|
|
Books > Computing & IT > Computer communications & networking
Wireless Communication Networks Supported by Autonomous UAVs and
Mobile Ground Robots covers wireless sensor networks and cellular
networks. For wireless sensor networks, the book presents
approaches using mobile robots or UAVs to collect sensory data from
sensor nodes. For cellular networks, it discusses the approaches to
using UAVs to work as aerial base stations to serve cellular users.
In addition, the book covers the challenges involved in these two
networks, existing approaches (e.g., how to use the public
transportation vehicles to play the role of mobile sinks to collect
sensory data from sensor nodes), and potential methods to address
open questions.
Every day approximately three-hundred thousand to four-hundred
thousand new malware are registered, many of them being adware and
variants of previously known malware. Anti-virus companies and
researchers cannot deal with such a deluge of malware - to analyze
and build patches. The only way to scale the efforts is to build
algorithms to enable machines to analyze malware and classify and
cluster them to such a level of granularity that it will enable
humans (or machines) to gain critical insights about them and build
solutions that are specific enough to detect and thwart existing
malware and generic-enough to thwart future variants. Advances in
Malware and Data-Driven Network Security comprehensively covers
data-driven malware security with an emphasis on using statistical,
machine learning, and AI as well as the current trends in
ML/statistical approaches to detecting, clustering, and
classification of cyber-threats. Providing information on advances
in malware and data-driven network security as well as future
research directions, it is ideal for graduate students,
academicians, faculty members, scientists, software developers,
security analysts, computer engineers, programmers, IT specialists,
and researchers who are seeking to learn and carry out research in
the area of malware and data-driven network security.
The artificial intelligence subset machine learning has become a
popular technique in professional fields as many are finding new
ways to apply this trending technology into their everyday
practices. Two fields that have majorly benefited from this are
pattern recognition and information security. The ability of these
intelligent algorithms to learn complex patterns from data and
attain new performance techniques has created a wide variety of
uses and applications within the data security industry. There is a
need for research on the specific uses machine learning methods
have within these fields, along with future perspectives. Machine
Learning Techniques for Pattern Recognition and Information
Security is a collection of innovative research on the current
impact of machine learning methods within data security as well as
its various applications and newfound challenges. While
highlighting topics including anomaly detection systems,
biometrics, and intrusion management, this book is ideally designed
for industrial experts, researchers, IT professionals, network
developers, policymakers, computer scientists, educators, and
students seeking current research on implementing machine learning
tactics to enhance the performance of information security.
The cybersecurity of connected medical devices is one of the
biggest challenges facing healthcare today. The compromise of a
medical device can result in severe consequences for both patient
health and patient data. Cybersecurity for Connected Medical
Devices covers all aspects of medical device cybersecurity, with a
focus on cybersecurity capability development and maintenance,
system and software threat modeling, secure design of medical
devices, vulnerability management, and integrating cybersecurity
design aspects into a medical device manufacturer's Quality
Management Systems (QMS). This book is geared towards engineers
interested in the medical device cybersecurity space, regulatory,
quality, and human resources specialists, and organizational
leaders interested in building a medical device cybersecurity
program.
During the COVID-19 era, the functions of social policy and public
administration have undergone a meaningful change, especially with
the advancement of digital elements and online and virtual
functions. Cyber developments, cyber threats, and the effects of
cyberwar on the public administrations of countries have become
critical research subjects, and it is important to have resources
that can introduce and guide users through the current best
practices, laboratory methods, policies, protocols, and more within
cyber public administration and social policy. The Handbook of
Research on Cyber Approaches to Public Administration and Social
Policy focuses on the post-pandemic changes in the functions of
social policy and public administration. It also examines the
implications of the cyber cosmos on public and social policies and
practices from a broad perspective. Covering topics such as
intersectional racism, cloud computing applications, and public
policies, this major reference work is an essential resource for
scientists, laboratory technicians, professionals, technologists,
computer scientists, policymakers, students, educators,
researchers, and academicians.
