This book fills a gap in the existing literature by combining a plethora of WSN-based emerging technologies into a single source so that reviewers can form opinions regarding these technologies.
Design for security and meet real-time requirements with this must-have book covering basic theory, hardware design and implementation of cryptographic algorithms, and side channel analysis.
Algorithms are ubiquitous in the contemporary technological world, and they ultimately consist of finite sequences of instructions used to accomplish tasks with necessary input values.
Presenting practical guidelines and examples, Advanced Server Virtualization emphasizes design, implementation, and management from both a technical and consultative point of view.
Starting from the fundamentals, this book provides a concise yet complete treatment of piezoelectric materials, an important class of smart materials which are useful as both actuators and sensors.
We feel greatly honoured to have been assigned the job of organizing the AICTE Sponsored International Conference on Application of AI, ML, DL, Big Data on Recent Societal Issues (ICARSI'2023) on April 21 & April 22,2023 at Saveetha Engineering College.
The Next Generation Innovation in IoT and Cloud Computing with Applications is a thought-provoking edited book that explores the cutting-edge advancements and transformative potential of the Internet of Things (IoT) and cloud computing.
This is one of the first parallel computing books to focus exclusively on parallel data structures, algorithms, software tools, and applications in data science.
Collecting scattered knowledge into one coherent account, this book provides a compendium of both classical and recently developed results on reversible computing.
The Proceeding includes the research contribution from the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023) held on March 24th 2023 at Vels Institute of Science, Technology and Advanced Studies.
Addressing the rapid evolution of global communications, this book provides step-by-step guidance on how to configure, enact, and manage the process of integrating mobile technology within an organization.
Although wireless sensor networks (WSNs) have been employed across a range of applications, there are few books available that cover the required algorithms, performance analysis, and applications of network management techniques in WSNs.
Iris and Periocular Recognition using Deep Learning systematically explains the fundamental and most advanced techniques for ocular imprint-based human identification, with many applications in sectors such as healthcare, online education, e-business, metaverse, and entertainment.
This book provides a thorough exploration of the intersection between gender-based healthcare disparities and the transformative potential of artificial intelligence (AI) and machine learning (ML).
Complex Networks: An Algorithmic Perspective supplies the basic theoretical algorithmic and graph theoretic knowledge needed by every researcher and student of complex networks.
In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence by Dr.
Advances in the area of wireless and mobile telemedicine to diagnose and treat patients have drawn growing attention from healthcare providers and recipients, industry, researchers, and governments.
This book explores how medical device integration (MDI) supports quality patient care and better clinical outcomes by reducing clinical documentation transcription errors, improving data accuracy and density within clinical records and ensuring the complete capture of medical device information on patients.
This book presents insights, interpretations, concepts, and interdependent views-in the landscape of mobile connectivity and service-that emphasize the significance of a harmonious interplay, cooperation, and coalescing of a variety of interdisciplinary domains of science and art.
This book presents common techniques used in numerous models, algorithms, and tools developed during the last decade to implement desktop grid computing.
This comprehensive technical guide explains game theory basics, architectures, protocols, security, models, open research issues, and cutting-edge advances and applications.
Measuring systems are an essential part of all automated production systems, they also serve to ensure quality of production or they are used to assure the reliability and safety in various areas.
You hold in your hands a comprehensive guide to creating a flourishing software development practice - one that makes a powerful impact with the software it builds.
This book provides readers at all levels of technical expertise with an understanding of mobile device concepts, application development processes, networking and infrastructure, and security methods.
This book provides a thorough introduction of 5G and B5G wireless networks, as well as cutting-edge technologies that aid in network design and development.
Blockchain and distributed-ledger technologies enable new modes of communication, synchronization, and transfer of value with a broad impact on Internet of Things (IoT), Data Science, society, industry, commerce, and government.
This book provides comprehensive coverage of building an end-to-end view on how to architect, design, and orchestrate a 5G capable network that will integrate with 5G RAN, IP transport, datacenters, Telco Cloud, and 5G packet networks.
Network Optimization in Intelligent Internet of Things Applications: Principles and Challenges sheds light on the optimization methods that form the basis of effective communication between networked devices.