Computer Science & Media Communications
415 Oser Avenue, Suite N, Hauppauge NY 11788-3619 USA
Orders: (631) 231-7269, Office: (631) 231-7269, Fax: (631) 299-0166, E-mail: billing.central@novapublishers.com
Cover

Data Sharing: Recent Progress and Remaining Challenges

Editors: Yousef Ibrahim Daradkeh (Prince Sattam bin Abdulaziz University (PSAU) – KSA) and
Korolev Petr Mikhailovich (Chief, World Global Network, Studia Korolevae, Russia)

Series: Computer Science, Technology and Applications

Publication Date: 2019

Book Description:
Coherence of the information world is needed to approve technology concerning data sharing. This book gives to a wide range of readers the possibility to know what problems exist in the field. An international group of experts discuss the situations in their practices concerning the data exchange. Bio information, education protocols, and investigation of data bases gather at different information resources. These data are needed for protection, invariability and open access. In many cases, opposite goals are encountered and it is important to solve complex problems. The authors of the chapters found within this book give their solutions to different problems. These tools and methods have been described in different conditions of locality (from the developed to the developing world) and domains of practice (from art and research to government and schooling). This book is founded on many sources, such as books, papers, reports, data bases, legislative acts, etc.
The editorial board and editors hope that this book will become a table book for readers and that they will often refer to it.

Binding: Softcover
Binding: e-Book

ISBN: 978-1-53614-677-6
ISBN: 978-1-53614-678-3

Price: $82.00
Price: $82.00


Cover

Object-Oriented Software Engineering with UML: A Hands-On Approach

Author: Roger Y. Lee, Ph.D.
Software Engineering and Information Technology Institute, Computer Science Department, Central Michigan University, Mount Pleasant, MI, USA

Series: Computer Science, Technology and Applications

Publication Date: 2019

Book Description:
The object-oriented paradigm supplements traditional software engineering by providing solutions to common problems such as modularity and reusability. Objects can be written for a specific purpose acting as an encapsulated black-box API that can work with other components by forming a complex system. This book provides a comprehensive overview of the many facets of the object-oriented paradigm and how it applies to software engineering. Starting with an in-depth look at objects, the book naturally progresses through the software engineering life cycle and shows how object-oriented concepts enhance each step. Furthermore, it is designed as a roadmap with each chapter, preparing the reader with the skills necessary to advance the project.

This book should be used by anyone interested in learning about object-oriented software engineering, including students and seasoned developers. Without overwhelming the reader, this book hopes to provide enough information for the reader to understand the concepts and apply them in their everyday work. After learning about the fundamentals of the object-oriented paradigm and the software engineering life cycle, the reader is introduced to more advanced topics such as web engineering, cloud computing, agile development, and big data. In recent years, these fields have been rapidly growing as many are beginning to realize the benefits of developing on a highly scalable, automated deployment system. Combined with the speed and effectiveness of agile development, legacy systems are beginning to make the transition to a more adaptive environment.

Core Features:
1. Provides a thorough exploration of the object-oriented paradigm.
2. Provides a detailed look at each step of the software engineering life cycle.
3. Provides supporting examples and documents.
4. Provides a detailed look at emerging technology and standards in object-oriented software engineering.

Binding: Hardcover
Binding: e-Book

ISBN: 978-1-53614-755-1
ISBN: 978-1-53614-756-8

Price: $230.00
Price: $230.00


Cover

Computer Science Advances: Research and Applications

Editor: Sandip A. Kale (Associate Professor, Mechanical Engineering Department, Trinity College of Engineering and Research, Pune, India)

