Details

The New Advanced Society


The New Advanced Society

Artificial Intelligence and Industrial Internet of Things Paradigm
Wiley-Scrivener 1. Aufl.

von: Sandeep Kumar Panda, Ramesh Kumar Mohapatra, Subhrakanta Panda, S. Balamurugan

190,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 18.03.2022
ISBN/EAN: 9781119884385
Sprache: englisch
Anzahl Seiten: 512

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<b>THE NEW ADVANCED SOCIETY</b> <p><b>Included in this book are the fundamentals of Society 5.0, artificial intelligence, and the industrial Internet of Things, featuring their working principles and application in different sectors.</B> <p>A 360-degree view of the different dimensions of the digital revolution is presented in this book, including the various industries transforming industrial manufacturing, the security and challenges ahead, and the far-reaching implications for society and the economy. The main objective of this edited book is to cover the impact that the new advanced society has on several platforms such as smart manufacturing systems, where artificial intelligence can be integrated with existing systems to make them smart, new business models and strategies, where anything and everything is possible through the internet and cloud, smart food chain systems, where food products can be delivered to any corner of the world at any time and in any situation, smart transport systems in which robots and self-driven cars are taking the lead, advances in security systems to assure people of their privacy and safety, and smart healthcare systems, where biochips can be incorporated into the human body to predict deadly diseases at early stages. Finally, it can be understood that the social reformation of Society 5.0 will lead to a society where every person leads an active and healthy life. <p><b>Audience</b> <p>The targeted audience for this book includes research scholars and industry engineers in artificial intelligence and information technology, engineering students, cybersecurity experts, government research agencies and policymakers, business leaders, and entrepreneurs. <p><b>Sandeep Kumar Panda, PhD</b> is an associate professor in the Department of Data Science and Artificial Intelligence at IcfaiTech (Faculty of Science and Technology), ICFAI Foundation for Higher Education, Hyderabad. His research areas include artificial intelligence, IoT, blockchain technology, cloud computing, cryptography, computational intelligence, and software engineering. <p><b>Ramesh Kumar Mohapatra, PhD </b>is an assistant professor in the Department of Computer Science and Engineering, National Institute of Technology, Rourkela, Odisha, India. His research interests include optical character recognition, document image analysis, video processing, secure computing, and machine learning. <p><b>Subhrakanta Panda, PhD </b>is an assistant professor in the Department of Computer Science and Information Systems, BITS-PILANI, Hyderabad Campus, Jawahar Nagar, Hyderabad, India. His research interests include social network analysis, cloud computing, security testing, and blockchain. <p><b>S. Balamurugan, PhD</b> is the Director of Research and Development, Intelligent Research Consultancy Services (iRCS), Coimbatore, Tamilnadu, India. He is also Director of the Albert Einstein Engineering and Research Labs (AEER Labs), as well as Vice-Chairman, Renewable Energy Society of India (RESI), India. He has published 45 books, 200+ international journals/ conferences, and 35 patents.
