Card List Article
This handbook provides a comprehensive technical guide covering fundamentals, recent advances and open issues in communications and networks. Communic..
This handbook provides a comprehensive technical guide covering fundamentals, recent advances and open issues in communications and networks. Communic..
A distributed sensor network (DSN) of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, s..
This book discusses the principles of information security. Information security is the practice of defending information from unauthorized access, us..
This book discusses about the fundamental concept of computational intelligence and soft computing. Computational intelligence (CI) is a set of nature..
In this book, we discuss the computer simulation techniques in process improvement and management. A computer simulation is a simulation, run on a sin..
This book presents the study of the hardware and software that are the foundations of modern computer systems. Computer programming is a process that ..
In this book, we present the issues regarding cyber-crime and law. Computer crime refers to any crime that involves a computer and a network. The comp..
This book discusses the fundamentals that relates to cybercrime. It explores all aspects of computer-based crime and threats, offering solutions and b..
In this book, we discuss the basic concept of optical computing. Optical or photonic computing uses photons produced by lasers or diodes for computati..
This book presents a very broad view of quantum computing and information processing in general. A quantum computer is a computation system that makes..
This book discusses the essential concept of quantum cryptography. Quantum cryptography describes the use of quantum mechanical effects (in particular..