- Table View
- List View
Information Centric Networks: Architecture & Current Trends (Practical Networking)
by Nitul Dutta Hiren Kumar Sarma Rajendrasinh Jadeja Krishna Delvadia Gheorghita GhineaThis book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking paradigm. The book starts with an introduction to the new promising concept of ICN and its origin along with the reason behind this interesting innovation. Different architectures proposed so far in support of implementing the ICN is also discussed in details. Few of the challenges of ICN implementation are enlisted as caching, naming, routing, and security. Each of these challenges with recent development is covered in individual chapters. Moreover, integration of current trends in communication and computing like software defined networking and machine learning approach are another area that this book is focusing. All these chapters highlight the recent developments reported in the area and also discusses the future trends. The book provides an overview of the recent developments in future internet technologies, bringing together the advancements that have been made in ICN. The book includes three unique chapters in the field of ICN research. The first, is the SDN framework for implementing ICN by decoupling data and control plan. The machine learning models for predicting future trends in network traffic and other management activities is another important chapter. This chapter includes the possibilities of using machine learning models for trend prediction to help network administrators and service providers to take care of unexpected sudden change traffic pattern and user behaviour. The third most vital chapter is the security issues in ICN. This chapter includes various facts that influences the security of ICN. Issues involved in naming, caching and routing are discussed separately along with few recent works in these areas. Various types of attacks in ICN are also part of the discussion. The stated book would be useful for researchers in this area and will work as a reference for future work. Moreover, the content of the book would also be suitable as a supporting material for undergraduate and graduate level courses in computer science and electrical engineering.
Information from Processes
by Robert M. LoseeInformation is an important concept that is studied extensively across a range of disciplines, from the physical sciences to genetics to psychology to epistemology. Information continues to increase in importance, and the present age has been referred to as the "Information Age." One may understand information in a variety of ways. For some, information is found in facts that were previously unknown. For others, a fact must have some economic value to be considered information. Other people emphasize the movement through a communication channel from one location to another when describing information. In all of these instances, information is the set of characteristics of the output of a process. Yet Information has seldom been studied in a consistent way across different disciplines. Information from Processes provides a discipline-independent and precise presentation of both information and computing processes. Information concepts and phenomena are examined in an effort to understand them, given a hierarchy of information processes, where one process uses others. Research about processes and computing is applied to answer the question of what information can and cannot be produced, and to determine the nature of this information (theoretical information science). The book also presents some of the basic processes that are used in specific domains (applied information science), such as those that generate information in areas like reasoning, the evolution of informative systems, cryptography, knowledge, natural language, and the economic value of information. Written for researchers and graduate students in information science and related fields, Information from Processes details a unique information model independent from other concepts in computer or archival science, which is thus applicable to a wide range of domains. Combining theoretical and empirical methods as well as psychological, mathematical, philosophical, and economic techniques, Losee's book delivers a solid basis and starting point for future discussions and research about the creation and use of information.
Information Hiding in Communication Networks
by Krzysztof Szczypiorski Sebastian Zander Amir Houmansadr Steffen Wendzel Wojciech MazurczykDescribes Information Hiding in communication networks, and highlights their important issues, challenges, trends, and applications. Highlights development trends and potential future directions of Information Hiding Introduces a new classification and taxonomy for modern data hiding techniques Presents different types of network steganography mechanisms Introduces several example applications of information hiding in communication networks including some recent covert communication techniques in popular Internet services
Information is Energy: Definition of a physically based concept of information
by Lienhard PagelAn objective, dynamic and physically justified concept of information is elaborated starting from Shannon's concept of entropy and applied to information technology, artificial intelligence (consciousness) and thermodynamics. The justification of an information conservation theorem acquires practical significance in information technology, especially as it moves into the quantum realm (photonics/quantum computing). The unconditional dynamics of information and its objectivity are critically examined and are the foundations of the considerations. We live in the information age, but the concept of information is still not defined objectively and physically. This book defines a dynamic concept of information that results in a conservation of information principle. Just as the principle of conservation of energy is essential to understanding energy, the principle of conservation of information leads to a deeper understanding of information. Information is strongly related to entropy, always in motion, cannot disappear, and is independent of subjects.