<p>Preface xvii</p> <p>Acknowledgments xxiii</p> <p><b>1 Post Pandemic: The New Advanced Society 1<br /></b><i>Sujata Priyambada Dash</i></p> <p>1.1 Introduction 1</p> <p>1.1.1 Themes 2</p> <p>1.1.1.1 Theme: Areas of Management 2</p> <p>1.1.1.2 Theme: Financial Institutions Cyber Crime 3</p> <p>1.1.1.3 Theme: Economic Notion 4</p> <p>1.1.1.4 Theme: Human Depression 6</p> <p>1.1.1.5 Theme: Migrant Labor 7</p> <p>1.1.1.6 Theme: Digital Transformation (DT) of Educational Institutions 9</p> <p>1.1.1.7 School and Colleges Closures 11</p> <p>1.2 Conclusions 12</p> <p>References 12</p> <p><b>2 Distributed Ledger Technology in the Construction Industry Using Corda 15<br /></b><i>Sandeep Kumar Panda, Shanmukhi Priya Daliyet, Shagun S. Lokre and Vihas Naman</i></p> <p>2.1 Introduction 16</p> <p>2.2 Prerequisites 16</p> <p>2.2.1 DLT vs Blockchain 17</p> <p>2.3 Key Points of Corda 18</p> <p>2.3.1 Some Salient Features of Corda 20</p> <p>2.3.2 States 20</p> <p>2.3.3 Contract 22</p> <p>2.3.3.1 Create and Assign Task (CAT) Contract 22</p> <p>2.3.3.2 Request for Cash (RT) Contract 23</p> <p>2.3.3.3 Transfer of Cash (TT) Contract 24</p> <p>2.3.3.4 Updation of the Task (UOT) Contract 24</p> <p>2.3.4 Flows 25</p> <p>2.3.4.1 Flow Associated With CAT Contract 25</p> <p>2.3.4.2 Flow Associated With RT Contract 26</p> <p>2.3.4.3 Flow Associated With TT Contract 26</p> <p>2.3.4.4 Flow Associated With UOT Contract 26</p> <p>2.4 Implementation 26</p> <p>2.4.1 System Overview 27</p> <p>2.4.2 Working Flowchart 28</p> <p>2.4.3 Experimental Demonstration 29</p> <p>2.5 Future Work 35</p> <p>2.6 Conclusion 36</p> <p>References 37</p> <p><b>3 Identity and Access Management for Internet of Things Cloud 43<br /></b><i>Soumya Prakash Otta and Subhrakanta Panda</i></p> <p>3.1 Introduction 44</p> <p>3.2 Internet of Things (IoT) Security 45</p> <p>3.2.1 IoT Security Overview 45</p> <p>3.2.2 IoT Security Requirements 46</p> <p>3.2.3 Securing the IoT Infrastructure 49</p> <p>3.3 IoT Cloud 49</p> <p>3.3.1 Cloudification of IoT 50</p> <p>3.3.2 Commercial IoT Clouds 52</p> <p>3.3.3 IAM of IoT Clouds 54</p> <p>3.4 IoT Cloud Related Developments 55</p> <p>3.5 Proposed Method for IoT Cloud IAM 58</p> <p>3.5.1 Distributed Ledger Approach for IoT Security 59</p> <p>3.5.2 Blockchain for IoT Security Solution 60</p> <p>3.5.3 Proposed Distributed Ledger-Based IoT Cloud IAM 62</p> <p>3.6 Conclusion 64</p> <p>References 65</p> <p><b>4 Automated TSR Using DNN Approach for Intelligent Vehicles 67<br /></b><i>Banhi Sanyal, Piyush R. Biswal, R.K. Mohapatra, Ratnakar Dash and Ankush Agarwalla</i></p> <p>4.1 Introduction 68</p> <p>4.2 Literature Survey 69</p> <p>4.3 Neural Network (NN) 70</p> <p>4.4 Methodology 71</p> <p>4.4.1 System Architecture 71</p> <p>4.4.2 Database 71</p> <p>4.5 Experiments and Results 71</p> <p>4.5.1 FFNN 74</p> <p>4.5.2 RNN 76</p> <p>4.5.3 CNN 76</p> <p>4.5.4 CNN 76</p> <p>4.5.5 Pre-Trained Models 79</p> <p>4.6 Discussion 79</p> <p>4.7 Conclusion 80</p> <p>References 88</p> <p><b>5 Honeypot: A Trap for Attackers 91<br /></b><i>Anjanna Matta, G. Sucharitha, Bandlamudi Greeshmanjali, Manji Prashanth Kumar and Mathi Naga Sarath Kumar</i></p> <p>5.1 Introduction 92</p> <p>5.1.1 Research Honeypots 93</p> <p>5.1.2 