Smart Secure Systems – IoT and Analytics Perspective

Smart Secure Systems – IoT and Analytics Perspective PDF Author: Guru Prasadh Venkataramani
Publisher: Springer
ISBN: 9811076359
Category : Computers
Languages : en
Pages : 345

Get Book Here

Book Description
This volume constitutes the refereed proceedings of the Second International Conference on Intelligent Information Technologies, ICIIT 2017, held in Chennai, India, in December 2017. The 20 full papers and 7 short papers presented were carefully reviewed and selected from 117 submissions. They feature research on the Internet of Things (IoT) and are organized in the following topical sections: IoT enabling technologies; IoT security; social IoT; web of things; and IoT services and applications.

Smart Secure Systems – IoT and Analytics Perspective

Smart Secure Systems – IoT and Analytics Perspective PDF Author: Guru Prasadh Venkataramani
Publisher: Springer
ISBN: 9811076359
Category : Computers
Languages : en
Pages : 345

Get Book Here

Book Description
This volume constitutes the refereed proceedings of the Second International Conference on Intelligent Information Technologies, ICIIT 2017, held in Chennai, India, in December 2017. The 20 full papers and 7 short papers presented were carefully reviewed and selected from 117 submissions. They feature research on the Internet of Things (IoT) and are organized in the following topical sections: IoT enabling technologies; IoT security; social IoT; web of things; and IoT services and applications.

Edge Computing and Computational Intelligence Paradigms for the IoT

Edge Computing and Computational Intelligence Paradigms for the IoT PDF Author: Nagarajan, G.
Publisher: IGI Global
ISBN: 1522585575
Category : Computers
Languages : en
Pages : 372

Get Book Here

Book Description
Edge computing is focused on devices and technologies that are attached to the internet of things (IoT). Identifying IoT use across a range of industries and measuring strategic values helps identify what technologies to pursue and can avoid wasted resources on deployments with limited values. Edge Computing and Computational Intelligence Paradigms for the IoT is a critical research book that provides a complete insight on the recent advancements and integration of intelligence in IoT. This book highlights various topics such as disaster prediction, governance, and healthcare. It is an excellent resource for researchers, working professionals, academicians, policymakers, and defense companies.

Research Anthology on Big Data Analytics, Architectures, and Applications

Research Anthology on Big Data Analytics, Architectures, and Applications PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1668436639
Category : Computers
Languages : en
Pages : 1988

Get Book Here

Book Description
Society is now completely driven by data with many industries relying on data to conduct business or basic functions within the organization. With the efficiencies that big data bring to all institutions, data is continuously being collected and analyzed. However, data sets may be too complex for traditional data-processing, and therefore, different strategies must evolve to solve the issue. The field of big data works as a valuable tool for many different industries. The Research Anthology on Big Data Analytics, Architectures, and Applications is a complete reference source on big data analytics that offers the latest, innovative architectures and frameworks and explores a variety of applications within various industries. Offering an international perspective, the applications discussed within this anthology feature global representation. Covering topics such as advertising curricula, driven supply chain, and smart cities, this research anthology is ideal for data scientists, data analysts, computer engineers, software engineers, technologists, government officials, managers, CEOs, professors, graduate students, researchers, and academicians.

Handbook of Research on Big Data and the IoT

Handbook of Research on Big Data and the IoT PDF Author: Kaur, Gurjit
Publisher: IGI Global
ISBN: 1522574336
Category : Computers
Languages : en
Pages : 602

Get Book Here

Book Description
The increase in connected devices in the internet of things (IoT) is leading to an exponential increase in the data that an organization is required to manage. To successfully utilize IoT in businesses, big data analytics are necessary in order to efficiently sort through the increased data. The combination of big data and IoT can thus enable new monitoring services and powerful processing of sensory data streams. The Handbook of Research on Big Data and the IoT is a pivotal reference source that provides vital research on emerging trends and recent innovative applications of big data and IoT, challenges facing organizations and the implications of these technologies on society, and best practices for their implementation. While highlighting topics such as bootstrapping, data fusion, and graph mining, this publication is ideally designed for IT specialists, managers, policymakers, analysts, software engineers, academicians, and researchers.

Sustainable Development through Machine Learning, AI and IoT

Sustainable Development through Machine Learning, AI and IoT PDF Author: Pawan Whig
Publisher: Springer Nature
ISBN: 3031470559
Category : Computers
Languages : en
Pages : 384

Get Book Here

Book Description
This book constitutes the revised selected papers of the First International Conference, ICSD 2023, virtually held in Delhi, India, during July 15–16, 2023. The book comprises 31 full papers that were selected from a total of 129 submissions. It provides insights into the latest research and advancements in sustainable development through the integration of machine learning, artificial intelligence, and IoT technologies. It serves as a valuable resource for researchers, practitioners, and policymakers working in the field of sustainable development.