Information ist Energie: Definition und Anwendung eines physikalisch begründeten Informationsbegriffs
by Lienhard PagelEin objektiver, dynamischer und physikalisch begründeter Informationsbegriff wird ausgehend vom Shannonschen Entropiebegriff erarbeitet und auf die Informationstechnik, die künstliche Intelligenz (Bewusstsein) und die Thermodynamik angewandt. Die Begründung eines Informationserhaltungssatzes erhält praktische Bedeutung in der Informationstechnik, insbesondere wenn sie in den Bereich der Quanten (Photonik/Quantencomputing) vordringt. Die unbedingte Dynamik von Information und deren Objektivität werden kritisch untersucht und sind die Grundlagen der Betrachtungen.
Information, Photonics and Communication: Proceedings of Second National Conference, IPC 2019 (Lecture Notes in Networks and Systems #79)
by Jyotsna Kumar Mandal Kallol Bhattacharya Ivy Majumdar Surajit MandalThe book includes high-quality papers presented at the Second National Conference of Information, Photonics and Communication (2019), organized by the Department of Electronics & Communication Engineering, B.P. Poddar Institute of Management & Technology from 01 to 03 February 2019. Covering multiple domains in four broad categories—photonics; devices and VLSI; communication systems and networks; signal processing and intelligent systems, it includes topics such as RF and microwave communications, wireless and mobile communication, satellite communications, signal, image and video processing, deep learning and optical networks.
Information Politics, Protests, and Human Rights in the Digital Age
by Mahmood MonshipouriWe live in a highly complex and evolving world that requires a fuller and deeper understanding of how modern technological tools, ideas, practices, and institutions interact, and how different societies adjust themselves to emerging realities of the digital age. This book conveys such issues with a fresh perspective and in a systematic and coherent way. While many studies have explained in depth the change in the aftermath of the unrests and uprisings throughout the world, they rarely mentioned the need for constructing new human rights norms and standards. This edited collection provides a balanced conceptual framework to demonstrate not only the power of autonomous communication networks but also their limits and the increasing setbacks they encounter in different contexts.
Information Science and Applications: Proceedings of ICISA 2020 (Lecture Notes in Electrical Engineering #739)
by Hyuncheol Kim Kuinam J. Kim Suhyun ParkThis book presents select proceedings of 11th International Conference on Information Science and Applications 2020 (ICISA 2020) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. Also the proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this book, readers can gain an understanding of the current state-of-the-art information strategies and technologies of convergence security.
Information Science and Applications: ICISA 2019 (Lecture Notes in Electrical Engineering #621)
by Kuinam J. Kim Hye-Young KimThis book presents selected papers from the 10th International Conference on Information Science and Applications (ICISA 2019), held on December 16–18, 2019, in Seoul, Korea, and provides a snapshot of the latest issues regarding technical convergence and convergences of security technologies. It explores how information science is at the core of most current research as well as industrial and commercial activities. The respective chapters cover a broad range of topics, including ubiquitous computing, networks and information systems, multimedia and visualization, middleware and operating systems, security and privacy, data mining and artificial intelligence, software engineering and web technology, as well as applications and problems related to technology convergence, which are reviewed and illustrated with the aid of case studies. Researchers in academia, industry, and at institutes focusing on information science and technology will gain a deeper understanding of the current state of the art in information strategies and technologies for convergence security.
Information Science and Applications 2018: ICISA 2018 (Lecture Notes in Electrical Engineering #514)
by Kuinam J. Kim Nakhoon BaekThis book contains selected papers from the 9th International Conference on Information Science and Applications (ICISA 2018) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security. The intended readership includes researchers in academia, industry and other research institutes focusing on information science and technology.
Information Security and Cryptology
by Dongdai Lin Xiaofeng Wang Moti YungThis book constitutes the thoroughly refereed post-conference proceedings of the 11th International Conference on Information Security and Cryptology, Inscrypt 2015, held in Beijing, China in November 2015. The 27 revised full papers presented were carefully reviewed and selected from 79 submissions. The papers are organized in topical sections on hash function; signature schemes; symmetric ciphers; elliptic curve and cryptographic fundamentals; Web and applications security; cloud security; key management and public key encryption; zero knowledge and secure computations; software and mobile security.
