<p>The 30 coherently written chapters by leading researchers presented in this anthology are devoted to basic results achieved in computational intelligence since 1997. The book provides complete coverage of the core issues in the field, especially in fuzzy logic and control as well as for evolution
Emerging Technologies in Computing: Theory, Practice and Advances
โ Scribed by Pramod Kumar (editor), Anuradha Tomar (editor), R. Sharmila (editor)
- Publisher
- Chapman and Hall/CRC
- Year
- 2021
- Tongue
- English
- Leaves
- 287
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Emerging Technologies in Computing reviews the past, current, and future needs of emerging technologies in the computer science field, and discusses the importance of appropriate practices and advances, as well as their impact. It outlines principles, challenges and applications, as well as issues involved in the digital age.
Key Features:
- includes high-quality research work by academics and industrial experts in the field of computing.
- includes case studies related to Artificial Intelligence, Blockchain, Internet of Things, Multimedia Big data, Blockchain, Augmented reality, Data Science, Robotics, Cybersecurity, 3D printing, Voice Assistants and Chat bots, and future communication networks.
- serves as a valuable reference guide for anyone seeking knowledge about the future of computing.
With the rapid development of technologies, it becomes increasingly crucial to remain up to date. This book provides a clear overview for all those who have an interest in emerging computing technologies and their impacts on society.
โฆ Table of Contents
Cover
Half Title
Title Page
Copyright Page
Table of Contents
Editors
Contributors
CHAPTER 1 Introduction to Emerging Technologies in Computer Science and Its Applications
1.1 Introduction
1.1.1 Computer Vision
1.1.2 Deep Learning
1.1.3 Internet of Things (IoT)
1.1.4 Quantum Computing
1.1.5 Edge Computing
1.1.6 Fog Computing
1.1.7 Serverless Computing
1.1.8 Implanted Technology
1.1.9 Virtual, Augmented, and Mixed Reality
1.1.10 Digital Twin
1.2 Conclusions
References
CHAPTER 2 Artificial Intelligence Innovations : Infrastructure and Application for Advances in Computational Supremacy
2.1 Introduction
2.2 Origination and Background of Artificial Intelligence
2.3 Different Types of AI
2.4 Challenges in AI
2.5 Artificial Intelligence: Infrastructure and Framework
2.5.1 AI Agents and Environment
2.5.2 AI Search Algorithms
2.5.3 Tools and Techniques Practiced in AI
2.5.3.1 Machine Learning Techniques
2.5.3.2 NLP (Natural Language Processing)
2.5.3.3 Fuzzy Logic
2.5.3.4 Nature Inspired Intelligence Techniques
2.6 Role of Artificial Intelligence in Advancement and Emergence of Distinct Fields
2.6.1 AI in Healthcare
2.6.1.1 Role of AI in Pandemic of COVID-19 Disease
2.6.2 AI in Education
2.6.3 AI in Robotics
2.6.4 AI in Transportation
2.6.5 AI in Renewable Energy
2.6.6 AI in Geoscience and Remote Sensing
2.6.7 AI in Finance
2.6.8 AI in Agriculture
2.6.9 Other Areas
2.7 Future Scope
2.8 Summary
References
CHAPTER 3 Essentials of Internet of Things: Design Principles and Architectures for Its Application in Various Domains
3.1 Importance of IoT
3.2 Design of Agriculture for IoT
3.3 Architecture of IoT for Agriculture
3.3.1 Front End Layer
3.3.2 Gateway Layer
3.3.3 Back End layer
3.4 Design of Medical Applications Using IoT
3.5 Architecture of IoT in Medical Applications
3.5.1 Extremity Tier
3.5.2 Intermediate Tier
3.5.3 Top Tier
3.6 Design of Transportation Process in IoT
3.7 Layered Architecture of Intelligent Transportation Process
3.7.1 Application Layer
3.7.2 Infrastructure Layer
3.7.3 Networking Layer
3.7.4 Security Layer
3.8 Design of Smart Grid Applications Using IoT
3.9 Architecture of Smart Grid Process
3.9.1 Information Layer
3.9.2 Power Flow Layer
3.9.3 Power System Layer
3.10 Design of Aquaculture Monitoring Using IoT
3.11 Conclusions
References
