modeling skills acquired from reading Volume I. The reader will model characters for the Castle Environment created in Volume I, which will be rigged using the Character Animation Toolkit (CAT) in 3ds Max and animated with game moves. The Skin Modifier is used for associating the meshes to the rigs and the characters are then exported to the Unity game engine and integrated into the Castle Scene with a Third Person Character camera. As the text introduces new modeling skills, it additionally calls on the reader to perform repetitive tasks, reinforcing skills learned in the process. The content is presented as if the reader is in a working video game studio, being responsible for researching asset design and providing the team with placeholder assets and final model assets that are unwrapped and custom textured using both box mapping and the 3ds Max Quick Peel tool. Although the text uses Autodesk 3ds Max for the modeling program, the principles are transferable to other major modeling programs. Key Features: The goal of this book is to teach the fundamentals of 3D modeling video game characters in a simplified, logical progression optimized for learning at a beginner level. Rigging principles (Linking, Inverse Kinematics [IK], Forward Kinematics [FK], Skin Deformation, Weighting Vertices and more) are introduced in a gradual progression to allow maximum comprehension and retention. This series of modeling exercises is the result of having successfully taught over 1000 video game students the fundamentals of 3D modeling. This complete, clearly written and concise text is written for self-paced learning, helping those instructors who might not be fully trained in 3D modeling and those interested in self-teaching. Includes instructions and project files for exporting the finished project environment into the 3D game engine, Unity. A companion site (www.3dsMaxBasics.com) includes working 3ds Max project files for chapters, notes and corrections, a 3ds Max user interface, 3ds Max shortcut keys and more.

3ds Max Basics for Modeling Video Game Assets: Volume 2: Model, Rig and Animate Characters for Export to Unity or Other Game Engines

by William Culbertson

As a textbook for learning the fundamentals of modeling, rigging and animating 3D-modeled characters for use in video games, this step-by-step lesson book builds on the reader's modeling skills acquired from reading Volume I. The reader will model characters for the Castle Environment created in Volume I, which will be rigged using the Character Animation Toolkit (CAT) in 3ds Max and animated with game moves. The Skin Modifier is used for associating the meshes to the rigs and the characters are then exported to the Unity game engine and integrated into the Castle Scene with a Third Person Character camera. As the text introduces new modeling skills, it additionally calls on the reader to perform repetitive tasks, reinforcing skills learned in the process. The content is presented as if the reader is in a working video game studio, being responsible for researching asset design and providing the team with placeholder assets and final model assets that are unwrapped and custom textured using both box mapping and the 3ds Max Quick Peel tool. Although the text uses Autodesk 3ds Max for the modeling program, the principles are transferable to other major modeling programs. Key Features: The goal of this book is to teach the fundamentals of 3D modeling video game characters in a simplified, logical progression optimized for learning at a beginner level. Rigging principles (Linking, Inverse Kinematics [IK], Forward Kinematics [FK], Skin Deformation, Weighting Vertices and more) are introduced in a gradual progression to allow maximum comprehension and retention. This series of modeling exercises is the result of having successfully taught over 1000 video game students the fundamentals of 3D modeling. This complete, clearly written and concise text is written for self-paced learning, helping those instructors who might not be fully trained in 3D modeling and those interested in self-teaching. Includes instructions and project files for exporting the finished project environment into the 3D game engine, Unity. A companion site (www.3dsMaxBasics.com) includes working 3ds Max project files for chapters, notes and corrections, a 3ds Max user interface, 3ds Max shortcut keys and more.

Data Protection and Privacy in Healthcare: Research and Innovations

by Ahmed Elngar Ambika Pawar Prathamesh Churi

The Healthcare industry is one of the largest and rapidly developing industries. Over the last few years, healthcare management is changing from disease centered to patient centered. While on one side the analysis of healthcare data plays an important role in healthcare management, but on the other side the privacy of a patient’s record must be of equal concern. This book uses a research-oriented approach and focuses on privacy-based healthcare tools and technologies. It offers details on privacy laws with real-life case studies and examples, and addresses privacy issues in newer technologies such as Cloud, Big Data, and IoT. It discusses the e-health system and preserving its privacy, and the use of wearable technologies for patient monitoring, data streaming and sharing, and use of data analysis to provide various health services. This book is written for research scholars, academicians working in healthcare and data privacy domains, as well as researchers involved with healthcare law, and those working at facilities in security and privacy domains. Students and industry professionals, as well as medical practitioners might also find this book of interest.

