Proceedings of the Second International Conference on Computer and Communication Technologies
Title | Proceedings of the Second International Conference on Computer and Communication Technologies PDF eBook |
Author | Suresh Chandra Satapathy |
Publisher | Springer |
Pages | 677 |
Release | 2015-09-10 |
Genre | Technology & Engineering |
ISBN | 8132225260 |
The book is about all aspects of computing, communication, general sciences and educational research covered at the Second International Conference on Computer & Communication Technologies held during 24-26 July 2015 at Hyderabad. It hosted by CMR Technical Campus in association with Division – V (Education & Research) CSI, India. After a rigorous review only quality papers are selected and included in this book. The entire book is divided into three volumes. Three volumes cover a variety of topics which include medical imaging, networks, data mining, intelligent computing, software design, image processing, mobile computing, digital signals and speech processing, video surveillance and processing, web mining, wireless sensor networks, circuit analysis, fuzzy systems, antenna and communication systems, biomedical signal processing and applications, cloud computing, embedded systems applications and cyber security and digital forensic. The readers of these volumes will be highly benefited from the technical contents of the topics.
Recent Advances in Steganography
Title | Recent Advances in Steganography PDF eBook |
Author | Hedieh Sajedi |
Publisher | BoD – Books on Demand |
Pages | 103 |
Release | 2012-11-07 |
Genre | Computers |
ISBN | 9535108409 |
Steganography is the art and science of communicating which hides the existence of the communication. Steganographic technologies are an important part of the future of Internet security and privacy on open systems such as the Internet. This book's focus is on a relatively new field of study in Steganography and it takes a look at this technology by introducing the readers various concepts of Steganography and Steganalysis. The book has a brief history of steganography and it surveys steganalysis methods considering their modeling techniques. Some new steganography techniques for hiding secret data in images are presented. Furthermore, steganography in speeches is reviewed, and a new approach for hiding data in speeches is introduced.
Computer Applications in Engineering and Management
Title | Computer Applications in Engineering and Management PDF eBook |
Author | Parveen Berwal |
Publisher | CRC Press |
Pages | 365 |
Release | 2022-04-07 |
Genre | Computers |
ISBN | 1000555720 |
The book Computer Applications in Engineering and Management is about computer applications in management, electrical engineering, electronics engineering, and civil engineering. It covers the software tools for office automation, introduces the basic concepts of database management, and provides an overview about the concepts of data communication, internet, and e-commerce. Additionally, the book explains the principles of computing management used in construction of buildings in civil engineering and the role of computers in power grid automation in electronics engineering. Features Provides an insight to prospective research and application areas related to industry and technology Includes industry-based inputs Provides a hands-on approach for readers of the book to practice and assimilate learning This book is primarily aimed at undergraduates and graduates in computer science, information technology, civil engineering, electronics and electrical engineering, management, academicians, and research scholars.
CIMSiM 2010
Title | CIMSiM 2010 PDF eBook |
Author | |
Publisher | |
Pages | 577 |
Release | 2010 |
Genre | Computational intelligence |
ISBN | 9780769542621 |
Wireless Networks and Security
Title | Wireless Networks and Security PDF eBook |
Author | Shafiullah Khan |
Publisher | Springer Science & Business Media |
Pages | 513 |
Release | 2013-01-26 |
Genre | Technology & Engineering |
ISBN | 3642361692 |
“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in applications. The contributions identify various vulnerabilities in the physical layer, MAC layer, network layer, transport layer, and application layer, and focus on ways of strengthening security mechanisms and services throughout the layers. This carefully edited monograph is targeting for researchers, post-graduate students in universities, academics, and industry practitioners or professionals.
Proceedings of the 19th International Conference on Computing and Information Technology (IC2IT 2023)
Title | Proceedings of the 19th International Conference on Computing and Information Technology (IC2IT 2023) PDF eBook |
Author | Phayung Meesad |
Publisher | Springer Nature |
Pages | 221 |
Release | 2023-05-23 |
Genre | Technology & Engineering |
ISBN | 3031304748 |
This book gathers the high-quality papers presented at the 19th International Conference on Computing and Information Technology (IC2IT2023), held on May 18–19, 2023, in Bangkok, Thailand. The book presents an original research work for both academic and industry domains, which is aiming to show valuable knowledge, skills and experiences in the field of computing and information technology. The topics covered in the book include natural language processing, image processing, intelligent systems and algorithms, as well as machine learning. These lead to the major research directions for innovating computational methods and applications of information technology.
Advanced, Contemporary Control
Title | Advanced, Contemporary Control PDF eBook |
Author | Marek Pawelczyk |
Publisher | Springer Nature |
Pages | 412 |
Release | 2023-06-15 |
Genre | Technology & Engineering |
ISBN | 3031351703 |
This book introduces the reader to the hottest topics in current control sciences and robotics, as seen by scientists from Poland and other European countries. Volume 1 comprises 37 chapters, which specifically address topics connected to modeling, identification, and analysis of automation systems, to design of control systems, and to fault diagnosis and fault-tolerant control. The contributions were presented during XXI Polish Control Conference, held in Gliwice, Poland, from June 26 to 29, 2023. This book is extremely useful to all persons who want to know the latest trends in automation and robotics.