Emerging Technologies in Computing: Theory, Practice and Advances
- Length: 296 pages
- Edition: 1
- Language: English
- Publisher: Chapman and Hall/CRC
- Publication Date: 2021-12-21
- ISBN-10: 0367633647
- ISBN-13: 9780367633646
- Sales Rank: #9194004 (See Top 100 Books)
Emerging Technologies in Computing reviews the past, current, and future needs of emerging technologies in the computer science field, and discusses the importance of appropriate practices and advances, as well as their impact. It outlines principles, challenges and applications, as well as issues involved in the digital age.
Key Features:
- includes high-quality research work by academics and industrial experts in the field of computing.
- includes case studies related to Artificial Intelligence, Blockchain, Internet of Things, Multimedia Big data, Blockchain, Augmented reality, Data Science, Robotics, Cybersecurity, 3D printing, Voice Assistants and Chat bots, and future communication networks.
- serves as a valuable reference guide for anyone seeking knowledge about the future of computing.
With the rapid development of technologies, it becomes increasingly crucial to remain up to date. This book provides a clear overview for all those who have an interest in emerging computing technologies and their impacts on society.
Cover Half Title Title Page Copyright Page Table of Contents Editors Contributors CHAPTER 1 Introduction to Emerging Technologies in Computer Science and Its Applications 1.1 Introduction 1.1.1 Computer Vision 1.1.2 Deep Learning 1.1.3 Internet of Things (IoT) 1.1.4 Quantum Computing 1.1.5 Edge Computing 1.1.6 Fog Computing 1.1.7 Serverless Computing 1.1.8 Implanted Technology 1.1.9 Virtual, Augmented, and Mixed Reality 1.1.10 Digital Twin 1.2 Conclusions References CHAPTER 2 Artificial Intelligence Innovations : Infrastructure and Application for Advances in Computational Supremacy 2.1 Introduction 2.2 Origination and Background of Artificial Intelligence 2.3 Different Types of AI 2.4 Challenges in AI 2.5 Artificial Intelligence: Infrastructure and Framework 2.5.1 AI Agents and Environment 2.5.2 AI Search Algorithms 2.5.3 Tools and Techniques Practiced in AI 2.5.3.1 Machine Learning Techniques 2.5.3.2 NLP (Natural Language Processing) 2.5.3.3 Fuzzy Logic 2.5.3.4 Nature Inspired Intelligence Techniques 2.6 Role of Artificial Intelligence in Advancement and Emergence of Distinct Fields 2.6.1 AI in Healthcare 2.6.1.1 Role of AI in Pandemic of COVID-19 Disease 2.6.2 AI in Education 2.6.3 AI in Robotics 2.6.4 AI in Transportation 2.6.5 AI in Renewable Energy 2.6.6 AI in Geoscience and Remote Sensing 2.6.7 AI in Finance 2.6.8 AI in Agriculture 2.6.9 Other Areas 2.7 Future Scope 2.8 Summary References CHAPTER 3 Essentials of Internet of Things: Design Principles and Architectures for Its Application in Various Domains 3.1 Importance of IoT 3.2 Design of Agriculture for IoT 3.3 Architecture of IoT for Agriculture 3.3.1 Front End Layer 3.3.2 Gateway Layer 3.3.3 Back End layer 3.4 Design of Medical Applications Using IoT 3.5 Architecture of IoT in Medical Applications 3.5.1 Extremity Tier 3.5.2 Intermediate Tier 3.5.3 Top Tier 3.6 Design of Transportation Process in IoT 3.7 Layered Architecture of Intelligent Transportation Process 3.7.1 Application Layer 3.7.2 Infrastructure Layer 3.7.3 Networking Layer 3.7.4 Security Layer 3.8 Design of Smart Grid Applications Using IoT 3.9 Architecture of Smart Grid Process 3.9.1 Information Layer 3.9.2 Power Flow Layer 3.9.3 Power System Layer 3.10 Design of Aquaculture Monitoring Using IoT 3.11 Conclusions References CHAPTER 4 Theories of Blockchain: Its Evolution and Application for Security, Privacy and Trust Management 4.1 Introduction 4.2 Literature Survey 4.2.1 History of Blockchain: Its Evolution 4.2.1.1 