Anupam Ghosh - Böcker
Visar alla böcker från författaren Anupam Ghosh. Handla med fri frakt och snabb leverans.
8 produkter
8 produkter
1 832 kr
Skickas inom 10-15 vardagar
Blockchain: Principles and Applications in IoT covers all the aspects of Blockchain and its application in IOT. The book focuses on Blockchain, its features, and the core technologies that are used to build the Blockchain network. The gradual flow of chapters traces the history of blockchain from cryptocurrencies to blockchain technology platforms and applications that are adopted by mainstream financial and industrial domains worldwide due to their ease of use, increased security and transparency.• Focuses on application of Blockchain on IoT domain• Focuses on Blockchain as a data repository• Most books on Blockchain cover bitcoins and crypto currency. This book will also cover blockchain in other areas like healthcare, supply chain management, etc• Covers consensus algorithms like PAROX, RAFT etc. and its applicationsThis book is primarily aimed at graduates and researchers in computer science and IT.
689 kr
Skickas inom 10-15 vardagar
Blockchain: Principles and Applications in IoT covers all the aspects of Blockchain and its application in IOT. The book focuses on Blockchain, its features, and the core technologies that are used to build the Blockchain network. The gradual flow of chapters traces the history of blockchain from cryptocurrencies to blockchain technology platforms and applications that are adopted by mainstream financial and industrial domains worldwide due to their ease of use, increased security and transparency.• Focuses on application of Blockchain on IoT domain• Focuses on Blockchain as a data repository• Most books on Blockchain cover bitcoins and crypto currency. This book will also cover blockchain in other areas like healthcare, supply chain management, etc• Covers consensus algorithms like PAROX, RAFT etc. and its applicationsThis book is primarily aimed at graduates and researchers in computer science and IT.
2 461 kr
Skickas inom 7-10 vardagar
MACHINE LEARNING TECHNIQUES AND ANALYTICS FOR CLOUD SECURITY This book covers new methods, surveys, case studies, and policy with almost all machine learning techniques and analytics for cloud security solutions The aim of Machine Learning Techniques and Analytics for Cloud Security is to integrate machine learning approaches to meet various analytical issues in cloud security. Cloud security with ML has long-standing challenges that require methodological and theoretical handling. The conventional cryptography approach is less applied in resource-constrained devices. To solve these issues, the machine learning approach may be effectively used in providing security to the vast growing cloud environment. Machine learning algorithms can also be used to meet various cloud security issues, such as effective intrusion detection systems, zero-knowledge authentication systems, measures for passive attacks, protocols design, privacy system designs, applications, and many more. The book also contains case studies/projects outlining how to implement various security features using machine learning algorithms and analytics on existing cloud-based products in public, private and hybrid cloud respectively. Audience Research scholars and industry engineers in computer sciences, electrical and electronics engineering, machine learning, computer security, information technology, and cryptography.
2 240 kr
Skickas inom 7-10 vardagar
CONVERGENCE OF DEEP LEARNING IN CYBER-IOT SYSTEMS AND SECURITY In-depth analysis of Deep Learning-based cyber-IoT systems and security which will be the industry leader for the next ten years. The main goal of this book is to bring to the fore unconventional cryptographic methods to provide cyber security, including cyber-physical system security and IoT security through deep learning techniques and analytics with the study of all these systems. This book provides innovative solutions and implementation of deep learning-based models in cyber-IoT systems, as well as the exposed security issues in these systems. The 20 chapters are organized into four parts. Part I gives the various approaches that have evolved from machine learning to deep learning. Part II presents many innovative solutions, algorithms, models, and implementations based on deep learning. Part III covers security and safety aspects with deep learning. Part IV details cyber-physical systems as well as a discussion on the security and threats in cyber-physical systems with probable solutions. Audience Researchers and industry engineers in computer science, information technology, electronics and communication, cybersecurity and cryptography.
