Browse Results

Showing 7,826 through 7,850 of 18,699 results

Invisible Influence: The Power to Persuade Anyone, Anytime, Anywhere

by Kevin Hogan

"Invisible Influence is a masterpiece in understanding the science of influence and how to take it from convincing to compelling. Kevin Hogan shows you in plain English how to understand, apply, and master the science of persuasion. The book is brilliant- and you can be brilliantly persuasive. Buy the book, read the book, and implement the book."-Jeffrey Gitomer, author of The Sales Bible and The Little Book of Leadership"One eyebrow-raising, head-whacking, forehead-slapping technique after another. Anyone whose daily life depends on influencing people-in other words, everyone-should read this book. Buy copies for your friends and hide it from your enemies."-Richard Brodie, author of Virus of the Mind: The New Science of the Meme"Master persuaders know that it's not really about the words you use or the moves you make-other people get persuaded because of what you think and how you feel. Kevin Hogan explains in delightfully clear detail how to make these master-persuader secrets work for you. Not only that, he also explains why all of this works, and he shows you the exact scientific research that proves it!"-David Garfinkel, author of Advertising Headlines That Make You Rich"Invisible Influence is a masterpiece. It will be the master influencer's reference book for the years to come. Invisible influence is like oxygen, you can't see it, but your life depends on it. In this book, you will discover the persuasion tactics that will compel your clients to say yes to you-again and again."-Roberto Monaco, www.influenceology.com"Dump the script-it's old news before the ink's dry. Trust yourself and use your new understanding of the ever-changing context to succeed. In his fascinating book, Hogan weaves established research findings into a handbook for successful influence. The guidelines are obvious but hidden, simple but profound. Understand them and you've mastered the complex and crucial art of persuasion."-William D. Crano, author of The Rules of Influence: Winning When You're in the Minority"Many write on the topic of persuasion. Precious few genuinely understand it. Kevin is one of those precious few. Read everything you can by him."-Mark Joyner, founder and CEO of Simpleology, www.simpleology.com

Invisible People: Stories of Lives at the Margins

by Alex Tizon Sam Howe Verhovek

“Somewhere in the tangle of the subject’s burden and the subject’s desire is your story.”—Alex Tizon Every human being has an epic story. The late Pulitzer Prize–winning writer Alex Tizon told the epic stories of marginalized people—from lonely immigrants struggling to forge a new American identity to a high school custodian who penned a New Yorker short story. Edited by Tizon’s friend and former colleague Sam Howe Verhovek, Invisible People collects the best of Tizon’s rich, empathetic accounts—including “My Family’s Slave,” the Atlantic magazine cover story about the woman who raised him and his siblings under conditions that amounted to indentured servitude. Mining his Filipino American background, Tizon tells the stories of immigrants from Cambodia and Laos. He gives a fascinating account of the Beltway sniper and insightful profiles of Surfers for Jesus and a man who tracks UFOs. His articles—many originally published in the Seattle Times and the Los Angeles Times—are brimming with enlightening details about people who existed outside the mainstream’s field of vision. In their introductions to Tizon’s pieces, New York Times executive editor Dean Baquet, Atlantic magazine editor in chief Jeffrey Goldberg, Pulitzer Prize winners Kim Murphy and Jacqui Banaszynski, and others salute Tizon’s respect for his subjects and the beauty and brilliance of his writing. Invisible People is a loving tribute to a journalist whose search for his own identity prompted him to chronicle the lives of others.

Invisible Rulers: The People Who Turn Lies into Reality

by Renee DiResta

An &“essential and riveting&” (Jonathan Haidt) analysis of the radical shift in the dynamics of power and influence, revealing how the machinery that powered the Big Lie works to create bespoke realities revolutionizing politics, culture, and society. Renée DiResta&’s powerful, original investigation into the way power and influence have been profoundly transformed reveals how a virtual rumor mill of niche propagandists increasingly shapes public opinion. While propagandists position themselves as trustworthy Davids, their reach, influence, and economics make them classic Goliaths—invisible rulers who create bespoke realities to revolutionize politics, culture, and society. Their work is driven by a simple maxim: if you make it trend, you make it true. By revealing the machinery and dynamics of the interplay between influencers, algorithms, and online crowds, DiResta vividly illustrates the way propagandists deliberately undermine belief in the fundamental legitimacy of institutions that make society work. This alternate system for shaping public opinion, unexamined until now, is rewriting the relationship between the people and their government in profound ways. It has become a force so shockingly effective that its destructive power seems limitless. Scientific proof is powerless in front of it. Democratic validity is bulldozed by it. Leaders are humiliated by it. But they need not be. With its deep insight into the power of propagandists to drive online crowds into battle—while bearing no responsibility for the consequences—Invisible Rulers not only predicts those consequences but offers ways for leaders to rapidly adapt and fight back.

