![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking
This volume publishes new trends and findings in hot topics related to ubiquitous computing/networking. It is the outcome of UNet - ainternational scientific event that took place on September 08-10, 2015, in the fascinating city of Casablanca, Morocco. UNet'15 is technically sponsored by IEEE Morocco Section and IEEE COMSOC Morocco Chapter.
This book presents recent research in the recognition of vulnerabilities of national systems and assets which gained special attention for the Critical Infrastructures in the last two decades. The book concentrates on R&D activities in the relation of Critical Infrastructures focusing on enhancing the performance of services as well as the level of security. The objectives of the book are based on a project entitled "Critical Infrastructure Protection Researches" (TAMOP-4.2.1.B-11/2/KMR-2011-0001) which concentrated on innovative UAV solutions, robotics, cybersecurity, surface engineering, and mechatornics and technologies providing safe operations of essential assets. This report is summarizing the methodologies and efforts taken to fulfill the goals defined. The project has been performed by the consortium of the Obuda University and the National University of Public Service.
This book presents the features and advantages offered by complex networks in the machine learning domain. In the first part, an overview on complex networks and network-based machine learning is presented, offering necessary background material. In the second part, we describe in details some specific techniques based on complex networks for supervised, non-supervised, and semi-supervised learning. Particularly, a stochastic particle competition technique for both non-supervised and semi-supervised learning using a stochastic nonlinear dynamical system is described in details. Moreover, an analytical analysis is supplied, which enables one to predict the behavior of the proposed technique. In addition, data reliability issues are explored in semi-supervised learning. Such matter has practical importance and is not often found in the literature. With the goal of validating these techniques for solving real problems, simulations on broadly accepted databases are conducted. Still in this book, we present a hybrid supervised classification technique that combines both low and high orders of learning. The low level term can be implemented by any classification technique, while the high level term is realized by the extraction of features of the underlying network constructed from the input data. Thus, the former classifies the test instances by their physical features, while the latter measures the compliance of the test instances with the pattern formation of the data. We show that the high level technique can realize classification according to the semantic meaning of the data. This book intends to combine two widely studied research areas, machine learning and complex networks, which in turn will generate broad interests to scientific community, mainly to computer science and engineering areas.
This book offers the first comprehensive view on integrated circuit and system design for the Internet of Things (IoT), and in particular for the tiny nodes at its edge. The authors provide a fresh perspective on how the IoT will evolve based on recent and foreseeable trends in the semiconductor industry, highlighting the key challenges, as well as the opportunities for circuit and system innovation to address them. This book describes what the IoT really means from the design point of view, and how the constraints imposed by applications translate into integrated circuit requirements and design guidelines. Chapter contributions equally come from industry and academia. After providing a system perspective on IoT nodes, this book focuses on state-of-the-art design techniques for IoT applications, encompassing the fundamental sub-systems encountered in Systems on Chip for IoT: ultra-low power digital architectures and circuits low- and zero-leakage memories (including emerging technologies) circuits for hardware security and authentication System on Chip design methodologies on-chip power management and energy harvesting ultra-low power analog interfaces and analog-digital conversion short-range radios miniaturized battery technologies packaging and assembly of IoT integrated systems (on silicon and non-silicon substrates). As a common thread, all chapters conclude with a prospective view on the foreseeable evolution of the related technologies for IoT. The concepts developed throughout the book are exemplified by two IoT node system demonstrations from industry. The unique balance between breadth and depth of this book: enables expert readers quickly to develop an understanding of the specific challenges and state-of-the-art solutions for IoT, as well as their evolution in the foreseeable future provides non-experts with a comprehensive introduction to integrated circuit design for IoT, and serves as an excellent starting point for further learning, thanks to the broad coverage of topics and selected references makes it very well suited for practicing engineers and scientists working in the hardware and chip design for IoT, and as textbook for senior undergraduate, graduate and postgraduate students ( familiar with analog and digital circuits).
This new and expanded monograph improves upon Mohan's earlier book, Residue Number Systems (Springer, 2002) with a state of the art treatment of the subject. Replete with detailed illustrations and helpful examples, this book covers a host of cutting edge topics such as the core function, the quotient function, new Chinese Remainder theorems, and large integer operations. It also features many significant applications to practical communication systems and cryptography such as FIR filters and elliptic curve cryptography. Starting with a comprehensive introduction to the basics and leading up to current research trends that are not yet widely distributed in other publications, this book will be of interest to both researchers and students alike.
