Author: Sanyog Rawat
Publisher: Springer Nature
ISBN: 9811966613
Category : Technology & Engineering
Languages : en
Pages : 674
Book Description
This book includes high-quality papers presented at Second International Conference on Computational Electronics for Wireless Communications (ICCWC 2022), held at National Institute of Technology, Surathkal, Karnataka, India, during June 9 – 10, 2022. The book presents original research work of academics and industry professionals to exchange their knowledge of the state-of-the-art research and development in computational electronics with an emphasis on wireless communications. The topics covered in the book are radio frequency and microwave, signal processing, microelectronics, and wireless networks.
Proceedings of Second International Conference on Computational Electronics for Wireless Communications
Proceedings of First International Conference on Computational Electronics for Wireless Communications
Author: Sanyog Rawat
Publisher: Springer Nature
ISBN: 9811662460
Category : Technology & Engineering
Languages : en
Pages : 679
Book Description
This book includes high-quality papers presented at Proceedings of First International Conference on Computational Electronics for Wireless Communications (ICCWC 2021), held at National Institute of Technology, Kurukshetra, Haryana, India, during June 11–12, 2021. The book presents original research work of academics and industry professionals to exchange their knowledge of the state-of-the-art research and development in computational electronics with an emphasis on wireless communications. The topics covered in the book are radio frequency and microwave, signal processing, microelectronics and wireless networks.
Publisher: Springer Nature
ISBN: 9811662460
Category : Technology & Engineering
Languages : en
Pages : 679
Book Description
This book includes high-quality papers presented at Proceedings of First International Conference on Computational Electronics for Wireless Communications (ICCWC 2021), held at National Institute of Technology, Kurukshetra, Haryana, India, during June 11–12, 2021. The book presents original research work of academics and industry professionals to exchange their knowledge of the state-of-the-art research and development in computational electronics with an emphasis on wireless communications. The topics covered in the book are radio frequency and microwave, signal processing, microelectronics and wireless networks.
Advances on Mathematical Modeling and Optimization with Its Applications
Author: Gunjan Mukherjee
Publisher: CRC Press
ISBN: 1040001343
Category : Mathematics
Languages : en
Pages : 279
Book Description
Advances on Mathematical Modeling and Optimization with Its Applications discusses optimization, equality, and inequality constraints and their application in the versatile optimizing domain. It further covers non-linear optimization methods such as global optimization, and gradient-based non-linear optimization, and their applications. Discusses important topics including multi-component differential equations, geometric partial differential equations, and computational neural systems Covers linear integer programming and network design problems, along with an application of the mixed integer problems Discusses constrained and unconstrained optimization, equality, and inequality constraints, and their application in the versatile optimizing domain Elucidates the application of statistical models, probability models, and transfer learning concepts Showcases the importance of multi-attribute decision modeling in the domain of image processing and soft computing The text is primarily for senior undergraduate and graduate students, and academic researchers in the fields of mathematics, statistics, and computer science.
Publisher: CRC Press
ISBN: 1040001343
Category : Mathematics
Languages : en
Pages : 279
Book Description
Advances on Mathematical Modeling and Optimization with Its Applications discusses optimization, equality, and inequality constraints and their application in the versatile optimizing domain. It further covers non-linear optimization methods such as global optimization, and gradient-based non-linear optimization, and their applications. Discusses important topics including multi-component differential equations, geometric partial differential equations, and computational neural systems Covers linear integer programming and network design problems, along with an application of the mixed integer problems Discusses constrained and unconstrained optimization, equality, and inequality constraints, and their application in the versatile optimizing domain Elucidates the application of statistical models, probability models, and transfer learning concepts Showcases the importance of multi-attribute decision modeling in the domain of image processing and soft computing The text is primarily for senior undergraduate and graduate students, and academic researchers in the fields of mathematics, statistics, and computer science.
Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks
Author: Sagayam, K. Martin
Publisher: IGI Global
ISBN: 1799850692
Category : Computers
Languages : en
Pages : 405
Book Description
Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amount of applications, wireless sensor networks are vulnerable to a variety of security attacks. The protection of wireless sensor networks remains a challenge due to their resource-constrained nature, which is why researchers have begun applying several branches of artificial intelligence to advance the security of these networks. Research is needed on the development of security practices in wireless sensor networks by using smart technologies. Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks provides emerging research exploring the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques. Featuring coverage on a broad range of topics such as clustering protocols, intrusion detection, and energy harvesting, this book is ideally designed for researchers, developers, IT professionals, educators, policymakers, practitioners, scientists, theorists, engineers, academicians, and students seeking current research on integrating intelligent techniques into sensor networks for more reliable security practices.
