|
|
Books > Computing & IT > Computer communications & networking > General
The cybersecurity of connected medical devices is one of the
biggest challenges facing healthcare today. The compromise of a
medical device can result in severe consequences for both patient
health and patient data. Cybersecurity for Connected Medical
Devices covers all aspects of medical device cybersecurity, with a
focus on cybersecurity capability development and maintenance,
system and software threat modeling, secure design of medical
devices, vulnerability management, and integrating cybersecurity
design aspects into a medical device manufacturer's Quality
Management Systems (QMS). This book is geared towards engineers
interested in the medical device cybersecurity space, regulatory,
quality, and human resources specialists, and organizational
leaders interested in building a medical device cybersecurity
program.
Inclusive Radio Communication Networks for 5G and Beyond is based
on the COST IRACON project that consists of 500 researchers from
academia and industry, with 120 institutions from Europe, US and
the Far East involved. The book presents state-of-the-art design
and analysis methods for 5G (and beyond) radio communication
networks, along with key challenges and issues related to the
development of 5G networks. This book is Open Access and was funded
by: CNIT - Consorzio Nazionale Interuniversitario per le
Telecomunicazioni European Association for Communications and
Networking (EURACON), AISBL
Intelligent Image and Video Compression: Communicating Pictures,
Second Edition explains the requirements, analysis, design and
application of a modern video coding system. It draws on the
authors' extensive academic and professional experience in this
field to deliver a text that is algorithmically rigorous yet
accessible, relevant to modern standards and practical. It builds
on a thorough grounding in mathematical foundations and visual
perception to demonstrate how modern image and video compression
methods can be designed to meet the rate-quality performance levels
demanded by today's applications and users, in the context of
prevailing network constraints. "David Bull and Fan Zhang have
written a timely and accessible book on the topic of image and
video compression. Compression of visual signals is one of the
great technological achievements of modern times, and has made
possible the great successes of streaming and social media and
digital cinema. Their book, Intelligent Image and Video Compression
covers all the salient topics ranging over visual perception,
information theory, bandpass transform theory, motion estimation
and prediction, lossy and lossless compression, and of course the
compression standards from MPEG (ranging from H.261 through the
most modern H.266, or VVC) and the open standards VP9 and AV-1. The
book is replete with clear explanations and figures, including
color where appropriate, making it quite accessible and valuable to
the advanced student as well as the expert practitioner. The book
offers an excellent glossary and as a bonus, a set of tutorial
problems. Highly recommended!" --Al Bovik
Advances in Delay-Tolerant Networks: Architecture and Enhanced
Performance, Second Edition provides an important overview of
delay-tolerant networks (DTNs) for researchers in electronics,
computer engineering, telecommunications and networking for those
in academia and R&D in industrial sectors. Part I reviews the
technology involved and the prospects for improving performance,
including different types of DTN and their applications, such as
satellite and deep-space communications and vehicular
communications. Part II focuses on how the technology can be
further improved, addressing topics, such as data bundling,
opportunistic routing, reliable data streaming, and the potential
for rapid selection and dissemination of urgent messages.
Opportunistic, delay-tolerant networks address the problem of
intermittent connectivity in a network where there are long delays
between sending and receiving messages, or there are periods of
disconnection.
The Internet of Edges is a new paradigm whose objective is to keep
data and processing close to the user. This book presents three
different levels of Edge networking: MEC (Multi-access Edge
Computing), Fog and Far Edge (sometimes called Mist or Skin). It
also reviews participatory networks, in which user equipment
provides the resources for the Edge network. Edge networks can be
disconnected from the core Internet, and the interconnection of
autonomous edge networks can then form the Internet of Edges. This
book analyzes the characteristics of Edge networks in detail,
showing their capacity to replace the imposing Clouds of core
networks due to their superior server response time, data security
and energy saving.
Most of our everyday life experiences are multisensory in nature;
that is, they consist of what we see, hear, feel, taste, smell, and
much more. Almost any experience you can think of, such as eating a
meal or going to the cinema, involves a magnificent sensory world.
In recent years, many of these experiences have been increasingly
transformed and capitalised on through advancements that adapt the
world around us - through technology, products, and services - to
suit our ever more computerised environment. Multisensory
Experiences: Where the senses meet technology looks at this trend
and offers a comprehensive introduction to the dynamic world of
multisensory experiences and design. It takes the reader from the
fundamentals of multisensory experiences, through the relationship
between the senses and technology, to finally what the future of
those experiences may look like, and our responsibility in it. This
book empowers you to shape your own and other people's experiences
by considering the multisensory worlds that we live in through a
journey that marries science and practice. It also shows how we can
take advantage of the senses and how they shape our experiences
through intelligent technological design.