Series: Computer Science, Technology and Applications

Publication Date: 2019

Book Description:
This book is comprised of eleven chapters about computer application and research areas to discuss the latest issues and technologies. Interesting and important topics like fuzzy and cognitive applications, fuzzy classifiers, neural network, data analytics, clustering and classification models, artificial intelligence, controller area network, digital technology industry 4.0, etc. are included in this book.
The first chapter presents neuro-fuzzy and cognitive researches for the development of objects on the basis of location and territory. The second chapter is about the method of parametric identification using a neuro-fuzzy classifier. The third chapter describes the research on the internet of things enabled smart campus for effectual data transit from one entity to another for classroom notes.
Chapters Four and Five are dedicated to the use of advanced computer science of the medical applications. Chapter Six presents the detection and estimation of obstacle position for imminent crash prediction to enhance the driver and vehicle interface using the controller area network. Chapter Seven presents the development of accurate models for estimation of pure CO2-oil minimum miscibility pressure based on artificial intelligence methods. Chapter Eight addresses dynamic, massive data handling with swarm intelligence based algorithms for finding the solution of a difficult problem. The next chapter proposes an encryption model which focuses on bit-level confusion and bit-level diffusion followed by block-level diffusion by using 1-D chaotic maps. Chapter Ten is dedicated to digital technologies of the industry 4.0. The last chapter compares the pattern sequence based forecasting method with ARIMA in univariate time series forecasting.

Binding: Hardcover
Binding: e-Book

ISBN: 978-1-53614-844-2
ISBN: 978-1-53614-845-9

Price: $160.00
Price: $160.00


Cover

An Insight to Computers

Author: S. Anandamurugan, Ph.D.
(Kongu Engineering College, Perundurai, Tamilnadu, India)

Series: Computer Science, Technology and Applications

Publication Date: 2019

Book Description:
This book is intended for use by new students taking courses related to computers. The book is structured as an introductory book, but it is designed to be accessible to a wide audience. This book uses a simple approach for better understanding via the help of diagrams. This book can be used as an introductory text to computers by advanced undergraduate or graduate students in computer science or related disciplines such as computer engineering, computer technology and information technology.

Binding: Softcover
Binding: e-Book

ISBN: 978-1-53614-985-2
ISBN: 978-1-53614-986-9

Price: $95.00
Price: $95.00


Cover

Intelligent Robots

Author: Li-Hong Juang
School of Electrical Engineering and Automation, Xiamen University of Technology, P.R. China

Series: Computer Science, Technology and Applications, Mechanical Engineering Theory and Applications

Publication Date: 2019

Book Description:
Intelligent robots are a combination of Computer engineering, Software engineering, Control engineering, Electronic engineering, Mechanical engineering, and Systems Design engineering, working together to design and manufacture useful products. In this book, I derive some novel computing and algorithm applications on computer vision and image processing, and intelligent control/navigation of mobile robots, for the “AI Design and Implantation for Intelligent Robot System.”

The detailed research directions include:
• Humanoid Robot Tracks Complex Line – using vision guiding that realizes the independent complex line-following tracking.
• Active Vision Communication – using two humanoid robots, that aims to study anthropomorphic communication with dual anthropomorphic robots, based on image identification technology.
• Active Speech Communication for Double Mobile Robots – that makes robots understand human language and communicate with each other through human language, to realize man-machine interactivity and mobile-robot interactivity.
• Humanoid Robot Grabs Steady Objects – that establishes a vision fetching method formed by a monocular vision unit through the analysis of robot target fetching based on vision, and roughly measures the position distance between target-objects.
• Humanoid Robot Recognizes Multi-target Objects with Complex Colors – that mainly studies Nao robot’s identification model for multiple targets and complex colors.

Binding: e-Book

ISBN: 978-1-53615-100-8

Price: $82.00


Cover

Secure Communications: Methods, Applications and Technology

Authors: Juan Luis Mata-Machuca
(Academy of Mechatronic, Unidad Profesional Interdisciplinaria de Tecnología Avanzada del I.P.N. (UPIITA-IPN), Ciudad de México, Mexico)

Ricardo Aguilar-López, PhD
(Department of Biotechnology and Bioengineering CINVESTAV-IPN, Mexico City, Mexico)

Series: Computer Science, Technology and Applications

Publication Date: 2019

Book Description:
Generally, nonlinear systems display complex dynamic behavior like steady state multiplicity, instabilities, complex oscillations, and so on, under different initial conditions, external disturbances, and time-varying parameters, leading to chaotic dynamic behaviors. In addition to the scientific interest of the study and analysis of nonlinear systems with exotic dynamic behaviors, the engineering applications have been growing in importance as well.