Invisible Users

by Jenna Burrell

The urban youth frequenting the Internet cafes of Accra, Ghana, who are decidedly not members of their country's elite, use the Internet largely as a way to orchestrate encounters across distance and amass foreign ties--activities once limited to the wealthy, university-educated classes. The Internet, accessed on second-hand computers (castoffs from the United States and Europe), has become for these youths a means of enacting a more cosmopolitan self. In Invisible Users, Jenna Burrell offers a richly observed account of how these Internet enthusiasts have adopted, and adapted to their own priorities, a technological system that was not designed with them in mind. Burrell describes the material space of the urban Internet cafe and the virtual space of push and pull between young Ghanaians and the foreigners they encounter online; the region's famous 419 scam strategies and the rumors of "big gains" that fuel them; the influential role of churches and theories about how the supernatural operates through the network; and development rhetoric about digital technologies and the future viability of African Internet cafes in the region. Burrell, integrating concepts from science and technology studies and African studies with empirical findings from her own field work in Ghana, captures the interpretive flexibility of technology by users in the margins but also highlights how their invisibility puts limits on their full inclusion into a global network society.

Invisible Walls: A Journalist in Search of Her Life

by Hella Pick

'Memoirs of such richness are rare . . . a joy' JAMES NAUGHTIE'A remarkable personal journey, by one of the great political correspondents of our world - eloquent, enlightening, exhilarating' PHILIPPE SANDSA trailblazer for women in journalism, Hella Pick arrived in Britain in 1939 as a child refugee from Austria. Over nearly four decades she covered the volatile global scene, first in West Africa, followed by America and long periods in Europe. In her thirty-five years with the Guardian she reported on the end of Empire in West Africa, the assassination of President Kennedy, Martin Luther King's march from Selma to Montgomery, the Vietnam peace negotiation in Paris, the 1968 student revolt in France, the birth of the Solidarity movement in Poland, and the closing stages of the Cold War. A request for coffee on board a Soviet ship anchored in Malta led to a chat with Mikhail Gorbachev. A request for an interview with Willy Brandt led to a personal friendship that enabled her to come to terms with Germany's Nazi past.Her book is also a clarion call for preserving professionalism in journalism at a time when social media muddy the waters between fact and fiction, and between reporting and commentary.INVISIBLE WALLS tells the dramatic story of how a Kindertransport survivor won the trust and sometimes the friendship of world leaders, and with them a wide range of remarkable men and women. It speaks frankly of personal heartache and of a struggle over her Jewish identity. It is also the intensely touching story of how, despite a gift for friendship and international recognised achievements as a woman journalist, a continuing sense of personal insecurity has confronted her with a series of invisible walls.

Invitation To Human Communication (Second Edition)

by Cindy Griffin Jennifer Emerling Bone

Working in partnership with National Geographic, INVITATION TO HUMAN COMMUNICATION, 2e acknowledges the complexity of today's workplace, the power of communication, and the importance of equipping readers with the foundational skills for success in this ever-changing environment. A leader in teaching foundational communication theories and skills, the text helps readers recognize the importance and centrality of communication in their professional and personal lives. Each chapter includes case studies and tips from nationally recognized explorers, scientists, researchers, and activists. The text showcases the best of communication theories and practices as well as explores how communication is central to carrying out work, developing professional and personal relationships with others, and sharing ideas with the larger public.

Invitation To Public Speaking - National Geographic Edition

by Cindy Griffin

Grounded in rhetorical tradition while offering a fresh perspective, INVITATION TO PUBLIC SPEAKING helps students understand the power and importance of public speaking--in their lives and in greater society. Intended for the introductory public speaking course, INVITATION TO PUBLIC SPEAKING engages students in the public dialogue, encourages civic engagement, and illustrates how they will apply speaking skills in their course work and throughout their careers. Speech-building exercises, thoughtful real-life examples, an invigorating art program, and an engaging voice help students comprehend public speaking as an activity to be engaged in with others, and prepares them to enter the public dialogue. INVITATION TO PUBLIC SPEAKING also features the most comprehensive integrated technology program available, giving students more interactive skill-building practice for public speaking.