Data Protection and Privacy in Healthcare: Research and Innovations

by Ahmed Elngar, Ambika Pawar, and Prathamesh Churi

The Healthcare industry is one of the largest and rapidly developing industries. Over the last few years, healthcare management is changing from disease centered to patient centered. While on one side the analysis of healthcare data plays an important role in healthcare management, but on the other side the privacy of a patient’s record must be of equal concern. This book uses a research-oriented approach and focuses on privacy-based healthcare tools and technologies. It offers details on privacy laws with real-life case studies and examples, and addresses privacy issues in newer technologies such as Cloud, Big Data, and IoT. It discusses the e-health system and preserving its privacy, and the use of wearable technologies for patient monitoring, data streaming and sharing, and use of data analysis to provide various health services. This book is written for research scholars, academicians working in healthcare and data privacy domains, as well as researchers involved with healthcare law, and those working at facilities in security and privacy domains. Students and industry professionals, as well as medical practitioners might also find this book of interest.

Security without Obscurity: Frequently Asked Questions (FAQ)

by Jeff Stapleton

Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton’s three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.

Security without Obscurity: Frequently Asked Questions (FAQ)

by Jeff Stapleton

Security without Obscurity: Frequently Asked Questions (FAQ) complements Jeff Stapleton’s three other Security without Obscurity books to provide clear information and answers to the most commonly asked questions about information security (IS) solutions that use or rely on cryptography and key management methods. There are good and bad cryptography, bad ways of using good cryptography, and both good and bad key management methods. Consequently, information security solutions often have common but somewhat unique issues. These common and unique issues are expressed as an FAQ organized by related topic areas. The FAQ in this book can be used as a reference guide to help address such issues. Cybersecurity is based on information technology (IT) that is managed using IS controls, but there is information, misinformation, and disinformation. Information reflects things that are accurate about security standards, models, protocols, algorithms, and products. Misinformation includes misnomers, misunderstandings, and lack of knowledge. Disinformation can occur when marketing claims either misuse or abuse terminology, alluding to things that are inaccurate or subjective. This FAQ provides information and distills misinformation and disinformation about cybersecurity. This book will be useful to security professionals, technology professionals, assessors, auditors, managers, and hopefully even senior management who want a quick, straightforward answer to their questions. It will serve as a quick reference to always have ready on an office shelf. As any good security professional knows, no one can know everything.

Applied Evolutionary Algorithms for Engineers using Python

by Leonardo Azevedo Scardua

Applied Evolutionary Algorithms for Engineers with Python is written for students, scientists and engineers who need to apply evolutionary algorithms to practical optimization problems. The presentation of the theoretical background is complemented with didactical Python implementations of evolutionary algorithms that researchers have recently applied to complex optimization problems. Cases of successful application of evolutionary algorithms to real-world like optimization problems are presented, together with source code that allows the reader to gain insight into the idiosyncrasies of the practical application of evolutionary algorithms. Key Features Includes detailed descriptions of evolutionary algorithm paradigms Provides didactic implementations of the algorithms in Python, a programming language that has been widely adopted by the AI community Discusses the application of evolutionary algorithms to real-world optimization problems Presents successful cases of the application of evolutionary algorithms to complex optimization problems, with auxiliary source code.

Applied Evolutionary Algorithms for Engineers using Python

by Leonardo Azevedo Scardua

Applied Evolutionary Algorithms for Engineers with Python is written for students, scientists and engineers who need to apply evolutionary algorithms to practical optimization problems. The presentation of the theoretical background is complemented with didactical Python implementations of evolutionary algorithms that researchers have recently applied to complex optimization problems. Cases of successful application of evolutionary algorithms to real-world like optimization problems are presented, together with source code that allows the reader to gain insight into the idiosyncrasies of the practical application of evolutionary algorithms. Key Features Includes detailed descriptions of evolutionary algorithm paradigms Provides didactic implementations of the algorithms in Python, a programming language that has been widely adopted by the AI community Discusses the application of evolutionary algorithms to real-world optimization problems Presents successful cases of the application of evolutionary algorithms to complex optimization problems, with auxiliary source code.