In addition to the engineering applications, the applications of complex analysis for transport phenomena, chemical reaction systems, the electronic industry, and synchronization techniques for secure data transmission are also of great importance. Ultimately, the analysis of nonlinear complex dynamic behaviors has led to important technological applications. Some examples include the analysis of chaotic oscillators, which has led to advances in process engineering, cryptography of images, secure data transmission, life science innovations, and information processing.

Experimenting with control theory has led to a higher performance of processes, especially of dynamic systems with complex behavior. In particular, the synchronization of the chaotic oscillator is important for secure data transmission. Recently, chaotic behavior of a class of dynamical systems called “fractional-order chaotic systems” has attracted much attention in science and engineering. Fractional-order chaotic systems are considered a generalization of integer-order chaotic systems, where arbitrary non-integer orders of integral and derivative operators are defined, for example, the fractional-order systems of Lorenz, Chua, Liu, Chen, and Rössler. Wide varieties of systems are known to display fractional-order chaotic dynamics, for example, systems involved with applications in bioengineering, robotics, mechatronics, finances, medicine, and so on.

For fractional-order chaotic systems, the synchronization phenomenon is an important property due to its useful applications. Synchronization in fractional-order chaotic systems appears when the states of one system are equal to states of another. The interest in synchronization is due to its potential applications in secure communications; the main idea for transmitting information via fractional-order dynamical systems is that an information signal is embedded in the transmitter system, which generates signals, and the receiver recovers the information signal.

The author’s work presents a method for the synchronization of a fractional-order unified chaotic system and its circuit implementation using the development board Arduino Uno, with Matlab-Simulink, by means of a fractional feedback controller. The synchronization implies that all trajectories of the slave system are close to all trajectories of the master system. The main goal is to find a fractional synchronization feedback control signal, such that the synchronization is possible. This is achieved with an adequate choice of the control gains of states and measured outputs of the corresponding system. The suitable conditions for synchronization are obtained by solving the dynamical equation of the synchronization error. Furthermore, to verify the effectiveness of the suggested approach, we have implemented an electronic circuit to obtain the synchronization regime between two fractional-order unified chaotic systems for the same order.

Binding: e-Book

ISBN: 978-1-53615-229-6

Price: $82.00


Cover

How Information Creates its Observer The Emergence of the Information Observer with Regularities

Author: Vladimir S. Lerner
(Marina Del Rey, CA, USA)

Series: Computer Science, Technology and Applications

Publication Date: 2019

Book Description:
Observers are everywhere, from communicating people, animals, and different species, to any interacting subjects that accept, transform, and exchange information.

Up to now, common information regularities, emergence, differentiation, and appearance have not been studied through a united approach.

This book presents a new approach for understanding the notion of information and its Observers, showing how information creates Observers and generates regularities during observation.

The approach is developed from Wheeler’s concept in physics, “It from Bit,” which has been modified in this text to “Observer-Participator Bit.”

Studying information comes from probabilistic observations, emerging space-time microprocess, entanglement, qubit, encoding bits, and evolving macroprocess, leading to the creation of the Observer, as well as a geometric information structure.

The regularities observed self-organize into information processes that encode information causality, logic, and complexity, and determine the observer’s cognition, evolving toward intelligence.

The regularities create a double spiral rotating coding structure, which observation self-generates.

For the first time, this book establishes the observer’s united information mechanism, with self-operating integral logic, transforming an observed uncertainty into physical reality.

The book also includes information formalism, which has been applied to solutions for a wide range of computer science and engineering problems implemented in practice.

