Today, relevant data are typically delivered to cloud-based servers for storing and analysis in order to extract key features and enable enhanced applications beyond the basic transmission of raw data and to realize the possibilities associated with the impending Internet of Things (IoT).
Computational Intelligence for Wireless Sensor Networks: Principles and Applications provides an integrative overview of the computational intelligence (CI) in wireless sensor networks and enabled technologies.
With the evolution of technology and sudden growth in the number of smart vehicles, traditional Vehicular Ad hoc NETworks (VANETs) face several technical challenges in deployment and management due to less flexibility, scalability, poor connectivity, and inadequate intelligence.
Computational Intelligence for Wireless Sensor Networks: Principles and Applications provides an integrative overview of the computational intelligence (CI) in wireless sensor networks and enabled technologies.
With the evolution of technology and sudden growth in the number of smart vehicles, traditional Vehicular Ad hoc NETworks (VANETs) face several technical challenges in deployment and management due to less flexibility, scalability, poor connectivity, and inadequate intelligence.
It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing.
It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing.
Asynchronous On-Chip Networks and Fault-Tolerant Techniques is the first comprehensive study of fault-tolerance and fault-caused deadlock effects in asynchronous on-chip networks, aiming to overcome these drawbacks and ensure greater reliability of applications.
Asynchronous On-Chip Networks and Fault-Tolerant Techniques is the first comprehensive study of fault-tolerance and fault-caused deadlock effects in asynchronous on-chip networks, aiming to overcome these drawbacks and ensure greater reliability of applications.
Introduction to the Cyber Ranges provides a comprehensive, integrative, easy-to-comprehend overview of different aspects involved in the cybersecurity arena.
Introduction to the Cyber Ranges provides a comprehensive, integrative, easy-to-comprehend overview of different aspects involved in the cybersecurity arena.
Cyber-Physical Systems: A Comprehensive Guide explores the complete sys-tem perspective, underlying theories, modelling, and the applications of Cyber Physical Systems (CPS).
Cyber-Physical Systems: A Comprehensive Guide explores the complete sys-tem perspective, underlying theories, modelling, and the applications of Cyber Physical Systems (CPS).
You hold in your hands a comprehensive guide to creating a flourishing software development practice - one that makes a powerful impact with the software it builds.
Cybersecurity: A Practical Engineering Approach introduces the implementation of a secure cyber architecture, beginning with the identification of security risks.
Cybersecurity: A Practical Engineering Approach introduces the implementation of a secure cyber architecture, beginning with the identification of security risks.
Whether you are a project manager looking to lead blockchain projects, a developer who would like to create blockchain-based applications, or a student with an interest, this book will provide you with the foundational understanding that you need.
Whether you are a project manager looking to lead blockchain projects, a developer who would like to create blockchain-based applications, or a student with an interest, this book will provide you with the foundational understanding that you need.
By deploying time series analysis, Fourier transform, functional analysis, min-plus convolution, and fractional order systems and noise, this book proposes fractal traffic modeling and computations of delay bounds, aiming to improve the quality of service in computer communication networks.
By deploying time series analysis, Fourier transform, functional analysis, min-plus convolution, and fractional order systems and noise, this book proposes fractal traffic modeling and computations of delay bounds, aiming to improve the quality of service in computer communication networks.
Energy efficiency is critical for running computer vision on battery-powered systems, such as mobile phones or UAVs (unmanned aerial vehicles, or drones).
Energy efficiency is critical for running computer vision on battery-powered systems, such as mobile phones or UAVs (unmanned aerial vehicles, or drones).
This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI.
This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI.
The goal of this book is to provide a reference for applications of mathematical modelling in social media and related network analysis and offer a theoretically sound background with adequate suggestions for better decision-making.
The goal of this book is to provide a reference for applications of mathematical modelling in social media and related network analysis and offer a theoretically sound background with adequate suggestions for better decision-making.