Invitation to Public Speaking (2nd edition)

by Cindy L. Griffin

For this second edition of an introductory text, Griffin (speech communication, Colorado State University) expands the text's focus to emphasize public speaking as public dialogue. There is more material on civic engagement, service learning, and plagiarism, plus six new student speeches and updated examples. The text provides instructions for specific speech construction, delivery, and strategy steps, with material on technology as a learning tool and in speech preparation integrated throughout. Learning features include chapter summaries, review questions, and Internet activities.

Involving the Audience: A Rhetoric Perspective on Using Social Media to Improve Websites (ATTW Series in Technical and Professional Communication)

by Lee Ann Kastman Breuch

Involving the Audience: A Rhetorical Perspective on Using Social Media to Improve Websites examines the usability challenges raised by large complex websites and proposes ways the social web can expand usability research to address these new challenges. Using the website healthcare.gov as an initial illustration, Breuch explains how large complex websites are inherently challenged by open-ended, interactive tasks that often have multiple pathways to completion. These challenges are illustrated through two in-depth case studies, each addressing the launch of an interactive, complex website designed for a large public audience.

IoT Applications for Healthcare Systems (EAI/Springer Innovations in Communication and Computing)

by Latif Ladid Falgun Thakkar Rahul K. Kher Chirag Paunwala Heena Kher Mita Paunwala Prasan Kumar Sahoo

This book discusses communications technologies used in the field of healthcare, including IoT, soft computing, machine learning, big data, augmented reality, and wearable sensors. The book presents various applications that are helpful for research scholars and scientists who are working toward identifying and pinpointing the potential of this technology. The book also helps researchers and practitioners to understand and analyze the e-healthcare architecture through IoT and the state-of-the-art in IoT countermeasures with real-time challenges. Topics of interest include healthcare systems based on advanced development boards, mobile health parameters recording and monitoring systems, remote health / patient monitoring, hospital operations management, abnormality / disease detection by IoT devices, and efficient drug management. The book is relevant to a range of researchers, academics, and practitioners working on the intersection of IoT and healthcare.

IoT Based Control Networks and Intelligent Systems: Proceedings of 3rd ICICNIS 2022 (Lecture Notes in Networks and Systems #528)

by Valentina E. Balas Ram Palanisamy P. P. Joby

This book gathers selected papers presented at International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS 2022), organized by St. Joseph’s College of Engineering and Technology, Kottayam, Kerala, India, during July 1–2, 2022. The book covers state-of-the-art research insights on Internet of things (IoT) paradigm to access, manage, and control the objects/things/people working under various information systems and deployed under wide range of applications like smart cities, health care, industries, and smart homes.

IoT Based Control Networks and Intelligent Systems: Proceedings of 4th ICICNIS 2023 (Lecture Notes in Networks and Systems #789)

by Marcelo S. Alencar Przemyslaw Falkowski-Gilski P. P. Joby

This book gathers selected papers presented at International Conference on IoT Based Control Networks and Intelligent Systems (ICICNIS 2023), organized by School of Computer Science and Engineering, REVA University, Bengaluru, India, during June 21–22, 2023. The book covers state-of-the-art research insights on Internet of things (IoT) paradigm to access, manage, and control the objects/things/people working under various information systems and deployed under wide range of applications like smart cities, healthcare, industries, and smart homes.

IoT Based Smart Applications (EAI/Springer Innovations in Communication and Computing)

by Dinesh Chander Verma Nidhi Sindhwani Rohit Anand M Niranjanamurthy Emilia Balas Valentina

This book provides insights into IoT, its applications, and various implementation techniques. The authors first discuss the IoT design methodology to define the domain model. They then cover various connection methodologies used in IoT such as Ethernet, Wi-Fi, low powered wide area network (LPWAN), Bluetooth, RFID, cellular, and satellite, and more, along with their challenges. An example is made on the designing process using Arduino, which offers smart, connected, and secure elements; they also illustrate the integration of IoT with Blockchain, cloud, machine learning, big data, embedded software, sensors, etc. The book going on to cover the future of IoT in various sectors and how IoT will continue to be game-changing technology.