Production Honeypots 93</p> <p>5.2 Method 94</p> <p>5.2.1 Low-Interaction Honeypots 94</p> <p>5.2.2 Medium-Interaction Honeypots 95</p> <p>5.2.3 High-Interaction Honeypots 95</p> <p>5.3 Cryptanalysis 96</p> <p>5.3.1 System Architecture 96</p> <p>5.3.2 Possible Attacks on Honeypot 97</p> <p>5.3.3 Advantages of Honeypots 98</p> <p>5.3.4 Disadvantages of Honeypots 99</p> <p>5.4 Conclusions 99</p> <p>References 100</p> <p><b>6 Examining Security Aspect in Industrial-Based Internet of Things 103<br /></b><i>Rohini Jha</i></p> <p>6.1 Introduction 104</p> <p>6.2 Process Frame of IoT Before Security 105</p> <p>6.2.1 Cyber Attack 107</p> <p>6.2.2 Security Assessment in IoT 107</p> <p>6.2.2.1 Security in Perception and Network Frame 108</p> <p>6.3 Attacks and Security Assessments in IIoT 111</p> <p>6.3.1 IoT Security Techniques Analysis Based on its Merits 111</p> <p>6.4 Conclusion 116</p> <p>References 119</p> <p><b>7 A Cooperative Navigation for Multi-Robots in Unknown Environments Using Hybrid Jaya-DE Algorithm 123<br /></b><i>D. Chandrasekhar Rao</i></p> <p>7.1 Introduction 124</p> <p>7.2 Related Works 126</p> <p>7.3 Problem Formulation 130</p> <p>7.4 Multi-Robot Navigation Employing Hybrid Jaya-DE Algorithm 134</p> <p>7.4.1 Basic Jaya Algorithm 134</p> <p>7.5 Hybrid Jaya-DE 136</p> <p>7.5.1 Mutation 136</p> <p>7.5.2 Crossover 136</p> <p>7.5.3 Selection 137</p> <p>7.6 Simulation Analysis and Performance Evaluation of Jaya-DE Algorithm 139</p> <p>7.7 Total Navigation Path Deviation (TNPD) 147</p> <p>7.8 Average Unexplored Goal Distance (AUGD) 148</p> <p>7.9 Conclusion 159</p> <p>References 159</p> <p><b>8 Categorization Model for Parkinson’s Disease Occurrence and Severity Prediction 163<br /></b><i>Prashant Kumar Shrivastava, Ashish Chaturvedi, Megha Kamble and Megha Jain</i></p> <p>8.1 Introduction 164</p> <p>8.2 Applications 166</p> <p>8.2.1 Machine Learning in PD Diagnosis 166</p> <p>8.2.2 Challenges of PD Detection 169</p> <p>8.2.3 Structuring of UPDRS Score 170</p> <p>8.3 Methodology 173</p> <p>8.3.1 Overview of Data Driven Intelligence 173</p> <p>8.3.2 Comparison Between Deep Learning and Traditional Machine 175</p> <p>8.3.3 Deep Learning for PD Diagnosis 176</p> <p>8.3.4 Convolution Neural Network for PD Diagnosis 176</p> <p>8.4 Proposed Models 178</p> <p>8.4.1 Classification of Patient and Healthy Controls 178</p> <p>8.4.2 Severity Score Classification 181</p> <p>8.5 Results and Discussion 184</p> <p>8.5.1 Performance Measures 185</p> <p>8.5.2 Graphical Results 187</p> <p>8.6 Conclusion 187</p> <p>References 187</p> <p><b>9 AI-Based Smart Agriculture Monitoring Using Ground-Based and Remotely Sensed Images 191<br /></b><i>Shounak Chakraborty, Nikumani Choudhury and Indrajit Kalita</i></p> <p>9.1 Introduction 192</p> <p>9.2 Automatic Land-Cover Classification Techniques Using Remotely Sensed Images 194</p> <p>9.3 Deep Learning-Based Agriculture Monitoring 196</p> <p>9.4 Adaptive Approaches for Multi-Modal Classification 197</p> <p>9.4.1 Unsupervised DA 199</p> <p>9.4.2 Semi-Supervised DA 200</p> <p>9.4.3 Active Learning-Based DA 201</p> <p>9.5 System Model 202</p> <p>9.6 IEEE 802.15.4 204</p> <p>9.6.1 802.15.4 MAC 204</p> <p>9.6.2 DSME MAC 205</p> <p>9.6.3 TSCH MAC 206</p> <p>9.7 