This book examines the relationship between mathematics and data in the modern world. Indeed, modern societies are awash with data which must be manipulated in many different ways: encrypted, compressed, shared between users in a prescribed manner, protected from an unauthorised access and transmitted over unreliable channels. All of these operations can be understood only by a person with know…
This is the first book to focus on the topological index, the Harary index, of a graph, including its mathematical properties, chemical applications and some related and attractive open problems. This book is dedicated to Professor Frank Harary (1921—2005), the grandmaster of graph theory and its applications. It has be written by experts in the field of graph theory and its applications. For…
This volume contains 73 papers presented at ICMEET 2015: International Conference on Microelectronics, Electromagnetics and Telecommunications. The conference was held during 18 – 19 December, 2015 at Department of Electronics and Communication Engineering, GITAM Institute of Technology, GITAM University, Visakhapatnam, INDIA. This volume contains papers mainly focused on Antennas, Electromag…
This textbook is an introduction to wavelet transforms and accessible to a larger audience with diverse backgrounds and interests in mathematics, science, and engineering. Emphasis is placed on the logical development of fundamental ideas and systematic treatment of wavelet analysis and its applications to a wide variety of problems as encountered in various interdisciplinary areas. Topics and …
This book constitutes the thoroughly refereed conference proceedings of the 9th International Workshop on Algorithms and Computation, WALCOM 2015, held in Dhaka, Bangladesh, in February 2015. The 26 revised full papers presented together with 3 invited talks were carefully reviewed and selected from 85 submissions. The papers are organized in topical sections on approximation algorithms, data s…
This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threa…
This book discusses the characteristics of virtualized cloud networking, identifies the requirements of cloud network management, and illustrates the challenges in deploying virtual clusters in multi-tenant cloud data centers. The book also introduces network partitioning techniques to provide contention-free allocation, topology-invariant reallocation, and highly efficient resource utilization…
Virtual reality (VR) is a multidisciplinary area of research aimed at interactive human–computer-mediated simulations of artificial environments. An important aspect of VR-based systems is the stimulation of the human senses – usually sight, sound, and touch – in such a way that a user feels a sense of presence in the virtual environment. Sometimes it is important to combine real and virt…
This book takes a quantitative look at ICT-generated event data to highlight current trends and issues in Nigeria at the local, state and national levels. Without emphasizing a specific policy or agenda, it provides context and perspective on the relative spatial-temporal distribution of conflict factors in Nigeria. The analysis of violence at state and local levels reveals a fractal pattern of…
This book presents vehicular ad-hoc networks (VANETs) from the their onset, gradually going into technical details, providing a clear understanding of both theoretical foundations and more practical investigation. The editors gathered top-ranking authors to provide comprehensiveness and timely content; the invited authors were carefully selected from a list of who’s who in the respective fiel…