Information Security and Cryptology -- ICISC 2013
by Hyang-Sook Lee Dong-Guk HanThis book constitutes the thoroughly refereed post-conference proceedings of the 16th International Conference on Information Security and Cryptology, ICISC 2013, held in Seoul, Korea in November 2013. The 31 revised full papers presented together with 2 invited talks were carefully selected from 126 submissions during two rounds of reviewing. The papers provide the latest results in research, development and applications in the field of information security and cryptology. They are organized in topical sections on secure multiparty computation, proxy re-encryption, side channel analysis and its countermeasures, cryptanalysis, embedded system security and its implementation, primitives for cryptography, digital signature, security protocol, cyber security, and public key cryptography.
Information Security and Cryptology - ICISC 2015
by Soonhak Kwon Aaram YunThis book constitutes the thoroughly refereedpost-conference proceedings of the 18th International Conference on InformationSecurity and Cryptology, ICISC 2015, held in Seoul, South Korea, in November2015. The 23 revised full papers presented were carefullyselected from 84 submissions during two rounds of reviewing and improvement. The papers provide the latest results in research, development and applicationsin the field of information security and cryptology. They are grouped aroundthe following topics: digital signatures; public-key cryptography; block ciphercryptanalysis; elliptic curve cryptography; protocols; security; side-channelattacks.
Information Security Essentials: A Guide for Reporters, Editors, and Newsroom Leaders
by Susan E. McGregorAs technological and legal changes have hollowed out the protections that reporters and news organizations have depended upon for decades, information security concerns facing journalists as they report, produce, and disseminate the news have only intensified. From source prosecutions to physical attacks and online harassment, the last two decades have seen a dramatic increase in the risks faced by journalists at all levels even as the media industry confronts drastic cutbacks in budgets and staff. As a result, few professional or aspiring journalists have a comprehensive understanding of what is required to keep their sources, stories, colleagues, and reputations safe.This book is an essential guide to protecting news writers, sources, and organizations in the digital era. Susan E. McGregor provides a systematic understanding of the key technical, legal, and conceptual issues that anyone teaching, studying, or practicing journalism should know. Bringing together expert insights from both leading academics and security professionals who work at and with news organizations from BuzzFeed to the Associated Press, she lays out key principles and approaches for building information security into journalistic practice. McGregor draws on firsthand experience as a Wall Street Journal staffer, followed by a decade of researching, testing, and developing information security tools and practices. Filled with practical but evergreen advice that can enhance the security and efficacy of everything from daily beat reporting to long-term investigative projects, Information Security Essentials is a vital tool for journalists at all levels.
Information Security for Automatic Speaker Identification
by Fathi E. El-SamieThe author covers the fundamentals of both information and communication security including current developments in some of the most critical areas of automatic speech recognition. Included are topics on speech watermarking, speech encryption, steganography, multilevel security systems comprising speaker identification, real transmission of watermarked or encrypted speech signals, and more. The book is especially useful for information security specialist, government security analysts, speech development professionals, and for individuals involved in the study and research of speech recognition at advanced levels.
Information Seeking and Communicating Behavior of Scientists and Engineers
by Cynthia SteinkeThis inspiring book addresses a topic that is far too often ignored or disregarded by sci-tech librarians: Exactly how do scientists and engineers really discover, select, and use the countless information and communications resources available to them when conducting research? The answer to this question should be a major influence on the way information specialists develop information systems in their libraries. Unfortunately, many librarians are not as familiar with the work, information needs, and communicating behavior of the research worker. Information Seeking and Communications Behavior of Scientists and Engineers looks at this question from several perspectives to give an overall view of how to best serve the needs of the scientific community.This book is an encouragement and a challenge to sci-tech librarians to make an ever greater effort to understand the work of their users, the differing information channels and sources they employ, and thus tailor the library’s systems and services to best support their information-seeking behavior.
The Information Society: Economic, Social, and Structural Issues (Routledge Communication Series)
by Jerry L. SalvaggioFirst Published in 1989. Routledge is an imprint of Taylor & Francis, an informa company.