IoT Benefits and Growth Opportunities for the Telecom Industry: Key Technology Drivers for Companies

by Vincent Sabourin Jordan Tito Jabo

This critical and forward-looking book features: An assessment of the impact of Internet of Things (IoT) on the telecom industry’s revenue streams IoT-based business models in the telecom industry A PESTLE (political, economic, socio-cultural, technological, legal, and environmental) analysis of the industry in relation to IoT Key technological drivers. It also features a case study of Bell Canada Enterprises (BCE) Inc., which highlights IoT-based business models in the industry. The study reveals that telecom operators have started implementing IoT projects, however, true revenue streams are yet to materialize. Ten IoT-based business models have been identified at BCE Inc. The book points out that operators do leverage existing infrastructure in terms of broadband fiber and mobile connectivity in part and resort to partnerships and acquisitions to acquire much-needed knowledge, technology, and smart devices. Concerning the effect of IoT on the telecoms’ revenue streams, it was revealed that new entrants, who are not necessarily in the telecom industry, have impacted the old players’ revenue streams. OTT services like YouTube, WhatsApp, IPTV, Netflix, are the biggest culprits. Seven key technological drivers for IoT have been identified and include widespread wireless connectivity, the availability and affordability of microcontrollers, sensors and actuators, the decreasing cost of bandwidth, the recent implementation of IPv6, and the ongoing development of 5G network, as well as the use of cloud computing and analytics. Finally, the PESTLE analysis of the industry shows that the lack of a comprehensive political and regulatory framework still slows down IoT deployment. Interoperability, security, and privacy concerns are other constraints. Conversely, general economic conditions in most developed and developing economies are favorable to the advancement of IoT technology. Governments are willing to subsidize R&D and have partnered with the private sector to speed up the roll-out process.

IoT Communication Performance Analysis (Transactions on Computer Systems and Networks)

by Chuzo Ninagawa

This book deals with analysis techniques for TCP, UDP, Web, and SOAP data transmission performance on the IoT cloud side, CSMA-type, and multi-hop data transmission performance on the IoT edge side, as well as gateway receives buffer and transmit packet assembly data transmission performance.As mathematical tools for the analysis of communication performance, universal analysis methods such as stochastic processes, queues, Markov processes, and communication traffic simulators are applied to actual examples, and their usage is described in detail. This book aims to provide lifelong skills for analyzing communication performance that will serve as the basis for the future evolution of the IoT.

IoT Edge Intelligence (Internet of Things)

by Flávia C. Delicato Roberto Minerva Souvik Pal Claudio Savaglio

This book explores fundamental and advanced concepts related to the AI-enabled Edge Technology paradigm, also known as Edge Intelligence, within the framework of the Internet of Things (IoT). Expanding the application of Edge computing is increasingly necessary. This can involve exploring automated, intelligent computational learning theorems, and ANN-oriented, trustworthy machine learning perspectives to enhance computational intelligence. The book functions as a valuable resource for professionals in the sector and also acts as a comprehensive learning tool for newcomers in the field of AI-enabled Edge Technologies and their applications, covering both fundamental and advanced concepts. This book uses data and network engineering and intelligent decision support system-by-design principles to design a reliable IoT edge-cloud ecosystem and to implement cyber-physical pervasive infrastructure solutions. The book will help readers understand the design architecture and AI algorithms and learn analytics through IoT edge, device-edge and the state-of-the-art in cloud-IoT countermeasures. The book is a valuable reference for anyone doing undergraduate or postgraduate studies, conducting research, or working in the computer science, information technology, electronics engineering, and complicated mathematical modeling domains.

IoT Edge Solutions for Cognitive Buildings (Internet of Things)

by Antonio Guerrieri Giandomenico Spezzano Franco Cicirelli Andrea Vinci

This book outlines the promise of the field of the Cognitive Internet of Things when it is applied to cognitive buildings. After an introduction, the authors discuss the goals of cognitive buildings such as operation in a more efficient, flexible, interactive, intuitive, and sustainable way. They go on to outline the benefits that these technologies promise to building owners, occupants, and their environments that range from reducing energy consumption and carbon footprint to promoting health, well-being, and productivity. The authors outline technologies that provide buildings and equipment with the ability to collect, aggregate, and analyze data and how this information can be collected by sensors and related to internal conditions and settings, energy consumption, user requests, and preferences to maintain comfort and save energy. This book is of interest to practitioners, researchers, students, and professors in IoT and smart cities.​