Wireless Information Highways provides an excellent introduction and balanced coverage of the most important topics related to the methodologies developed to support data management in asymmetric communication environments. This book is based on a number of self-contained chapters and provides an opportunity for practitioners and researchers to explore the connection between various computer science techniques and develop solutions to problems that arise in the rapidly emerging field of wireless networks.
This provides a comprehensive overview of the key principles of security concerns surrounding the upcoming Internet of Things (IoT), and introduces readers to the protocols adopted in the IoT. It also analyses the vulnerabilities, attacks and defense mechanisms, highlighting the security issues in the context of big data. Lastly, trust management approaches and ubiquitous learning applications are examined in detail. As such, the book sets the stage for developing and securing IoT applications both today and in the future.
This book delivers concise coverage of classical methods and new developments related to indoor location-based services. It collects results from isolated domains including geometry, artificial intelligence, statistics, cooperative algorithms, and distributed systems and thus provides an accessible overview of fundamental methods and technologies. This makes it an ideal starting point for researchers, students, and professionals in pervasive computing. Location-based services are services using the location of a mobile computing device as their primary input. While such services are fairly easy to implement outside buildings thanks to accessible global positioning systems and high-quality environmental information, the situation inside buildings is fundamentally different. In general, there is no simple way of determining the position of a moving target inside a building without an additional dedicated infrastructure. The book's structure is learning oriented, starting with a short introduction to wireless communication systems and basic positioning techniques and ending with advanced features like event detection, simultaneous localization and mapping, and privacy aspects. Readers who are not familiar with the individual topics will be able to work through the book from start to finish. At the same time all chapters are self-contained to support readers who are already familiar with some of the content and only want to pick selected topics that are of particular interest.
This thesis focuses on the problem of optimizing the quality of network multimedia services. This problem spans multiple domains, from subjective perception of multimedia quality to computer networks management. The work done in this thesis approaches the problem at different levels, developing methods for modeling the subjective perception of quality based on objectively measurable parameters of the multimedia coding process as well as the transport over computer networks. The modeling of subjective perception is motivated by work done in psychophysics, while using Machine Learning techniques to map network conditions to the human perception of video services. Furthermore, the work develops models for efficient control of multimedia systems operating in dynamic networked environments with the goal of delivering optimized Quality of Experience. Overall this thesis delivers a set of methods for monitoring and optimizing the quality of multimedia services that adapt to the dynamic environment of computer networks in which they operate.
This book introduces higher-degree research students and early career academics to scientific research as occurring in the field of information systems and adjacent fields, such as computer science, management science, organization science, and software engineering. Instead of focusing primarily on research methods as many other textbooks do, it covers the entire research process, from start to finish, placing particular emphasis on understanding the cognitive and behavioural aspects of research, such as motivation, modes of inquiry, theorising, planning for research, planning for publication, and ethical challenges in research. Comprehensive but also succinct and compact, the book guides beginning researchers in their quest to do scholarly work and to assist them in developing their own answers and strategies over the course of their work. Jan Recker explains in this book the fundamental concepts that govern scientific research and then moves on to introduce the basic steps every researcher undertakes: choosing research questions, developing theory, building a research design, employing research methods, and finally writing academic papers. He also covers essentials of ethical conduct of scientific research. This second edition contains major updates on all these elements plus significant expansions on relevant research methods such as design research and computational methods, a rewritten and extended chapter on theory development, and expansions to the chapters on research methods, scientific publishing, and research ethics. A companion website provides pedagogical materials and instructions for using this book in teaching.
This book is a collection of selected papers presented at the First International Conference on Industrial IoT, Big Data and Supply Chain (IIoTBDSC), held as an online conference due to COVID-19 (initially to be held in Macao, Special Administration Region (SAR) of China), during September 15-17, 2020. It includes novel and innovative work from experts, practitioners, scientists and decision-makers from academia and industry. It brings multi-disciplines together on IIoT, data science, cloud computing, software engineering approaches to design, development, testing and quality of products and services.
The updated book presents Matlab illustrations on various digital signal processing (DSP) techniques such as random process, time varying wireless system model, and detection and estimation theory used in wireless communication. The book also covers recent wireless techniques like OFDM, massive MIMO techniques, non-orthogonal multiple access, millimeter wave MIMO, full duplex, cognitive radio, co-operating communication, unmanned aerial vehicles etc. This book is suitable for those who are doing basic and applied research in digital signal processing for wireless communication.