Information Support and Aircraft Flight Management (Springer Aerospace Technology)
by Oleg Ivanovich Zavalishin Anatoly Nikolaevich Korotonoshko Dmitry Alexandrovich Zatuchny Yury Grigorievich ShatrakovThis book presents materials on the implementation of modern technologies for aircraft information support and ground-based radio equipment for flights in the Russian Federation, especially in the Arctic and far Eastern regions, as well as new methods for monitoring the flight of civil aviation aircraft based on the use of local control and correction stations and optical systems that fully meet the requirements of international and domestic organizations for the reliability and integrity of transmitted information. The book is intended for engineering and technical specialists involved in the development, manufacturing and operation of aircraft avionics and ground-based radio electronic flight support systems, as well as graduate students and senior students of radio engineering specialties. It is useful to researchers and professionals whose activities are related to air traffic control.
Information System Design: Proceedings of Eighth International Conference on Information System Design and Intelligent Applications (ISDIA 2024), Volume 4 (Lecture Notes in Networks and Systems #1107)
by Vikrant Bhateja Jinshan Tang Zdzislaw Polkowski Milan Simic V. V. S. S. S. ChakravarthyThis book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3 - 4 January 2024. It covers a wide range of topics in computer science and information technology, including data mining and data warehousing, high-performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, and information security.
Information System Design: Proceedings of Eighth International Conference on Information System Design and Intelligent Applications (ISDIA 2024), Volume 2 (Lecture Notes in Networks and Systems #1057)
by Vikrant Bhateja Jinshan Tang Dilip Kumar Sharma Zdzislaw Polkowski Afaq AhmadThis book presents a collection of high-quality, peer-reviewed research papers from the 8th International Conference on Information System Design and Intelligent Applications (ISDIA 2024), held in Dubai, UAE, from 3 - 4 January 2024. It covers a wide range of topics in computer science and information technology, including data mining and data warehousing, high-performance computing, parallel and distributed computing, computational intelligence, soft computing, big data, cloud computing, grid computing, cognitive computing, and information security.
Information Systems: A Manager's Guide to Harnessing Technology Version 8.0
by John GallaugherKey Features: *Unique approach to information systems by leading with strategic thinking before diving into technical topics *Current and engaging case studies that challenge students to apply what they’ve learned *Coverage of not only strategy and technology basics, but also of critical concepts including data analytics, security, social media, the sharing economy, disruptive innovation, network effects and more *In-depth profiles on widely known firms such as Facebook, Amazon, Google, Netflix, Rent the Runway, and Zara.
Information Systems Architecture and Technology: Part I (Advances in Intelligent Systems and Computing #1050)
by Leszek Borzemski Jerzy Świątek Zofia WilimowskaThis three-volume book highlights significant advances in the development of new information systems technologies and architectures. Further, it helps readers solve specific research and analytical problems and glean useful knowledge and business value from data. Each chapter provides an analysis of a specific technical problem, followed by a numerical analysis, simulation, and implementation of the solution to the real-world problem. Managing an organization, especially in today’s rapidly changing environment, is a highly complex process. Increased competition in the marketplace, especially as a result of the massive and successful entry of foreign businesses into domestic markets, changes in consumer behaviour, and broader access to new technologies and information, calls for organisational restructuring and the introduction and modification of management methods using the latest scientific advances. This situation has prompted various decision-making bodies to introduce computer modelling of organization management systems. This book presents the peer-reviewed proceedings of the 40th Anniversary International Conference “Information Systems Architecture and Technology” (ISAT), held on September 15–17, 2019, in Wrocław, Poland. The conference was organised by the Computer Science Department, Faculty of Computer Science and Management, Wroclaw University of Sciences and Technology, and University of Applied Sciences in Nysa, Poland. The papers have been grouped into three major sections: Part I—discusses topics including, but not limited to, artificial intelligence methods, knowledge discovery and data mining, big data, knowledge-based management, Internet of Things, cloud computing and high-performance computing, distributed computer systems, content delivery networks, and service-oriented computing. Part II—addresses various topics, such as system modelling for control, recognition and decision support, mathematical modelling in computer system design, service-oriented systems, and cloud computing, and complex process modelling. Part III—focuses on a number of themes, like knowledge-based management, modelling of financial and investment decisions, modelling of managerial decisions, production systems management, and maintenance, risk management, small business management, and theories and models of innovation.