2 240 kr
Skickas inom 7-10 vardagar
FOG COMPUTING FOR INTELLIGENT CLOUD IOT SYSTEMS This book is a comprehensive guide on fog computing and how it facilitates computing, storage, and networking services Fog computing is a decentralized computing structure that connects data, devices, and the cloud. It is an extension of cloud computing and is an essential concept in IoT (Internet of Things), as it reduces the burden of processing in cloud computing. It brings intelligence and processing closer to where the data is created and transmitted to other sources. Fog computing has many benefits, such as reduced latency in processing data, better response time that helps the user’s experience, and security and privacy compliance that assures protecting the vital data in the cloud. It also reduces the cost of bandwidth, because the processing is achieved in the cloud, which reduces network bandwidth usage and increases efficiency as user devices share data in the local processing infrastructure rather than the cloud service. Fog computing has various applications across industries, such as agriculture and farming, the healthcare industry, smart cities, education, and entertainment. For example, in the agriculture industry, a very prominent example is the SWAMP project, which stands for Smart Water Management Platform. With fog computing’s help, SWAMP develops a precision-based smart irrigation system concept used in agriculture, minimizing water wastage. This book is divided into three sections. The first section studies fog computing and machine learning, covering fog computing architecture, application perspective, computational offloading in mobile cloud computing, intelligent Cloud-IoT systems, machine learning fundamentals, and data visualization. The second section focuses on applications and analytics, spanning various applications of fog computing, such as in healthcare, Industry 4.0, cancer cell detection systems, smart farming, and precision farming. This section also covers analytics in fog computing using big data and patient monitoring systems, and the emergence of fog computing concerning applications and potentialities in traditional and digital educational systems. Security aspects in fog computing through blockchain and IoT, and fine-grained access through attribute-based encryption for fog computing are also covered. Audience The book will be read by researchers and engineers in computer science, information technology, electronics, and communication specializing in machine learning, deep learning, the cyber world, IoT, and security systems.
2 240 kr
Skickas inom 7-10 vardagar
Future-proof your digital infrastructure with this essential book, which provides a comprehensive exploration of both traditional and advanced machine and deep learning models to implement resilient and intelligent intrusion detection systems for securing complex cloud-IoT environments. The rapid growth of cloud computing and the Internet of Things has transformed industry by enabling real-time data collection, processing, and automation. However, this increasing interconnectivity also introduces significant security challenges, including data breaches, unauthorized access, and cyber threats. Ensuring the security and privacy of cloud-IoT environments requires advanced intrusion detection mechanisms, privacy-preserving strategies, and efficient resource management. This book explores various advanced methods to achieve these goals, including machine and deep learning models, to protect cloud-IoT systems against cyber threats. This book covers both traditional and advanced techniques to implement intrusion detection systems and provides detailed comparative analysis. By offering practical insights, readers will gain a deeper understanding of how to effectively implement intelligent security solutions, ensuring resilience, privacy, and protection against evolving cyber threats in cloud-IoT environments. Readers will find the volume: Provides comprehensive coverage of topics like machine and deep learning for intelligent security; Explores cyber-IoT systems and intrusion detection systems for identifying suspicious activities and mitigating potential threats;Discusses various security mechanisms to safeguard the cloud-IoT environment and implement various techniques to detect intrusions early on.Audience Research scholars and industry professionals in information technology, artificial intelligence and cybersecurity looking to innovate cybersecurity for cloud computing and IoT.
1 674 kr
Skickas inom 7-10 vardagar
This book pioneers the synergy between state-of-the-art edge computing technologies and the power of operations research. It comprehensively explores real-world applications, demonstrating how various operations' research techniques enhance edge computing’s efficiency, reliability and resource allocation. Innovative solutions for dynamic task scheduling, load balancing and data management, all tailored to the unique challenges of edge environments, are displayed.Starting with operation research methodologies with foundations, applications and research challenges in edge computing and an overview of digital education, this book continues with an exploration of applications in the health sector using IoT, intelligent payment procedures and performance measurement of edge computing, using edge computing and operation research. Smart or AI-based applications are also explored further on and the book ends with insight into ultralightweight and security protocols with solutions for IoT using blockchain.
2 118 kr
Skickas inom 7-10 vardagar
This book focuses on quantum machine learning that harnesses the collective properties of quantum states, such as superposition, interference, and entanglement, uses algorithms run on quantum devices, such as quantum computers, to supplement, expedite, or support the work performed by a classical machine learning program. The devices that perform quantum computations are known as quantum computers. Quantum computers have the potential to revolutionize computation by making certain types of classically intractable problems solvable. A few large companies and small start-ups now have functioning non-error-corrected quantum computers composed of several tens of qubits, and some of these are even accessible to the public through the cloud. Additionally, quantum simulators are making strides in fields varying from molecular energetics to many-body physics. Most known use cases fit into four archetypes: quantum simulation, quantum linear algebra for AI and machine learning, quantum optimization and search, and quantum factorization. Advantages of quantum computing are many and to list a few, first, they’re fast. Ultimately, quantum computers have the potential to provide computational power on a scale that traditional computers cannot ever match. In 2019, for example, Google claimed to carry out a calculation in about 200 seconds that would take a classical supercomputer around 10,000 years. Second, they can solve complex problems. The more complex a problem, the harder it is for even a supercomputer to solve. When a classical computer fails, it’s usually because of a huge degree of complexity and many interacting variables. However, due to the concepts of superposition and entanglement, quantum computers can account for all these variables and complexities to reach a solution. Last but not the least, they can run complex simulations. The speed and complexity that quantum computing can achieve means that, in theory, a quantum computer could simulate many intricate systems.