Publisher: IGI Global
ISBN: 1799850692
Category : Computers
Languages : en
Pages : 405
Book Description
Wireless sensor networks have gained significant attention industrially and academically due to their wide range of uses in various fields. Because of their vast amount of applications, wireless sensor networks are vulnerable to a variety of security attacks. The protection of wireless sensor networks remains a challenge due to their resource-constrained nature, which is why researchers have begun applying several branches of artificial intelligence to advance the security of these networks. Research is needed on the development of security practices in wireless sensor networks by using smart technologies. Deep Learning Strategies for Security Enhancement in Wireless Sensor Networks provides emerging research exploring the theoretical and practical advancements of security protocols in wireless sensor networks using artificial intelligence-based techniques. Featuring coverage on a broad range of topics such as clustering protocols, intrusion detection, and energy harvesting, this book is ideally designed for researchers, developers, IT professionals, educators, policymakers, practitioners, scientists, theorists, engineers, academicians, and students seeking current research on integrating intelligent techniques into sensor networks for more reliable security practices.
Proceedings of Second International Conference on Computing, Communications, and Cyber-Security
Author: Pradeep Kumar Singh
Publisher: Springer Nature
ISBN: 9811607338
Category : Technology & Engineering
Languages : en
Pages : 1027
Book Description
This book features selected research papers presented at the Second International Conference on Computing, Communications, and Cyber-Security (IC4S 2020), organized in Krishna Engineering College (KEC), Ghaziabad, India, along with Academic Associates; Southern Federal University, Russia; IAC Educational, India; and ITS Mohan Nagar, Ghaziabad, India during 3–4 October 2020. It includes innovative work from researchers, leading innovators, and professionals in the area of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues.
Publisher: Springer Nature
ISBN: 9811607338
Category : Technology & Engineering
Languages : en
Pages : 1027
Book Description
This book features selected research papers presented at the Second International Conference on Computing, Communications, and Cyber-Security (IC4S 2020), organized in Krishna Engineering College (KEC), Ghaziabad, India, along with Academic Associates; Southern Federal University, Russia; IAC Educational, India; and ITS Mohan Nagar, Ghaziabad, India during 3–4 October 2020. It includes innovative work from researchers, leading innovators, and professionals in the area of communication and network technologies, advanced computing technologies, data analytics and intelligent learning, the latest electrical and electronics trends, and security and privacy issues.
Wireless Networks and Security
Author: Shafiullah Khan
Publisher: Springer Science & Business Media
ISBN: 3642361692
Category : Technology & Engineering
Languages : en
Pages : 513
Book Description
“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications. The contributions identify various vulnerabilities in the physical layer, MAC layer, network layer, transport layer, and application layer, and focus on ways of strengthening security mechanisms and services throughout the layers. This carefully edited monograph is targeting for researchers, post-graduate students in universities, academics, and industry practitioners or professionals.
Publisher: Springer Science & Business Media
ISBN: 3642361692
Category : Technology & Engineering
Languages : en
Pages : 513
Book Description
“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications. The contributions identify various vulnerabilities in the physical layer, MAC layer, network layer, transport layer, and application layer, and focus on ways of strengthening security mechanisms and services throughout the layers. This carefully edited monograph is targeting for researchers, post-graduate students in universities, academics, and industry practitioners or professionals.
The Stances of e-Government
Author: Puneet Kumar
Publisher: CRC Press
ISBN: 1351396188
Category : Computers
Languages : en
Pages : 223
Book Description
This book focuses on the three inevitable facets of e-government, namely policies, processes and technologies. The policies discusses the genesis and revitalization of government policies; processes talks about ongoing e-government practices across developing countries; technology reveals the inclusion of novel technologies.
Publisher: CRC Press
ISBN: 1351396188
Category : Computers
Languages : en
Pages : 223
Book Description
This book focuses on the three inevitable facets of e-government, namely policies, processes and technologies. The policies discusses the genesis and revitalization of government policies; processes talks about ongoing e-government practices across developing countries; technology reveals the inclusion of novel technologies.
Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications
Author: Management Association, Information Resources
Publisher: IGI Global
ISBN: 1522598677
Category : Computers
Languages : en
Pages : 1805
Book Description
The ubiquity of modern technologies has allowed for increased connectivity between people and devices across the globe. This connected infrastructure of networks creates numerous opportunities for applications and uses. As the applications of the internet of things continue to progress so do the security concerns for this technology. The study of threat prevention in the internet of things is necessary as security breaches in this field can ruin industries and lives. Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications is a vital reference source that examines recent developments and emerging trends in security and privacy for the internet of things through new models, practical solutions, and technological advancements related to security. Highlighting a range of topics such as cloud security, threat detection, and open source software, this multi-volume book is ideally designed for engineers, IT consultants, ICT procurement managers, network system integrators, infrastructure service providers, researchers, academics, and professionals interested in current research on security practices pertaining to the internet of things.
Publisher: IGI Global
ISBN: 1522598677
Category : Computers
Languages : en
Pages : 1805
Book Description
The ubiquity of modern technologies has allowed for increased connectivity between people and devices across the globe. This connected infrastructure of networks creates numerous opportunities for applications and uses. As the applications of the internet of things continue to progress so do the security concerns for this technology. The study of threat prevention in the internet of things is necessary as security breaches in this field can ruin industries and lives. Securing the Internet of Things: Concepts, Methodologies, Tools, and Applications is a vital reference source that examines recent developments and emerging trends in security and privacy for the internet of things through new models, practical solutions, and technological advancements related to security. Highlighting a range of topics such as cloud security, threat detection, and open source software, this multi-volume book is ideally designed for engineers, IT consultants, ICT procurement managers, network system integrators, infrastructure service providers, researchers, academics, and professionals interested in current research on security practices pertaining to the internet of things.
Advances in Electronics, Communication and Computing
Author: Pradeep Kumar Mallick
Publisher: Springer Nature
ISBN: 9811587523
Category : Technology & Engineering
Languages : en
Pages : 662
Book Description
This book comprises select proceedings of the international conference ETAEERE 2020, and covers latest research in the areas of electronics, communication and computing. The book includes different approaches and techniques for specific applications using particle swarm optimization, Otsu’s function and harmony search optimization algorithm, DNA-NAND gate, triple gate SOI MOSFET, micro-Raman and FTIR analysis, high-k dielectric gate oxide, spectrum sensing in cognitive radio, microstrip antenna, GPR with conducting surfaces, energy efficient packet routing, iBGP route reflectors, circularly polarized antenna, double fork shaped patch radiator, implementation of Doppler radar at 24 GHz, iris image classification using SVM, digital image forgery detection, secure communication, spoken dialog system, and DFT-DCT spreading strategies. Given the range of topics covered, this book can be useful for both students and researchers working in electronics and communication.
Publisher: Springer Nature
ISBN: 9811587523
Category : Technology & Engineering
Languages : en
Pages : 662
Book Description
This book comprises select proceedings of the international conference ETAEERE 2020, and covers latest research in the areas of electronics, communication and computing. The book includes different approaches and techniques for specific applications using particle swarm optimization, Otsu’s function and harmony search optimization algorithm, DNA-NAND gate, triple gate SOI MOSFET, micro-Raman and FTIR analysis, high-k dielectric gate oxide, spectrum sensing in cognitive radio, microstrip antenna, GPR with conducting surfaces, energy efficient packet routing, iBGP route reflectors, circularly polarized antenna, double fork shaped patch radiator, implementation of Doppler radar at 24 GHz, iris image classification using SVM, digital image forgery detection, secure communication, spoken dialog system, and DFT-DCT spreading strategies. Given the range of topics covered, this book can be useful for both students and researchers working in electronics and communication.
Improving Information Security Practices through Computational Intelligence
Author: Awad, Wasan Shaker
Publisher: IGI Global
ISBN: 1466694270
Category : Computers
Languages : en
Pages : 348
Book Description
The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.
Publisher: IGI Global
ISBN: 1466694270
Category : Computers
Languages : en
Pages : 348
Book Description
The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with every passing year, so do the number of proposed cryptographic schemata for improving and ensuring the encryption integrity of cutting-edge infosec protocols. Improving Information Security Practices through Computational Intelligence presents an overview of the latest and greatest research in the field, touching on such topics as cryptology, stream ciphers, and intrusion detection, and providing new insights to an audience of students, teachers, and entry-level researchers working in computational intelligence, information security, and security engineering.