![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
This book constitutes the refereed proceedings of the 6th International Workshop on Representations, Analysis and Recognition of Shape and Motion from Imaging Data, RFMI 2016, held in Sidi Bou Said Village, Tunisia, in October 2016. The 9 revised full papers and 7 revised short papers presented were carefully reviewed and selected from 23 submissions. The papers are organized in topical sections on 3D shape registration and comparison; face analysis and recognition; video and motion analysis; 2D shape analysis.
This book constitutes the refereed proceedings of the 23nd International Conference on Information and Software Technologies, ICIST 2017, held in Druskininkai, Lithuania, in October 2017. The 51 papers presented were carefully reviewed and selected from 135 submissions. The papers are organized in topical sections on information systems; business intelligence for information and software systems; software engineering; information technology applications.
This book constitutes the refereed proceedings of the 6th International Conference on Game Theory for Networks, GameNets 2016, held in Kelowna, Canada, in May 2016. The 13 papers were carefully selected from 26 submissions and cover topics such as algorithmic game theory, game models and theories, game theories in wireless networks, design and analysis of economic games.
This SpringerBrief offers two concrete design examples for traffic offloading. The first is an optimal resource allocation for small-cell based traffic offloading that aims at minimizing mobile users' data cost. The second is an optimal resource allocation for device-to-device assisted traffic offloading that also minimizes the total energy consumption and cellular link usage (while providing an overview of the challenging issues). Both examples illustrate the importance of proper resource allocation to the success of traffic offloading, show the consequent performance advantages of executing optimal resource allocation, and present the methodologies to achieve the corresponding optimal offloading solution for traffic offloading in heterogeneous cellular networks. The authors also include an overview of heterogeneous cellular networks and explain different traffic offloading paradigms ranging from uplink traffic offloading through small cells to downlink traffic offloading via mobile device-to-device cooperation. This brief is an excellent resource for postgraduate students studying advanced-level topics in wireless communications and networking. Researchers, engineers and professionals working in related fields will also find this brief a valuable resource tool.
This SpringerBrief explains the emerging cyber threats that undermine Android application security. It further explores the opportunity to leverage the cutting-edge semantics and context-aware techniques to defend against such threats, including zero-day Android malware, deep software vulnerabilities, privacy breach and insufficient security warnings in app descriptions. The authors begin by introducing the background of the field, explaining the general operating system, programming features, and security mechanisms. The authors capture the semantic-level behavior of mobile applications and use it to reliably detect malware variants and zero-day malware. Next, they propose an automatic patch generation technique to detect and block dangerous information flow. A bytecode rewriting technique is used to confine privacy leakage. User-awareness, a key factor of security risks, is addressed by automatically translating security-related program semantics into natural language descriptions. Frequent behavior mining is used to discover and compress common semantics. As a result, the produced descriptions are security-sensitive, human-understandable and concise.By covering the background, current threats, and future work in this field, the brief is suitable for both professionals in industry and advanced-level students working in mobile security and applications. It is valuable for researchers, as well.
This book constitutes the refereed proceedings of the First International Conference on Smart Trends in Information Technology and Computer Communications, SmartCom 2016, held in Jaipur, India, in August 2016. The 106 revised papers presented were carefully reviewed and selected from 469 submissions. The papers address issues on smart and secure systems; technologies for digital world; data centric approaches; applications for e-agriculture and e-health; products and IT innovations; research for knowledge computing.
If you've already tinkered a bit with Arduino or Raspberry Pi, and you want to get more hands-on with hardware, or even if you're completely new to electronics and you just want to dive in, then Beginning FPGA is the book you need. You don't need an electronics engineering degree or even any programming experience to get the most out of Beginning FPGA. Just bring your curiosity and your FPGA. In this book, you'll be using the MicroNova Mercury, a very affordable and breadboard-friendly FPGA development board. FPGA stands for Field-Programmable Gate Array. It's an integrated circuit waiting for you to tell it what to become. Unlike a microcontroller board like the Arduino, you don't really program an FPGA and tell it what to do; instead you use a hardware description language to tell it what to be. And what can it be? It can be just about anything you can imagine In this book you'll use it to create a pressure sensor, an air quality sensor, and just for fun, the KITT car display from Knight Rider (or Cylon eyes if you prefer to think of it that way). You'll also learn how to make your FPGA talk to a Raspberry Pi.Along the way, you'll learn the theory behind FPGAs and electronics, including the math and logic you need to understand what's happening - all explained in a fun, friendly, and accessible way. It also doesn't hurt that you'll be learning VHDL, a hardware description languae that is also an extremely marketable skill. What you'll learn * What an FPGA is and how it's different from a microcontroller or ASIC * How to set up your toolchain * How to use VHDL, a popular hardware description language, to tell your FPGA what to be * Theory behind FPGA and electronics * How to use your FPGA with a variety of sensors * How to use your FPGA to talk to a Raspberry Pi Who this book is for Arduino, Raspberry Pi, and other electronics enthusiasts who want a clear and practical introduction to FPGA. No experience necessary.