This handbook provides a unique and in-depth survey of the current state-of-the-art in software engineering, covering its major topics, the conceptual genealogy of each subfield, and discussing future research directions. Subjects include foundational areas of software engineering (e.g. software processes, requirements engineering, software architecture, software testing, formal methods, software maintenance) as well as emerging areas (e.g., self-adaptive systems, software engineering in the cloud, coordination technology). Each chapter includes an introduction to central concepts and principles, a guided tour of seminal papers and key contributions, and promising future research directions. The authors of the individual chapters are all acknowledged experts in their field and include many who have pioneered the techniques and technologies discussed. Readers will find an authoritative and concise review of each subject, and will also learn how software engineering technologies have evolved and are likely to develop in the years to come. This book will be especially useful for researchers who are new to software engineering, and for practitioners seeking to enhance their skills and knowledge.
This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.
Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. You require an accurate picture of the environments you protect and operate in order to rapidly investigate, mitigate, and then recover from these new attack vectors. This book gives you a deep understanding of new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. Python Passive Network Mapping is for practitioners, forensic investigators, IT teams, and individuals who work together when performing incident response and investigating potential damage, or are examining the impacts of new malware threats. Those defending critical infrastructures will have a special interest in this book, as active or probing methods of network mapping are rarely used within these environments as any resulting impacts can be disastrous. Python Passive Network Mapping is ideally suited for use as a text in a variety of academic programs to expose and engage students in the art of passively mapping enterprise networks, with the added benefit of providing exposure to open source Python solutions.
This book features a selection of revised and extended research articles written by prominent researchers who participated in the 26th World Congress on Engineering and Computer Science (WCECS 2018), held in San Francisco, USA, on October 23-25, 2018. Topics covered include engineering mathematics, electrical engineering, communications systems, computer science, chemical engineering, systems engineering, manufacturing engineering and industrial applications. With contributions carefully chosen to represent the most cutting-edge research presented at the conference and highlighting the state of the art in engineering technologies and the physical sciences and their applications, the book is a valuable reference resource for graduate students and researchers working in these fields.
This thesis focuses on the design and use of software defined networking (SDN) in residential Internet service providers (ISPs), as well as innovative operational models that can be incorporated in broadband ecosystems. Though SDN addresses the challenges for bundled best-effort service provided by broadband operators for users, it does not distinguish between the different types of applications (video streaming, web-browsing, and large file transfers), nor does it cater to the varying needs of different household devices (entertainment tablets, work laptops, or connected appliances). This is a problem for end-users, who want to differentiate between applications and devices; for content providers (CPs), who want to exercise control over streams of high monetary value; and for Internet service providers (ISPs), who have to accommodate growing traffic volumes without additional revenues. This book develops a series of solution techniques that use SDN to find an optimal balance between the competing requirements of end-users, ISPs, and CPs. In addition to the design and discussions of various architectures, it provides technical details on real-world system implementations and prototypes. As such, it offers a valuable resource for researchers, network architects, network strategists, developers, and all other readers seeking to learn more about the practical value of SDN in future ISP networks.
This edited volume explores the fundamental aspects of the dark web, ranging from the technologies that power it, the cryptocurrencies that drive its markets, the criminalities it facilitates to the methods that investigators can employ to master it as a strand of open source intelligence. The book provides readers with detailed theoretical, technical and practical knowledge including the application of legal frameworks. With this it offers crucial insights for practitioners as well as academics into the multidisciplinary nature of dark web investigations for the identification and interception of illegal content and activities addressing both theoretical and practical issues.
This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, security, and privacy. The book discusses various new CPS technologies from diverse aspects to enable higher level of innovation towards intelligent life. The book provides insight to the future integration, coordination and interaction between the physical world, the information world, and human beings. The book features contributions from renowned researchers and engineers, who discuss key issues from various perspectives, presenting opinions and recent CPS-related achievements. Investigates how to advance the development of cyber-physical systems Provides a joint consideration of other newly emerged technologies and concepts in relation to CPS like cloud computing, big data, fog computing, and crowd sourcing Includes topics related to CPS such as architecture, system, networking, application, algorithm, security and privacy
Sustaining a competitive edge in today's business world requires innovative approaches to product, service, and management systems design and performance. Advances in computing technologies have presented managers with additional challenges as well as further opportunities to enhance their business models Business Transformation and Sustainability through Cloud System Implementation presents novel computing technologies designed for use in business and corporate environments, enabling managers and associates to make the most of the technologies at their disposal. This premier reference work seeks to alert firm management professionals and researchers to the potential risks and benefits associated with emerging technologies and guide firms on the proper selection, maintenance, and use of Web-based computing systems.
