|
|
Books > Computing & IT > Computer communications & networking > General
Call Admission Control (CAC) and Dynamic Channel Assignments (DCA)
are important decision-making problems in mobile cellular
communication systems. Current research in mobile communication
considers them as two independent problems, although the former
greatly depends on the resulting free channels obtained as the
outcome of the latter. This book provides a solution to the CAC
problem, considering DCA as an integral part of decision-making for
call admission. Further, current technical resources ignore
movement issues of mobile stations and fluctuation in network load
(incoming calls) in the control strategy used for call admission.
In addition, the present techniques on call admission offers
solution globally for the entire network, instead of considering
the cells independently. CAC here has been formulated by two
alternative approaches. The first approach aimed at handling the
uncertainty in the CAC problem by employing fuzzy comparators. The
second approach is concerned with formulation of CAC as an
optimization problem to minimize call drop, satisfying a set of
constraints on feasibility and availability of channels, hotness of
cells, and velocity and angular displacement of mobile stations.
Evolutionary techniques, including Genetic Algorithm and
Biogeography Based Optimization, have been employed to solve the
optimization problems. The proposed approaches outperform
traditional methods with respect to grade and quality of services.
The book presents a coherent description of distributed
manufacturing, providing a solid base for further research on the
subject as well as smart implementations in companies. It provides
a guide for those researching and working in a range of fields,
such as smart manufacturing, cloud computing, RFID tracking,
distributed automation, cyber physical production and global design
anywhere, manufacture anywhere solutions. Foundations &
Principles of Distributed Manufacturing anticipates future advances
in the fields of embedded systems, the Internet of Things and cyber
physical systems, outlining how adopting these innovations could
rapidly bring about improvements in key performance indicators,
which could in turn generate competition pressure by rendering
successful business models obsolete. In laying the groundwork for
powerful theoretical models, high standards for the homogeneity and
soundness of the suggested setups are applied. The book especially
elaborates on the upcoming competition in online manufacturing
operations and respective control procedures. By outlining
encapsulation and evolving decision-making principles, Foundations
& Principles of Distributed Manufacturing fully conceptualizes
the view of manufacturing networks as sets of loosely coupled
interacting smart factory objects. Moreover, the book provides
concrete approaches to a number of future fields, where distributed
manufacturing might be applied. Both researchers and professionals
will profit from the authors' broad experience in Distributed
Manufacturing and Fractal Enterprise implementations, where they
initiated and completed a number of successful research projects:
within the global Intelligent Manufacturing Systems (IMS) scheme,
within the European Research Area frameworks as well as national
contexts, and both in industry and at leading research
institutions. This background ensures well-founded theory on one
hand and valuable practical results on the other in a fascinating
area that is still under intensive research. Readers will acquire
essential insights as well as useful guidance for categorizing and
specifying extended distributed manufacturing solutions and their
professional implementations.
Windows 2003 Server is unquestionably the dominant enterprise level
operating system in the industry, with 95% of all companies running
it. And for the last tow years, over 50% of all product upgrades
have been security related. Securing Windows Server, according to
bill gates, is the company's #1 priority.
The book will start off by teaching readers to create the
conceptual design of their Active Directory infrastructure by
gathering and analyzing business and technical requirements. Next,
readers will create the logical design for an Active Directory
infrastructure. Here the book starts to drill deeper and focus on
aspects such as group policy design. Finally, readers will learn to
create the physical design for an active directory and network
Infrastructure including DNS server placement; DC and GC placements
and Flexible Single Master Operations (FSMO) role placement.
The next book in our best selling and critically acclaimed How to
Cheat series. This is the perfect book for users who have already
purchased How to Cheat at Managing Windows 2003 Small Business
Server.
* Active Directory is the market leader in the directory services
space, and 57% of all Microsoft corporate customers have deployed
AD
* Follows Syngress's proven "How To Cheat" methodology
* Companion Web site offers dozens of templates, "Cheat Sheets,"
and checklists for readers
This book combines the three dimensions of technology, society and
economy to explore the advent of today's cloud ecosystems as
successors to older service ecosystems based on networks. Further,
it describes the shifting of services to the cloud as a long-term
trend that is still progressing rapidly.The book adopts a
comprehensive perspective on the key success factors for the
technology - compelling business models and ecosystems including
private, public and national organizations. The authors explore the
evolution of service ecosystems, describe the similarities and
differences, and analyze the way they have created and changed
industries. Lastly, based on the current status of cloud computing
and related technologies like virtualization, the internet of
things, fog computing, big data and analytics, cognitive computing
and blockchain, the authors provide a revealing outlook on the
possibilities of future technologies, the future of the internet,
and the potential impacts on business and society.
