![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer communications & networking > General
This book investigates the modeling and optimization issues in mobile social networks (MSNs). Firstly, the architecture and applications of MSNs are examined. The existing works on MSNs are reviewed by specifying the critical challenges and research issues. Then, with the introduction of MSN-based social graph and information dissemination mechanisms, the analytical model for epidemic information dissemination with opportunistic Links in MSNs is discussed. In addition, optimal resource allocation is studied based on a heterogeneous architecture, which provides mobile social services with high capacity and low latency. Finally, this book summarize some open problems and future research directions in MSNs. Written for researchers and academics, this book is useful for anyone working on mobile networks, network architecture, or content delivery. It is also valuable for advanced-level students of computer science.
Research and development in wireless and mobile networks and services areas have been going on for some time, reaching the stage of products. Graceful evo- tion of networks, new access schemes, flexible protocols, increased variety of services and applications, networks reliability and availability, security, are some of the present and future challenges that have to be met. MWCN (Mobile and Wireless Communications Networks) and PWC (Personal Wireless Communications) are two conferences sponsored by IFIP WG 6.8 that provide forum for discussion between researchers, practitioners and students interested in new developments in mobile and wireless networks, services, applications and computing. In 2008, MWCN and PWC were held in Toulouse, France, from September 30 to October 2, 2008. MWNC'2008 and PWC'2008 were coupled to form the first edition of IFIP Wireless and Mobile Networking Conference (WMNC'2008). MWCN and PWC topics were revisited in order to make them complementary and covering together the main hot issues in wireless and mobile networks, services, applications, computing, and technologies.
The COVID-19 pandemic upended the lives of many and taught us the critical importance of taking care of one's health and wellness. Technological advances, coupled with advances in healthcare, has enabled the widespread growth of a new area called mobile health or mHealth that has completely revolutionized how people envision healthcare today. Just as smartphones and tablet computers are rapidly becoming the dominant consumer computer platforms, mHealth technology is emerging as an integral part of consumer health and wellness management regimes. The aim of this book is to inform readers about the this relatively modern technology, from its history and evolution to the current state-of-the-art research developments and the underlying challenges related to privacy and security issues. The book's intended audience includes individuals interested in learning about mHealth and its contemporary applications, from students to researchers and practitioners working in this field. Both undergraduate and graduate students enrolled in college-level healthcare courses will find this book to be an especially useful companion and will be able to discover and explore novel research directions that will further enrich the field.
Reactive systems are computing systems which are interactive, such as real-time systems, operating systems, concurrent systems, control systems, etc. They are among the most difficult computing systems to program. Temporal logic is a formal tool/language which yields excellent results in specifying reactive systems. This volume, the first of two, subtitled Specification, has a self-contained introduction to temporal logic and, more important, an introduction to the computational model for reactive programs, developed by Zohar Manna and Amir Pnueli of Stanford University and the Weizmann Institute of Science, Israel, respectively.
Foreword by Lars Knudsen
The twentieth century ended with the vision of smart dust: a network of wirelessly connected devices whose size would match that of a dust particle, each one a se- containedpackageequippedwithsensing, computation, communication, andpower. Smart dust held the promise to bridge the physical and digital worlds in the most unobtrusive manner, blending together realms that were previously considered well separated. Applications involved scattering hundreds, or even thousands, of smart dust devices to monitor various environmental quantities in scenarios ranging from habitat monitoring to disaster management. The devices were envisioned to se- organize to accomplish their task in the most ef?cient way. As such, smart dust would become a powerful tool, assisting the daily activities of scientists and en- neers in a wide range of disparate disciplines. Wireless sensor networks (WSNs), as we know them today, are the most no- worthy attempt at implementing the smart dust vision. In the last decade, this ?eld has seen a fast-growing investment from both academia and industry. Signi?cant ?nancial resources and manpower have gone into making the smart dust vision a reality through WSNs. Yet, we still cannot claim complete success. At present, only specialist computerscientists or computerengineershave the necessary background to walk the road from conception to a ?nal, deployed, and running WSN syst
5G Core Networks: Powering Digitalization provides an overview of the 5G Core network architecture, as well as giving descriptions of cloud technologies and the key concepts in the 3GPP rel-15/16 specifications. Written by the authors who are heavily involved in development of the 5G standards and who wrote the successful book on EPC and 4G Packet Networks, this book provides an authoritative reference on the technologies and standards of the 3GPP 5G Core network. Content includes: An overview of the 5G Core Architecture The Stand-Alone and Non-Stand-Alone Architectures Detailed presentation of 5G Core key concepts An overview of 5G Radio and Cloud technologies Learn The differences between the 5G Core network and previous core network generations How the interworking with previous network standards is defined Why certain functionality has been included and what is beyond the scope of 5G Core How the specifications relate to state-of-the-art web-scale concepts and virtualization technologies Details of the protocol and service descriptions Examples of network deployment options
Applications of optical switching in network elements and communication networks are discussed in considerable depth. Optical circuits, packet, and burst switching are all included. Composed of distinct self-contained chapters with minimum overlaps and independent references. Provides up-to-date comprehensive coverage of optical switching, technologies, devices, systems and networks. Discusses applications of optical switching in network elements and communications networks.