Binding: Hardcover
Binding: e-Book

ISBN: 978-1-53615-286-9
ISBN: 978-1-53615-287-6

Price: $270.00
Price: $270.00


Cover

Twitter: Global Perspectives, Uses and Research Techniques

Editors: Innocent Chiluwa (Department of Languages & General Studies, Covenant University, OTA, Nigeria) and

Gwen Bouvier (Maynooth University, Maynooth, Co. Kildare, Ireland)

Series: Media and Communications – Technologies, Policies and Challenges

Publication Date: 2019

Book Description:
Social media have formed part and parcel of our everyday life. Defined by many as “a public sphere,” Twitter has indeed enabled social and political conversations, empowering diverse voices from networked societies that hold government accountable and encourage activities that promises several benefits in business, politics, education, health, and commerce among others.

This collection of essays takes a difference approach to describing the functions and roles of Twitter in almost all human affairs. In examining the various ideas and opinions about Twitter and its diverse and complex userbase, this volume not only describes the uses and perspectives but also introduces cutting-edge scientific research techniques for studying Twitter. The uses of Twitter in some professional and academic disciplines such as journalism, teaching and learning, creative writing, campaigning, sports, and business are carefully explained.

This volume’s international authorship includes experts, professionals, and emerging scholars from various disciplines, and they apply different methods and approaches to studying Twitter as a strong and vibrant platform of social media. This book will be very helpful as a handbook to students, scholars, and professionals in communication, journalism, education, politics, linguistics, and social media studies.

Binding: Hardcover
Binding: e-Book

ISBN: 978-1-53615-307-1
ISBN: 978-1-53615-308-8

Price: $230.00
Price: $230.00


Cover

Blockchain Technology and Applications

Editor: Jan Veuger
(School of Finance and Accounting, School of Creative Technology and School of Governance, Law and Urban Development of the Saxion University of Applied Sciences Enschede, The Netherlands)

Series: Computer Science, Technology and Applications

Publication Date: 2019

Book Description:
This book provides an overview of the latest developments on Blockchain technology and its applications. The internet has already made it possible to transfer information quickly and cheaply, without involving intermediaries, while Blockchain gives the same benefits for transferring value. The Internet is used to transfer words and images, while Blockchain is used for transactions. Essentially, Blockchain is a combination of two elements: a shared and distributed ledger with synchronized data spread over multiple sites, countries, and / or institutions, and a cryptography – a digital token with a monetary value.

This technology could have a huge impact on the value chain in our society. This impact includes efficiency, transparency, ownership, value (transfer), automation, and service provision. To understand the world of blockchain, we need to understand the innovation of the currency Bitcoin in 2009, that was built on Blockchain technology. Bitcoin is a combination of four individual elements: (1) cryptography, (2) a peer-to-peer network, (3) an open source protocol and (4) a shared ledger. This makes it a phenomenon that people have been enthusiastic about.

This book is comprised of chapters written by experts on Blockchain from Austria, Brazil, China, Croatia, Georgia, Germany, Italy, Netherlands, Slovenia, Spain, and Switzerland, on the following topics: (1) Blockchain and the Agenda 2030 by Danielle Mendes Thame Denny, (2) Application of Blockchain Technology in the Field of E-Government Services by Jiarui Zhang, (3) Can the Cybersecurity of Smart Building be Improved Using Blockchain Technology? by Ben van Lier, (4) Influence of Blockchain Applications and Digitalization on Real Estate by Jan Veuger, (5) Blockchain: Technology Looking For a Problem in Real Estate? by Jo Bronckers and Jan Veuger et al., (6) Real Estate Start-up Get a Brick by Wendel Hulsebos and Jan Veuger, (7) Blockchain: An Efficiency Solution For Housing Associations? by Michel Vonk, (8) Blockchain Applications in Support of the Energy Transition by Mieke Oostra and Jelle Rijpma, and (9) Many Keys of Blockchain for Real Estate by Esther Dekker.

