Download or read book Advancing the Next Generation of Mobile Computing Emerging Technologies written by Khalil, Ismail and published by IGI Global. This book was released on 2012-02-29 with total page 345 pages. Available in PDF, EPUB and Kindle. Book excerpt: "This book offers historical perspectives on mobile computing, as well as new frameworks and methodologies for mobile networks, intelligent mobile applications, and mobile computing applications"--Provided by publisher.
Download or read book Cybersecurity and Privacy in Cyber Physical Systems written by Yassine Maleh and published by CRC Press. This book was released on 2019-05-01 with total page 434 pages. Available in PDF, EPUB and Kindle. Book excerpt: Cybersecurity and Privacy in Cyber-Physical Systems collects and reports on recent high-quality research that addresses different problems related to cybersecurity and privacy in cyber-physical systems (CPSs). It Presents high-quality contributions addressing related theoretical and practical aspects Improves the reader’s awareness of cybersecurity and privacy in CPSs Analyzes and presents the state of the art of CPSs, cybersecurity, and related technologies and methodologies Highlights and discusses recent developments and emerging trends in cybersecurity and privacy in CPSs Proposes new models, practical solutions, and technological advances related to cybersecurity and privacy in CPSs Discusses new cybersecurity and privacy models, prototypes, and protocols for CPSs This comprehensive book promotes high-quality research by bringing together researchers and experts in CPS security and privacy from around the world to share their knowledge of the different aspects of CPS security. Cybersecurity and Privacy in Cyber-Physical Systems is ideally suited for policymakers, industrial engineers, researchers, academics, and professionals seeking a thorough understanding of the principles of cybersecurity and privacy in CPSs. They will learn about promising solutions to these research problems and identify unresolved and challenging problems for their own research. Readers will also have an overview of CPS cybersecurity and privacy design.
Download or read book Cyber Crime Concepts Methodologies Tools and Applications written by Management Association, Information Resources and published by IGI Global. This book was released on 2011-11-30 with total page 1885 pages. Available in PDF, EPUB and Kindle. Book excerpt: Threatening the safety of individuals, computers, and entire networks, cyber crime attacks vary in severity and type. Studying this continually evolving discipline involves not only understanding different types of attacks, which range from identity theft to cyberwarfare, but also identifying methods for their prevention. Cyber Crime: Concepts, Methodologies, Tools and Applications is a three-volume reference that explores all aspects of computer-based crime and threats, offering solutions and best practices from experts in software development, information security, and law. As cyber crime continues to change and new types of threats emerge, research focuses on developing a critical understanding of different types of attacks and how they can best be managed and eliminated.
Download or read book Multimedia over Cognitive Radio Networks written by Fei Hu and published by CRC Press. This book was released on 2014-12-04 with total page 496 pages. Available in PDF, EPUB and Kindle. Book excerpt: With nearly 7 billion mobile phone subscriptions worldwide, mobility and computing have become pervasive in our society and business. Moreover, new mobile multimedia communication services are challenging telecommunication operators. To support the significant increase in multimedia traffic—especially video—over wireless networks, new technological infrastructure must be created. Cognitive Radio Networks (CRNs) are widely regarded as one of the most promising technologies for future wireless communications. This book explains how to efficiently deliver video, audio, and other data over CRNs. Covering advanced algorithms, protocols, and hardware-/software-based experiments, this book describes how to encode video in a prioritized way to send to dynamic radio links. It discusses different FEC codes for video reliability and explains how different machine learning algorithms can be used for video quality control. It also explains how to use readily available software tools to build a CRN simulation model. This book explains both theoretical and experimental designs. It describes how universal software radio peripheral (USRP) boards can be used for real-time, high-resolution video transmission. It also discusses how a USRP board can sense the spectrum dynamics and how it can be controlled by GNU Radio software. A separate chapter discusses how the network simulator ns-2 can be used to build a simulated CRN platform.