Systematic Design of Sigma-Delta Analog-to-Digital Converters
describes the issues related to the sigma-delta analog-to-digital
converters (ADCs) design in a systematic manner: from the top level
of abstraction represented by the filters defining signal and noise
transfer functions (STF, NTF), passing through the architecture
level where topology-related performance is calculated and
simulated, and finally down to parameters of circuit elements like
resistors, capacitors, and amplifier transconductances used in
individual integrators. The systematic approach allows the
evaluation of different loop filters (order, aggressiveness,
discrete-time or continuous-time implementation) with quantizers
varying in resolution. Topologies explored range from simple single
loops to multiple cascaded loops with complex structures including
more feedbacks and feedforwards. For differential circuits, with
switched-capacitor integrators for discrete-time (DT) loop filters
and active-RC for continuous-time (CT) ones, the passive integrator
components are calculated and the power consumption is estimated,
based on top-level requirements like harmonic distortion and noise
budget.
Industrial IoT (IIoT) and Industry 4.0 are newly developing and fast emerging domains of interest among students, researchers, and professionals in academia and industry. Due to the popular demand of this topic, Introduction to Industrial Internet of Things and Industry 4.0 is written to serve a diverse readership from the domains of computer science and engineering, mechanical engineering, information technology, industrial engineering, electronics engineering, and other related branches of engineering. Based on the lead author's massive open online courses (MOOCs), this book can be used as a textbook on the emerging paradigm of Industry 4.0 and IIoT, as well as a reference for professionals working in sectors of IIoT. The book covers the significant aspects of IIoT in detail, including sensors, actuators, data transmission, and data acquisition, which form the core of IIoT. Topics and concepts are presented in a comprehensive manner, so that readers can develop expertise and knowledge. The book helps beginners to gain a basic idea of Industry 4.0 and IIoT as the first section is an overview of IoT applications, infrastructure-based protocols, cloud computing, and fog computing. The second section is designed to impart a basic knowledge of Industry 4.0 and IIoT as well as of the different phases of development in industry. Delving into more advanced areas, other sections in the book cover: The business models and reference architecture of IIoT The technological aspects of Industry 4.0 and IIoT Predictive and prescriptive analytics applied in IIoT-based implementations Applications and case studies of IIoT Key enabling technologies of IIoT To aid students and professional master IIoT and Industry 4.0, the book includes conceptual questions, exercises, and learning objectives.
1) What to do when you get hacked 2) A guide to incident response 3) Incident response and cybersecurity for small businesses
The diversity of methodologies and applications in the literature for the performance modelling and analysis of ATM networks, widely considered as the new generation of high speed communication systems, attests to the breadth and richness of recent ATM research and developments Performance Evaluation and Applications of ATM Networks contains seventeen tutorial papers by eminent researchers and practitioners in the ATM field worldwide. It offers a fundamental source of reference, reflecting essential state-of-the-art material for further research and development in the performance evaluation and applications field of ATM networks. Topics discussed in this book include: ATM Traffic Modelling and Characterization; ATM Traffic Management and Control ATM Routing and Network Resilience; IP/ATM Networks Integration; ATM Special Topics: Optical, Wireless and Satellite Networks; Analytical Techniques for ATM Networks. Performance Evaluation and Applications of ATM Networks maintains throughout an effective balance between descriptive and quantitative approaches for the presentation of important ATM mechanisms and performance evaluation techniques. It unifies ATM performance modelling material already known and introduces readers to some unfamiliar and unexplored ATM performance evaluation and application research areas. Performance Evaluation and Applications of ATM Networks is ideal for personnel in computer/communication industries as well as academic researchers in computer science and electrical engineering.