Information technology (IT) use has generally been regarded as a
positive phenomenon which always generates desirable outcomes.
Recent years, however, have witnessed increasing negative
consequences resulted from IT use. Emerging issues include
individual users have experienced technostress from personal social
media usage as well as IT use in the workplace; and organisations
have experienced a loss in productivity and assets due to
employees' non-compliance with information security policies.Themes
explored throughout the book include: AI and its Implications for
Organisations Augmented Reality Cognitive Absorption of Technology
Information Technology in Organisations and Societies:
Multidisciplinary Perspectives from AI to Technostress represents a
collective effort that not only consolidates studies on key issues
and phenomena concerning the positive and negative aspects of IT
use but also prescribes future research avenues in related research
domains. It is particularly relevant to academics and researchers
working on IT use research and can be used as a handy reference
guide by those working in the field.
This book constitutes the refereed post-conference proceedings of
the 10th IFIP WG 5.14 International Conference on Computer and
Computing Technologies in Agriculture, CCTA 2016, held in Dongying,
China, in October 2016. The 55 revised papers presented were
carefully reviewed and selected from 128 submissions. They cover a
wide range of interesting theories and applications of information
technology in agriculture, including intelligent sensing, cloud
computing, key technologies of the Internet of Things, precision
agriculture, animal husbandry information technology, including
Internet + modern animal husbandry, livestock big data platform and
cloud computing applications, intelligent breeding equipment,
precision production models, water product networking and big data
, including fishery IoT, intelligent aquaculture facilities, and
big data applications.
The Tactile Internet will change the landscape of communication by
introducing a new paradigm that enables the remote delivery of
haptic data. This book answers the many questions surrounding the
Tactile Internet, including its reference architecture and adapted
compression methods for conveying haptic information. It also
describes the key enablers for deploying the applications of the
Tactile Internet. As an antecedent technology, the IoT is tackled,
explaining the differences and similarities between the Tactile
Internet, the Internet of Things and the Internet of Everything.
The essentials of teleoperation systems are summarized and the
challenges that face this paradigm in its implementation and
deployment are also discussed. Finally, a teleoperation case study
demonstrating an application of the Tactile Internet is
investigated to demonstrate its functionalities, architecture and
performance.
Synthetic Worlds, Virtual Worlds, and Alternate Realities are all
terms used to describe the phenomenon of computer-based, simulated
environments in which users inhabit and interact via avatars. The
best-known commercial applications are in the form of electronic
gaming, and particularly in massively-multiplayer online
role-playing games like World of Warcraft or Second Life. Less
known, but possibly more important, is the rapid adoption of
platforms in education and business, where Serious Games are being
used for training purposes, and even Second Life is being used in
many situations that formerly required travel. The editors of this
book captures the state of research in the field intended to
reflect the rapidly growing yet relatively young market in
education and business. The general focus is set on the scientific
community but integrates the practical applications for businesses,
with papers on information systems, business models, and economics.
In six parts, international authors - all experts in their field -
discuss the current state-of-the-art of virtual worlds/alternate
realities and how the field will develop over the next years.
Chapters discuss the influences and impacts in and around virtual
worlds. Part four is about education, with a focus on learning
environments and experiences, pedagogical models, and the effects
on the different roles in the educational sector. The book looks at
business models and how companies can participate in virtual worlds
while receiving a return on investment, and includes cases and
scenarios of integration, from design, implementation to
application.
By the year 2000, a balance was sought between security
requirements and a respect for privacy, as well as for individual
and collective freedoms. As we progress further into the 21st
century, however, security is taking precedence within an
increasingly controlled society. This shift is due to advances in
innovative technologies and the investments made by commercial
companies to drive constant technological progress. Despite the
implementation of the General Data Protection Regulation (GDPR)
within the EU in 2018 or 2020's California Consumer Privacy Act
(CCPA), regulatory bodies do not have the ability to fully manage
the consequences presented by emerging technologies. Security and
Its Challenges in the 21st Century provides students and
researchers with an international legal and geopolitical analysis;
it is also intended for those interested in societal development,
artificial intelligence, smart cities and quantum cryptology.
