|
|
Books > Computing & IT > Computer communications & networking
Although some IoT systems are built for simple event control where
a sensor signal triggers a corresponding reaction, many events are
far more complex, requiring applications to interpret the event
using analytical techniques to initiate proper actions. Artificial
intelligence of things (AIoT) applies intelligence to the edge and
gives devices the ability to understand the data, observe the
environment around them, and decide what to do best with minimum
human intervention. With the power of AI, AIoT devices are not just
messengers feeding information to control centers. They have
evolved into intelligent machines capable of performing self-driven
analytics and acting independently. A smart environment uses
technologies such as wearable devices, IoT, and mobile internet to
dynamically access information, connect people, materials and
institutions, and then actively manages and responds to the
ecosystem's needs in an intelligent manner. In this edited book,
the authors present challenges, technologies, applications and
future trends of AI-enabled IoT (AIoT) in realizing smart and
intelligent environments, including frameworks and methodologies to
apply AIoT in monitoring devices and environments, tools and
practices most applicable to product or service development to
solve innovation problems, advanced and innovative techniques and
practical implementations to enhance future smart environment
systems as. They plan to cover a broad range of applications
including smart cities, smart transportation and smart agriculture.
This book is a valuable resource for industry and academic
researchers, scientists, engineers and advanced students in the
fields of ICTs and networking, IoT, AI and machine and deep
learning, data science, sensing, robotics, automation and smart
technologies and smart environments.
Cognitive networks can be crucial for the evolution of future
communication systems; however, current trends have indicated major
movement in other relevant fields towards the integration of
different techniques for the realization of self-aware and
self-adaptive communication systems. Evolution of Cognitive
Networks and Self-Adaptive Communication Systems overviews
innovative technologies combined for the formation of self-aware,
self-adaptive, and self-organizing networks. By aiming to inform
the research community and the related industry of solutions for
cognitive networks, this book is essential for researchers,
instructors, and professionals interested in clarifying the latest
trends resulting in a unified realization for cognitive networking
and communication systems.
The fields of Big Data and the Internet of Things (IoT) have seen
tremendous advances, developments, and growth in recent years. The
IoT is the inter-networking of connected smart devices, buildings,
vehicles and other items which are embedded with electronics,
software, sensors and actuators, and network connectivity that
enable these objects to collect and exchange data. The IoT produces
a lot of data. Big data describes very large and complex data sets
that traditional data processing application software is inadequate
to deal with, and the use of analytical methods to extract value
from data. This edited book covers analytical techniques for
handling the huge amount of data generated by the Internet of
Things, from architectures and platforms to security and privacy
issues, applications, and challenges as well as future directions.
Cyber attacks are rapidly becoming one of the most prevalent issues
in the world. As cyber crime continues to escalate, it is
imperative to explore new approaches and technologies that help
ensure the security of the online community. Threat Detection and
Countermeasures in Network Security presents the latest
methodologies and trends in detecting and preventing network
threats. Investigating the potential of current and emerging
security technologies, this publication is an all-inclusive
reference source for academicians, researchers, students,
professionals, practitioners, network analysts, and technology
specialists interested in the simulation and application of
computer network protection.
Computer networks have become essential to the survival of
businesses, organizations, and educational institutions, as the
number of network users, services, and applications has increased
alongside advancements in information technology. Given this,
efforts have been put forward by researchers, designers, managers,
analysts, and professionals to optimize network performance and
satisfy the varied groups that have an interest in network design
and implementation. Simulation in Computer Network Design and
Modeling: Use and Analysis reviews methodologies in computer
network simulation and modeling, illustrates the benefits of
simulation in computer networks design, modeling, and analysis, and
identifies the main issues that face efficient and effective
computer network simulation. This reference will inform the work
and research of academics, post-graduate students, developers,
network designers, network analysts, telecommunication system
designers, and others who are interested in using simulation in
computer network design and modeling.
Service Oriented Architecture (SOA) is the paradigm for software
and system specification, design, implementation and management
that intends to shape and dominate IT and business landscapes in
the near future. Non-Functional Properties in Service Oriented
Architecture: Requirements, Models and Methods offers a selection
of chapters that cover three important aspects related to the use
of non-functional properties in SOA: requirements specification
with respect to non-functional properties, modeling non-functional
properties and implementation of non-functional properties. This
book serves as both a practical reference and an advanced
scientific source for those interested in current issues, new
trends, and yet-unresolved areas of the discipline.
Cloud computing can provide virtually unlimited scalable high
performance computing resources. Cloud workflows often underlie
many large scale data/computation intensive e-science applications
such as earthquake modelling, weather forecasting and astrophysics.
During application modelling, these sophisticated processes are
redesigned as cloud workflows, and at runtime, the models are
executed by employing the supercomputing and data sharing ability
of the underlying cloud computing infrastructures.
"Temporal QOS Management in Scientific Cloud Workflow Systems"
focuses on real world scientific applications which often must be
completed by satisfying a set of temporal constraints such as
milestones and deadlines. Meanwhile, activity duration, as a
measurement of system performance, often needs to be monitored and
controlled. This book demonstrates how to guarantee on-time
completion of most, if not all, workflow applications. Offering a
comprehensive framework to support the lifecycle of
time-constrained workflow applications, this book will enhance the
overall performance and usability of scientific cloud workflow
systems.