Some Obstacles on the Road to ATM; D. Abensour, L. Felton. Electropolitical Correctness and High Speed Networking, or, Why ATM Is Like a Nose; D. Stevenson. An Overview of the ATM Forum and the Traffic Management Activities; L. Gun, G.A. Marin. Communication Subsystems for High Speed Networks; D.N. Serpanos. SMDS and Frame Relay; J.P. Bernoux. ATM Systems in Support of BISDN, Frame Relay, and SMDS Services; P. Holzworth. Approaching BISDN; C. Bisdikian, et al. On Transport Systems for ATM Networks; M. Zitterbart, et al. XTP Bucket Error Control; S. Fdida, H. Santoso. Congestion Control Mechanisms for ATM Networks; D.S. Holtsinger. Highly-Bursty Sources and their Admission Control in ATM Networks; K. Sohraby. A User Relief Approach to Congestion Control in ATM Networks; I. Stavrakakis, et al. Space Priority Buffer Management; D. Tipper, et al. 4 additional articles. Index.
This book includes the original, peer-reviewed research papers from the 2nd International Conference on Electrical Systems, Technology and Information (ICESTI 2015), held in September 2015 at Patra Jasa Resort & Villas Bali, Indonesia. Topics covered include: Mechatronics and Robotics, Circuits and Systems, Power and Energy Systems, Control and Industrial Automation, and Information Theory. It explores emerging technologies and their application in a broad range of engineering disciplines, including communication technologies and smart grids. It examines hybrid intelligent and knowledge-based control, embedded systems, and machine learning. It also presents emerging research and recent application in green energy system and storage. It discusses the role of electrical engineering in biomedical, industrial and mechanical systems, as well as multimedia systems and applications, computer vision and image and signal processing. The primary objective of this series is to provide references for dissemination and discussion of the above topics. This volume is unique in that it includes work related to hybrid intelligent control and its applications. Engineers and researchers as well as teachers from academia and professionals in industry and government will gain valuable insights into interdisciplinary solutions in the field of emerging electrical technologies and its applications.
This book covers the basic principles for understanding radio wave propagation for common frequency bands used in radio-communications. This includes achievements and developments in propagation models for wireless communication. This book is intended to bridge the gap between the theoretical calculations and approaches to the applied procedures needed for radio links design in a proper manner. The authors emphasize propagation engineering by giving fundamental information and explain the use of basic principles together with technical achievements. This new edition includes additional information on radio wave propagation in guided media and technical issues for fiber optics cable networks with several examples and problems. This book also includes a solution manual - with 90 solved examples distributed throughout the chapters - and 158 problems including practical values and assumptions.
This book presents a comprehensive overview of the computerized core monitoring techniques currently employed at pressurized water reactor (PWR) and boiling water reactor (BWR) nuclear power plants. It also offers a brief overview of the corresponding techniques at research and materials testing reactors. The book combines detailed descriptions of the theoretical background and fundamental underlying principles as well as the practical applications of core surveillance. It not only provides numerous industrial examples to illustrate how complex computerized systems are able to support the safe operation of nuclear reactors, but also outlines some new application areas that were made possible only by state-of-the-art computing resources. Thanks to its practical approach, it serves as a valuable and practical reference book for readers interested in the surveillance of nuclear reactors, ranging from undergraduate and postgraduate students to researchers and experts working at research reactors and nuclear power plants, as well as at nuclear regulatory authorities.
A comprehensive and broad introduction to computer and intrusion forensics, this practical work is designed to help you master the tools, techniques and underlying concepts you need to know, covering the areas of law enforcement, national security and the private sector. The text presents case studies from around the world, and treats key emerging areas such as stegoforensics, image identification, authorship categorization, link discovery and data mining. It also covers the principles and processes for handling evidence from digital sources effectively and law enforcement considerations in dealing with computer-related crimes, as well as how the effectiveness of computer forensics procedures may be influenced by organizational security policy. |
![]() ![]() You may like...
Dark Silicon and Future On-chip Systems…
Suyel Namasudra, Hamid Sarbazi-Azad
Hardcover
R4,186
Discovery Miles 41 860
Bitcoin & Cryptocurrency Technologies…
Szabolcs Juhasz
Hardcover
Pacific Gas and Electric Magazine; v.2…
Pacific Gas and Electric Company
Hardcover
R1,077
Discovery Miles 10 770
Electric Toy Making for Amateurs. This…
T. O'Conor (Thomas O'Conor) Sloane
Hardcover
R901
Discovery Miles 9 010
Fort Wayne Works News; 10, no. 1…
General Electric Company Fort Wayne
Hardcover
R934
Discovery Miles 9 340
Bitcoin and Cryptocurrency Technologies…
Keizer Soeze
Hardcover
|