This book comprises select proceedings of the annual convention of the Computer Society of India. Divided into 10 topical volumes, the proceedings present papers on state-of-the-art research, surveys, and succinct reviews. The volume covers diverse topics ranging from information security to cryptography and from encryption to intrusion detection. This book focuses on Cyber Security. It aims at informing the readers about the technology in general and the internet in particular. The book uncovers the various nuances of information security, cyber security and its various dimensions. This book also covers latest security trends, ways to combat cyber threats including the detection and mitigation of security threats and risks. The contents of this book will prove useful to professionals and researchers alike.
This book includes high-quality, peer-reviewed research papers from the 6thInternational Conference on Innovations in Computer Science & Engineering (ICICSE 2018), held at Guru Nanak Institutions, Hyderabad, India from August 17 to 18, 2018. The book discusses a wide variety of industrial, engineering and scientific applications of the emerging techniques and offers a platform for researchers from academia and industry to present their original work and exchange ideas, information, techniques and applications in the field of computer science.
This book provides an overview to researchers, graduate, and undergraduate students, as well as academicians who are interested in arsenic. It covers human health risks and established cases of human ailments and sheds light on prospective control measures, both biological and physico-chemical. Arsenic (As) is a widely distributed element in the environment having no known useful physiological function in plants or animals. Historically, this metalloid has been known to be used widely as a poison. Effects of arsenic have come to light in the past few decades due to its increasing contamination in several parts of world, with the worst situation being in Bangladesh and West Bengal, India. The...
Phytoremediation is an emerging technology that employs higher plants for the clean-up of contaminated environments. Basic and applied research have unequivocally demonstrated that selected plant species possess the genetic potential to accumulate, degrade, metabolize and immobilize a wide range of contaminants. The main focus of this volume is on the recent advances of technologies using green plants for remediation of various metals and metalloids. Topics include biomonitoring of heavy metal pollution, amendments of higher uptake of toxic metals, transport of heavy metals in plants, and toxicity mechanisms. Further chapters discuss agro-technological methods for minimizing pollution while improving soil quality, transgenic approaches to heavy metal remediation and present protocols for metal remediation via in vitro root cultures.
This book is a collection of selected peer-reviewed papers presented at the International Conference on Signal Processing and Communication (ICSC 2018). It covers current research and developments in the fields of communications, signal processing, VLSI circuits and systems, and embedded systems. The book offers in-depth discussions and analyses of latest problems across different sub-fields of signal processing and communications. The contents of this book will prove to be useful for students, researchers, and professionals working in electronics and electrical engineering, as well as other allied fields.
In the era of social connectedness, people are becoming increasingly enthusiastic about interacting, sharing, and collaborating through online collaborative media. However, conducting sentiment analysis on these platforms can be challenging, especially for business professionals who are using them to collect vital data. Sentiment Analysis and Knowledge Discovery in Contemporary Business is an essential reference source that discusses applications of sentiment analysis as well as data mining, machine learning algorithms, and big data streams in business environments. Featuring research on topics such as knowledge retrieval and knowledge updating, this book is ideally designed for business managers, academicians, business professionals, researchers, graduate-level students, and technology developers seeking current research on data collection and management to drive profit.
This book includes high-quality, peer-reviewed papers from the International Conference on Recent Advancement in Computer, Communication and Computational Sciences (RACCCS-2017), held at Aryabhatta College of Engineering & Research Center, Ajmer, India on September 2–3, 2017, presenting the latest developments and technical solutions in computational sciences. Data science, data- and knowledge engineering require networking and communication as a backbone and have a wide scope of implementation in engineering sciences. Keeping this ideology in mind, the book offers insights that reflect the advances in these fields from upcoming researchers and leading academicians across the globe. Covering a variety of topics, such as intelligent hardware and software design, advanced communications, intelligent computing technologies, advanced software engineering, the web and informatics, and intelligent image processing, it helps those in the computer industry and academia use the advances of next-generation communication and computational technology to shape real-world applications.
After two decades of research and development, elliptic curve cryptography now has widespread exposure and acceptance. Industry, banking, and government standards are in place to facilitate extensive deployment of this efficient public-key mechanism. Anchored by a comprehensive treatment of the practical aspects of elliptic curve cryptography (ECC), this guide explains the basic mathematics, describes state-of-the-art implementation methods, and presents standardized protocols for public-key encryption, digital signatures, and key establishment. In addition, the book addresses some issues that arise in software and hardware implementation, as well as side-channel attacks and countermeasures....