![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.
This book provides an introduction to software-defined radio and cognitive radio, along with methodologies for applying knowledge representation, semantic web, logic reasoning and artificial intelligence to cognitive radio, enabling autonomous adaptation and flexible signaling. Readers from the wireless communications and software-defined radio communities will use this book as a reference to extend software-defined radio to cognitive radio, using the semantic technology described.
By studying applications in radar, telecommunications and digital image restoration, this monograph discusses signal processing techniques based on bispectral methods. Improved robustness against different forms of noise as well as preservation of phase information render this method a valuable alternative to common power-spectrum analysis used in radar object recognition, digital wireless communications, and jitter removal in images.
This book discusses the use of the spectrum sharing techniques in cognitive radio technology, in order to address the problem of spectrum scarcity for future wireless communications. The authors describe a cognitive radio medium access control (MAC) protocol, with which throughput maximization has been achieved. The discussion also includes use of this MAC protocol for imperfect sensing scenarios and its effect on the performance of cognitive radio systems. The authors also discuss how energy efficiency has been maximized in this system, by applying a simple algorithm for optimizing the transmit power of the cognitive user. The study about the channel fading in the cognitive user and licensed user and power adaption policy in this scenario under peak transmit power and interference power constraint is also present in this book.
This book features selected contributions in the areas of modeling, simulation, and optimization. The contributors discusses requirements in problem solving for modeling, simulation, and optimization. Modeling, simulation, and optimization have increased in demand in exponential ways and how potential solutions might be reached. They describe how new technologies in computing and engineering have reduced the dimension of data coverage worldwide, and how recent inventions in information and communication technology (ICT) have inched towards reducing the gaps and coverage of domains globally. The chapters cover how the digging of information in a large data and soft-computing techniques have contributed to a strength in prediction and analysis, for decision making in computer science, technology, management, social computing, green computing, and telecom. The book provides an insightful reference to the researchers in the fields of engineering and computer science. Researchers, academics, and professionals will benefit from this volume. Features selected expanded papers in modeling, simulation, and optimization from COMPSE 2016; Includes research into soft computing and its application in engineering and technology; Presents contributions from global experts in academia and industry in modeling, simulation, and optimization.
This book presents the state of the art technologies and solutions to tackle the critical challenges faced by the building and development of the WSN and ecological monitoring system but also potential impact on society at social, medical and technological level. This book is dedicated to Sensing systems for Sensors, Wireless Sensor Networks and Ecological Monitoring. The book aims at Master and PhD degree students, researchers, practitioners, especially WSN engineers involved with ecological monitoring. The book will provide an opportunity of a dedicated and a deep approach in order to improve their knowledge in this specific field.
This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners.
This book covers key topics in the field of intelligent ambient adaptive systems. It focuses on the results worked out within the framework of the ATRACO (Adaptive and TRusted Ambient eCOlogies) project. The theoretical background, the developed prototypes, and the evaluated results form a fertile ground useful for the broad intelligent environments scientific community as well as for industrial interest groups. The new edition provides: Chapter authors comment on their work on ATRACO with final remarks as viewed in retrospective Each chapter has been updated with follow-up work emerging from ATRACO An extensive introduction to state-of-the-art statistical dialog management for intelligent environments Approaches are introduced on how Trust is reflected during the dialog with the system
In-Vehicle Corpus and Signal Processing for Driver Behavior is comprised of expanded papers from the third biennial DSPinCARS held in Istanbul in June 2007. The goal is to bring together scholars working on the latest techniques, standards, and emerging deployment on this central field of living at the age of wireless communications, smart vehicles, and human-machine-assisted safer and comfortable driving. Topics covered in this book include: improved vehicle safety; safe driver assistance systems; smart vehicles; wireless LAN-based vehicular location information processing; EEG emotion recognition systems; and new methods for predicting driving actions using driving signals. In-Vehicle Corpus and Signal Processing for Driver Behavior is appropriate for researchers, engineers, and professionals working in signal processing technologies, next generation vehicle design, and networks for mobile platforms.