Inclusive Radio Communication Networks for 5G and Beyond is based
on the COST IRACON project that consists of 500 researchers from
academia and industry, with 120 institutions from Europe, US and
the Far East involved. The book presents state-of-the-art design
and analysis methods for 5G (and beyond) radio communication
networks, along with key challenges and issues related to the
development of 5G networks. This book is Open Access and was funded
by: CNIT - Consorzio Nazionale Interuniversitario per le
Telecomunicazioni European Association for Communications and
Networking (EURACON), AISBL
Intelligent Image and Video Compression: Communicating Pictures,
Second Edition explains the requirements, analysis, design and
application of a modern video coding system. It draws on the
authors' extensive academic and professional experience in this
field to deliver a text that is algorithmically rigorous yet
accessible, relevant to modern standards and practical. It builds
on a thorough grounding in mathematical foundations and visual
perception to demonstrate how modern image and video compression
methods can be designed to meet the rate-quality performance levels
demanded by today's applications and users, in the context of
prevailing network constraints. "David Bull and Fan Zhang have
written a timely and accessible book on the topic of image and
video compression. Compression of visual signals is one of the
great technological achievements of modern times, and has made
possible the great successes of streaming and social media and
digital cinema. Their book, Intelligent Image and Video Compression
covers all the salient topics ranging over visual perception,
information theory, bandpass transform theory, motion estimation
and prediction, lossy and lossless compression, and of course the
compression standards from MPEG (ranging from H.261 through the
most modern H.266, or VVC) and the open standards VP9 and AV-1. The
book is replete with clear explanations and figures, including
color where appropriate, making it quite accessible and valuable to
the advanced student as well as the expert practitioner. The book
offers an excellent glossary and as a bonus, a set of tutorial
problems. Highly recommended!" --Al Bovik
Each Student Book and ActiveBook have has clearly laid out pages
with a range of supportive features to aid learning and teaching:
Getting to know your unit sections ensure learners understand the
grading criteria and unit requirements. Getting ready for
Assessment sections focus on preparation for external assessment
with guidance for learners on what to expect. Hints and tips will
help them prepare for assessment and sample answers are provided
for a range of question types including, short and long answer
questions, all with a supporting commentary. Learners can also
prepare for internal assessment using this feature. A case study of
a learner completing the internal assessment for that unit covering
'How I got started', 'How I brought it all together' and 'What I
got from the experience'. Pause Point feature provide opportunities
for learners to self-evaluate their learning at regular intervals.
Each Pause Point point feature gives learners a Hint or Extend
option to either revisit and reinforce the topic or to encourage
independent research or study skills. Case Study and Theory into
Practice features enable development of problem-solving skills and
place the theory into real life situations learners could
encounter. Assessment Activity/Practice provide scaffolded
assessment practice activities that help prepare learners for
assessment. Within each assessment practice activity, a Plan, Do
and Review section supports learners' formative assessment by
making sure they fully understand what they are being asked to do,
what their goals are and how to evaluate the task and consider how
they could improve. Dedicated Think Future pages provide case
studies from the industry, with a focus on aspects of skills
development that can be put into practice in a real work
environment and further study.
Advances in Delay-Tolerant Networks: Architecture and Enhanced
Performance, Second Edition provides an important overview of
delay-tolerant networks (DTNs) for researchers in electronics,
computer engineering, telecommunications and networking for those
in academia and R&D in industrial sectors. Part I reviews the
technology involved and the prospects for improving performance,
including different types of DTN and their applications, such as
satellite and deep-space communications and vehicular
communications. Part II focuses on how the technology can be
further improved, addressing topics, such as data bundling,
opportunistic routing, reliable data streaming, and the potential
for rapid selection and dissemination of urgent messages.
Opportunistic, delay-tolerant networks address the problem of
intermittent connectivity in a network where there are long delays
between sending and receiving messages, or there are periods of
disconnection.
Empower yourself with the knowledge to keep up with the rapidly
changing technical world of work, as two workforce productivity and
technology experts lay out a clear picture of
the?coming?revolution?in how work is done and how jobs are shaped.
If you listen to the news, robots are coming for your job.
Full-time employment will soon be a thing of the past as
organizations opt more to hire employees on a contract basis.?With
technological advances across email, video, project management, and
instant messaging platforms, being tied to a desk working full time
for one company is becoming obsolete. So, where does that leave
you? The Human Cloud may be the most important book you read to
prepare for how work is done in the future. In these pages, human
cloud technologist Matthew Mottola and AI expert Matthew Coatney
help you not only clearly understand the transition you see
happening around you, but they will also help you take advantage of
it. In The Human Cloud, Mottola and Coatney inform you about topics
including: How employees and employers will be able to take
advantage of the new automated and freelance-based workplace. How
they will be able to take advantage of the new technology
disruptions the machine cloud will create. Why the changes
employees and employers are seeing aren't the projection of doom
that many are predicting. How to navigate the coming job
marketplace. By replacing fear with knowledge, you will better
understand how this shift in employment is a good thing, be
equipped to embrace the positive?advantages new technology brings,
and further secure how your own job is shaped so you are never left
behind.
Tactile Internet with Human-in-the-Loop describes the change from
the current Internet, which focuses on the democratization of
information independent of location or time, to the Tactile
Internet, which democratizes skills to promote equity that is
independent of age, gender, sociocultural background or physical
limitations. The book promotes the concept of the Tactile Internet
for remote closed-loop human-machine interaction and describes the
main challenges and key technologies. Current standardization
activities in the field for IEEE and IETF are also described,
making this book an ideal resource for researchers, graduate
students, and industry R&D engineers in communications
engineering, electronic engineering, and computer engineering.
This book highlights recent research advances on biometrics using
new methods such as deep learning, nonlinear graph embedding, fuzzy
approaches, and ensemble learning. Included are special biometric
technologies related to privacy and security issues, such as
cancellable biometrics and soft biometrics. The book also focuses
on several emerging topics such as big data issues, internet of
things, medical biometrics, healthcare, and robot-human
interactions. The authors show how these new applications have
triggered a number of new biometric approaches. They show, as an
example, how fuzzy extractor has become a useful tool for key
generation in biometric banking, and vein/heart rates from medical
records can also be used to identify patients. The contributors
cover the topics, their methods, and their applications in depth.
|
|