This book addresses the fundamental theory and key technologies of
narrowband and broadband mobile communication systems specifically
for railways. It describes novel relaying schemes that meet the
different design criteria for railways and discusses the
applications of signal classification techniques as well as offline
resource scheduling as a way of advancing rail practice. Further,
it introduces Novel Long Term Evolution for Railway (LTE-R) network
architecture, the Quality of Service (QoS) requirement of LTE-R and
its performance evaluation and discusses in detail security
technologies for rail-dedicated mobile communication systems. The
advanced research findings presented in the book are all based on
high-speed railway measurement data, which offer insights into the
propagation mechanisms and corresponding modeling theory and
approaches in unique railway scenarios.It is a valuable resource
for researchers, engineers and graduate students in the fields of
rail traffic systems, telecommunication and information systems.
This book explores the concept of a map as a fundamental data type.
It defines maps at three levels. The first is an abstract level, in
which mathematic concepts are leveraged to precisely explain maps
and operational semantics. The second is at a discrete level, in
which graph theory is used to create a data model with the goal of
implementation in computer systems. Finally, maps are examined at
an implementation level, in which the authors discuss the
implementation of a fundamental map data type in database systems.
The map data type presented in this book creates new mechanisms for
the storage, analysis, and computation of map data objects in any
field that represents data in a map form. The authors develop a
model that includes a map data type capable of representing
thematic and geometric attributes in a single data object. The book
provides a complete example of mathematically defining a data type,
ensuring closure properties of those operations, and then
translating that type into a state that is suited for
implementation in a particular context. The book is designed for
researchers and professionals working in geography or computer
science in a range of fields including navigation, reasoning,
robotics, geospatial analysis, data management, and information
retrieval.
Is meaningful communication possible between two intelligent
parties who share no common language or background? In this work, a
theoretical framework is proposed in which it is possible to
address when and to what extent such semantic communication is
possible: such problems can be rigorously addressed by explicitly
focusing on the goals of the communication. Under this framework,
it is possible to show that for many goals, communication without
any common language or background is possible using universal
protocols. This work should be accessible to anyone with an
undergraduate-level knowledge of the theory of computation. The
theoretical framework presented here is of interest to anyone
wishing to design systems with flexible interfaces, either among
computers or between computers and their users.
This book develops, evaluates and refines a cloud service
relationship theory that explains how cloud users' uncertainties
arise in these relationships and how they can be mitigated. To that
end, the book employs principal-agent theory and the concepts of
bounded rationality and social embeddedness. Beyond advancing IS
research, the findings presented can greatly benefit governments,
IT departments and IT providers, helping them to better understand
cloud service relationships and to adjust their cloud service
strategies accordingly.
This book presents a mathematical treatment of the radio resource
allocation of modern cellular communications systems in contested
environments. It focuses on fulfilling the quality of service
requirements of the living applications on the user devices, which
leverage the cellular system, and with attention to elevating the
users' quality of experience. The authors also address the
congestion of the spectrum by allowing sharing with the band
incumbents while providing with a quality-of-service-minded
resource allocation in the network. The content is of particular
interest to telecommunications scheduler experts in industry,
communications applications academia, and graduate students whose
paramount research deals with resource allocation and quality of
service.
The ubiquity of modern technologies has allowed for increased
connectivity between people and devices across the globe. This
connected infrastructure of networks creates numerous opportunities
for applications and uses. The Internet of Things: Breakthroughs in
Research and Practice is an authoritative reference source for the
latest academic material on the interconnectivity of networks and
devices in the digital era and examines best practices for
integrating this advanced connectivity across multiple fields.
Featuring extensive coverage on innovative perspectives, such as
secure computing, regulatory standards, and trust management, this
book is ideally designed for engineers, researchers, professionals,
graduate students, and practitioners seeking scholarly insights on
the Internet of Things.
Globalization has pushed the use of technology in business with
advancing information and communication technology becoming a key
factor in the future development of the retailing industry.
Technology applications have significantly contributed to the
exponential growth and profits of retailing institutions worldwide.
""Information Communication Technologies and Globalization of
Retailing Applications"" critically examines the synergy of
technology use and conventional wisdom in retailing and explores
contemporary changes determining higher customer value. Discussions
in this book encompass strategy implications for managers to
optimize their advantage in retailing through the application of
ICT, bridging the customer-technology gap.