This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The primary emphasis is on protocol modeling and analysis. It introduces media access control (MAC) protocols, standards of wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless body area networks (WBANs), discussing their key technologies, applications, and deployment scenarios. The main analytical approaches and models for performance analysis of the fundamental resource scheduling mechanisms, including the contention-based, reservation-based, and hybrid MAC, are presented. To help readers understand and evaluate system performance, the brief contains a range of simulation results. In addition, a thorough bibliography provides an additional tool. This brief is an essential resource for engineers, researchers, students, and users of wireless networks.
This book constitutes the post-conference proceedings of the First International Conference on Smart Grid Inspired Future Technologies, SmartGIFT 2016, held in May 2016 in Liverpool, UK. Smart grid is the next generation electric grid that enables efficient, intelligent, and economical power generation, transmission, and distribution. The 25 revised full papers presented were reviewed and selected from 36 submissions. The papers cover technical topics such as high-level ideology and methodology, concrete smart grid inspired data sensing, processing, and networking technologies, smart grid system architecture, Quality of Service (QoS), energy efficiency, security in smart grid systems, management of smart grid systems, service engineering and algorithm design, and real-world deployment experiences.
This SpringerBrief introduces key techniques for 5G wireless networks. The authors cover the development of wireless networks that led to 5G, and how 5G mobile communication technology (5G) can no longer be defined by a single business model or a typical technical characteristic. The discussed networks functions and services include Network Foundation Virtualization (N-FV), Cloud Radio Access Networks (Cloud-RAN), and Mobile Cloud Networking (MCN). The benefits of cloud platforms are examined, as are definable networking and green wireless networking. Other related and representative projects on 5G are mobile and wireless communications enablers for the Twenty-Twenty Information Society, Multi-hop Cellular Networks, Network Function as-a-Service over Virtualized Infrastructures, iJOIN, and Nuage Virtualized Services Platform. Major applications of 5G range from RAN sharing and Multi-Operator Core Networks to mobile convergence. Enhancing the user experience by providing smart and customized services, 5G will support the explosive growth of big data, mobile internet, digital media, and system efficiency. This SpringerBrief is designed for professionals, researchers, and academics working in networks or system applications. Advanced-level students of computer science or computer engineering will also find the content valuable.
This book constitutes the refereed proceedings of the International Summit on Applications for Future Internet, AFI 2016, held in Puebla, Mexico, in May 2016. The 21 papers presented were carefully selected from 29 submissions and focus on the usage of Future Internet in the biological and health sciences as well as the increased application of IoT devices in fields like smart cities, health and agriculture.
This book introduces the optimal online charging control of electric vehicles (EVs) and battery energy storage systems (BESSs) in smart grids. The ultimate goal is to minimize the total energy cost as well as reduce the fluctuation of the total power flow caused by the integration of the EVs and renewable energy generators. Using both theoretic analysis and data-driven numerical results, the authors reveal the effectiveness and efficiency of the proposed control techniques. A major benefit of these control techniques is their practicality, since they do not rely on any non-causal knowledge of future information. Researchers, operators of power grids, and EV users will find this to be an exceptional resource. It is also suitable for advanced-level students of computer science interested in networks, electric vehicles, and energy systems.
Includes recently approved adopted and implemented standards for versatile switches, routers and multi-service provisioning platforms. Numerous illustrative examples showing actual situations or cases implemented. Covers the activities of all the major optical networking standards bodies and forums (ITU-T, IETF, MEF, and OIF).