Very Primary Stage 4.2.1.2 Primary Stage 4.2.1.3 Modern Stage 4.2.2 Various Views on Blockchain’s Applicability 4.2.3 Basic Principles of Blockchain 4.2.3.1 Distributed Database 4.2.3.2 Peer-to-Peer Transmission 4.2.3.3 Transparency with Pseudonymity 4.2.3.4 Irreversibility of Records 4.2.3.5 Computational Logic 4.3 Blockchain Architecture 4.3.1 Working Process of Blockchain 4.3.2 Types of Blockchain 4.3.2.1 Public Blockchain 4.3.2.2 Private Blockchain 4.3.2.3 Semi-Private Blockchain 4.3.2.4 Consortium Blockchain 4.3.3 Algorithms in Blockchain 4.3.3.1 Proof of Work (PoW) 4.3.3.2 Proof of Stake (PoS) 4.3.3.3 Proof of Elapsed Time protocol (PoET) 4.3.3.4 Proof of Importance (PoI) 4.3.3.5 Delegated Proof of Stake (DPoS) 4.4 Potential Use of Blockchain in Various Applications 4.4.1 Healthcare 4.4.2 Education 4.4.3 Internet of Things (IoT) 4.4.4 Gaming 4.5 Security, Privacy & Trust Management of Blockchain 4.5.1 Security 4.5.2 Privacy 4.5.3 Trust Management 4.6 Challenges and Issues of Utilizing the Blockchain in Various Applications 4.7 Scope for Tightening the Security, Privacy and Trust Offered by Blockchain Security 4.7.1 Security 4.7.2 Privacy 4.7.3 Trust 4.8 Future Research Directions of Utilizing Blockchain in Various Applications 4.9 Summary References CHAPTER 5 Advances in Robotic Systems: Design, Modeling, Development and Control Principles 5.1 Introduction 5.2 Designing a Robotic System 5.2.1 Designing Process 5.2.2 Designing Software 5.3 Modeling and Development 5.3.1 Physical Modeling and Development 5.3.2 Model Implementation 5.4 Control Principles 5.4.1 Fuzzy Logic Control 5.4.2 Artificial Neural Network 5.4.3 Deep Neural Network References CHAPTER 6 Data Science Practices: Running the Data Experiments Effectively for Statistical and Predictive Analytics on Data 6.1 Introduction 6.2 Literature Review 6.3 Pre-trained Sets and Transfer Learning 6.3.1 Adjustments in the Pre-trained Network (Tuning) 6.3.2 Identifying an Image Using the VGG16 Network 6.4 Image Classification with ResNet 6.4.1 Pre-trained Model Advantages 6.4.2 Pre-Trained Model Challenges 6.4.2.1 Reverse Transfer 6.5 Conclusions 6.6 Future Work References CHAPTER 7 The Actuality of Augmented Reality: Understanding the Realm of the Theoretical Framework for Embracing Its Potential Facilities 7.1 Introduction 7.2 Background Details of Augmented Reality 7.3 Brief History of Augmented Reality 7.4 Applications of Augmented Reality 7.4.1 Augmented Reality in Medical Field 7.4.2 Augmented Reality in Commerce 7.4.3 Augmented Reality in Archaeology 7.4.4 Augmented Reality Cloud 7.4.5 Augmented Reality in Fitness World 7.4.6 Augmented Reality in Entertainment World 7.4.7 Augmented Reality in Gaming Field 7.5 Challenges of Augmented Reality 7.5.1 Limited Content 7.5.2 Hardware Issues 7.5.3 Public Dubiety 7.5.4 Physical Safety Risks 7.5.5 Security and Privacy Issues 7.5.6 Digital Fatigue 7.6 Future Scope of Augmented Reality 7.7 Summary References CHAPTER 8 Emerging Technologies and Cyber Security: New Horizons of Cyber Security Solutions 8.1 Introduction 8.2 Types of Security Threat 8.2.1 Spyware 8.2.2 Worm 8.2.3 Denial-of-Service (DoS) Attacks 8.2.4 Phishing 8.2.5 SQL Injection 8.2.6 Rootkit 8.2.7 Malware 8.2.8 Ransomware 8.2.9 Data Breach 8.3 Elements of Cybersecurity 8.3.1 Application Security 8.3.2 Information Security 8.3.3 Network Security 8.3.4 Business Continuity Planning 8.3.5 End-User Education 8.4 Cybersecurity Challenges 8.4.1 Ransomware Evolution 8.4.2 Blockchain Revolution 8.4.3 Internet of Things (IoT) Threats 8.4.4 Serverless Apps Vulnerability 8.5 Cybersecurity Risk Analysis 8.6 Trends in Cybersecurity 8.7 Conclusions and Future Work References CHAPTER 9 3D Printing Procedures: Explore the Endless Possibilities of 3D Object Design, Modeling and