Analysis of IEEE 802.15.4 for Smart Agriculture 207</p> <p>9.7.1 Effect of Device Specification 207</p> <p>9.7.1.1 Low-Power 208</p> <p>9.7.2 Effect of MAC Protocols 208</p> <p>9.8 Experimental Results 209</p> <p>9.9 Conclusion & Future Directions 212</p> <p>References 212</p> <p><b>10 Car Buying Criteria Evaluation Using Machine Learning Approach 223<br /></b><i>Samdeep Kumar Panda</i></p> <p>10.1 Introduction 224</p> <p>10.2 Literature Survey 225</p> <p>10.3 Proposed Method 226</p> <p>10.4 Dataset 227</p> <p>10.5 Exploratory Data Analysis 227</p> <p>10.6 Splitting of Data Into Training Data and Test Data 230</p> <p>10.7 Pre-Processing 232</p> <p>10.8 Training of Our Models 232</p> <p>10.8.1 Gaussian Naïve Bayes 233</p> <p>10.8.2 Decision Tree Classifier 234</p> <p>10.8.3 Tuning the Model 235</p> <p>10.8.4 Karnough Nearest Neighbor Classifier 236</p> <p>10.8.5 Tuning the Model 237</p> <p>10.8.6 Neural Network 238</p> <p>10.8.7 Tuning the Model 239</p> <p>10.9 Result Analysis 240</p> <p>10.9.1 Confusion Matrix 240</p> <p>10.9.2 Gaussian Naïve Bayes 241</p> <p>10.9.3 Decision Tree Classifier 242</p> <p>10.9.4 Karnough Nearest Neighbor Classifier 242</p> <p>10.9.5 Neural Network 242</p> <p>10.9.6 Accuracy Scores 243</p> <p>10.10 Conclusion and Future Work 244</p> <p>References 244</p> <p><b>11 Big Data, Artificial Intelligence and Machine Learning: A Paradigm Shift in Election Campaigns 247<br /></b><i>Md. Safiullah and Neha Parveen</i></p> <p>11.1 Introduction 248</p> <p>11.2 Big Data Reveals the Voters’ Preference 249</p> <p>11.2.1 Use of Software Applications in Election Campaigns 251</p> <p>11.2.1.1 Team Joe App 252</p> <p>11.2.1.2 Trump 2020 252</p> <p>11.2.1.3 Modi App 253</p> <p>11.3 Deep Fakes and Election Campaigns 254</p> <p>11.3.1 Deep Fake in Delhi Elections 254</p> <p>11.4 Social Media Bots 256</p> <p>11.5 Future of Artificial Intelligence and Machine Learning in Election Campaigns 259</p> <p>References 259</p> <p><b>12 Impact of Optimized Segment Routing in Software Defined Network 263<br /></b><i>Amrutanshu Panigrahi, Bibhuprasad Sahu, Satya Sobhan Panigrahi, Ajay Kumar Jena and Md. Sahil Khan</i></p> <p>12.1 Introduction 264</p> <p>12.2 Software-Defined Network 266</p> <p>12.3 SDN Architecture 268</p> <p>12.4 Segment Routing 270</p> <p>12.5 Segment Routing in SDN 272</p> <p>12.6 Traffic Engineering in SDN 274</p> <p>12.7 Segment Routing Protocol 275</p> <p>12.8 Simulation and Result 277</p> <p>12.9 Conclusion and Future Work 278</p> <p>References 283</p> <p><b>13 An Investigation into COVID-19 Pandemic in India 289<br /></b><i>Shubhangi V. Urkude, Vijaykumar R. Urkude, S. Vairachilai and Sandeep Kumar Panda</i></p> <p>13.1 Introduction 289</p> <p>13.1.1 Symptoms of COVID-19 292</p> <p>13.1.2 Precautionary Measures 292</p> <p>13.1.3 Ways of Spreading the Coronavirus 294</p> <p>13.2 Literature Survey 295</p> <p>13.3 Technologies Used to Fight COVID-19 296</p> <p>13.3.1 Robots 296</p> <p>13.3.2 Drone Technology 297</p> <p>13.3.3 Crowd Surveillance 297</p> <p>13.3.4 Spraying the Disinfectant 298</p> <p>13.3.5 Sanitizing the Contaminated Areas 298</p> <p>13.3.6 Monitoring Temperature Using Thermal Camera 298</p> <p>13.3.7 Delivering the Essential Things 298</p> <p>13.3.8 