Many questions remain about Blockchain, including whether to continue looking at existing markets for applications of the technology, or at disruptive and innovative newcomers. Is Blockchain only a technological disruption or a real game changer? Will the entire value chain of the market embrace it? Confidence in Blockchain is certainly a precondition for guiding disruption where (new) companies use new technology to offer cheaper and superior alternatives in the market. However, the big question is, how quickly will Blockchain develop as well as all its applications? Stephen Hawking wrote in his book Brief Answers to the Big Questions about how we will shape the future (Hawking, 2018: p207): “In the same way that the internet, our mobile phones, medical imaging, satellite navigation, and social networks would have been incomprehensible to the society of only a few generations ago, our future world is beginning to be conceived. Information on its own will not take us there, but the intelligent and creactive use of it will.”

Binding: Hardcover
Binding: e-Book

ISBN: 978-1-53615-288-3
ISBN: 978-1-53615-289-0

Price: $230.00
Price: $230.00


Cover

Advances in Artificial Intelligence Systems

Editors: V. Rajinikanth (Department of Electronics and Instrumentation Engg., St. Joseph’s College of Engineering, Chennai, India) and K. Kamalanand, PhD (Department of Instrumentation Engineering, MIT Campus, Anna University, Chennai, India)

Series: Computer Science, Technology and Applications

Publication Date: 2019

Book Description:
This book will help in fast decision making and solving complex real-world problems. In recent years, the fields of artificial intelligence along with nanotechnology, robotics and 3D printing have been referred to as the technologies of the future which will help mankind move towards a time of self-sustainability and development even in resource limited environments. Systems which mimic cognitive functions such as learning and problem solving, are referred to as intelligent systems. Such systems have the capability to ‘think’ and ‘act’ in times when expert procedures are required in real world scenarios. In recent years, the field of artificial intelligence has given rise to several branches such as swarm intelligence, machine learning and deep learning algorithms.

Swarm intelligence systems mimic the intelligent behaviors of a group or a colony of organisms such as a swarm of bees or a school of fish, in which the individuals of the group collectively work together to reach a common goal. Recent artificial intelligence approaches such as deep learning techniques and swarm intelligence algorithms have been proved to be useful in the development of intelligent systems in a variety of fields such as medical and biological systems, process control, etc. This book discusses few applications of computational intelligence algorithms such as social group optimization, convolutional neural networks, firefly algorithm and non-dominated sorting in genetic algorithms. The purpose of this book is to bring multidisciplinary researchers together to discuss state-of-art applications of artificial intelligence.

Binding: Softcover
Binding: e-Book

ISBN: 978-1-53615-484-9
ISBN: 978-1-53615-485-6

Price: $82.00
Price: $82.00


Cover

Advanced Security Issues of IoT Based 5G Plus Wireless Communication for Industry 4.0

Editor: Vijey Thayananthan, PhD (Department of Computer Science, Faculty of Computing and In-formation Technology, King Abdulaziz University, Jeddah, Saudi Arabia.)

Series: Computer Science, Technology and Applications

Publication Date: 2019

Book Description:
Advanced IoT based wireless communication has recently received a lot of attention due to a wide range of industry 4.0 applications such as security solutions of CPS in vehicular communication, E_Healthcare over secure wireless communication, privacy issues of E_Learning via cost and energy efficient wireless network communication, etc. In these applications, physical data is continuously monitored by the IoT-based sensor nodes to facilitate the current situations, 5G network management, security solutions, etc. in industry 4.0 environment.

Despite the many security issues considered in existing wireless communication in the industry 4.0 applications, IoT based 5G and 5G+ wireless communication will enhance the future security issues including cybersecurity solutions. The aim of this book to deliver the best services with minimum cost and maximum security in all industry 4.0 applications. For instance, medical priority services against the available sources and devices (IoT, sensors, decision-making units, etc.), patient monitoring services against the waiting list and the population, and security services of CPS against the energy efficiency and the battery lifetime are challenging critical problems in the industry 4.0.