Wireless Vehicular Networks for Car Collision Avoidance focuses on the development of the ITS (Intelligent Transportation Systems) in order to minimize vehicular accidents. The book presents and analyses a range of concrete accident scenarios while examining the causes of vehicular collision and proposing countermeasures based on wireless vehicular networks.The book also describes the vehicular network standards and quality of service mechanisms focusing on improving critical dissemination of safety information. With recommendations on techniques and protocols to consider when improving road safety policies in order to minimize crashes and collision risks.
Cognitive radios (CR) technology is capable of sensing its surrounding environment and adapting its internal states by making corresponding changes in certain operating parameters. CR is envisaged to solve the problems of the limited available spectrum and the inefficiency in the spectrum usage. CR has been considered in mobile ad hoc networks (MANETs), which enable wireless devices to dynamically establish networks without necessarily using a fixed infrastructure. The changing spectrum environment and the importance of protecting the transmission of the licensed users of the spectrum mainly differentiate classical MANETs from CR-MANETs. The cognitive capability and re-configurability of CR-MANETs have opened up several areas of research which have been explored extensively and continue to attract research and development. The book will describe CR-MANETs concepts, intrinsic properties and research challenges of CR-MANETs. Distributed spectrum management functionalities, such as spectrum sensing and sharing, will be presented. The design, optimization and performance evaluation of security issues and upper layers in CR-MANETs, such as transport and application layers, will be investigated.
Authors are well known and highly recognized by the "acoustic echo
and noise community."
This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms - for wired devices - are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book. Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication; Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data; Features authentication methods based on the usage of authentication tags as well as digital watermarks.
Readers will progress from an understanding of what the Internet is now towards an understanding of the motivations and techniques that will drive its future.
This book provides a comprehensive analysis of Brooks-Iyengar Distributed Sensing Algorithm, which brings together the power of Byzantine Agreement and sensor fusion in building a fault-tolerant distributed sensor network. The authors analyze its long-term impacts, advances, and future prospects. The book starts by discussing the Brooks-Iyengar algorithm, which has made significant impact since its initial publication in 1996. The authors show how the technique has been applied in many domains such as software reliability, distributed systems and OS development, etc. The book exemplifies how the algorithm has enhanced new real-time features by adding fault-tolerant capabilities for many applications. The authors posit that the Brooks-Iyengar Algorithm will to continue to be used where fault-tolerant solutions are needed in redundancy system scenarios. This book celebrates S.S. Iyengar's accomplishments that led to his 2019 Institute of Electrical and Electronics Engineers' (IEEE) Cybermatics Congress "Test of Time Award" for his work on creating Brooks-Iyengar Algorithm and its impact in advancing modern computing.
Complex Orthogonal Space-Time Processing in Wireless Communications incorporates orthogonal space-time processing using STBCs in MIMO wireless communication systems. Complex Orthogonal STBCs (CO STBCs) are given emphasis because they can be used for PSK/QAM modulation schemes and are more practical than real STBCs. The overall coverage provides general knowledge about space-time processing and its applications for broad audiences. It also includes the most up-to-date review of the literature on space-time processing in general, and space-time block processing in particular. The authors also examine open issues and problems for future research in this area.
This practical resource is essential reading for wireless communications engineers whose projects involve the use of cutting-edge software radio technology. It covers all aspects of systems design and explains various options for hardware, including a look at current and state of the art silicon technologies. The book places special emphasis on how software radio technology can solve many of the problems faced by professionals designing third-generation cellular mobile systems. The book concludes with an overview of engineering design assistance software tools that are becoming so important for the successful development of embedded radio products.