Public Announcement in the Infected Areas 298</p> <p>13.4 Impact of COVID-19 on Business 299</p> <p>13.4.1 Impact on Financial Markets 299</p> <p>13.4.2 Impact on Supply Side 299</p> <p>13.4.3 Impact on Demand Side 300</p> <p>13.4.4 Impact on International Trade 300</p> <p>13.5 Impact of COVID-19 on Indian Economy 300</p> <p>13.6 Data and Result Analysis 300</p> <p>13.7 Conclusion and Future Scope 304</p> <p>References 304</p> <p><b>14 Skin Cancer Classification: Analysis of Different CNN Models via Classification Accuracy 307<br /></b><i>Poonam Biswal, Monali Saha, Nishtha Jaiswal and Minakhi Rout</i></p> <p>14.1 Introduction 307</p> <p>14.2 Literature Survey 308</p> <p>14.3 Methodology 310</p> <p>14.3.1 Dataset Preparation 310</p> <p>14.3.2 Dataset Loading and Data Pre-Processing 311</p> <p>14.3.3 Creating Models 312</p> <p>14.4 Models Used 312</p> <p>14.5 Simulation Results 313</p> <p>14.5.1 Changing Size of MaxPool2D(n,n) 314</p> <p>14.5.2 Changing Size of AveragePool2D(n,n) 314</p> <p>14.5.3 Changing Number of con2d(32n–64n) Layers 315</p> <p>14.5.4 Changing Number of con2d-32*n Layers 315</p> <p>14.5.5 ROC Curves and MSE Curves 318</p> <p>14.6 Conclusion 321</p> <p>References 321</p> <p><b>15 Route Mapping of Multiple Humanoid Robots Using Firefly-Based Artificial Potential Field Algorithm in a Cluttered Terrain 323<br /></b><i>Abhishek Kumar Kashyap, Anish Pandey and Dayal R. Parhi</i></p> <p>15.1 Introduction 324</p> <p>15.2 Design of Proposed Algorithm 328</p> <p>15.2.1 Mechanism of Artificial Potential Field 328</p> <p>15.2.1.1 Potential Field Generated by Attractive Force of Goal 329</p> <p>15.2.1.2 Potential Field Generated by Repulsive Force of Obstacle 331</p> <p>15.2.2 Mechanism of Firefly Algorithm 332</p> <p>15.2.2.1 Architecture of Optimization Problem Based on Firefly Algorithm 335</p> <p>15.2.3 Dining Philosopher Controller 337</p> <p>15.3 Hybridization Process of Proposed Algorithm 339</p> <p>15.4 Execution of Proposed Algorithm in Multiple Humanoid Robots 339</p> <p>15.5 Comparison 344</p> <p>15.6 Conclusion 346</p> <p>References 346</p> <p><b>16 Innovative Practices in Education Systems Using Artificial Intelligence for Advanced Society 351<br /></b><i>Vinutha D.C., Kavyashree S., Vijay C.P. and G.T. Raju</i></p> <p>16.1 Introduction 352</p> <p>16.2 Literature Survey 353</p> <p>16.2.1 AI in Auto-Grading 354</p> <p>16.2.2 AI in Smart Content 356</p> <p>16.2.3 AI in Auto Analysis on Student’s Grade 356</p> <p>16.2.4 AI Extends Free Intelligent Tutoring 357</p> <p>16.2.5 AI in Predicting Student Admission and Drop-Out Rate 359</p> <p>16.3 Proposed System 359</p> <p>16.3.1 Data Collection Module 360</p> <p>16.3.2 Data Pre-Processing Module 364</p> <p>16.3.3 Clustering Module 364</p> <p>16.3.4 Partner Selection Module 366</p> <p>16.4 Results 368</p> <p>16.5 Future Enhancements 370</p> <p>16.6 Conclusion 370</p> <p>References 371</p> <p><b>17 PSO-Based Hybrid Weighted k-Nearest Neighbor Algorithm for Workload Prediction in Cloud Infrastructures 373<br /></b><i>N. Yamuna, J. Antony Vijay and B. Gomathi</i></p> <p>17.1 Introduction 374</p> <p>17.2 Literature Survey 375</p> <p>17.2.1 Machine Learning 378</p> <p>17.3 Proposed System 379</p> <p>17.3.1 Load