This book covers some improvement methods in security influence to future communication they are cybersecurity issues of IoT based 5G and 5G+ communication systems. These methods can be considered through the efficient channel coding scheme, efficient traffic management, bandwidth guard, cybersecurity solutions, etc. Requirements for future communication such 5G+ support to illustrate the security issues in selected applications of industry 4.0 such as learning style transformation. Sensors are typically capable of wireless communication and are significantly utilized in many applications such as medical communication with IoT-based 5G infrastructure.

Despite many security solutions of communication technologies, decision making, dynamic and intelligent solutions based on sensors, IoT devices, CPS, etc. will be minimizing energy costs and maximizing security issues of industry 4.0. The field of advanced IoT-based 5G+ wireless communication networks merge a lot of functions like secure transmission capacities with latest multiple access schemes, computation of best latency and energy efficiency, and secure communication with location-based services, etc. This book covers many functionalities through the important examples and applications used in industry 4.0.

Binding: Hardcover
Binding: e-Book

ISBN: 978-1-53615-538-9
ISBN: 978-1-53615-539-6

Price: $160.00
Price: $160.00


Cover

New Studies on Video Games and Health

Editor: Anthony S. Thomas

Series: Electronics and Telecommunications Research

Publication Date: 2019

Book Description:
In New Studies on Video Games and Health, the first chapter analyzes investigations on the use of virtual reality in the context of learning and rehabilitation. The second chapter compares video game players and non-video game players across a range of measures of competitiveness to understand the differences and similarities between these groups’ context general competitive profiles. The objective of the closing chapter is to identify and analyze how the techno scientific processes of corporeal virtualization, linked to video games, have interfered in the constitution of the bodies and what implications are involved in the body culture of movement and Physical Education.

Binding: Softcover
Binding: e-Book

ISBN: 978-1-53615-567-9
ISBN: 978-1-53615-568-6

Price: $82.00
Price: $82.00


Cover

Information Security: Cyberattacks, Data Breaches and Security Controls

Editor: Paul Scholz

Series: Privacy and Identity Protection

Publication Date: 2019

Book Description:
Federal agencies and our nation’s critical infrastructures, such as communications and financial services, are dependent on information technology systems and electronic data to carry out operations and to process, maintain, and report essential information. Yet, cyber-based intrusions and attacks on federal and nonfederal systems have become not only more numerous and diverse, but also more damaging and disruptive as discussed in chapter 1.

The IRS has a demanding responsibility to collect taxes, process tax returns, and enforce the nation’s tax laws. It relies extensively on computerized systems to support its financial and mission-related operations and on information security controls to protect the sensitive financial and taxpayer information that reside on those systems. As part of its audit of IRS’s fiscal year 2017 and 2016 financial statements, GAO assessed whether controls over financial and tax processing systems were effective in ensuring the confidentiality, integrity, and availability of financial and sensitive taxpayer information as reported in chapter 2.

Reliance on a global supply chain introduces multiple risks to federal information systems. Chapter 3 highlights information security risks associated with the supply chains used by federal agencies to procure IT systems.

The Office of Personnel Management (OPM) collects and maintains personal data on millions of individuals, including data related to security clearance investigations. In June 2015, OPM reported that an intrusion into its systems had affected the personnel records of about 4.2 million current and former federal employees. Then, in July 2015, the agency reported that a separate but related incident had compromised its systems and the files related to background investigations for 21.5 million individuals. From February 2015 through August 2017, multiple reviews of OPM’s information security were conducted. Four reports based on these reviews were issued. The reports contained 80 recommendations for improving the agency’s security posture. Chapter 4 reviews relevant documents and artifacts reflecting OPM’s actions and progress toward implementing the 80 recommendations contained in the four reports, and assessed the actions against the intent of the recommendations.

CDC is responsible for detecting and responding to emerging health threats and controlling dangerous substances. In carrying out its mission, CDC relies on information technology systems to receive, process, and maintain sensitive data. Accordingly, effective information security controls are essential to ensure that the agency’s systems and information are protected from misuse and modification. Chapter 5 reviews the extent to which CDC has taken corrective actions to address the previously identified security program and technical control deficiencies and related recommendations for improvement.