Digital Forensics Explained

by Greg Gogolin

This book covers the full life cycle of conducting a mobile and computer digital forensic examination, including planning and performing an investigation as well as report writing and testifying. Case reviews in corporate, civil, and criminal situations are also described from both prosecution and defense perspectives. Digital Forensics Explained, Second Edition draws from years of experience in local, state, federal, and international environments and highlights the challenges inherent in deficient cyber security practices. Topics include the importance of following the scientific method and verification, legal and ethical issues, planning an investigation (including tools and techniques), incident response, case project management and authorization, social media and internet, cloud, anti-forensics, link and visual analysis, and psychological considerations. The book is a valuable resource for the academic environment, law enforcement, those in the legal profession, and those working in the cyber security field. Case reviews include cyber security breaches, anti-forensic challenges, child exploitation, and social media investigations. Greg Gogolin, PhD, CISSP, is a Professor of Information Security and Intelligence at Ferris State University and a licensed Professional Investigator. He has worked more than 100 cases in criminal, civil, and corporate environments.

Digital Forensics Explained

by Greg Gogolin

This book covers the full life cycle of conducting a mobile and computer digital forensic examination, including planning and performing an investigation as well as report writing and testifying. Case reviews in corporate, civil, and criminal situations are also described from both prosecution and defense perspectives. Digital Forensics Explained, Second Edition draws from years of experience in local, state, federal, and international environments and highlights the challenges inherent in deficient cyber security practices. Topics include the importance of following the scientific method and verification, legal and ethical issues, planning an investigation (including tools and techniques), incident response, case project management and authorization, social media and internet, cloud, anti-forensics, link and visual analysis, and psychological considerations. The book is a valuable resource for the academic environment, law enforcement, those in the legal profession, and those working in the cyber security field. Case reviews include cyber security breaches, anti-forensic challenges, child exploitation, and social media investigations. Greg Gogolin, PhD, CISSP, is a Professor of Information Security and Intelligence at Ferris State University and a licensed Professional Investigator. He has worked more than 100 cases in criminal, civil, and corporate environments.

BIM-enabled Cognitive Computing for Smart Built Environment: Potential, Requirements, and Implementation

by Ibrahim Yitmen

The book provides knowledge in the Building Information Model (BIM)-enabled cognitive computing methods for smart built environment involving cognitive network capabilities for smart buildings, integrating Augmented Reality/Mixed Reality in cognitive building concepts, cognitive Internet of Things (CIoT) for smart cities, Artificial Intelligence applications for cognitive cities, and cognitive smart cities using big data and machine learning. It focuses on the potential, requirements and implementation of CIoT paradigm to buildings, Artificial Intelligence techniques, reasoning, and Augmented Reality/Mixed Reality in cognitive building concepts, the concept of cognitive smart cities in its complexity, heterogeneity, and scope, and the challenge of utilizing the big data generated by smart cities from a machine learning perspective. The book comprises BIM-based and data-analytic research on cognitive IoT for smart buildings and cognitive cities using big data and machine learning as complex and dynamic systems. It presents applied theoretical contributions fostering a better understanding of such systems and the synergistic relationships between the motivating physical and informational settings. It reviews ongoing development of BIM-based and data science technologies for the processing, analysis, management, modeling, and simulation of big and context data and the associated applicability to cognitive systems that will advance different aspects of future cognitive cities. The book also analyses the required material to inform pertinent research communities of the state-of-the-art research and the latest development in the area of cognitive smart cities development, as well as a valuable reference for planners, designers, strategists, and ICT experts who are working towards the development and implementation of CIoT based on big data analytics and context–aware computing.