IoT Enabled Computer-Aided Systems for Smart Buildings (EAI/Springer Innovations in Communication and Computing)

by Maitreyee Dutta Gonçalo Marques Jagriti Saini

This book focuses on the integration of IoT and computer aided systems for the development of smart buildings. The scope of the book includes, but is not restricted to, advanced technologies for monitoring, energy management, smart gardening, protection, safety, assisted living, and intelligent operations. The authors cover the wide aspects of interconnected smart services with convenient interfacing to the end-users. The features of this book include discussion on various aspects of IoT and computer aided systems for smart architecture designs and innovative object interconnections. The book also provides highlights on the applications of IoT in the development of intelligent structures for technology-enabled lifestyles. Furthermore, it provides prominent scopes for future inventions in the field of electrical engineering, building system management, and computer-aided advancements. The content of this book is useful to graduate and post-graduate students, researchers, and professionals working on the concept of smart building, smart city, and smart environments.

IoT Projects with Arduino Nano 33 BLE Sense: Step-By-Step Projects for Beginners

by Agus Kurniawan

Get started with the extremely versatile and powerful Arduino Nano 33 BLE Sense, a smart device based on the nRF52840 from Nordic semiconductors. This book introduces you to developing with the device.You'll learn how to access Arduino I/O such as analog and digital I/O, serial communication, SPI and I2C. The book also covers how to access sensor devices on Arduino Nano 33 BLE Sense, how to interact with other external devices over BLE, and build embedded Artificial Intelligence applications.Arduino Nano 33 BLE Sense consists of multiple built-in sensors such as 9-axis inertial, humidity, temperature, barometric, microphone, gesture, proximity, light color and light intensity sensors. With this book, you'll see how this board supports the Bluetooth Low Energy (BLE) network, enabling interactions with other devices over the network.What You’ll LearnPrepare and set up Arduino Nano 33 BLE Sense boardOperate Arduino Nano 33 BLE Sense board hardware and softwareDevelop programs to access Arduino Nano 33 BLE Sense board I/OBuild IoT programs with Arduino Nano 33 BLE Sense boardWho This Book Is ForMakers, developers, students, and professionals at any level interested in developing with the Arduino Nano 33 BLE Sense board.

IoT Projects with NVIDIA Jetson Nano: AI-Enabled Internet of Things Projects for Beginners

by Agus Kurniawan

Explore the capabilities of the NVIDIA Jetson Nano, an IoT device designed to perform computations like a computer desktop. This book will show you how to build your first project and optimize your devices, programs, and daily activities with the AI computation abilities of the Jetson Nano. This board consists of CPU Quad-core ARM A57 @ 1.43 GHz and GPU 128-core Maxwell. With this hardware specification, the board can run multiple neural networks in parallel for complex AI applications. With the integrated sensor and actuators, this board enables stronger IoT solutions and provides more advanced capabilities.Discover how develop complex IoT projects with the Jetson Nano today.What You’ll LearnSet up NVIDIA Jetson Nano deviceBuild applications like image classification, object detection, segmentation, and speech processingUse the Jetson Nano to process daily computer activities such as browsing the internet, checking emails, or playing music and videosImplement machine learning computations into your projectsWho This Book Is ForMakers, developers, students, and professional of all levels who are new to the NVIDIA Jetson Nano technology.

IoT Security: Advances in Authentication

by Madhusanka Liyanage

An up-to-date guide to an overview of authentication in the Internet of Things (IoT) The Internet of things (IoT) is the network of the countless physical devices that have the possibility to connect and exchange data. Among the various security requirements, authentication to the IoT is the first step to prevent the impact of attackers. IoT Security offers an important guide into the development of the many authentication mechanisms that provide IoT authentication at various levels such as user level, device level and network level. The book covers a wide range of topics including an overview of IoT and addresses in detail the security challenges at every layer by considering both the technologies and the architecture used. The authors—noted experts on the topic—provide solutions for remediation of compromised security, as well as methods for risk mitigation, and offer suggestions for prevention and improvement. In addition, IoT Security offers a variety of illustrative use cases. This important book: Offers an authoritative reference designed for use by all IoT stakeholders Includes information for securing devices at the user, device, and network levels Contains a classification of existing vulnerabilities Written by an international group of experts on the topic Provides a guide to the most current information available on IoT security Written for network operators, cloud operators, IoT device manufacturers, IoT device users, wireless users, IoT standardization organizations, and security solution developers, IoT Security is an essential guide that contains information on security features, including underlying networks, architectures, and security requirements.