Federal agencies are dependent on information systems to carry out operations. The risks to these systems are increasing as security threats evolve and become more sophisticated. To reduce the risk of a successful cyberattack, agencies can deploy intrusion detection and prevention capabilities on their networks and systems. Chapter 6 determined the reported effectiveness of agencies’ implementation of the government’s approach and strategy; the extent to which DHS and OMB have taken steps to facilitate the use of intrusion detection and prevention capabilities to secure federal systems; and the extent to which agencies reported implementing capabilities to detect and prevent intrusions.

Recent large-scale data breaches of public and private entities have put hundreds of millions of people at risk of identity theft or other harm. Chapter 7 reviews issues related to consumers’ options to address risks of harm from data breaches and examines information and expert views on the effectiveness of consumer options to address data breach risks. While Chapter 8 considers the answer to this question: what legal obligations do Internet companies have to prevent and respond to data breaches? Then discusses several factors Congress might consider when weighing future legislation.

Binding: Hardcover
Binding: e-Book

ISBN: 978-1-53615-880-9
ISBN: 978-1-53615-881-6

Price: $230.00
Price: $230.00


Cover

Big Data and Cloud: Trust, Security and Privacy

Authors: Abdulrahman Yarali
Professor of Telecommunication, Murray State University, Murray, KY, USA

Michael Lee Ramage
Center for Computer and Information Technology, Murray State University, Murray, KY, USA

Series: Internet Theory, Technology and Applications

Publication Date: 2019

Book Description:
The emergence of big data is expected to change business dynamics in different organizations and the value behind big data is evident. Consumer data is traded, sold, and a sought-after commodity. In the next two decades, the volume of data available to different enterprises will grow dramatically. The big data is expected to change insights about the customers, operational costs, and all the relevant aspects of different business models around the world. The emergence of cloud computing has enabled businesses to compete at a higher level because the traditional software and systems are no longer required. Digital heterogeneity and the confluence of Artificial Intelligence with 5G and IoT are expected to dominate the market because the majority of the organizations in the world are considering the use of AI to reduce their operating costs.

Even as the future of business technology continues to get brighter, there is a need to reconsider trust, privacy, and risk management issues. As technology continues to advance, the risks become greater, and thus, security becomes a significant aspect that needs to be addressed. In the last few years, new laws have been developed to regulate how service providers collect, use, retain, disclose, and dispose of user information. The number of cyber-attacks and data breaches have been rising at an alarming rate and it is essential for the organization to take necessary precautions to protect their data. In this book, transformation and advancement to a pervasive and converged digital infrastructure of Big Data, IoT and AI with their values, threats and security at different levels are discussed.

Binding: Hardcover
Binding: e-Book

ISBN: 978-1-53616-287-5
ISBN: 978-1-53616-288-2

Price: $230.00
Price: $230.00


Cover

Quantum Image Watermarking

Authors: Ri-Gui Zhou, PhD, Gaofeng Luo and Wenwen Hu
Shanghai Maritime University, Shanghai, China

Series: Computer Science, Technology and Applications

Publication Date: October 2019

Book Description:
This book offers various schemes related to watermarking techniques for quantum images in spatial and frequency domains. The book includes 7 chapters. Chapter 1 is an introductory part, which describes the research background, the significance of topics, literature review and research methods. Chapter 2 is the basis of knowledge, which provides the techniques of the field of quantum computation, such as quantum bit, quantum gate, and quantum circuit.

Chapters 3, 4, 5, 6, 7 are on various quantum watermarking schemes. We present new quantum watermarking algorithms for binary images, grayscale and color images. These chapters describe the design of quantum watermarking schemes and their corresponding quantum circuits. In addition, the simulated experimental results and analysis demonstrate the superiority of the proposed schemes in this book.