Digital Health: Mobile and Wearable Devices for Participatory
Health Applications is a key reference for engineering and clinical
professionals considering the development or implementation of
mobile and wearable solutions in the healthcare domain. The book
presents a comprehensive overview of devices and appropriateness
for the respective applications. It also explores the ethical,
privacy, and cybersecurity aspects inherent in networked and mobile
technologies. It offers expert perspectives on various approaches
to the implementation and integration of these devices and
applications across all areas of healthcare. The book is designed
with a multidisciplinary audience in mind; from software developers
and biomedical engineers who are designing these devices to
clinical professionals working with patients and engineers on
device testing, human factors design, and user
engagement/compliance.
5G NR: The Next Generation Wireless Access Technology, Second
Edition, follows the authors' highly celebrated books on 3G and 4G
and provides a new level of insight into 5G NR. After background
discussion of 5G, including requirements, spectrum aspects, and the
standardization timeline, all technology features of the first
phase of NR are described in detail. The book covers the NR
physical-layer structure and higher-layer protocols, RF and
spectrum aspects, and co-existence and interworking with LTE. The
book provides a good foundation in NR and different NR technology
components, giving insight into why a certain solution has been
selected. This second edition is updated to reflect the latest
developments in Release 16 and includes brand new chapters on: NR
in unlicensed spectrum; NR-U in Rel-16; IAB; V2X and sidelink in
Rel-16; industrial IoT; IIoT and referring to the URLLC
enhancements for PDCCH; RIM/CL; and positioning. Also included are
the key radio-related requirements of NR; design principles;
technical features of basic NR transmission structure-showing where
it was inherited from LTE, where it deviates from it, and the
reasons why- NR multi-antenna transmission functionality; detailed
description of the signals and functionality of the initial NR
access, including signals for synchronization and system
information; random access and paging; LTE/NR co-existence in the
same spectrum and the benefits of their interworking as one system;
and different aspects of mobility in NR. RF requirements for NR are
described for BS and UE, the legacy bands, and for the new mm-wave
bands.
Computing in Communication Networks: From Theory to Practice
provides comprehensive details and practical implementation tactics
on the novel concepts and enabling technologies at the core of the
paradigm shift from store and forward (dumb) to compute and forward
(intelligent) in future communication networks and systems. The
book explains how to create virtualized large scale testbeds using
well-established open source software, such as Mininet and Docker.
It shows how and where to place disruptive techniques, such as
machine learning, compressed sensing, or network coding in a newly
built testbed. In addition, it presents a comprehensive overview of
current standardization activities. Specific chapters explore
upcoming communication networks that support verticals in
transportation, industry, construction, agriculture, health care
and energy grids, underlying concepts, such as network slicing and
mobile edge cloud, enabling technologies, such as SDN/NFV/ ICN,
disruptive innovations, such as network coding, compressed sensing
and machine learning, how to build a virtualized network
infrastructure testbed on one's own computer, and more.
The internet of things (IoT) has drawn great attention from both
academia and industry, since it offers a challenging notion of
creating a world where all things around us are connected to the
internet and communicate with each other with minimal human
intervention. Another component for helping IoT to succeed is cloud
computing. The combination of cloud computing and IoT will enable
new monitoring services and powerful processing of sensory data
streams. These applications, alongside implementation details and
challenges, should also be explored for successful mainstream
adoption. IoT is also fueled by the advancement of digital
technologies, and the next generation era will be cloud-based IoT
systems. Integration and Implementation of the Internet of Things
Through Cloud Computing studies, analyzes, and presents cloud-based
IoT-related technologies, protocols, and standards along with
recent research and development in cloud-based IoT. It also
presents recent emerging trends and technological advances of
cloud-based IoT, innovative applications, and the challenges and
implications for society. The chapters included take a strong look
at the societal and social aspects of this technology along with
its implementations and technological analyses. This book is
intended for IT specialists, technologists, practitioners,
researchers, academicians, and students who are interested in the
next era of IoT through cloud computing.