BIM-enabled Cognitive Computing for Smart Built Environment: Potential, Requirements, and Implementation

by Ibrahim Yitmen

The book provides knowledge in the Building Information Model (BIM)-enabled cognitive computing methods for smart built environment involving cognitive network capabilities for smart buildings, integrating Augmented Reality/Mixed Reality in cognitive building concepts, cognitive Internet of Things (CIoT) for smart cities, Artificial Intelligence applications for cognitive cities, and cognitive smart cities using big data and machine learning. It focuses on the potential, requirements and implementation of CIoT paradigm to buildings, Artificial Intelligence techniques, reasoning, and Augmented Reality/Mixed Reality in cognitive building concepts, the concept of cognitive smart cities in its complexity, heterogeneity, and scope, and the challenge of utilizing the big data generated by smart cities from a machine learning perspective. The book comprises BIM-based and data-analytic research on cognitive IoT for smart buildings and cognitive cities using big data and machine learning as complex and dynamic systems. It presents applied theoretical contributions fostering a better understanding of such systems and the synergistic relationships between the motivating physical and informational settings. It reviews ongoing development of BIM-based and data science technologies for the processing, analysis, management, modeling, and simulation of big and context data and the associated applicability to cognitive systems that will advance different aspects of future cognitive cities. The book also analyses the required material to inform pertinent research communities of the state-of-the-art research and the latest development in the area of cognitive smart cities development, as well as a valuable reference for planners, designers, strategists, and ICT experts who are working towards the development and implementation of CIoT based on big data analytics and context–aware computing.

Secure Searchable Encryption and Data Management

by Brij B. Gupta Mamta

With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it’s a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.

Secure Searchable Encryption and Data Management

by Brij B. Gupta Mamta

With the advent of the IT revolution, the volume of data produced has increased exponentially and is still showing an upward trend. This data may be abundant and enormous, but it’s a precious resource and should be managed properly. Cloud technology plays an important role in data management. Storing data in the cloud rather than on local storage has many benefits, but apart from these benefits, there are privacy concerns in storing sensitive data over third-party servers. These concerns can be addressed by storing data in an encrypted form; however, while encryption solves the problem of privacy, it engenders other serious issues, including the infeasibility of the fundamental search operation and a reduction in flexibility when sharing data with other users, amongst others. The concept of searchable encryption addresses these issues. This book provides every necessary detail required to develop a secure, searchable encryption scheme using both symmetric and asymmetric cryptographic primitives along with the appropriate security models to ensure the minimum security requirements for real-world applications.

Green Internet of Things for Smart Cities: Concepts, Implications, and Challenges (Green Engineering and Technology)

by Surjeet Dalal Vivek Jaglan Dac-Nhuong Le

The bright future of green IoT will change our tomorrow environment to become healthier and green, with very high quality of service that is socially, environmentally, and economically sustainable. This book covers the most recent advances in IoT, it discusses Smart City implementation, and offers both quantitative and qualitative research. It focuses on greening things such as green communication and networking, green design and implementations, green IoT services and applications, energy saving strategies, integrated RFIDs and sensor networks, mobility and network management, the cooperation of homogeneous and heterogeneous networks, smart objects, and green localization. This book with its wide range of related topics in IoT and Smart City, will be useful for graduate students, researchers, academicians, institutions, and professionals that are interested in exploring the areas of IoT and Smart City.

Green Internet of Things for Smart Cities: Concepts, Implications, and Challenges (Green Engineering and Technology)

by Harald Fischer-Tiné and Maria Framke

The bright future of green IoT will change our tomorrow environment to become healthier and green, with very high quality of service that is socially, environmentally, and economically sustainable. This book covers the most recent advances in IoT, it discusses Smart City implementation, and offers both quantitative and qualitative research. It focuses on greening things such as green communication and networking, green design and implementations, green IoT services and applications, energy saving strategies, integrated RFIDs and sensor networks, mobility and network management, the cooperation of homogeneous and heterogeneous networks, smart objects, and green localization. This book with its wide range of related topics in IoT and Smart City, will be useful for graduate students, researchers, academicians, institutions, and professionals that are interested in exploring the areas of IoT and Smart City.

Refine Search

Showing 7,201 through 7,225 of 83,302 results