Binding: Hardcover
Binding: e-Book

ISBN: 978-1-53616-099-4
ISBN: 978-1-53616-183-0

Price: $160.00
Price: $160.00


Cover

Vehicular Networks: Applications, Performance Analysis and Challenges

Editors: Peter Chong
Head of Department of Electrical and Electronic Engineering, Auckland University of Technology, New Zealand

Ivan Ho
Department of Electronic and Information Engineering, The Hong Kong Polytechnic University, Hong Kong

Series: Computer Science, Technology and Applications

Publication Date: September 2019

Book Description:
With the forthcoming enforcement of installing wireless units for Dedicated Short Range Communications (DSRC) on newly manufactured light-duty vehicles in the US, the development of the Cellular V2X (C-V2X) standard in 3GPP, and the growing interest in connected autonomous vehicles, vehicle-to-everything (V2X) communications and vehicular networking for improving road safety, enhancing traffic efficiency, and supporting heterogeneous vehicular applications for smart mobility is foreseeable in the near future. This book provides an overview of vehicular networks on the performance analysis, potential applications, and existing challenges.

It covers the fundamental methodology for modeling the vehicular traffic and the performance of vehicular communication protocols, as well as the challenges and cutting-edge solutions for vehicular positioning in urban canyon and big data mining for traffic flow prediction and various vehicular applications. The concept of mobile edge computing (MEC) in vehicular networks is also introduced and discussed for better resource management and network utilization. Finally, how to preserve privacy and system security while not disrupting the normal operation of vehicular networks is a pivotal challenge to overcome. This book is suitable for researchers and professionals in the area of vehicular networking and intelligent transportation systems. College engineering postgraduate students who aspire for an in-depth study and understanding of the upcoming trend in vehicular networks and related technologies will also find this book of interest.

Binding: Hardcover
Binding: e-Book

ISBN: 978-1-53615-978-3
ISBN: 978-1-53615-979-0

Price: $230.00
Price: $230.00


Cover

Broadband: Deployment, Access and the Digital Divide

Editor: Orlando Harrison

Series: Internet Theory, Technology and Applications

Publication Date: October 2019

Book Description:
Broadband—whether delivered via fiber, cable modem, mobile or fixed wireless, copper wire, or satellite—is increasingly the technology underlying telecommunications services such as voice, video, and data. Chapter 1 focuses on the gaps specifically related to broadband availability and adoption. How broadband is defined and characterized in statute and in regulation can have a significant impact on federal broadband policies and how federal resources are allocated to promote broadband deployment in unserved and underserved areas as discussed in chapter 2.

The move to place restrictions on the owners of the networks that comprise and provide access to the internet, to ensure equal access and nondiscriminatory treatment, is referred to as “net neutrality.” While there is no single accepted definition of net neutrality most agree that any such definition should include the general principles that owners of the networks that comprise and provide access to the internet should not control how consumers lawfully use that network; and should not be able to discriminate against content provider access to that network as reported in chapters 3 and 4.

The “digital divide” is a term that has been used to characterize a gap between “information haves and have-nots,” or in other words, between those Americans who use or have access to telecommunications and information technologies and those who do not. Chapter 5 focuses on the one important subset of the digital divide debate which concerns high-speed internet access and advanced telecommunications services, also known as broadband.

While there are many examples of rural communities with state-of-the-art telecommunications facilities, recent surveys and studies have indicated that, in general, rural areas tend to lag behind urban and suburban areas in broadband deployment. The Rural Utilities Service (RUS) at the U.S. Department of Agriculture (USDA) houses three ongoing assistance programs exclusively created and dedicated to financing broadband deployment: the Rural Broadband Access Loan and Loan Guarantee Program, the Community Connect Grant Program, and the ReConnect Program. Chapter 6 discusses each of these programs.

Tribal lands are generally in remote and rugged areas and broadband access can help residents develop online businesses, access telemedicine services, and use online educational tools. However, residents of tribal lands have lower levels of broadband access than residents of non-tribal lands. Chapters 7 through 11 report on the status of broadband on tribal lands.

Binding: Hardcover
Binding: e-Book

ISBN: 978-1-53616-409-1
ISBN: 978-1-53616-410-7

Price: $230.00
Price: $230.00