Cellular Internet of Things: From Massive Deployments to Critical
5G Applications, Second Edition, gives insights into the recent and
rapid work performed by the 3rd Generation Partnership Project
(3GPP) and the Multefire Alliance (MFA) to develop systems for the
Cellular IoT. Beyond the technologies, readers will learn what the
mMTC and cMTC market segments look like, deployment options and
expected performance in terms of system capacity, expected battery
lifetime, data throughput, access delay time and device cost,
regulations for operation in unlicensed frequency bands, and how
they impact system design and performance. This new edition
contains updated content on the latest EC-GSM IoT, LTE-M and NB-IoT
features in 3GPP Release 15, critical communication, i.e. URLLC,
specified in 3GPP Release 15 for both LTE and NR, LTE-M and NB-IoT
for unlicensed frequency bands specified in the Multefire Alliance
(MFA), and an updated outlook of what the future holds in
Industrial IoT and drone communications, amongst other topics.
Air Route Networks through Complex Networks Theory connects theory
research with network connectivity analysis, providing
practitioners with the tools they need to develop more efficient,
resilient and profitable air route networks. The book helps airline
route planners and executives create more robust route networks
that are less vulnerable to disruptions, such as node isolation.
The book further explores errors and attacks in complex networks,
strategies for detecting critical nodes and cascading failure
models to assess and maximize robustness. The book explains how to
measure air route network connectivity with complex network
representations. Air transport is among the most dynamic and
toughest competition industries in today's global economy. The
quality of air route network design is a key strategic factor in an
airline's viability. These robust networks provide for more stable
and secure carrier operations vs. those based simply on existing
supply and demand volumes. Node-specific and network-specific
representations are covered, along with in-depth coverage of
connectivity in special and temporal networks. These collective
tools serve as a guide for practitioners seeking to apply complex
network theory to the airline industry.
Digital technologies are currently dramatically changing
healthcare. Cloud healthcare is an increasingly trending topic in
the field, converging skills from computer and health science. This
new strategy fosters the management of health data at a large scale
and makes it easier for healthcare organizations to improve patient
experience and health team productivity while helping the support,
security, compliance, and interoperability of health data.
Exploring the Convergence of Computer and Medical Science Through
Cloud Healthcare is a reference in the ongoing digital
transformation of the healthcare sector. It presents a
comprehensive state-of-the-art approach to cloud internet of things
health technologies and practices. It provides insights over
strategies, methodologies, techniques, tools, and services based on
emerging cloud digital health solutions to overcome digital health
challenges. Covering topics such as auxiliary systems, the internet
of medical things, and natural language processing, this premier
reference source is an essential resource for medical
professionals, hospital administrators, medical students, medical
professors, libraries, researchers, and academicians.
As the progression of the internet continues, society is finding
easier, quicker ways of simplifying their needs with the use of
technology. With the growth of lightweight devices, such as smart
phones and wearable devices, highly configured hardware is in
heightened demand in order to process the large amounts of raw data
that are acquired. Connecting these devices to fog computing can
reduce bandwidth and latency for data transmission when associated
with centralized cloud solutions and uses machine learning
algorithms to handle large amounts of raw data. The risks that
accompany this advancing technology, however, have yet to be
explored. Architecture and Security Issues in Fog Computing
Applications is a pivotal reference source that provides vital
research on the architectural complications of fog processing and
focuses on security and privacy issues in intelligent fog
applications. While highlighting topics such as machine learning,
cyber-physical systems, and security applications, this publication
explores the architecture of intelligent fog applications enabled
with machine learning. This book is ideally designed for IT
specialists, software developers, security analysts, software
engineers, academicians, students, and researchers seeking current
research on network security and wireless systems.
Securing Delay-Tolerant Networks with BPSec One-stop reference on
how to secure a Delay-Tolerant Network (DTN), written by
experienced industry insiders Securing Delay-Tolerant Networks with
BPSec answers the question, "How can delay-tolerant networks be
secured when operating in environments that would otherwise break
many of the common security approaches used on the terrestrial
Internet today?" The text is composed of three sections: (1)
security considerations for delay-tolerant networks, (2) the
design, implementation, and customization of the BPSec protocol,
and (3) how this protocol can be applied, combined with other
security protocols, and deployed in emerging network environments.