Manufacturing 9.1 Introduction 9.2 3D Printing Technology 9.3 Classification of 3D Printing 9.3.1 Photopolymerization 9.3.2 Extrusion Based 9.3.3 Powder Based 9.3.4 Lamination Based 9.4 3D Printing Materials 9.4.1 Polymers 9.4.2 Metals 9.4.3 Composites 9.4.4 Ceramics 9.4.5 Smart Materials 9.4.6 Special Materials 9.5 Application of 3D Printing 9.5.1 Automotive Industry 9.5.2 Aerospace Industry 9.5.3 Food Industry 9.5.4 Bio-medical Industry 9.5.5 Architecture and Construction Industry 9.5.6 Textile Industry 9.5.7 Electric and Electronics Industry 9.6 Advancement and Future Trends in 3D Printing 9.7 Is 3D Printing Ready for Production? 9.7.1 Bioprinting 9.8 Application of Bio-printing 9.9 Evolution of 4D Printing from 3D Printing 9.10 4D Printing Materials and Technologies 9.10.1 Thermo Responsive Materials 9.10.2 Moisture Responsive Materials 9.10.3 Photo/Electro/Magneto Responsive Materials 9.11 Summary References CHAPTER 10 Multimedia Big Data: The Multimedia Big Data Impact on Data Storage, Management and Security Strategies for Data Analytics 10.1 Introduction 10.2 Review on Big Data 10.3 Big Data Multimedia Life Cycle 10.3.1 Data Acquisition 10.3.2 Data Compression/Reduction 10.3.3 Data Representation 10.3.4 Processing and Analysis of Data 10.3.5 Storage and Retrieval of Multimedia Data 10.3.6 Data Assessment 10.3.7 Data Computing 10.4 Characteristics of Multimedia Big Data 10.5 Applications in Multimedia Big Data 10.6 Big Data Security and Privacy Approaches 10.6.1 Data Confidentiality 10.6.2 Data Integrity 10.6.3 Privacy 10.6.4 Availability of Data 10.6.5 Threats to Data Availability 10.7 Challenges of Multimedia Big Data 10.7.1 Future Discussion 10.8 Conclusions References CHAPTER 11 Voice Assistants and Chatbots Hands on Essentials of UI and Feature Design Development and Testing 11.1 Introduction of Intelligent Virtual Assistants: Chatbots and Voice Assistants 11.1.1 Chatbots Introduction 11.1.2 Voice Assistants’ Introduction 11.1.3 Artificial Intelligence 11.1.4 Machine Learning 11.1.4.1 Supervised Learning 11.1.4.2 Unsupervised Learning 11.1.4.3 Reinforcement Learning 11.2 Literature Survey 11.3 Evolution of Voice Assistants and Its Types 11.3.1 Working of Voice Assistant 11.4 Evolution of Chatbots and Its Types 11.4.1 Types of Chatbots 11.4.1.1 Rule-Based Chatbots 11.4.1.2 Intellectually Independent Chatbots 11.4.1.3 AI-Powered Chatbots 11.4.2 NLP and Its Working in Chatbot 11.5 UI, Designing, and Testing of Intelligent Virtual Assistants 11.5.1 Acquire Information about the Platform 11.5.2 Enclosing of IA’s Purpose 11.5.3 Establish a Tenor of Voice 11.5.4 Generate User Flows 11.5.5 Guidance of the Users with UI Design of Chatbot 11.5.6 Design for Misinterpretations 11.5.7 Trail and Scrutinize User Conduct 11.5.8 Intelligent Agent Testing 11.6 Future Scope 11.7 Summary References CHAPTER 12 Future Communication Networks: Architectures, Protocols, and Mechanisms for the Next-Generation Internet 12.1 Introduction 12.2 ICN Research Challenges 12.2.1 Scalable Naming Schemes 12.2.2 Scalable Name Resolution 12.2.3 Efficient Name Based Routing 12.2.4 Caching Strategy 12.2.5 Congestion Control Mechanisms 12.2.6 Quality of Service (QoS) 12.2.7 Security, Privacy, Access Control, and Trust 12.2.8 Mobility 12.3 Important ICN Architectures 12.3.1 Content-Centric Networking (CCN) 12.3.2 Named Data Networking (NDN) 12.3.3 Data Oriented Networking Architecture (DONA) 12.3.4 Network of Information (NetInf) 12.3.5 Publish-Subscribe Internet Routing Paradigm (PSIRP) 12.4 Comparative Analysis of ICN Architectures 12.5 Conclusion Acknowledgment References INDEX
Donate to keep this site alive
1. Disable the AdBlock plugin. Otherwise, you may not get any links.
2. Solve the CAPTCHA.
3. Click download link.
4. Lead to download server to download.