CHAPTER 4 Theories of Blockchain: Its Evolution and Application for Security, Privacy and Trust Management
4.1 Introduction
4.2 Literature Survey
4.2.1 History of Blockchain: Its Evolution
4.2.1.1 Very Primary Stage
4.2.1.2 Primary Stage
4.2.1.3 Modern Stage
4.2.2 Various Views on Blockchainโs Applicability
4.2.3 Basic Principles of Blockchain
4.2.3.1 Distributed Database
4.2.3.2 Peer-to-Peer Transmission
4.2.3.3 Transparency with Pseudonymity
4.2.3.4 Irreversibility of Records
4.2.3.5 Computational Logic
4.3 Blockchain Architecture
4.3.1 Working Process of Blockchain
4.3.2 Types of Blockchain
4.3.2.1 Public Blockchain
4.3.2.2 Private Blockchain
4.3.2.3 Semi-Private Blockchain
4.3.2.4 Consortium Blockchain
4.3.3 Algorithms in Blockchain
4.3.3.1 Proof of Work (PoW)
4.3.3.2 Proof of Stake (PoS)
4.3.3.3 Proof of Elapsed Time protocol (PoET)
4.3.3.4 Proof of Importance (PoI)
4.3.3.5 Delegated Proof of Stake (DPoS)
4.4 Potential Use of Blockchain in Various Applications
4.4.1 Healthcare
4.4.2 Education
4.4.3 Internet of Things (IoT)
4.4.4 Gaming
4.5 Security, Privacy & Trust Management of Blockchain
4.5.1 Security
4.5.2 Privacy
4.5.3 Trust Management
4.6 Challenges and Issues of Utilizing the Blockchain in Various Applications
4.7 Scope for Tightening the Security, Privacy and Trust Offered by Blockchain Security
4.7.1 Security
4.7.2 Privacy
4.7.3 Trust
4.8 Future Research Directions of Utilizing Blockchain in Various Applications
4.9 Summary
References
CHAPTER 5 Advances in Robotic Systems: Design, Modeling, Development and Control Principles
5.1 Introduction
5.2 Designing a Robotic System
5.2.1 Designing Process
5.2.2 Designing Software
5.3 Modeling and Development
5.3.1 Physical Modeling and Development
5.3.2 Model Implementation
5.4 Control Principles
5.4.1 Fuzzy Logic Control
5.4.2 Artificial Neural Network
5.4.3 Deep Neural Network
References
CHAPTER 6 Data Science Practices: Running the Data Experiments Effectively for Statistical and Predictive Analytics on Data
6.1 Introduction
6.2 Literature Review
6.3 Pre-trained Sets and Transfer Learning
6.3.1 Adjustments in the Pre-trained Network (Tuning)
6.3.2 Identifying an Image Using the VGG16 Network
6.4 Image Classification with ResNet
6.4.1 Pre-trained Model Advantages
6.4.2 Pre-Trained Model Challenges
6.4.2.1 Reverse Transfer
6.5 Conclusions
6.6 Future Work
References
CHAPTER 7 The Actuality of Augmented Reality: Understanding the Realm of the Theoreticalร Framework for Embracing Its Potential Facilities
7.1 Introduction
7.2 Background Details of Augmented Reality
7.3 Brief History of Augmented Reality
7.4 Applications of Augmented Reality
7.4.1 Augmented Reality in Medical Field
7.4.2 Augmented Reality in Commerce
7.4.3 Augmented Reality in Archaeology
7.4.4 Augmented Reality Cloud
7.4.5 Augmented Reality in Fitness World
7.4.6 Augmented Reality in Entertainment World
7.4.7 Augmented Reality in Gaming Field
7.5 Challenges of Augmented Reality
7.5.1 Limited Content
7.5.2 Hardware Issues
7.5.3 Public Dubiety
7.5.4 Physical Safety Risks
7.5.5 Security and Privacy Issues
7.5.6 Digital Fatigue
7.6 Future Scope of Augmented Reality
7.7 Summary
References
CHAPTER 8 Emerging Technologies and Cyber Security: New Horizons of Cyber Security Solutions
8.1 Introduction
8.2 Types of Security Threat
8.2.1 Spyware
8.2.2 Worm
8.2.3 Denial-of-Service (DoS) Attacks
8.2.4 Phishing
8.2.5 SQL Injection
8.2.6 Rootkit
8.2.7 Malware
8.2.8 Ransomware
8.2.9 Data Breach
8.3 Elements of Cybersecurity
8.3.1 Application Security
8.3.2 Information Security
8.3.3 Network Security
8.3.4 Business Continuity Planning
8.3.5 End-User Education
8.4 Cybersecurity Challenges
8.4.1 Ransomware Evolution
8.4.2 Blockchain Revolution
8.4.3 Internet of Things (IoT) Threats
8.4.4 Serverless Apps Vulnerability
8.5 Cybersecurity Risk Analysis
8.6 Trends in Cybersecurity
8.7 Conclusions and Future Work
References
CHAPTER 9 3D Printing Procedures: Explore the Endless Possibilities of 3D Object Design, Modeling and Manufacturing