The text includes pragmatic considerations for deploying BPSec in
both regular and delay-tolerant networks. It also features a
tutorial on how to achieve several important security outcomes with
a combination of security protocols, BPSec included. Overall, it
covers best practices for common security functions, clearly
showing designers how to prevent network architecture from being
over-constrained by traditional security approaches. Written by the
lead author and originator of the BPSec protocol specification,
Securing Delay-Tolerant Networks (DTNs) with BPSec includes
information on: The gap between cryptography and network security,
how security requirements constrain network architectures, and why
we need something different DTN stressing conditions, covering
intermittent connectivity, congested paths, partitioned topologies,
limited link state, and multiple administrative controls Securing
the terrestrial internet, involving a layered approach to security,
the impact of protocol design on security services, and securing
the internetworking and transport layers A delay-tolerant security
architecture, including desirable properties of a DTN secure
protocol, fine-grained security services, and protocol augmentation
Securing Delay-Tolerant Networks (DTNs) with BPSec is a one-stop
reference on the subject for any professional operationally
deploying BP who must use BPSec for its security, including
software technical leads, software developers, space flight mission
leaders, network operators, and technology and product development
leaders in general.
Distributed systems intertwine with our everyday lives. The
benefits and current shortcomings of the underpinning technologies
are experienced by a wide range of people and their smart devices.
With the rise of large-scale IoT and similar distributed systems,
cloud bursting technologies, and partial outsourcing solutions,
private entities are encouraged to increase their efficiency and
offer unparalleled availability and reliability to their users.
Applying Integration Techniques and Methods in Distributed Systems
is a critical scholarly publication that defines the current state
of distributed systems, determines further goals, and presents
architectures and service frameworks to achieve highly integrated
distributed systems and presents solutions to integration and
efficient management challenges faced by current and future
distributed systems. Highlighting topics such as multimedia,
programming languages, and smart environments, this book is ideal
for system administrators, integrators, designers, developers,
researchers, and academicians.
If you look around you will find that all computer systems, from
your portable devices to the strongest supercomputers, are
heterogeneous in nature. The most obvious heterogeneity is the
existence of computing nodes of different capabilities (e.g.
multicore, GPUs, FPGAs, ...). But there are also other
heterogeneity factors that exist in computing systems, like the
memory system components, interconnection, etc. The main reason for
these different types of heterogeneity is to have good performance
with power efficiency. Heterogeneous computing results in both
challenges and opportunities. This book discusses both. It shows
that we need to deal with these challenges at all levels of the
computing stack: from algorithms all the way to process technology.
We discuss the topic of heterogeneous computing from different
angles: hardware challenges, current hardware state-of-the-art,
software issues, how to make the best use of the current
heterogeneous systems, and what lies ahead. The aim of this book is
to introduce the big picture of heterogeneous computing. Whether
you are a hardware designer or a software developer, you need to
know how the pieces of the puzzle fit together. The main goal is to
bring researchers and engineers to the forefront of the research
frontier in the new era that started a few years ago and is
expected to continue for decades. We believe that academics,
researchers, practitioners, and students will benefit from this
book and will be prepared to tackle the big wave of heterogeneous
computing that is here to stay.
Deep Learning through Sparse Representation and Low-Rank Modeling
bridges classical sparse and low rank models-those that emphasize
problem-specific Interpretability-with recent deep network models
that have enabled a larger learning capacity and better utilization
of Big Data. It shows how the toolkit of deep learning is closely
tied with the sparse/low rank methods and algorithms, providing a
rich variety of theoretical and analytic tools to guide the design
and interpretation of deep learning models. The development of the
theory and models is supported by a wide variety of applications in
computer vision, machine learning, signal processing, and data
mining. This book will be highly useful for researchers, graduate
students and practitioners working in the fields of computer
vision, machine learning, signal processing, optimization and
statistics.
Businesses have had to face many challenges due to the COVID-19
pandemic; to survive in the changing landscape, they had to adapt
quickly and implement new tactics and best practices to stay
competitive. Networking is one of the many areas that looks vastly
different in a post-pandemic world and companies must understand
this change or risk falling behind. Further study is required to
uncover the various difficulties and potential future directions of
networking and innovation within the business landscape. The
Handbook of Research on Digital Innovation and Networking in
Post-COVID-19 Organizations provides a thorough overview of the
ways in which organizations have had to change and adapt to the new
business environments and considers how networking looks different
in a post-COVID-19 world. Covering key topics such as
organizational structures, consumer behavior, teleworking, and
collaborations, this major reference work is ideal for managers,
business owners, industry professionals, policymakers, researchers,
scholars, academicians, practitioners, instructors, and students.
|
You may like...
Sea Prayer
Khaled Hosseini
Hardcover
(1)
R336
Discovery Miles 3 360
|