Marknadens största urval
Snabb leverans

Böcker av Parikshit N. Mahalle

Filter
Filter
Sortera efterSortera Populära
  • av Parikshit N. Mahalle, Sheetal S. Sonawane & Archana S. Ghotkar
    1 476,-

    This book gives a comprehensive view of graph theory in informational retrieval (IR) and natural language processing(NLP). This book provides number of graph techniques for IR and NLP applications with examples. It also provides understanding of graph theory basics, graph algorithms and networks using graph. The book is divided into three parts and contains nine chapters. The first part gives graph theory basics and graph networks, and the second part provides basics of IR with graph-based information retrieval. The third part covers IR and NLP recent and emerging applications with case studies using graph theory. This book is unique in its way as it provides a strong foundation to a beginner in applying mathematical structure graph for IR and NLP applications. All technical details that include tools and technologies used for graph algorithms and implementation in Information Retrieval and Natural Language Processing with its future scope are explained in a clear and organized format.

  • av Parikshit N. Mahalle
    1 386,-

    The Internet of Things is a wide-reaching network of devices, and these devices can intercommunicate and collaborate with each other to produce variety of services at any time, any place, and in any way. Maintaining access control, authentication and managing the identity of devices while they interact with other devices, services and people is an important challenge for identity management. The identity management presents significant challenges in the current Internet communication. These challenges are exacerbated in the internet of things by the unbound number of devices and expected limitations in constrained resources. Current identity management solutions are mainly concerned with identities that are used by end users, and services to identify themselves in the networked world. However, these identity management solutions are designed by considering that significant resources are available and applicability of these identity management solutions to the resource constrained internet of things needs a thorough analysis. Technical topics discussed in the book include:* Internet of Things;* Identity Management;* Identity models in Internet of Things;* Identity management and trust in the Internet of Things context;* Authentication and access control;Identitymanagement for Internet of Things contributes to the area of identity management for ubiquitous devices in the Internet of Things. It initially presents the motivational factors together with the identity management problems in the context of Internet of Things and proposes an identity management framework. Following this, it refers to the major challenges for Identitymanagement and presents different identity management models. This book also presents relationship between identity and trust, different approaches for trust management, authentication and access control.

  • av Parikshit N. Mahalle, Thinagaran Perumal, Tomonobu Senjyu & m.fl.
    2 266 - 3 316,-

  • av Parikshit N. Mahalle, Gitanjali Rahul Shinde, Soumi Majumder & m.fl.
    1 830,-

  • av Parikshit N. Mahalle
    2 516,-

    This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers' goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains. This book is motivating to address privacy threats in new inventions for a wide range of stakeholders like layman to educated users, villages to metros and national to global levels. This book contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols. The main endeavour of this book is threat analysis and activity modelling of attacks in order to give an actual view of the ubiquitous computing applications. The unique approach will help readers for a better understanding.

  • - Proceedings of Third International Conference on ICTCS 2017
    av Simon Fong
    2 660,-

    This book contains 74 papers presented at ICTCS 2017: Third International Conference on Information and Communication Technology for Competitive Strategies. The conference was held during 16-17 December 2017, Udaipur, India and organized by Association of Computing Machinery, Udaipur Professional Chapter in association with The Institution of Engineers (India), Udaipur Local Center and Global Knowledge Research Foundation. This book contains papers mainly focused on ICT for Computation, Algorithms and Data Analytics and IT Security etc.

  • av Parikshit N. Mahalle
    670,-

    This book covers all small details about Underwater Sensor Networks (UWSN). Researchers can use this book as a prerequisite before starting any research on underwater networks or underwater applications.

  • av Parikshit N. Mahalle
    816,-

    This book offers a basic understanding of the Internet of Things (IoT), its design issues and challenges for healthcare applications. It also provides details of the challenges of healthcare big data, role of big data in healthcare and techniques, and tools for IoT in healthcare.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.