Download or read book Nature Inspired Networking written by Phan Cong-Vinh and published by CRC Press. This book was released on 2018-02-13 with total page 371 pages. Available in PDF, EPUB and Kindle. Book excerpt: "Nature-inspired" includes, roughly speaking, "bio-inspired"+"physical-inspired"+"social-inspired"+ and so on. This book contains highly original contributions about how nature is going to shape networking systems of the future. Hence, it focuses on rigorous approaches and cutting-edge solutions, which encompass three classes of major methods: 1) Those that take inspiration from nature for the development of novel problem solving techniques; 2) Those that are based on the use of networks to synthesize natural phenomena; and 3) Those that employ natural materials to compute or communicate.
Download or read book Contemporary Challenges and Solutions for Mobile and Multimedia Technologies written by Khalil, Ismail and published by IGI Global. This book was released on 2012-10-31 with total page 399 pages. Available in PDF, EPUB and Kindle. Book excerpt: Mobile computing and multimedia technologies continue to expand and change the way we interact with each other on a business and social level. With the increased use of mobile devices and the exchange of information over wireless networks, information systems are able to process and transmit multimedia data in various areas. Contemporary Challenges and Solutions for Mobile and Multimedia Technologies provides comprehensive knowledge on the growth and changes in the field of multimedia and mobile technologies. This reference source highlights the advancements in mobile technology that are beneficial for developers, researchers, and designers.
Download or read book Innovations and Social Media Analytics in a Digital Society written by Maria José Sousa and published by CRC Press. This book was released on 2022-06-15 with total page 293 pages. Available in PDF, EPUB and Kindle. Book excerpt: Recent advances in digitization are transforming healthcare, education, tourism, information technology, and some other sectors. Social media analytics are tools that can be used to measure innovation and the relation of the companies with the citizens. This book comprises state-ofthe-art social media analytics, and advanced innovation policies in the digitization of society. The number of applications that can be used to create and analyze social media analytics generates large amounts of data called big data, including measures of the use of the technologies to develop or to use new services to improve the quality of life of the citizens. Digitization has applications in fields from remote monitoring to smart sensors and other devices. Integration generates data that need to be analyzed and visualized in an easy and clear way, that will be some of the proposals of the researchers present in this book. This volume offers valuable insights to researchers on how to design innovative digital analytics systems and how to improve information delivery remotely.
Download or read book Internet of Things Applications From Research and Innovation to Market Deployment written by Ovidiu Vermesan and published by CRC Press. This book was released on 2022-09-01 with total page 263 pages. Available in PDF, EPUB and Kindle. Book excerpt: The book aims to provide a broad overview of various topics of Internet of Things from the research, innovation and development priorities to enabling technologies, nanoelectronics, cyber physical systems, architecture, interoperability and industrial applications. It is intended to be a standalone book in a series that covers the Internet of Things activities of the IERC – Internet of Things European Research Cluster from technology to international cooperation and the global state of play.The book builds on the ideas put forward by the European research Cluster on the Internet of Things Strategic Research Agenda and presents global views and state of the art results.
Download or read book Web Authentication using Third Parties in Untrusted Environments written by Anna Vapen and published by Linköping University Electronic Press. This book was released on 2016-08-22 with total page 91 pages. Available in PDF, EPUB and Kindle. Book excerpt: With the increasing personalization of the Web, many websites allow users to create their own personal accounts. This has resulted in Web users often having many accounts on different websites, to which they need to authenticate in order to gain access. Unfortunately, there are several security problems connected to the use and re-use of passwords, the most prevalent authentication method currently in use, including eavesdropping and replay attacks. Several alternative methods have been proposed to address these shortcomings, including the use of hardware authentication devices. However, these more secure authentication methods are often not adapted for mobile Web users who use different devices in different places and in untrusted environments, such as public Wi-Fi networks, to access their accounts. We have designed a method for comparing, evaluating and designing authentication solutions suitable for mobile users and untrusted environments. Our method leverages the fact that mobile users often bring their own cell phones, and also takes into account different levels of security adapted for different services on the Web. Another important trend in the authentication landscape is that an increasing number of websites use third-party authentication. This is a solution where users have an account on a single system, the identity provider, and this one account can then be used with multiple other websites. In addition to requiring fewer passwords, these services can also in some cases implement authentication with higher security than passwords can provide. How websites select their third-party identity providers has privacy and security implications for end users. To better understand the security and privacy risks with these services, we present a data collection methodology that we have used to identify and capture third-party authentication usage on the Web. We have also characterized the third-party authentication landscape based on our collected data, outlining which types of third-parties are used by which types of sites, and how usage differs across the world. Using a combination of large-scale crawling, longitudinal manual testing, and in-depth login tests, our characterization and analysis has also allowed us to discover interesting structural properties of the landscape, differences in the cross-site relationships, and how the use of third-party authentication is changing over time. Finally, we have also outlined what information is shared between websites in third-party authentication, dened risk classes based on shared data, and proled privacy leakage risks associated with websites and their identity providers sharing data with each other. Our ndings show how websites can strengthen the privacy of their users based on how these websites select and combine their third-parties and the data they allow to be shared.
