This book delves into the fascinating world of Open-Source Intelligence (OSINT), empowering you to leverage the vast ocean of publicly available information to gain valuable insights and intelligence....Daugiau...
The book puts key issues such as bias, transparency, accountability and privacy at center stage. From computer science through law and ethics into policy, it lays down the roadmap on which developers, data scientists, and policymakers could bring AI...Daugiau...
This book explores the security and privacy challenges associated with real-time applications of the Internet of Things (IoT) and Wireless Sensor Networks (WSN) technologies. It is a valuable resource for readers interested in the security and priva...Daugiau...
Blockchain for Good: The Transformative Impacts on Industry, Community, and the Planet explores how blockchain technology can drive ethical, social, and environmental advancements....Daugiau...
This book provides an insightful examination of cybersecurity threats and their implications across various sectors, including healthcare, agriculture, and government. It covers fundamental concepts in cyber security, including cybercrime laws, cybe...Daugiau...
This book explores the role of Embedded AI in revolutionising industries such as healthcare, transportation, manufacturing, retail. It begins by introducing the fundamentals of AI and embedded systems and specific challenges and opportunities....Daugiau...
The book explores the application of cutting-edge machine learning and deep learning algorithms in mining Electronic Health Records (EHR). With the aim of improving patient health management, this book explains the structure of EHR, consisting of de...Daugiau...
The book includes detailed Python examples for each phase, making it an essential resource for researchers and practitioners in animal behavior and technology....Daugiau...
This book offers a comprehensive overview of the current state of cybersecurity in smart cities and explores how AI and IoT technologies can be used to address cybersecurity challenges....Daugiau...
This book presents cutting-edge research, advanced techniques, and practical applications of the integration of Cloud Computing and IoT. It offers in-depth insights, developments, and practical applications, showcasing helpful tools and techniques i...Daugiau...
This book delves into the history of biometrics, the various systems that have been developed to date, the problems that have arisen from these systems, the necessity of AI-based biometrics systems, the various AI techniques that have been developed...Daugiau...
This book presents a novel method of multimodal biometric fusion using a random selection of biometrics, which covers a new method of feature extraction, a new framework of sensor level and feature level fusion. Most of the biometric systems present...Daugiau...
This book offers a comprehensive overview from diverse perspectives of online gaming technology, policy, and experiments to understand and review the Indian approach. It starts with the technological viewpoint on the governance and regulation of onl...Daugiau...
The book aims to demonstrate the effectiveness of federated learning in high-performance information systems and informatics-based solutions for addressing current information support requirements....Daugiau...
This book aims to provide a deep insight into the concept of Linux, its usage, programming and several other connected topics. The book promotes hands-on practices of regular expressions and filters like sed and awk through many concretely executed...Daugiau...
This book sheds light on the optimisation methods that form the basis of effective communication between networked devices. It is an excellent resource as it provides readers with a thorough understanding of the methods, ideas, and tactics essential...Daugiau...
This book delves into the critical realm of trust management within the Internet of Vehicles (IOV) networks, exploring its multifaceted implications on safety and security which forms part of the intelligent transportation system domain. An essentia...Daugiau...
This book introduces the cyber risk investment model, and the cybersecurity risk management framework used within business driven risk assessments to meet the intent of Privacy and Data Protection Laws. The aim of this book is to demonstrate the use...Daugiau...
This book focuses on the current trends in research and analysis of virtual machine placement in a cloud data center. It discusses the integration of machine learning models and meta-heuristic approaches for placement techniques....Daugiau...
This text presents a comprehensive analysis of mathematical formulations for proving the effectiveness of artificial intelligence in education and investigates the possibilities for integrating advanced artificial intelligence algorithms....Daugiau...
The text covers techniques, and frameworks pertaining to the internet of medical things and highlights computing algorithms to establish a pre-learned intelligent system for improving and automating the diagnosis process in personal healthcare syste...Daugiau...
The third in a new series exploring the basics of Raspberry Pi Operating System administration, this instalment focuses onText Editors, git/GitHub and LXC/LXD...Daugiau...
Research Software Engineering: A Guide to the Open Source Ecosystem strives for a big picture overview and to give an understanding of the opportunities of programming as an approach to analytics and statistics....Daugiau...