This book presents a collection of the latest research in the area
of immersive technologies, presented at the International Augmented
and Virtual Reality Conference 2018 in Manchester, UK, and
showcases how augmented reality (AR) and virtual reality (VR) are
transforming the business landscape. Innovations in this field are
seen as providing opportunities for businesses to offer their
customers unique services and experiences. The papers gathered here
advance the state of the art in AR/VR technologies and their
applications in various industries such as healthcare, tourism,
hospitality, events, fashion, entertainment, retail, education and
gaming. The volume collects contributions by prominent computer and
social sciences experts from around the globe. Addressing the most
significant topics in the field of augmented and virtual reality
and sharing the latest findings, it will be of interest to
academics and practitioners alike.
Modern organizations are critically dependent on data
communications and network systems utilized in managing information
and communications, vital to continuity and success of operations.
""Breakthrough Perspectives in Network and Data Communications
Security, Design and Applications"" addresses key issues and offers
expert viewpoints into the field of network and data
communications, providing the academic, information technology, and
managerial communities with the understanding necessary to
implement robust, secure, and effective solutions. This much-needed
addition to library and professional collections offers a matchless
set of high quality research articles and premier technologies to
address the most salient issues in network and data communications.
When digitized entities, connected devices and microservices
interact purposefully, we end up with a massive amount of
multi-structured streaming (real-time) data that is continuously
generated by different sources at high speed. Streaming analytics
allows the management, monitoring, and real-time analytics of live
streaming data. The topic has grown in importance due to the
emergence of online analytics and edge and IoT platforms. A real
digital transformation is being achieved across industry verticals
through meticulous data collection, cleansing and crunching in real
time. Capturing and subjecting those value-adding events is
considered to be the prime task for achieving trustworthy and
timely insights. The authors articulate and accentuate the
challenges widely associated with streaming data and analytics,
describe data analytics algorithms and approaches, present edge and
fog computing concepts and technologies and show how streaming
analytics can be accomplished in edge device clouds. They also
delineate several industry use cases across cloud system operations
in transportation and cyber security and other business domains.
The book will be of interest to ICTs industry and academic
researchers, scientists and engineers as well as lecturers and
advanced students in the fields of data science, cloud/fog/edge
architecture, internet of things and artificial intelligence and
related fields of applications. It will also be useful to
cloud/edge/fog and IoT architects, analytics professionals, IT
operations teams and site reliability engineers (SREs).
A smart building is the state-of-art in building with features that
facilitates informed decision making based on the available data
through smart metering and IoT sensors. This set provides useful
information for developing smart buildings including significant
improvement of energy efficiency, implementation of operational
improvements and targeting sustainable environment to create an
effective customer experience. It includes case studies from
industrial results which provide cost effective solutions and
integrates the digital SCADE solution. Describes complete
implication of smart buildings via industrial, commercial and
community platforms Systematically defines energy-efficient
buildings, employing power consumption optimization techniques with
inclusion of renewable energy sources Covers data centre and cyber
security with excellent data storage features for smart buildings
Includes systematic and detailed strategies for building air
conditioning and lighting Details smart building security
propulsion. This set is aimed at graduate students, researchers and
professionals in building systems, architectural, and electrical
engineering.
This book provides extensive insight into the possibilities and
challenges of XML in building new information management solutions
in networked organizations. After a brief introduction to Web
communication features and XML fundamentals, the book examines the
benefits of adopting XML and illustrates various types of XML use:
XML in document management; XML for data-centric and multimedia
components; XML as a format for metadata, including metadata for
the Semantic Web; and XML in support of data interchange between
software applications and among organizations. The challenges of
adopting XML in large-scale information management are also
discussed. In addition, applications across a broad spectrum are
examined and numerous case studies pertaining to the adoption of
XML are presented. The book is particularly suitable for courses
offered in Information Studies, Information Systems, or Information
Technology. It also serves as an excellent practical guide for
professionals in information management and provides important
support material for courses in Computer Science and in Business.
|
You may like...
Saint Joan
George Bernard Shaw
Paperback
R362
Discovery Miles 3 620
Major Barbara
George Bernard Shaw
Hardcover
R714
Discovery Miles 7 140
|