By enabling the conversion of traditional manufacturing systems into contemporary digitalized ones, Internet of Things (IoT) adoption in manufacturing creates huge economic prospects through reshaping industries.
This book offers readers a holistic understanding of intelligent environments, encompassingtheir definition, design, interaction paradigms, the role of Artificial Intelligence (AI), and theassociated broader philosophical and procedural aspects.
The Naked Android: Synthetic Socialness and the Human Gaze illuminates the connection between the stories people tell, their expectations of what a robot is, and how these beliefs and values manifest in how real robots are designed and used.
Since the turn of the century much has happened in politics, governments, spying, technology, global business, mobile communications, and global competition on national and corporate levels.
A compilation of the fundamental knowledge, skills, techniques, and tools require by all security professionals, Information Security Handbook, Sixth Edition sets the standard on which all IT security programs and certifications are based.
The book offers a critical exploration of the integration of AI, blockchain, and metaverse technology in the hospitality and tourism industry to investigate the potential of these technologies in revolutionizing the industry.
The Routledge Handbook of Esports offers the first fully comprehensive, interdisciplinary study of esports, one of the fastest growing sectors of the contemporary sports and entertainment industries.
Design for security and meet real-time requirements with this must-have book covering basic theory, hardware design and implementation of cryptographic algorithms, and side channel analysis.
This innovative resource provides comprehensive coverage of the policies, practices, and guidelines needed to address the security issues related to today's wireless sensor networks, satellite services, mobile e-services, and inter-system roaming and interconnecting systems.
The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its beginnings to modern uses.
How did we end up here, masters of scientific insight, purveyors of ever more powerful technologies, astride the burning planet that created us, and now responsible for cleaning up the mess and determining the future direction of all of life?
Artificial Intelligence in Forensic Science addresses the current and emerging opportunities being utilized to apply modern Artificial Intelligence (AI) technologies to current forensic and investigation practices.
The Next Generation Innovation in IoT and Cloud Computing with Applications is a thought-provoking edited book that explores the cutting-edge advancements and transformative potential of the Internet of Things (IoT) and cloud computing.
The Proceeding includes the research contribution from the International Conference on Next-Gen Technologies in Computational Intelligence (NGTCA 2023) held on March 24th 2023 at Vels Institute of Science, Technology and Advanced Studies.
Practical Hacking Techniques and Countermeasures examines computer security from the hacker's perspective, demonstrating how a security system can be designed and structured to repel an attack.
Ambient assisted living (AAL) utilizes information and communication technology to empower individuals to maintain an active and independent lifestyle for as long as possible.
Offering a holistic view of the pioneering trends and innovations in smart healthcare management, this book focuses on the methodologies, frameworks, design issues, tools, architectures, and technologies necessary to develop and understand intelligent healthcare systems and emerging applications in the present era.
This book provides a thorough exploration of the intersection between gender-based healthcare disparities and the transformative potential of artificial intelligence (AI) and machine learning (ML).
How did we end up here, masters of scientific insight, purveyors of ever more powerful technologies, astride the burning planet that created us, and now responsible for cleaning up the mess and determining the future direction of all of life?
Computer Forensics: Evidence Collection and Management examines cyber-crime, E-commerce, and Internet activities that could be used to exploit the Internet, computers, and electronic devices.
In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence by Dr.