This reference text presents an overview of the blockchain-based internet of things systems, along with the opportunities, challenges, and solutions in diverse fields such as business, education, agriculture, and healthcare....Daugiau...
The book covers soft computing techniques that provide an optimal solution to the optimization problem using single or multiple objectives. The book focuses on basic design principles and analysis of these techniques. These techniques can be used to...Daugiau...
In todays fast-paced world, Android development is a rapidly evolving field that requires regular updates to keep up with the latest trends and technologies. Tiny Android Projects Using Kotlin is an excellent resource for developers who want to lear...Daugiau...
Artificial Intelligence and Machine Learning for Smart Community: Concepts and Applications presents the evolution, challenges, and limitations of the application of machine learning and artificial intelligence to intelligent systems and smart commu...Daugiau...
The second in a new series, this instalment builds on the insights provided in Volume 1 to provide a compendium of easy-to-use and essential Raspberry Pi OS system administration for the novice user...Daugiau...
The first in a new series exploring the basics of Raspberry Pi Operating System administration, this volume is a compendium of easy-to-use and essential Raspberry Pi OS system administration for the novice user....Daugiau...
This text demystifies the subject by using a simple and stepbystep approach, from fundamentals to modern concepts of traditional uniprocessor operating systems, in addition to advanced operating systems on various multipleprocessor platforms and als...Daugiau...
This book offers in-depth analysis of security vulnerabilities in different mobile operating systems. It provides methodology and solutions for handling Android malware and vulnerabilities and transfers the latest knowledge in machine learning and d...Daugiau...
This is the first book that focuses on the intersection of graph searching games and probabilistic methods. The book explores various applications of these powerful mathematical tools to games and processes. It also provides results, techniques, and...Daugiau...
The book reviews the concept of quantum unitary, binary and ternary quantum operators as well as the computation implied by each operator. It provides details of the quantum processor, providing its architecture, which is validated via execution sim...Daugiau...
The popularity of Android mobile phones has attracted cybercriminals to create malware applications that carry out various malicious activities. This book will be highly useful for Android malware researchers, developers, students and cyber security...Daugiau...
This book can be used for self-paced study, in an undergraduate course on software design, or as the core of an intensive weeklong workshop for working programmers. Each chapter has a set of exercises ranging in size and difficulty from half a dozen...Daugiau...
The purpose of this edited book is to provide stateoftheart approaches and novel technologies for smart ships coving a range of topics in the areas so that it will be an excellent reference book for the researchers, students and professionals in the...Daugiau...
This book introduces the theory and practice of the double-flywheels model of Continuous Delivery 2.0 : Discovery Loop, which allows IT organisations to help businesses figure out the most efficacious ways to develop....Daugiau...
Linux with Operating System Concepts, 2nd Edition, merges conceptual operating system (OS) and Unix/Linux topics into one cohesive textbook for undergraduate students. The book can be used for a one- or two-semester course on Linux or Unix. It is co...Daugiau...
This is the first book to introduce the Huawei Mobile Services (HMS) ecosystem. It gives developers a basic understanding of the ecosystem and how to leverage kit and tool capabilities to make their apps better....Daugiau...
This book describes methods for processing biometric information in a smart city environment. The theoretical foundations of building a biometric multisensor network, which allows you to create a unified urban biometric community, are considered....Daugiau...
Fundamental topics in digital signal processing are covered through the introduction of theory, analytical tables, and applications with simulation tools. The text addresses the widespread focus in electrical engineering fields for processing inform...Daugiau...
This book is an attempt to establish in the readers the importance of creating interoperable data stores and writing rules for handling this data. It also covers extracts from a few project dissertations and a research funded project that the author...Daugiau...
This book covers embedded real-time multi-threaded operating system called RT-Thread. RT-Thread supports multiple chip architectures, compilers and IDEs, and is free to use. The book has two parts: the kernel and device components. Each chapter feat...Daugiau...
Comprehensive in scope, this text covers applied and practical elements, theory, and the reasons for the design of applications and security techniques. It covers both the management and the engineering issues of computer security and provides excel...Daugiau...
Big Data of Complex Networks presents and explains the methods from the study of big data that can be used in analysing massive structural data sets, including both very large networks and sets of graphs. As well as applying statistical analysis tec...Daugiau...