Aware Cloud Computing Model 379</p> <p>17.3.2 Wavelet Neural Network 379</p> <p>17.3.3 Evaluation Using LOOCV Model 380</p> <p>17.3.4 k-Nearest Neighbor (k-NN) Algorithm 381</p> <p>17.3.5 Particle Swarm Optimization (PSO) Algorithm 382</p> <p>17.3.6 HWkNN Optimization Algorithm Based on PSO 383</p> <p>17.3.7 PSO-Based HWkNN (PHWkNN) Load Prediction Algorithm 384</p> <p>17.4 Experimental Results 385</p> <p>17.5 Conclusion 390</p> <p>References 391</p> <p><b>18 An Extensive Survey on the Prediction of Bankruptcy 395<br /></b><i>Sasmita Manjari Nayak and Minakhi Rout</i></p> <p>18.1 Introduction 395</p> <p>18.2 Literature Survey 397</p> <p>18.2.1 Data Pre-Processing 397</p> <p>18.2.1.1 Balancing of Imbalanced Dataset 397</p> <p>18.2.1.2 Outlier Data Handling 410</p> <p>18.2.2 Classifiers 418</p> <p>18.2.3 Ensemble Models 422</p> <p>18.3 System Architecture and Simulation Results 438</p> <p>18.4 Conclusion 438</p> <p>References 443</p> <p><b>19 Future of Indian Agriculture Using AI and Machine Learning Tools and Techniques 447<br /></b><i>Manoj Kumar, Pratibha Maurya and Rinki Verma</i></p> <p>19.1 Introduction 448</p> <p>19.2 Overview of AI and Machine Learning 450</p> <p>19.3 Review of Literature 452</p> <p>19.4 Application of AI & Machine Learning in Agriculture 456</p> <p>19.5 Current Scenario and Emerging Trends of AI and ML in Indian Agriculture Sector 460</p> <p>19.6 Opportunities for Agricultural Operations in India 465</p> <p>19.7 Conclusion 466</p> <p>References 467</p> <p>Index 473</p>
<p><b>Sandeep Kumar Panda,</b> <b>PhD </b>is an associate professor in the Department of Data Science and Artificial Intelligence at IcfaiTech (Faculty of Science and Technology), ICFAI Foundation for Higher Education, Hyderabad. His research areas include Artificial Intelligence, IoT, Blockchain Technology, Cloud Computing, Cryptography, Computational Intelligence, and Software Engineering.</p> <p><b>Ramesh Kumar Mohapatra, PhD</b> is an assistant professor in the  Department of Computer Science and Engineering, National Institute of Technology, Rourkela, Odisha, India. His research interests include Optical Character Recognition, Document Image Analysis, Video Processing, Secure Computing, Machine Learning.</p> <p><b>Subhrakanta Panda,</b> <b>PhD</b> is an assistant professor in the department of Computer Science and Information Systems, BITS-PILANI, Hyderabad Campus, Jawahar Nagar, Shameerpet Mandal, Hyderabad, INDIA. His research interests include Social Network Analysis, Cloud Computing, Security Testing, Blockchain.</p> <p><b>S. Balamurugan, PhD</b> is the Director of Research and Development, Intelligent Research Consultancy Services (iRCS), Coimbatore, Tamilnadu, India. He is also Director of the Albert Einstein Engineering and Research Labs (AEER Labs), as well as Vice-Chairman, Renewable Energy Society of India (RESI), India. He has published 45 books, 200+ international journals/ conferences, and 35 patents.</p>
