Marknadens största urval
Snabb leverans

Böcker av Parikshit N. Mahalle

Filter
Filter
Sortera efterSortera Populära
  • av Parikshit N. Mahalle
    516,-

    This book focus on key component required for building predictive maintenance model. The current trend of Maintenance 4.0 leans towards the preventive mechanism enabled by predictive approach and condition-based smart maintenance. The intelligent decision support, earlier detection of spare part failure, fatigue detection is the main slices of intelligent and predictive maintenance system (PMS) leading towards Maintenance 4.0 This book presents prominent use cases of mechanical engineering using PMS along with the benefits. Basic understanding of data preparation is required for development of any AI application; in view of this, the types of the data and data preparation processes, and tools are also presented in this book.

  • av Parikshit N. Mahalle
    2 266,-

    This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers' goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains. This book is motivating to address privacy threats in new inventions for a wide range of stakeholders like layman to educated users, villages to metros and national to global levels. This book contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols. The main endeavour of this book is threat analysis and activity modelling of attacks in order to give an actual view of the ubiquitous computing applications. The unique approach will help readers for a better understanding.

  • - Proceedings of Third International Conference on ICTCS 2017
    av Simon Fong
    2 660,-

    This book contains 74 papers presented at ICTCS 2017: Third International Conference on Information and Communication Technology for Competitive Strategies. The conference was held during 16-17 December 2017, Udaipur, India and organized by Association of Computing Machinery, Udaipur Professional Chapter in association with The Institution of Engineers (India), Udaipur Local Center and Global Knowledge Research Foundation. This book contains papers mainly focused on ICT for Computation, Algorithms and Data Analytics and IT Security etc.

  • av Parikshit N. Mahalle
    610,-

    This book covers all small details about Underwater Sensor Networks (UWSN). Researchers can use this book as a prerequisite before starting any research on underwater networks or underwater applications.

  • av Parikshit N. Mahalle
    816,-

    This book offers a basic understanding of the Internet of Things (IoT), its design issues and challenges for healthcare applications. It also provides details of the challenges of healthcare big data, role of big data in healthcare and techniques, and tools for IoT in healthcare.

  • av Parikshit N. Mahalle
    640 - 1 360,-

    The Internet of Things is a wide-reaching network of devices, and these devices can intercommunicate and collaborate with each other to produce variety of services at any time, any place, and in any way. Maintaining access control, authentication and managing the identity of devices while they interact with other devices, services and people is an important challenge for identity management. The identity management presents significant challenges in the current Internet communication. These challenges are exacerbated in the internet of things by the unbound number of devices and expected limitations in constrained resources. Current identity management solutions are mainly concerned with identities that are used by end users, and services to identify themselves in the networked world. However, these identity management solutions are designed by considering that significant resources are available and applicability of these identity management solutions to the resource constrained internet of things needs a thorough analysis. Technical topics discussed in the book include:* Internet of Things;* Identity Management;* Identity models in Internet of Things;* Identity management and trust in the Internet of Things context;* Authentication and access control;Identitymanagement for Internet of Things contributes to the area of identity management for ubiquitous devices in the Internet of Things. It initially presents the motivational factors together with the identity management problems in the context of Internet of Things and proposes an identity management framework. Following this, it refers to the major challenges for Identitymanagement and presents different identity management models. This book also presents relationship between identity and trust, different approaches for trust management, authentication and access control.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.