This is an examination of the history and the state of the art of the quest for visualizing scientific knowledge and the dynamics of its development. Through an interdisciplinary perspective this book presents profound visions, pivotal advances, and insightful contributions made by generations of researchers and professionals, which portrays a holistic view of the underlying principles and mechanisms of the development of science. This updated and extended second edition: highlights the latest advances in mapping scientific frontiers examines the foundations of strategies, principles, and design patterns provides an integrated and holistic account of major developments across disciplinary boundaries "Anyone who tries to follow the exponential growth of the literature on citation analysis and scientometrics knows how difficult it is to keep pace. Chaomei Chen has identified the significant methods and applications in visual graphics and made them clear to the uninitiated. Derek Price would have loved this book which not only pays homage to him but also to the key players in information science and a wide variety of others in the sociology and history of science." - Eugene Garfield "This is a wide ranging book on information visualization, with a specific focus on science mapping. Science mapping is still in its infancy and many intellectual challenges remain to be investigated and many of which are outlined in the final chapter. In this new edition Chaomei Chen has provided an essential text, useful both as a primer for new entrants and as a comprehensive overview of recent developments for the seasoned practitioner." - Henry Small Chaomei Chen is a Professor in the College of Information Science and Technology at Drexel University, Philadelphia, USA, and a ChangJiang Scholar at Dalian University of Technology, Dalian, China. He is the Editor-in-Chief of Information Visualization and the author of Turning Points: The Nature of Creativity (Springer, 2012) and Information Visualization: Beyond the Horizon (Springer, 2004, 2006).
Ethics and Human Behaviour in ICT Development discusses ethics in a professional context and encourages readers to self-assessment of their own behaviour. It provides thought-provoking accounts of the little-known early history of technological development in information and communication technology (ICT) and the automation industry in Poland, with a focus on Wroclaw. The book provides a framework for understanding the relationship between ethics and behaviour, and analyses critically ethical and behavioural issues in challenging workplaces and social contexts. It includes: case studies from around the world, especially Poland, which illustrate the relationships between human behaviour and ethics; biographies of successful Polish ICT and automation leading designers; analysis of case studies of human behaviour and ethics in challenging industrial development and other environments; and illustrative practical applications alongside the theory of human behaviour and ethics. The authors demonstrate the ingenuity of the early Polish designers, programmers and other specialists in overcoming the shortage of components caused by import embargoes to enable Poland to develop its own computer industry. An example of this is Elwro, formerly the largest manufacturer of computers in Poland. The discussion of its growth illustrates the potential of human creativity to overcome problems. The discussion of its fall highlights the importance of ethical approaches to technology transfer and the dangers of a colonialist mentality. The book is designed for engineers, computer scientists, researchers and professionals alike, as well as being of interest for those broadly concerned with ethics and human behaviour.
Very little has been written to address the emerging trends in social software and technology. With these technologies and applications being relatively new and evolving rapidly, research is wide open in these fields. Social Software and Web 2.0 Technology Trends fills this critical research need, providing an overview of the current state of Web 2.0 technologies and their impact on organizations and educational institutions. Written for academicians and practicing managers, this estimable book presents business applications as well as implementations for institutions of higher education with numerous examples of how these technologies are currently being used. Delivering authoritative insights to a rapidly evolving domain of technology application, this book is an invaluable resource for both academic libraries and for classroom instruction.