This book provides a comprehensive overview of modern networks design, from specifications and modeling to implementations and test procedures, including the design and implementation of modern networks on chip, in both wireless and mobile applications. Topical coverage includes algorithms and methodologies, telecommunications, hardware (including networks on chip), security and privacy, wireless and mobile networks and a variety of modern applications, such as VoLTE and the internet of things.
The approach adopted in Digital Synthesizers and Transmitters for Software Radio will provide an understanding of key areas in the field of digital synthesizers and transmitters. It is easy to include different digital techniques in the digital synthesizers and transmitters by using digital signal processing methods, because the signal is in digital form. By programming the digital synthesizers and transmitters, adaptive channel bandwidths, modulation formats, frequency hopping and data rates are easily achieved. Techniques such as digital predistortion for power amplifier linearization, digital compensation methods for analog I/Q modulator nonlinearities and digital power control and ramping are presented in this book. The flexibility of the digital synthesizers and transmitters makes them ideal as signal generators for software radio. Software radios represent a major change in the design paradigm for radios in which a large portion of the functionality is implemented through programmable signal processing devices, giving the radio the ability to change its operating parameters to accommodate new features and capabilities. A software radio approach reduces the content of radio frequency (RF) and other analog components of traditional radios and emphasizes digital signal processing to enhance overall transmitter flexibility. Software radios are emerging in commercial and military infrastructure.
A book offering advice on how to safeguard a company's telecommunication and computer networks against natural disaster, sabotage and human error. It aims to help identify the vulnerabilities of a system and describes specific risk avoidance measures.
The "digital revolution" of the last two decades has pervaded
innumerable aspects of our daily lives and changed our planet
irreversibly. The shift from analog to digital broadcasting has
facilitated a seemingly infinite variety of new
applications-audience interactivity being but one example. The
greater efficiency and compression of digital media have endowed
broadcasters with a "digital dividend" of spare transmission
capacity over and above the requirements of terrestrial
broadcasting. The question is, who will use it, and how? Comparing
the European experience with that of broadcasters elsewhere in the
world, the author sketches the current status of international
frequency management, quantifies the value of the "dividend"
itself, analyzes the details of the analog-to-digital switchovers
already completed, and posits what the future holds for the sector.
As we grapple with new devices, inconceivable a mere generation
ago, that allow us to access digital media instantly, anywhere and
at any time of day, this book is a potent reminder that what we
have witnessed so far may be just the first wavering steps along a
road whose destination we can only guess at.
This book presents cutting-edge results on stability analysis and control scheme designs for networked teleoperation systems. It highlights new research on commonly encountered nonlinear teleoperation systems, including the stability analysis of teleoperation systems with asymmetric time-varying delays, stability analysis of teleoperation systems with interval time delays, and so on. Moreover, the book presents several high-performance control scheme designs for teleoperation systems when the velocity is available and unavailable, and for systems with nonlinear input. The results presented here mark a substantial contribution to nonlinear teleoperation system theory, robotic control theory and networked control system theory. As such, the book will be of interest to university researchers, R&D engineers and graduate students in control theory and control engineering who wish to learn about the core principles, methods, algorithms, and applications of networked teleoperation systems, robotic systems and nonlinear control systems.
Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, allowing them to be programmed to perform specific duties. This extensively updated, second edition of the popular Artech House book, Smart Card Security and Applications, offers a current overview of the ways smart cards address the computer security issues of today's varied applications. Brand new discussions on multi-application operating systems, computer networks, and the Internet are included to keep technical and business professionals abreast of the very latest developments in this field. The book provides technical details on the newest protection mechanisms, features a discussion on the effects of recent attacks, and presents a clear methodology for solving unique security problems.
Simon Haykin is a well-known author of books on neural networks. |
![]() ![]() You may like...
Integral Methods in Science and…
Christian Constanda, Matteo Dalla Riva, …
Hardcover
R3,687
Discovery Miles 36 870
Muhammad - The slave, the messenger, the…
Prof Mamdouh Mohamed
Hardcover
|