9.1 Introduction
9.2 3D Printing Technology
9.3 Classification of 3D Printing
9.3.1 Photopolymerization
9.3.2 Extrusion Based
9.3.3 Powder Based
9.3.4 Lamination Based
9.4 3D Printing Materials
9.4.1 Polymers
9.4.2 Metals
9.4.3 Composites
9.4.4 Ceramics
9.4.5 Smart Materials
9.4.6 Special Materials
9.5 Application of 3D Printing
9.5.1 Automotive Industry
9.5.2 Aerospace Industry
9.5.3 Food Industry
9.5.4 Bio-medical Industry
9.5.5 Architecture and Construction Industry
9.5.6 Textile Industry
9.5.7 Electric and Electronics Industry
9.6 Advancement and Future Trends in 3D Printing
9.7 Is 3D Printing Ready for Production?
9.7.1 Bioprinting
9.8 Application of Bio-printing
9.9 Evolution of 4D Printing from 3D Printing
9.10 4D Printing Materials and Technologies
9.10.1 Thermo Responsive Materials
9.10.2 Moisture Responsive Materials
9.10.3 Photo/Electro/Magneto Responsive Materials
9.11 Summary
References
CHAPTER 10 Multimedia Big Data: The Multimedia Big Data Impact on Data Storage, Management and Security Strategies for Data Analytics
10.1 Introduction
10.2 Review on Big Data
10.3 Big Data Multimedia Life Cycle
10.3.1 Data Acquisition
10.3.2 Data Compression/Reduction
10.3.3 Data Representation
10.3.4 Processing and Analysis of Data
10.3.5 Storage and Retrieval of Multimedia Data
10.3.6 Data Assessment
10.3.7 Data Computing
10.4 Characteristics of Multimedia Big Data
10.5 Applications in Multimedia Big Data
10.6 Big Data Security and Privacy Approaches
10.6.1 Data Confidentiality
10.6.2 Data Integrity
10.6.3 Privacy
10.6.4 Availability of Data
10.6.5 Threats to Data Availability
10.7 Challenges of Multimedia Big Data
10.7.1 Future Discussion
10.8 Conclusions
References
CHAPTER 11 Voice Assistants and Chatbots Hands on Essentials of UI and Feature Design Development and Testing
11.1 Introduction of Intelligent Virtual Assistants: Chatbots and Voice Assistants
11.1.1 Chatbots Introduction
11.1.2 Voice Assistantsโ Introduction
11.1.3 Artificial Intelligence
11.1.4 Machine Learning
11.1.4.1 Supervised Learning
11.1.4.2 Unsupervised Learning
11.1.4.3 Reinforcement Learning
11.2 Literature Survey
11.3 Evolution of Voice Assistants and Its Types
11.3.1 Working of Voice Assistant
11.4 Evolution of Chatbots and Its Types
11.4.1 Types of Chatbots
11.4.1.1 Rule-Based Chatbots
11.4.1.2 Intellectually Independent Chatbots
11.4.1.3 AI-Powered Chatbots
11.4.2 NLP and Its Working in Chatbot
11.5 UI, Designing, and Testing of Intelligent Virtual Assistants
11.5.1 Acquire Information about the Platform
11.5.2 Enclosing of IAโs Purpose
11.5.3 Establish a Tenor of Voice
11.5.4 Generate User Flows
11.5.5 Guidance of the Users with UI Design of Chatbot
11.5.6 Design for Misinterpretations
11.5.7 Trail and Scrutinize User Conduct
11.5.8 Intelligent Agent Testing
11.6 Future Scope
11.7 Summary
References
CHAPTER 12 Future Communication Networks: Architectures, Protocols, and Mechanisms for the Next-Generation Internet
12.1 Introduction
12.2 ICN Research Challenges
12.2.1 Scalable Naming Schemes
12.2.2 Scalable Name Resolution
12.2.3 Efficient Name Based Routing
12.2.4 Caching Strategy
12.2.5 Congestion Control Mechanisms
12.2.6 Quality of Service (QoS)
12.2.7 Security, Privacy, Access Control, and Trust
12.2.8 Mobility
12.3 Important ICN Architectures
12.3.1 Content-Centric Networking (CCN)
12.3.2 Named Data Networking (NDN)
12.3.3 Data Oriented Networking Architecture (DONA)
12.3.4 Network of Information (NetInf)
12.3.5 Publish-Subscribe Internet Routing Paradigm (PSIRP)
12.4 Comparative Analysis of ICN Architectures
12.5 Conclusion
Acknowledgment
References
INDEX
๐ SIMILAR VOLUMES
In recent years, innovative technologies have lead to rapid progression and accelerated research studies within the field of end-user computing. <b>Computational Advancements in End-User Technologies: Emerging Models and Frameworks contains leading research and practices into the advancement, signi
In recent years, innovative technologies have lead to rapid progression and accelerated research studies within the field of end-user computing. Computational Advancements in End-User Technologies: Emerging Models and Frameworks contains leading research and practices into the advancement, significa
<p>Until recently, the philosophy and history of science proceeded in a separate way from the philosophy and history of technology, and indeed with respect to both science and technology, philosophical and historical inquiries were also following their separate ways. Now we see in the past quarter-c
<div>This book constitutes the proceedings of the 2nd International Conference on Advances in Emerging Trends and Technologies (ICAETT 2020), held in Riobamba, Ecuador, on 26โ30 October 2019, proudly organized by Facultad de Informรกtica y Electrรณnica (FIE) at Escuela Superior Politรฉcnica de Chimbora
Not many years ago, some researcher created the vision of the 'data utility' as a key enabler towards ubiquitous and pervasive computing. As for the water and power grid, there should be a utility infrastructure, designed for worldwide availability, providing continuous access to persistent informat