<p><b>Included in this book are the fundamentals of Society 5.0, artificial intelligence, and the industrial Internet of Things, featuring their working principles and application in different sectors.</B></p> <p>A 360-degree view of the different dimensions of the digital revolution is presented in this book, including the various industries transforming industrial manufacturing, the security and challenges ahead, and the far-reaching implications for society and the economy. The main objective of this edited book is to cover the impact that the new advanced society has on several platforms such as smart manufacturing systems, where artificial intelligence can be integrated with existing systems to make them smart, new business models and strategies, where anything and everything is possible through the internet and cloud, smart food chain systems, where food products can be delivered to any corner of the world at any time and in any situation, smart transport systems in which robots and self-driven cars are taking the lead, advances in security systems to assure people of their privacy and safety, and smart healthcare systems, where biochips can be incorporated into the human body to predict deadly diseases at early stages. Finally, it can be understood that the social reformation of Society 5.0 will lead to a society where every person leads an active and healthy life. <p><b>Audience</b> <p>The targeted audience for this book includes research scholars and industry engineers in artificial intelligence and information technology, engineering students, cybersecurity experts, government research agencies and policymakers, business leaders, and entrepreneurs. <p><b>Sandeep Kumar Panda, PhD</b> is an associate professor in the Department of Data Science and Artificial Intelligence at IcfaiTech (Faculty of Science and Technology), ICFAI Foundation for Higher Education, Hyderabad. His research areas include artificial intelligence, IoT, blockchain technology, cloud computing, cryptography, computational intelligence, and software engineering. <p><b>Ramesh Kumar Mohapatra, PhD </b>is an assistant professor in the Department of Computer Science and Engineering, National Institute of Technology, Rourkela, Odisha, India. His research interests include optical character recognition, document image analysis, video processing, secure computing, and machine learning. <p><b>Subhrakanta Panda, PhD </b>is an assistant professor in the Department of Computer Science and Information Systems, BITS-PILANI, Hyderabad Campus, Jawahar Nagar, Hyderabad, India. His research interests include social network analysis, cloud computing, security testing, and blockchain. <p><b>S. Balamurugan, PhD</b> is the Director of Research and Development, Intelligent Research Consultancy Services (iRCS), Coimbatore, Tamilnadu, India. He is also Director of the Albert Einstein Engineering and Research Labs (AEER Labs), as well as Vice-Chairman, Renewable Energy Society of India (RESI), India. He has published 45 books, 200+ international journals/ conferences, and 35 patents.

Diese Produkte könnten Sie auch interessieren:

MDX Solutions
MDX Solutions
von: George Spofford, Sivakumar Harinath, Christopher Webb, Dylan Hai Huang, Francesco Civardi
PDF ebook
53,99 €
Concept Data Analysis
Concept Data Analysis
von: Claudio Carpineto, Giovanni Romano
PDF ebook
107,99 €
Handbook of Virtual Humans
Handbook of Virtual Humans
von: Nadia Magnenat-Thalmann, Daniel Thalmann
PDF ebook
150,99 €