IoT Signal Detection

by Lin Bai Rui Han Jingjing Wang Jianwei Liu

Comprehensive reference covering signal detection for random access in IoT systems from the beginner to expert level With a carefully balanced blend of theoretical elements and applications, IoT Signal Detection is an easy-to-follow presentation on signal detection for IoT in terms of device activity detection, sparse signal detection, collided signal detection, round-trip delay estimation, and backscatter signal division, building progressively from basic concepts and important background material up to an advanced understanding of the subject. Various signal detection and estimation techniques are explained, e.g., variational inference algorithm and compressive sensing reconstruction algorithm, and a number of recent research outcomes are included to provide a review of the state of the art in the field. Written by four highly qualified academics, IoT Signal Detection discusses sample topics such as: ML, ZF, and MMSE detection, Markov chain Monte Carlo-based detection, variational inference-based detection, compressive sensing-based detection Sparse signal detection for multiple access, covering Bayesian compressive sensing algorithm and structured subspace pursuit algorithm Collided signal detection for multiple access using automatic modulation classification algorithm, round-trip delay estimation for collided signals Signal detection for backscatter signals, covering central limited theorem-based detection including detection algorithms, performance analysis, and simulation results Signal design for multi-cluster coordination, covering successive interference cancellation design, device grouping and power control, and constructive interference-aided multi-cluster coordination With seamless coverage of the subject presented in a linear and easy-to-understand way, IoT Signal Detection is an ideal reference for both graduate students and practicing engineers in wireless communications.

IoT System Testing: An IoT Journey from Devices to Analytics and the Edge

by Jon Duncan Hagar

To succeed, teams must assure the quality of IoT systems. The world of technology continually moves from one hot area to another; this book considers the next explosion—of IoT—from a quality testing viewpoint. You'll first gain an introduction to the Internet of Things (IoT), V&V, and testing. Next, you'll be walked through IoT test planning and strategy over the full life cycle, including the impact of data analytics and AI. You will then delve deeper into IoT security testing and various test techniques, patterns, and more. This is followed by a detailed study of IoT software test labs, architecture, environments and AI. There are many options for testing IoT qualities based on the criticality of the software and risks involved; each option has positives, negatives, as well as cost and schedule impacts. The book will guide start-up and experienced teams into these paths and help you to improve the testing and quality assessment of IoT systems. What You Will LearnUnderstand IoT software test architecture and planningMaster IoT security testing and test techniquesStudy IoT test lab automation and architecturesReview the need for IoT security, data analytics, AI, Neural Networks and dependability using testing and V&V Who This Book Is ForReaders with basic knowledge of software development who want to learn more about IoT testing and its intricacies, as well as companies moving into the domain of IoT, and even those already deep into the IoT domain will benefit from this book.

IoT and Analytics for Sensor Networks: Proceedings of ICWSNUCA 2021 (Lecture Notes in Networks and Systems #244)

by Sheng-Lung Peng Souvik Pal Padmalaya Nayak

This book includes high-quality research papers presented at the 1st International Conference on Wireless Sensor Networks, Ubiquitous Computing and Applications (ICWSNUCA, 2021), which is held at Gokaraju Rangaraju Institute of Engineering and Technology, Hyderabad, India, during 26–27 February, 2021. This volume focuses on the applications, use-cases, architectures, deployments, and recent advances of wireless sensor networks as well as ubiquious computing. Different research topics are illustrated in this book, like wireless sensor networks for the Internet of Things; IoT applications for eHealth; smart cities; architectures for WSNs and IoT, WSNs hardware and new devices; low-power wireless technologies; wireless ad hoc sensor networks; routing and data transfer in WSNs; multicast communication in WSNs; security management in WSNs and in IoT systems; and power consumption optimization in WSNs.

IoT and Cloud Computing for Societal Good (EAI/Springer Innovations in Communication and Computing)

by Jitendra Kumar Verma Deepak Saxena Vicente González–Prida Díaz

This book gathers the state-of-the-art for industrial application of scientific and practical research in the Cloud and IoT paradigms to benefit society. The book first aims to discuss and outline various aspects of tackling climate change. The authors then discuss how Cloud and IoT can help for digital health and learning from industrial aspects. The next part of book discusses technical improvements in the fields of security and privacy. The book also covers Smart Homes and IoT in agriculture. The book is targeted towards advancing undergraduate, graduate, and post graduate students, researchers, academicians, policymakers, various government officials, NGOs, and industry research professionals who are currently working in the field of science and technology either directly or indirectly to benefit common masses.

Refine Search

Showing 7,826 through 7,850 of 18,699 results