This book discusses the best research roadmaps, strategies, and challenges in data-centric approach of artificial intelligence (AI) in various domains. It presents comparative studies of model-centric and data-centric AI. It also highlights different phases in data-centric approach and data-centric principles. The book presents prominent use cases of data-centric AI. It serves as a reference guide for researchers and practitioners in academia and industry.
VANET (vehicular ad hoc network) is a subgroup of MANET (mobile ad hoc network). It enables communication among vehicles on the road and between related infrastructures. This book addresses the basic elements of VANET along with components involved in the communication with their functionalities and configurations. It contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms, and protocols, and addresses the different services provided by VANET with the help of a scenario showing a network tackling an emergency. Features: • Covers all important concepts of VANET for beginners and different road scenarios in VANET • Covers essential communication protocols in VANET • Introduces approaches for VANET implementation using simulators • Provides a classification of messages and a priority-based message forwarding strategy This book is aimed at undergraduates, postgraduates, industry, researchers, and research scholars in information and communications technology.
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.0 (OAuth 2.0) framework along with user-managed access (UMA) and security analysis. Important key concepts are discussed regarding login credentials with restricted access to third parties with a primary account as a resource server. A detailed protocol overview and authorization process, along with security analysis of OAuth 2.0, are also discussed in the book. Case studies of websites with vulnerability issues are included. FEATURES Provides an overview of the security challenges of IoT and mitigation techniques with a focus on authorization and access control mechanisms Discusses a behavioral analysis of threats and attacks using UML base modeling Covers the use of the OAuth 2.0 Protocol and UMA for connecting web applications Includes role-based access control (RBAC), discretionary access control (DAC), mandatory access control (MAC) and permission-based access control (PBAC) Explores how to provide access to third-party web applications through a resource server by use of a secured and reliable OAuth 2.0 framework This book is for researchers and professionals who are engaged in IT security, auditing and computer engineering.
This book covers all small details about Underwater Sensor Networks (UWSN). Researchers can use this book as a prerequisite before starting any research on underwater networks or underwater applications. This book covers the introduction, challenges, different architectural models for UWSN, various attacks on UWSN, underwater applications, and networking layers. The target audience includes professors and students in engineering, and researchers and engineers working on marine applications. In academic level, the book is helpful for students having Networking and Information Security as elective subject and doing projects in Wireless Networks. It is also helpful for spostgraduates and Ph.D. researchers to learn basics of Underwater Sensor Networks.
Epidemic trend analysis, timeline progression, prediction, and recommendation are critical for initiating effective public health control strategies, and AI and data analytics play an important role in epidemiology, diagnostic, and clinical fronts. The focus of this book is data analytics for COVID-19, which includes an overview of COVID-19 in terms of epidemic/pandemic, data processing and knowledge extraction. Data sources, storage and platforms are discussed along with discussions on data models, their performance, different big data techniques, tools and technologies. This book also addresses the challenges in applying analytics to pandemic scenarios, case studies and control strategies. Aimed at Data Analysts, Epidemiologists and associated researchers, this book: discusses challenges of AI model for big data analytics in pandemic scenarios; explains how different big data analytics techniques can be implemented; provides a set of recommendations to minimize infection rate of COVID-19; summarizes various techniques of data processing and knowledge extraction; enables users to understand big data analytics techniques required for prediction purposes.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.