Download or read book Sensor Technology Concepts Methodologies Tools and Applications written by Management Association, Information Resources and published by IGI Global. This book was released on 2020-02-07 with total page 1618 pages. Available in PDF, EPUB and Kindle. Book excerpt: Collecting and processing data is a necessary aspect of living in a technologically advanced society. Whether it’s monitoring events, controlling different variables, or using decision-making applications, it is important to have a system that is both inexpensive and capable of coping with high amounts of data. As the application of these networks becomes more common, it becomes imperative to evaluate their effectiveness as well as other opportunities for possible implementation in the future. Sensor Technology: Concepts, Methodologies, Tools, and Applications is a vital reference source that brings together new ways to process and monitor data and to put it to work in everything from intelligent transportation systems to healthcare to multimedia applications. It also provides inclusive coverage on the processing and applications of wireless communication, sensor networks, and mobile computing. Highlighting a range of topics such as internet of things, signal processing hardware, and wireless sensor technologies, this multi-volume book is ideally designed for research and development engineers, IT specialists, developers, graduate students, academics, and researchers.
Download or read book Prediction of Stock Market Index Movements with Machine Learning written by Nazif AYYILDIZ and published by Özgür Publications. This book was released on 2023-12-16 with total page 121 pages. Available in PDF, EPUB and Kindle. Book excerpt: The book titled "Prediction of Stock Market Index Movements with Machine Learning" focuses on the performance of machine learning methods in forecasting the future movements of stock market indexes and identifying the most advantageous methods that can be used across different stock exchanges. In this context, applications have been conducted on both developed and emerging market stock exchanges. The stock market indexes of developed countries such as NYSE 100, NIKKEI 225, FTSE 100, CAC 40, DAX 30, FTSE MIB, TSX; and the stock market indexes of emerging countries such as SSE, BOVESPA, RTS, NIFTY 50, IDX, IPC, and BIST 100 were selected. The movement directions of these stock market indexes were predicted using decision trees, random forests, k-nearest neighbors, naive Bayes, logistic regression, support vector machines, and artificial neural networks methods. Daily dataset from 01.01.2012 to 31.12.2021, along with technical indicators, were used as input data for analysis. According to the results obtained, it was determined that artificial neural networks were the most effective method during the examined period. Alongside artificial neural networks, logistic regression and support vector machines methods were found to predict the movement direction of all indexes with an accuracy of over 70%. Additionally, it was noted that while artificial neural networks were identified as the best method, they did not necessarily achieve the highest accuracy for all indexes. In this context, it was established that the performance of the examined methods varied among countries and indexes but did not differ based on the development levels of the countries. As a conclusion, artificial neural networks, logistic regression, and support vector machines methods are recommended as the most advantageous approaches for predicting stock market index movements.
