Horizons in Computer Science Research. Volume 23

$250.00

Thomas S. Clary (Editor)

Series: Horizons in Computer Science
BISAC: COM014000

This volume contains ten chapters which present recent and future research concepts in computer science research. Chapter One presents new theorems for analysing digital logic gates. The second chapter reviews current work to postulate the future of intrusion detection systems in cloud computing. Chapter Three analyzes the storage structure and management of distributed ledger tecnohlogies in blockchain systems. Chapter Four reviews an experiment testing the bouncing phenomenon of sand particles on a membrane and how their random walk forms Chladni patterns. The fifth chapter discusses a robust model for the foraging of microorganisms by random walk patterns. Chapter Six presents research into the use of printed circuit board from a recycling based point of view. The seventh chapter is an introduction to sparse distributed representations in text data curation in the context of natural language processing (NLP). The eighth chapter reviews a wide ranging survey of research into intrusion detection systems in the Internet of Things (IoT) model of the world. Chapter Nine provides a far reaching review of modern issues in digital forensic processes in the environment of cloud computing. The tenth and final chapter uses a schema of hegemonic praxis to analyze issues of cyber warfare in the modern world.

Table of Contents

Preface

Chapter 1. New Theorems for Analyzing Digital Logic Gates
J.O. Nehinbe, PhD
ICT Security Solutions, W/Africa, Lagos, Nigeria

Chapter 2. The Future of Intrusion Detection Systems in Cloud Computing
Sunil Gautam¹ and Azriel Henry²
¹Department of Computer Science and Engineering, Institute of Technology, Nirma University Ahmedabad, Gujarat, India
²Department of Computer Science and Engineering, Institute of Advanced Research, Gandhinagar, Gujarat, India

Chapter 3. Storage Structure and Management of Distributed Ledger Technologies (DLTs) in Blockchain Systems
Tzu-Lun Huang¹, PhD and Jason Huang²
¹Department of Computer Science and Information Engineering, St. John’s University, Taiwan
²Advanced Financial Engineering LLC, CA, USA

Chapter 4. Random Walk of Particles during the Formation of Chladni Patterns
Igor Grabec
Slovenian Academy of Sciences and Arts, Faculty of Computer and Informaticas, University of Ljubljana

Chapter 5. Foraging Performed by the Random Walk
Igor Grabec, Ada Elizabeta Sok
Slovenian Academy of Sciences and Arts, Faculty of Medicine, University of Ljubljana

Chapter 6. Printed Circuit Boards from a Recycling Point of View
M. Kaya, PhD
Mining Engineering Department, Eskisehir Osmangazi University, Eskisehir, Turkey

Chapter 7. Text Data Curation via Sparse Distributed Representations
Martin Marinov, PhD
Department of Automation Information and Control Systems, Technical University of Sofia, Sofia, Bulgaria

Chapter 8. Intrusion Detection Systems for Advanced Ecosystem Based on IoT
Sunil Gautam¹, Ketaki Pattani² and Kaushal Singh²
¹Department of Computer Science and Engineering, Institute of Technology, Nirma University Ahmedabad, Gujarat, India
²Department of Physical Sciences and Engineering, Institute of Advanced Research (IAR), Gandhinagar, Gujarat, India

Chapter 9. Digital Forensics Process in the Cloud Computing Environment – Parameters, Issues, Models, and Implementations
Dr. Sulabha Vilas Patil
Sant Gadge Baba Amravati University, Amravati, Maharashtra, India

Chapter 10. The Praxis of the Hegemony in Cyber Warfare
Joshua Ojo Nehinbe
ICT Security Solutions, West Africa

Index