This book constitutes the refereed proceedings of the Second International Conference on Future Network Systems and Security, FNSS 2016, held in Paris, France, in November 2016. The 12 full papers and one short paper presented were carefully reviewed and selected from 34 submissions. The papers focus on the technology, communications, systems and security aspects of relevance to the network of the future.
This book constitutes the refereed proceedings of the 16th International Conference on Innovations for Community Services, I4CS 2016, held in Vienna, Austria, in June 2016. The 12 revised full papers presented together with two short papers were carefully reviewed and selected from 30 submissions. The papers are organized in topical sections on navigation and data management; monitoring and decision making; coding and security; collaboration and workflow; routing and technology; topic and object tracking.
This book constitutes the refereed proceedings of the 14th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2013, held in Dresden, Germany, in September/October 2013. The 75 revised papers were carefully selected for inclusion in this volume. They provide a comprehensive overview of identified challenges and recent advances in various collaborative network (CN) domains and their applications with a particular focus on the support for reindustrialization. The papers have been organized in the following topical sections: product-service ecosystems; innovation in networks; strategies to build collaborative networks; collaboration related processes and performance; models and meta-models of collaboration; cloud-based support to collaborative networks; collaborative platforms; services and service design; sustainable collaborative networks; event-driven collaborative networks; social-semantic enterprise; and risks and trust.
This book constitutes the refereed proceedings of the 31st International Symposium on Computer and Information Sciences, ISCIS 2016, held in Krakow, Poland, in October 2016. The 29 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on smart algorithms; data classification and processing; stochastic modelling; performance evaluation; queuing systems; wireless networks and security; image processing and computer vision.
This SpringerBrief focuses on the coexistence concerns emerging in LTE networks using unlicensed frequency bands. It provides a comprehensive review on LTE networks and their unavoidable need for enhanced capacity to meet the demands for future applications, including a need for low-cost options. LTE using unlicensed frequency (U-LTE) is then introduced as the most promising solution, and discussed from various perspectives to unveil its benefits, challenges, and requirements for coexistence with the widely-deployed IEEE 802.11/Wi-Fi technology. Meeting these coexistence requirements is the most important factor for the acceptance of U-LTE, and the majority of this brief explores the big picture concerns and existing solutions related to coexistence-aware medium access protocols for background knowledge. A proposed network-aware adaptive listen-before-talk protocol is presented and evaluated. Finally, the authors identify a number of open technical questions and potential research issues in U-LTE. This SpringerBrief is suitable for telecom engineers, researchers, and academic professionals with valuable knowledge and potential working or research directions when designing and developing medium access protocols for next generation wireless access networks.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th EAI International Conference on Sensor Systems and Software, S-Cube 2016, held in Sophia Antipolis, Nice, France, in December 2016. The 15 revised full papers and 5 invited papers cover technologies for wireless sensor networks, smart city and industry 4.0 applications, and smart sensing.
This book delivers concise coverage of classical methods and new developments related to indoor location-based services. It collects results from isolated domains including geometry, artificial intelligence, statistics, cooperative algorithms, and distributed systems and thus provides an accessible overview of fundamental methods and technologies. This makes it an ideal starting point for researchers, students, and professionals in pervasive computing. Location-based services are services using the location of a mobile computing device as their primary input. While such services are fairly easy to implement outside buildings thanks to accessible global positioning systems and high-quality environmental information, the situation inside buildings is fundamentally different. In general, there is no simple way of determining the position of a moving target inside a building without an additional dedicated infrastructure. The book's structure is learning oriented, starting with a short introduction to wireless communication systems and basic positioning techniques and ending with advanced features like event detection, simultaneous localization and mapping, and privacy aspects. Readers who are not familiar with the individual topics will be able to work through the book from start to finish. At the same time all chapters are self-contained to support readers who are already familiar with some of the content and only want to pick selected topics that are of particular interest.
This book presents an examination of the middleware that can be used to configure and operate heterogeneous node platforms and sensor networks. The middleware requirements for a range of application scenarios are compared and analysed. The text then defines middleware architecture that has been integrated in an approach demonstrated live in a refinery. Features: presents a thorough introduction to the major concepts behind wireless sensor networks (WSNs); reviews the various application scenarios and existing middleware solutions for WSNs; discusses the middleware mechanisms necessary for heterogeneous WSNs; provides a detailed examination of platform-agnostic middleware architecture, including important implementation details; investigates the programming paradigms for WSNs, and for heterogeneous sensor networks in general; describes the results of extensive experimentation and testing, demonstrating that the generic architecture is viable for implementation on multiple platforms.