The unrelenting growth of wireless communications continues to raise new research and development problems that require unprecedented interactions among communication engineers. In particular, specialists in transmission and specialists in networks must often cross each other's boundaries. This is especially true for CDMA, an access technique that is being widely accepted as a system solution for next-generation mobile cellular systems, but it extends to other system aspects as well. Major challenges lie ahead, from the design of physical and radio access to network architecture, resource management, mobility management, and capacity and performance aspects. Several of these aspects are addressed in this volume, the fourth in the edited series on Multiaccess, Mobility and Teletraffic for Wireless Communications. It contains papers selected from MMT'99, the fifth Workshop held on these topics in October 1999 in Venezia, Italy. The focus of this workshop series is on identifying, presenting, and discussing the theoretical and implementation issues critical to the design of wireless communication networks. More specifically, these issues are examined from the viewpoint of the impact each one of them can have on the others. Specific emphasis is given to the evolutionary trends of universal wireless access and software radio. Performance improvements achieved by spectrally efficient codes and smart antennas in experimental GSM testbeds are presented. Several contributions address critical issues regarding multimedia services for Third-Generation Mobile Radio Networks ranging from high rate data transmission with CDMA technology to resource allocation for integrated Voice/WWW traffic.
This book mainly introduces the latest development of generalized intuitionistic multiplicative fuzzy calculus and its application. The book pursues three major objectives: (1) to introduce the calculus models with concrete mathematical expressions for generalized intuitionistic multiplicative fuzzy information; (2) to introduce new information fusion methods based on the definite integral models; and (3) to clarify the involved approaches bymilitary case. The book is especially valuable for readers to understand how the theoretical framework of generalized intuitionistic multiplicative fuzzy calculus is constructed, not only discrete or continuous but also correlative (generalized) intuitionistic (multiplicative) fuzzy information is aggregated based on the definite integral models and the theory with a military practice is integrated, which would deepen the understanding and give researchers more inspiration in practical decision analysis under uncertainties.
Today, the information systems (IS) discipline faces new challenges. Emerging technologies as well as matured approaches for the social, technical, and developmental role of IS provide a new context for the evolution of the discipline over the next few years. ""Emerging Topics and Technologies in Information Systems"" communicates the challenges and opportunities that information systems research is dealing with today while promoting cutting-edge research on how current IS support is creating the critical backbone for the knowledge society. This book is an essential reference for policy makers, government officers, academicians, and practitioners thirsty for knowledge on IS and IT beyond traditional textbooks.
Many organizations critically depend on very large information systems. In the authors' experience these organizations often struggle to find the right strategy to sustainably develop their systems. Based on their own experience at a major bank, over more than a decade, the authors have developed a successful strategy to deal with these challenges, including: - A thorough analysis of the challenges associated with very large information systems - An assessment of possible strategies for the development of these systems, resulting in managed evolution as the preferred strategy - Describing key system aspects for the success of managed evolution, such as architecture management, integration architecture and infrastructure - Developing the necessary organizational, cultural, governance and controlling mechanisms for successful execution
This book provides a comprehensive view of the methods and approaches for performance evaluation of computer networks. It offers a clear and logical introduction to the topic, covering both fundamental concepts and practical aspects. It enables the reader to answer a series of questions regarding performance evaluation in modern computer networking scenarios, such as 'What, where, and when to measure?', 'Which time scale is more appropriate for a particular measurement and analysis?', 'Experimentation, simulation or emulation? Why?', and 'How do I best design a sound performance evaluation plan?'. The book includes concrete examples and applications in the important aspects of experimentation, simulation and emulation, and analytical modeling, with strong support from the scientific literature. It enables the identification of common shortcomings and highlights where students, researchers, and engineers should focus to conduct sound performance evaluation. This book is a useful guide to advanced undergraduates and graduate students, network engineers, and researchers who plan and design proper performance evaluation of computer networks and services. Previous knowledge of computer networks concepts, mechanisms, and protocols is assumed. Although the book provides a quick review on applied statistics in computer networking, familiarity with basic statistics is an asset. It is suitable for advanced courses on computer networking as well as for more specific courses as a secondary textbook.