Research Anthology on Machine Learning Techniques, Methods, and Applications

Research Anthology on Machine Learning Techniques, Methods, and Applications PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1668462923
Category : Computers
Languages : en
Pages : 1516

Get Book Here

Book Description
Machine learning continues to have myriad applications across industries and fields. To ensure this technology is utilized appropriately and to its full potential, organizations must better understand exactly how and where it can be adapted. Further study on the applications of machine learning is required to discover its best practices, challenges, and strategies. The Research Anthology on Machine Learning Techniques, Methods, and Applications provides a thorough consideration of the innovative and emerging research within the area of machine learning. The book discusses how the technology has been used in the past as well as potential ways it can be used in the future to ensure industries continue to develop and grow. Covering a range of topics such as artificial intelligence, deep learning, cybersecurity, and robotics, this major reference work is ideal for computer scientists, managers, researchers, scholars, practitioners, academicians, instructors, and students.

Cyber-Physical Systems for Social Applications

Cyber-Physical Systems for Social Applications PDF Author: Dimitrova, Maya
Publisher: IGI Global
ISBN: 1522578803
Category : Computers
Languages : en
Pages : 460

Get Book Here

Book Description
Present day sophisticated, adaptive, and autonomous (to a certain degree) robotic technology is a radically new stimulus for the cognitive system of the human learner from the earliest to the oldest age. It deserves extensive, thorough, and systematic research based on novel frameworks for analysis, modelling, synthesis, and implementation of CPSs for social applications. Cyber-Physical Systems for Social Applications is a critical scholarly book that examines the latest empirical findings for designing cyber-physical systems for social applications and aims at forwarding the symbolic human-robot perspective in areas that include education, social communication, entertainment, and artistic performance. Highlighting topics such as evolinguistics, human-robot interaction, and neuroinformatics, this book is ideally designed for social network developers, cognitive scientists, education science experts, evolutionary linguists, researchers, and academicians.

Research Anthology on Securing Mobile Technologies and Applications

Research Anthology on Securing Mobile Technologies and Applications PDF Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1799886018
Category : Technology & Engineering
Languages : en
Pages : 837

Get Book Here

Book Description
Mobile technologies have become a staple in society for their accessibility and diverse range of applications that are continually growing and advancing. Users are increasingly using these devices for activities beyond simple communication including gaming and e-commerce and to access confidential information including banking accounts and medical records. While mobile devices are being so widely used and accepted in daily life, and subsequently housing more and more personal data, it is evident that the security of these devices is paramount. As mobile applications now create easy access to personal information, they can incorporate location tracking services, and data collection can happen discreetly behind the scenes. Hence, there needs to be more security and privacy measures enacted to ensure that mobile technologies can be used safely. Advancements in trust and privacy, defensive strategies, and steps for securing the device are important foci as mobile technologies are highly popular and rapidly developing. The Research Anthology on Securing Mobile Technologies and Applications discusses the strategies, methods, and technologies being employed for security amongst mobile devices and applications. This comprehensive book explores the security support that needs to be required on mobile devices to avoid application damage, hacking, security breaches and attacks, or unauthorized accesses to personal data. The chapters cover the latest technologies that are being used such as cryptography, verification systems, security policies and contracts, and general network security procedures along with a look into cybercrime and forensics. This book is essential for software engineers, app developers, computer scientists, security and IT professionals, practitioners, stakeholders, researchers, academicians, and students interested in how mobile technologies and applications are implementing security protocols and tactics amongst devices.

Applying Integration Techniques and Methods in Distributed Systems and Technologies

Applying Integration Techniques and Methods in Distributed Systems and Technologies PDF Author: Kecskemeti, Gabor
Publisher: IGI Global
ISBN: 1522582967
Category : Computers
Languages : en
Pages : 368

Get Book Here

Book Description
Distributed systems intertwine with our everyday lives. The benefits and current shortcomings of the underpinning technologies are experienced by a wide range of people and their smart devices. With the rise of large-scale IoT and similar distributed systems, cloud bursting technologies, and partial outsourcing solutions, private entities are encouraged to increase their efficiency and offer unparalleled availability and reliability to their users. Applying Integration Techniques and Methods in Distributed Systems is a critical scholarly publication that defines the current state of distributed systems, determines further goals, and presents architectures and service frameworks to achieve highly integrated distributed systems and presents solutions to integration and efficient management challenges faced by current and future distributed systems. Highlighting topics such as multimedia, programming languages, and smart environments, this book is ideal for system administrators, integrators, designers, developers, researchers, and academicians.

Machine Learning and Cognitive Science Applications in Cyber Security

Machine Learning and Cognitive Science Applications in Cyber Security PDF Author: Khan, Muhammad Salman
Publisher: IGI Global
ISBN: 1522581014
Category : Computers
Languages : en
Pages : 338

Get Book Here

Book Description
In the past few years, with the evolution of advanced persistent threats and mutation techniques, sensitive and damaging information from a variety of sources have been exposed to possible corruption and hacking. Machine learning, artificial intelligence, predictive analytics, and similar disciplines of cognitive science applications have been found to have significant applications in the domain of cyber security. Machine Learning and Cognitive Science Applications in Cyber Security examines different applications of cognition that can be used to detect threats and analyze data to capture malware. Highlighting such topics as anomaly detection, intelligent platforms, and triangle scheme, this publication is designed for IT specialists, computer engineers, researchers, academicians, and industry professionals interested in the impact of machine learning in cyber security and the methodologies that can help improve the performance and reliability of machine learning applications.