Download or read book Securing the Internet of Things Concepts Methodologies Tools and Applications written by Management Association, Information Resources and published by IGI Global. This book was released on 2019-09-06 with total page 1805 pages. Available in PDF, EPUB and Kindle. Book excerpt: The ubiquity of modern technologies has allowed for increased connectivity between people and devices across the globe. This connected infrastructure of networks creates numerous opportunities for applications and uses. As the applications of the internet of things continue to progress so do the security concerns for this technology. The study of threat prevention in the internet of things is necessary as security breaches in this field can ruin industries and lives. Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications is a vital reference source that examines recent developments and emerging trends in security and privacy for the internet of things through new models, practical solutions, and technological advancements related to security. Highlighting a range of topics such as cloud security, threat detection, and open source software, this multi-volume book is ideally designed for engineers, IT consultants, ICT procurement managers, network system integrators, infrastructure service providers, researchers, academics, and professionals interested in current research on security practices pertaining to the internet of things.
Download or read book Big Data Concepts Methodologies Tools and Applications written by Management Association, Information Resources and published by IGI Global. This book was released on 2016-04-20 with total page 2523 pages. Available in PDF, EPUB and Kindle. Book excerpt: The digital age has presented an exponential growth in the amount of data available to individuals looking to draw conclusions based on given or collected information across industries. Challenges associated with the analysis, security, sharing, storage, and visualization of large and complex data sets continue to plague data scientists and analysts alike as traditional data processing applications struggle to adequately manage big data. Big Data: Concepts, Methodologies, Tools, and Applications is a multi-volume compendium of research-based perspectives and solutions within the realm of large-scale and complex data sets. Taking a multidisciplinary approach, this publication presents exhaustive coverage of crucial topics in the field of big data including diverse applications, storage solutions, analysis techniques, and methods for searching and transferring large data sets, in addition to security issues. Emphasizing essential research in the field of data science, this publication is an ideal reference source for data analysts, IT professionals, researchers, and academics.
Download or read book International Journal of Mobile Computing and Multimedia Communications IJMCMC written by and published by . This book was released on 2011 with total page 81 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book International Journal of Mobile Computing and Multimedia Communications written by Ismail Khalil and published by IGI Publishing. This book was released on 2012-01-01 with total page 98 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book International Journal of Mobile Computing and Multimedia Communications Issue 2 written by Ismail Khalil and published by IGI Publishing. This book was released on 2010 with total page 94 pages. Available in PDF, EPUB and Kindle. Book excerpt: The International Journal of Mobile Computing and Multimedia Communications (IJMCMC) publishes original research papers, state of the art reviews, technical notes, case studies, innovative projects, and book reviews on topics leveraging all aspects of mobile and multimedia computing: from underlying technologies to applications, theory to practice, and servers to networks to devices.The coverage of this journal ranges from innovative topics to research findings to trends analysis on mobile multimedia and related theories, technologies, methods, applications, and services from all engineering, business and organizational perspectives.
Download or read book Fog Computing written by Assad Abbas and published by John Wiley & Sons. This book was released on 2020-04-21 with total page 616 pages. Available in PDF, EPUB and Kindle. Book excerpt: Summarizes the current state and upcoming trends within the area of fog computing Written by some of the leading experts in the field, Fog Computing: Theory and Practice focuses on the technological aspects of employing fog computing in various application domains, such as smart healthcare, industrial process control and improvement, smart cities, and virtual learning environments. In addition, the Machine-to-Machine (M2M) communication methods for fog computing environments are covered in depth. Presented in two parts—Fog Computing Systems and Architectures, and Fog Computing Techniques and Application—this book covers such important topics as energy efficiency and Quality of Service (QoS) issues, reliability and fault tolerance, load balancing, and scheduling in fog computing systems. It also devotes special attention to emerging trends and the industry needs associated with utilizing the mobile edge computing, Internet of Things (IoT), resource and pricing estimation, and virtualization in the fog environments. Includes chapters on deep learning, mobile edge computing, smart grid, and intelligent transportation systems beyond the theoretical and foundational concepts Explores real-time traffic surveillance from video streams and interoperability of fog computing architectures Presents the latest research on data quality in the IoT, privacy, security, and trust issues in fog computing Fog Computing: Theory and Practice provides a platform for researchers, practitioners, and graduate students from computer science, computer engineering, and various other disciplines to gain a deep understanding of fog computing.