The research presented in this book discusses how to efficiently retrieve track and trace information for an item of interest that took a certain path through a complex network of manufacturers, wholesalers, retailers, and consumers. To this end, a super-ordinate system called "Discovery Service" is designed that has to handle large amounts of data, high insert-rates, and a high number of queries that are submitted to the discovery service. An example that is used throughout this book is the European pharmaceutical supply chain, which faces the challenge that more and more counterfeit medicinal products are being introduced. Between October and December 2008, more than 34 million fake drug pills were detected at customs control at the borders of the European Union. These fake drugs can put lives in danger as they were supposed to fight cancer, take effect as painkiller or antibiotics, among others. The concepts described in this book can be adopted for supply chain management use cases other than track and trace, such as recall, supply chain optimization, or supply chain analytics.
Modeling and Simulation Environment for Satellite and Terrestrial Communications Networks: Proceedings of the European COST Telecommunications Symposium will be of interest to network designers, developers, and operators. This book is a collection of papers given at the European Cost Telecommunications Symposium. The Symposium was broken down into four sessions: Modelling and Simulation. Teletraffic Modelling. Communications Networks Simulation. Problems in Simulation. Each session addressed a wide spectrum of subjects. The symposium covered nearly all of the important aspects of simulation modeling and tools for the design and performance evaluation of communication techniques and systems. Emerging techniques were emphasized. Modeling and Simulation Environment for Satellite and Terrestrial Communications Networks: Proceedings of the European COST Telecommunications Symposium is a useful reference work for practicing engineers and academic researchers.
This book focus on Long Term Evolution (LTE) and beyond. The chapters describe different aspects of research and development in LTE, LTE-Advanced (4G systems) and LTE-450 MHz such as telecommunications regulatory framework, voice over LTE, link adaptation, power control, interference mitigation mechanisms, performance evaluation for different types of antennas, cognitive mesh network, integration of LTE network and satellite, test environment, power amplifiers and so on. It is useful for researchers in the field of mobile communications.
Pervasive Computing and Networking aim at providing ubiquitous, ever-present, adaptable, smart, enveloping and immersive environments in which computing components and humans can interact regardless of the location. The combination of an abundance of computational power of the processors and the communication bandwidth provided by the wireless and mobile networking everywhere and all the time makes such environments within the reach of current technology. Yet, to realize the full potential of such environments, many technical and economical challenges needs to be overcome. These challenges and the perspective on the seminal directions of the research in this area were the subject of the Workshop for Pervasive Computing and Networking at Rensselaer Polytechnic Institute, Troy, NY, USA. This book presents chapters based on presentations made at the workshop by leaders in the field. The scope of Advances in Pervasive Computing and Networking ranges from fundamental theory of pervasive computing and networking to crucial challenges and emerging applications. Such seminal topics as a scalable, self-organizing technology for sensor networks, the fundamental relationship between the achievable capacity and delay in mobile wireless networks, the role of self-optimization in sensor networks or similarities and differences between computer networks and their biological counterparts are the subject of the first group of chapters. The next group of chapters covers communication issues, such as cooperative communication in mobile, wireless and sensor networks, methods for maximizing aggregate throughput in 802.11 mesh networks with a physical carrier, and self-configuring location discovery systems for smart environments. The book closes with chapters focusing on sensor network emerging applications such as smart and safe buildings, a design for a distributed transmitter for reachback based on radar signals sensing and two-radio multi-channel clustering.
Cloud Systems in Supply Chains explores the risks that could face supply chain firms if their implementation of cloud systems is not carefully managed or if not appropriately selected and supported. This volume aids supply chain firms in ensuring that their cloud system activities are positioned to assist and sustain their competitive advantages. |
![]() ![]() You may like...
Practical Industrial Data Communications…
Deon Reynders, Steve Mackay, …
Paperback
R1,490
Discovery Miles 14 900
Research Anthology on Architectures…
Information R Management Association
Hardcover
R14,044
Discovery Miles 140 440
Research Anthology on Architectures…
Information R Management Association
Hardcover
R14,048
Discovery Miles 140 480
Deep Reinforcement Learning for Wireless…
Dinh Thai Hoang, Nguyen Van Huynh, …
Hardcover
R3,112
Discovery Miles 31 120
Network+ Guide to Networks
Jill West, Jean Andrews, …
Paperback
|