Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India CSI Volume 2


Book Description

This volume contains 70 papers presented at CSI 2014: Emerging ICT for Bridging the Future: Proceedings of the 49th Annual Convention of Computer Society of India. The convention was held during 12-14, December, 2014 at Hyderabad, Telangana, India. This volume contains papers mainly focused on Machine Learning & Computational Intelligence, Ad hoc Wireless Sensor Networks and Networks Security, Data Mining, Data Engineering and Soft Computing.




Emerging ICT for Bridging the Future - Proceedings of the 49th Annual Convention of the Computer Society of India (CSI) Volume 1


Book Description

This volume contains 73 papers presented at CSI 2014: Emerging ICT for Bridging the Future: Proceedings of the 49th Annual Convention of Computer Society of India. The convention was held during 12-14, December, 2014 at Hyderabad, Telangana, India. This volume contains papers mainly focused on Fuzzy Systems, Image Processing, Software Engineering, Cyber Security and Digital Forensic, E-Commerce, Big Data, Cloud Computing and ICT applications.










Resource Publication


Book Description




Cooperative Fishery Unit Report


Book Description




Evolving Networking Technologies


Book Description

EVOLVING NETWORKING TECHNOLOGIES This book discusses in a practical manner some of the critical security challenges facing the ever-evolving networking technologies of today. In an age of explosive worldwide growth of electronic data storage and communications, effective protection of information has become a critical requirement, especially when used in coordination with other tools for information security and cryptography in all of its applications, including data confidentiality, data integrity, and user authentication. While the importance of cryptographic technique, i.e., encryption, in protecting sensitive and critical information and resources cannot be overemphasized, an examination of the technical evolution within several industries reveals an approaching precipice of scientific change. The glacially paced but inevitable convergence of quantum mechanics, nanotechnology, computer science, and applied mathematics will revolutionize modern technology. The implications of such changes will be far-reaching, with one of its greatest impacts affecting information security and, more specifically, modern cryptography. The book takes the reader through these issues. As the security systems design becomes more and more complex to meet these challenges, a mistake that is committed most often by security specialists is not making a comprehensive analysis of the system to be secured before choosing which security mechanism to deploy. Often, the security mechanism chosen turns out to be either incompatible with, or inadequate for, handling the complexities of the system. In addition, the book also discusses three main points: Configuration management is a critical issue, and as networks are increasing in size, their configuration needs to be managed. Devices may conflict with each other in terms of configuration. Therefore, it becomes challenging for firewalls to be up-to-date according to network policies. Scalability of the network is another big challenge, it would be easier to address if the network stays the same, but the network is ever expanding with a constant increase in the number of devices devoted to the network. Vendor lock-in: Business decisions that are taken today are revolving around the assumptions and capabilities of the current vendor and environment scenario. Buying the best solutions from today’s vendors involves how to interoperate, integrate, and support multiple solutions. It may involve tearing out all of the longstanding kits without tearing down the entire network at the same time. Audience This book specifically appeals to industry practitioners, IT researchers, and students regarding network technological management.




Cloud Control Systems


Book Description

Cloud Control Systems: Analysis, Design and Estimation introduces readers to the basic definitions and various new developments in the growing field of cloud control systems (CCS). The book begins with an overview of cloud control systems (CCS) fundamentals, which will help beginners to better understand the depth and scope of the field. It then discusses current techniques and developments in CCS, including event-triggered cloud control, predictive cloud control, fault-tolerant and diagnosis cloud control, cloud estimation methods, and secure control/estimation under cyberattacks. This book benefits all researchers including professors, postgraduate students and engineers who are interested in modern control theory, robust control, multi-agents control. - Offers insights into the innovative application of cloud computing principles to control and automation systems - Provides an overview of cloud control systems (CCS) fundamentals and introduces current techniques and developments in CCS - Investigates distributed denial of service attacks, false data injection attacks, resilient design under cyberattacks, and safety assurance under stealthy cyberattacks




Mobile NMR and MRI


Book Description

There has been a recent surge in hardware developments with respect to mobile NMR and MRI systems, from which novel applications are starting to emerge. These comparatively low cost systems allow either for more routine use of NMR and MRI, generally for material quality control, or they allow for the analysis of samples whose size and shape precludes conventional NMR and MRI application. This book will, for the first time, summarise these recent hardware developments, highlight the challenges facing mobile and generally low-field NMR and MRI and describe various applications. Including chapters on commercial applications in well logging and food content measurements, the broad appeal of this book will fill a gap in the literature for NMR spectroscopists, analytical chemists and all those involved in measurement science in both industry and academia.




Multidisciplinary Research in Arts, Science & Commerce (Volume-2)


Book Description