This book deals with a number of fundamental issues related to the practical implementation of ultrasonic NDT techniques in an industrial environment. The book discusses advanced academic research results and their application to industrial procedures. The text covers the choice and generation of the signals energizing the system to probe position optimization, from quality assessment evaluation to tomographic inversion. With a focus to deepen a number of fundamental aspects involved in the specific objective of designing and developing an ultrasonic imaging system for nondestructive testing, aimed to automatically classify the entire production of an industrial production line, targeted to the field of precision mechanics. The contents of this book is the result of the common effort of six University Research Groups that focused their research activities for two years on this specific objective, working in direct conjunction with primary industrial firms, in a research project funded by the Italian government as a Strategic Research Project.
This is the first book to present a multidisciplinary approach to cyberterrorism. It traces the threat posed by cyberterrorism today, with chapters discussing possible technological vulnerabilities, potential motivations to engage in cyberterrorism, and the challenges of distinguishing this from other cyber threats. The book also addresses the range of potential responses to this threat by exploring policy and legislative frameworks as well as a diversity of techniques for deterring or countering terrorism in cyber environments. The case studies throughout the book are global in scope and include the United States, United Kingdom, Australia, New Zealand and Canada. With contributions from distinguished experts with backgrounds including international relations, law, engineering, computer science, public policy and politics, Cyberterrorism: Understanding, Assessment and Response offers a cutting edge analysis of contemporary debate on, and issues surrounding, cyberterrorism. This global scope and diversity of perspectives ensure it is of great interest to academics, students, practitioners, policymakers and other stakeholders with an interest in cyber security.
Wireless Sensor Network (WSN) consists of numerous physically distributed autonomous devices used for sensing and monitoring the physical and/or environmental conditions. A WSN uses a gateway that provides wireless connectivity to the wired world as well as distributed networks. There are many open problems related to Ad-Hoc networks and its applications. Looking at the expansion of the cellular infrastructure, Ad-Hoc network may be acting as the basis of the 4th generation wireless technology with the new paradigm of 'anytime, anywhere communications'. To realize this, the real challenge would be the security, authorization and management issues of the large scale WSNs. This book is an edited volume in the broad area of WSNs. The book covers various chapters like Multi-Channel Wireless Sensor Networks, its Coverage, Connectivity as well as Deployment. It covers comparison of various communication protocols and algorithms such as MANNET, ODMRP and ADMR Protocols for Ad hoc Multicasting, Location Based Coordinated Routing Protocol and other Token based group local mutual exclusion Algorithms. The book also covers a chapter on Extended Ad hoc On-Demand Distance Vector (EAODV) routing protocol based on Distributed Minimum Transmission Multicast Routing (DMTMR). One chapter is dedicated to OCDMA and its future application and another chapter covers development of Home Automation System using SWN.
This edited book presents the results of the 5th Workshop on Real-world Wireless Sensor Networks (REALWSN). The purpose of this workshop was to bring together researchers and practitioners working in the area of sensor networks, with focus on real-world experiments or deployments of wireless sensor networks. Included were, nonetheless, emerging forms of sensing such as those that leverage smart phones, Internet of Things, RFIDs, and robots. Indeed, when working with real-world experiments or deployments, many new or unforeseen issues may arise: the network environment may be composed of a variety of different technologies, leading to very heterogeneous network structures; software development for large scale networks poses new types of problems; the performance of prototype networks may differ significantly from the deployed system; whereas actual sensor network deployments may need a complex combination of autonomous and manual configuration. Furthermore, results obtained through simulation are typically not directly applicable to operational networks; it is therefore imperative for the community to produce results from experimental research. The workshop collected the state of the art in emerging and current research trends dealing with Real-world Wireless Sensor Networks, with the aim of representing a stepping stone for future research in this field. |
![]() ![]() You may like...
Biopreparedness and Public Health…
Iris Hunger, Vladan Radosavljevic, …
Hardcover
Trauma and Emergency Surgery - The Role…
Georgios Tsoulfas, Mohammad Meshkini
Hardcover
R3,491
Discovery Miles 34 910
Hot Topics in Burn Injuries
Selda Pelin Kartal, Dilek Bayramgurler
Hardcover
R3,484
Discovery Miles 34 840
|