You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.
Cyber-Physical Systems: AI and COVID-19 highlights original research which addresses current data challenges in terms of the development of mathematical models, cyber-physical systems-based tools and techniques, and the design and development of algorithmic solutions, etc. It reviews the technical concepts of gathering, processing and analyzing data from cyber-physical systems (CPS) and reviews tools and techniques that can be used. This book will act as a resource to guide COVID researchers as they move forward with clinical and epidemiological studies on this outbreak, including the technical concepts of gathering, processing and analyzing data from cyber-physical systems (CPS). The major ...
The evolution of deep learning models, combined with with advances in the Internet of Things and sensor technology, has gained more importance for weather forecasting, plant disease detection, underground water detection, soil quality, crop condition monitoring, and many other issues in the field of agriculture. agriculture. Deep Learning for Sustainable Agriculture discusses topics such as the impactful role of deep learning during the analysis of sustainable agriculture data and how deep learning can help farmers make better decisions. It also considers the latest deep learning techniques for effective agriculture data management, as well as the standards established by international organ...
This book gathers high-quality papers presented at the First International Conference on Sustainable Technologies for Computational Intelligence (ICTSCI 2019), which was organized by Sri Balaji College of Engineering and Technology, Jaipur, Rajasthan, India, on March 29–30, 2019. It covers emerging topics in computational intelligence and effective strategies for its implementation in engineering applications.
INTERNET OF HEALTHCARE THINGS The book addresses privacy and security issues providing solutions through authentication and authorization mechanisms, blockchain, fog computing, machine learning algorithms, so that machine learning-enabled IoT devices can deliver information concealed in data for fast, computerized responses and enhanced decision-making. The main objective of this book is to motivate healthcare providers to use telemedicine facilities for monitoring patients in urban and rural areas and gather clinical data for further research. To this end, it provides an overview of the Internet of Healthcare Things (IoHT) and discusses one of the major threats posed by it, which is the dat...
This book gathers high-quality papers presented at the Second International Conference on Sustainable Technologies for Computational Intelligence (ICTSCI 2021) held at Graphic Era University, Dehradun, India, during May 22–23, 2021. It covers emerging topics in computational intelligence and effective strategies for its implementation in engineering applications.
The book includes a selection of the best papers presented at the Third International Conference on Sustainable Computing (SUSCOM 2021), held in Jaipur, India, during 19 – 20 March 2021. It covers topics like Internet of things (IoT); artificial system of security; smart storage and knowledge retrieval using data cloud; intelligent transport management; intelligent cognitive and bio-inspired computing and management science. The book is useful for peoples from academia, government bodies, healthcare and industry to discuss their future scope.
This book presents innovative work by leading academics, researchers, and experts from industry which is useful for young researchers and students. This book includes selected papers from International Conference on Intelligent Cyber-Physical Systems (ICPS 2021), held at Indian Institute of Information Technology Kota (IIIT Kota), MNIT Jaipur Campus, Jaipur, India, during 16-18 April 2021. The book is a collection of the state-of-the art research work in the cutting-edge technologies related to the artificial intelligence and cyber physical systems.
This book offers a collection of high-quality peer-reviewed research papers presented at the Second International Conference on Communication and Computational Technologies (ICCCT 2019), held at Rajasthan Institute of Engineering and Technology, Jaipur, Rajasthan, India, on 30–31 August 2019. In contributions prepared by researchers from academia and industry alike, the book discusses a wide variety of industrial, engineering and scientific applications of emerging techniques.
In the complex landscape of binge eating disorders, a pervasive and intricate challenge unfolds. Binge eating, characterized by Binge eating disorders, is a difficult challenge that requires a nuanced understanding of the underlying neuroscientific mechanisms for effective prevention and intervention strategies. There is a pressing need to bridge the gap between cutting-edge neuroscientific research and the evolving therapeutic landscape. To address this, our groundbreaking book is tailored for academic scholars in the neuroscientific community. We offer a transformative journey into the heart of binge eating disorders, unraveling the mysteries that govern neural circuits, genetic factors, h...
Mobile forensics has grown from a relatively obscure tradecraft to a crucial part of many criminal investigations, and is now used daily by examiners and analysts within local, state, and federal law enforcement as well as within the military, US government organizations, and the private “e-Discovery” industry. Developments in forensic research, tools, and processes over the past decade have been very successful and continue to change at a rapid pace. Forensic Investigations and Risk Management in Mobile and Wireless Communications is a collection of innovative research on the methods and applications of analyzing mobile devices and data for collection of information pertaining to the legal evidence related to various security breaches and intrusion detection. While highlighting topics including cybercrime, neural networks, and smartphone security, this book is ideally designed for security analysts, IT professionals, researchers, practitioners, academicians, and students currently investigating the up-and-coming aspects surrounding network security, computer science, and security engineering.