Explains how to reduce the cost to detect and handle temporal
violations while delivering high quality of service (QoS) Offers
new concepts, innovative strategies and algorithms to support
large-scale sophisticatedapplications in the cloud Improves the
overall performance and usability of cloud workflow systems"
Dynamic, trustworthy and reliable service delivery in Service
Oriented Architectures (SOA) is one of the main preconditions for
successful and sustainable business operations. Service and
business process reliability is, therefore, of paramount importance
and cannot be compromised. Engineering Reliable Service Oriented
Architecture: Managing Complexity and Service Level Agreements
presents a guide to engineering reliable SOA systems and enhances
current understanding of service reliability. It is an essential
reference for both practitioners and researchers wishing to explore
state-of-the art results from the field of reliable SOA application
engineering.
In today's globalized world, businesses and governments rely
heavily on technology for storing and protecting essential
information and data. Despite the benefits that computing systems
offer, there remains an assortment of issues and challenges in
maintaining the integrity and confidentiality of these databases.
As professionals become more dependent cyberspace, there is a need
for research on modern strategies and concepts for improving the
security and safety of these technologies. Modern Theories and
Practices for Cyber Ethics and Security Compliance is a collection
of innovative research on the concepts, models, issues, challenges,
innovations, and mitigation strategies needed to improve cyber
protection. While highlighting topics including database
governance, cryptography, and intrusion detection, this book
provides guidelines for the protection, safety, and security of
business data and national infrastructure from cyber-attacks. It is
ideally designed for security analysts, law enforcement,
researchers, legal practitioners, policymakers, business
professionals, governments, strategists, educators, and students
seeking current research on combative solutions for cyber threats
and attacks.
Privacy protection within large databases can be a challenge. By
examining the current problems and challenges this domain is
facing, more efficient strategies can be established to safeguard
personal information against invasive pressures. HCI Challenges and
Privacy Preservation in Big Data Security is an informative
scholarly publication that discusses how human-computer interaction
impacts privacy and security in almost all sectors of modern life.
Featuring relevant topics such as large scale security data, threat
detection, big data encryption, and identity management, this
reference source is ideal for academicians, researchers,
advanced-level students, and engineers that are interested in
staying current on the advancements and drawbacks of human-computer
interaction within the world of big data.
Recent technology trends involving the combination of mobile
networks and cloud computing have offered new chances for mobile
network providers to use specific carrier-cloud services. These
advancements will enhance the utilization of the mobile cloud in
industry and corporate settings. Mobile Networks and Cloud
Computing Convergence for Progressive Services and Applications is
a fundamental source for the advancement of knowledge, application,
and practice in the interdisciplinary areas of mobile network and
cloud computing. By addressing innovative concepts and critical
issues, this book is essential for researchers, practitioners, and
students interested in the emerging field of vehicular wireless
networks.
Radio Frequency Identification (RFID) technology may become one of
the most pervasive technologies of the near future. Yet the
widespread adoption of this new technology presents security risks
that have not been sufficiently addressed.Security and Trends in
Wireless Identification and Sensing Platform Tags: Advancements in
RFID highlights new research regarding wireless identification and
sensing platform (WISP) tags, security, and applications. It serves
as a reference on WISP technology and presents recent advances in
this field. This volume serves as a useful reference for security
experts, will introduce RFID professionals to new trends in this
area, and can also be used by IT experts looking to utilize this
technology.
About 25 years ago, the first developments of ANT (Actor-Network
Theory) took place, but it wasn t until much later that researchers
began to take it seriously. In the late 1990s, ANT began to take
hold in the scientific community as a new and exciting approach to
socio-technical research and social theory. Actor-Network Theory
and Technology Innovation: Advancements and New Concepts provides a
comprehensive look at the development of actor-network theory
itself, as well as case studies of its use to assist in the
explanation of various socio-technical phenomena. This book
includes topics relating to technological innovation; both those
using actor-network theory as an explanatory framework and those
using other approaches. It is an excellent source of information
regarding ANT as an approach to technological innovation and its
link to ICT (Information Communication Technology).
This book provides a comprehensive survey of state-of-the-art
techniques for the security of critical infrastructures, addressing
both logical and physical aspects from an engineering point of
view. Recently developed methodologies and tools for CI analysis as
well as strategies and technologies for CI protection are
investigated in the following strongly interrelated and
multidisciplinary main fields: - Vulnerability analysis and risk
assessment - Threat prevention, detection and response - Emergency
planning and management Each of the aforementioned topics is
addressed considering both theoretical aspects and practical
applications. Emphasis is given to model-based holistic evaluation
approaches as well as to emerging protection technologies,
including smart surveillance through networks of intelligent
sensing devices. Critical Infrastructure Security can be used as a
self-contained reference handbook for both practitioners and
researchers or even as a textbook for master/doctoral degree
students in engineering or related disciplines.More specifically,
the topic coverage of the book includes: - Historical background on
threats to critical infrastructures - Model-based risk evaluation
and management approaches - Security surveys and game-theoretic
vulnerability assessment - Federated simulation for interdependency
analysis - Security operator training and emergency preparedness -
Intelligent multimedia (audio-video) surveillance - Terahertz body
scanners for weapon and explosive detection - Security system
design (intrusion detection / access control) - Dependability and
resilience of computer networks (SCADA / cyber-security) - Wireless
smart-sensor networks and structural health monitoring -
Information systems for crisis response and emergency management -
Early warning, situation awareness and decision support software
Edge computing is focused on devices and technologies that are
attached to the internet of things (IoT). Identifying IoT use
across a range of industries and measuring strategic values helps
identify what technologies to pursue and can avoid wasted resources
on deployments with limited values. The Handbook of Research on
Edge Computing and Computational Intelligence Paradigms for the IoT
is a critical research book that provides a complete insight on the
recent advancements and integration of intelligence in IoT. This
book highlights various topics such as disaster prediction,
governance, and healthcare. It is an excellent resource for
researchers, working professionals, academicians, policymakers, and
defense companies.
|
|