Information Systems Architecture and Technology: Part III (Advances in Intelligent Systems and Computing #1052)
by Zofia Wilimowska Leszek Borzemski Jerzy ŚwiątekThis three-volume book highlights significant advances in the development of new information systems technologies and architectures. Further, it helps readers solve specific research and analytical problems and glean useful knowledge and business value from data. Each chapter provides an analysis of a specific technical problem, followed by a numerical analysis, simulation, and implementation of the solution to the real-world problem.Managing an organization, especially in today’s rapidly changing environment, is a highly complex process. Increased competition in the marketplace, especially as a result of the massive and successful entry of foreign businesses into domestic markets, changes in consumer behaviour, and broader access to new technologies and information, calls for organisational restructuring and the introduction and modification of management methods using the latest scientific advances. This situation has prompted various decision-making bodies to introduce computer modelling of organization management systems.This book presents the peer-reviewed proceedings of the 40th Anniversary International Conference “Information Systems Architecture and Technology” (ISAT), held on September 15–17, 2019, in Wrocław, Poland. The conference was organised by the Computer Science Department, Faculty of Computer Science and Management, Wroclaw University of Sciences and Technology, and University of Applied Sciences in Nysa, Poland. The papers have been grouped into three major sections:Part I—discusses topics including, but not limited to, artificial intelligence methods, knowledge discovery and data mining, big data, knowledge-based management, Internet of Things, cloud computing and high-performance computing, distributed computer systems, content delivery networks, and service-oriented computing.Part II—addresses various topics, such as system modelling for control, recognition and decision support, mathematical modelling in computer system design, service-oriented systems, and cloud computing, and complex process modelling.Part III—focuses on a number of themes, like knowledge-based management, modelling of financial and investment decisions, modelling of managerial decisions, production systems management, and maintenance, risk management, small business management, and theories and models of innovation.
Information Systems Architecture and Technology: Part II (Advances in Intelligent Systems and Computing #1051)
by Jerzy Świątek Leszek Borzemski Zofia WilimowskaThis three-volume book highlights significant advances in the development of new information systems technologies and architectures. Further, it helps readers solve specific research and analytical problems and glean useful knowledge and business value from data. Each chapter provides an analysis of a specific technical problem, followed by a numerical analysis, simulation, and implementation of the solution to the real-world problem.Managing an organization, especially in today’s rapidly changing environment, is a highly complex process. Increased competition in the marketplace, especially as a result of the massive and successful entry of foreign businesses into domestic markets, changes in consumer behaviour, and broader access to new technologies and information, calls for organisational restructuring and the introduction and modification of management methods using the latest scientific advances. This situation has prompted various decision-making bodies to introduce computer modelling of organization management systems.This book presents the peer-reviewed proceedings of the 40th Anniversary International Conference “Information Systems Architecture and Technology” (ISAT), held on September 15–17, 2019, in Wrocław, Poland. The conference was organised by the Computer Science Department, Faculty of Computer Science and Management, Wroclaw University of Sciences and Technology, and University of Applied Sciences in Nysa, Poland. The papers have been grouped into three major sections:Part I—discusses topics including, but not limited to, artificial intelligence methods, knowledge discovery and data mining, big data, knowledge-based management, Internet of Things, cloud computing and high-performance computing, distributed computer systems, content delivery networks, and service-oriented computing.Part II—addresses various topics, such as system modelling for control, recognition and decision support, mathematical modelling in computer system design, service-oriented systems, and cloud computing, and complex process modelling.Part III—focuses on a number of themes, like knowledge-based management, modelling of financial and investment decisions, modelling of managerial decisions, production systems management, and maintenance, risk management, small business management, and theories and models of innovation.
Information Systems Security and Privacy
by Olivier Camp Steven Furnell Paolo MoriSlamming the door on security threats just got easier for IT professionals. This resource on security design and operations puts tools and techniques at their command, providing the expertise on things from access control to privacy enhancement.