![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
This book presents an in-depth treatment of routing and wavelength assignment for optical networks, and focuses specifically on quality-of-service and fault resiliency issues. It reports on novel approaches for the development of routing and wavelength assignment schemes for fault-resilient optical networks, which improve their performance in terms of signal quality, call blocking, congestion level and reliability, without a substantial increase in network setup cost. The book first presents a solution for reducing the effect of the wavelength continuity constraint during the routing and wavelength assignment phase. Further, it reports on an approach allowing the incorporation of a traffic grooming mechanism with routing and wavelength assignment to enhance the effective channel utilization of a given capacity optical network using fewer electrical-optical-electrical conversions. As a third step, it addresses a quality of service provision scheme for wavelength-division multiplexing (WDM)-based optical networks. Lastly, the book describes the inclusion of a tree-based fault resilience scheme in priority-based dispersion-reduced wavelength assignment schemes for the purpose of improving network reliability, while maintaining a better utilization of network resources. Mainly intended for graduate students and researchers, the book provides them with extensive information on both fundamental and advanced technologies for routing and wavelength assignment in optical networks. The topics covered will also be of interest to network planners and designers.
Cooperative Control of Nonlinear Networked Systems is concerned with the distributed cooperative control of multiple networked nonlinear systems in the presence of unknown non-parametric uncertainties and non-vanishing disturbances under certain communication conditions. It covers stability analysis tools and distributed control methods for analyzing and synthesizing nonlinear networked systems. The book presents various solutions to cooperative control problems of multiple networked nonlinear systems on graphs. The book includes various examples with segments of MATLAB (R) codes for readers to verify, validate, and replicate the results. The authors present a series of new control results for nonlinear networked systems subject to both non-parametric and non-vanishing uncertainties, including the cooperative uniformly ultimately bounded (CUUB) result, finite-time stability result, and finite-time cooperative uniformly ultimately bounded (FT-CUUB) result. With some mathematical tools, such as algebraic graph theory and certain aspects of matrix analysis theory introduced by the authors, the readers can obtain a deeper understanding of the roles of matrix operators as mathematical machinery for cooperative control design for multi-agent systems. Cooperative Control of Nonlinear Networked Systems is a valuable source of information for researchers and engineers in cooperative adaptive control, as its technical contents are presented with examples in full analytical and numerical detail, and graphically illustrated for easy-to-understand results. Scientists in research institutes and academics in universities working on nonlinear systems, adaptive control and distributed control will find the book of interest, as it contains multi-disciplinary problems and covers different areas of research.
This book constitutes the refereed proceedings of five International Workshops held as parallel events of the 18th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2022, virtually and in Hersonissos, Crete, Greece, in June 2022: the 11th Mining Humanistic Data Workshop (MHDW 2022); the 7th 5G-Putting Intelligence to the Network Edge Workshop (5G-PINE 2022); the 1st workshop on AI in Energy, Building and Micro-Grids (AIBMG 2022); the 1st Workshop/Special Session on Machine Learning and Big Data in Health Care (ML@HC 2022); and the 2nd Workshop on Artificial Intelligence in Biomedical Engineering and Informatics (AIBEI 2022). The 35 full papers presented at these workshops were carefully reviewed and selected from 74 submissions.
Though the reductionist approachto biology and medicine has led to several imp- tant advances, further progresses with respect to the remaining challenges require integration of representation, characterization and modeling of the studied systems along a wide range of spatial and time scales. Such an approach, intrinsically - lated to systems biology, is poised to ultimately turning biology into a more precise and synthetic discipline, paving the way to extensive preventive and regenerative medicine [1], drug discovery [20] and treatment optimization [24]. A particularly appealing and effective approach to addressing the complexity of interactions inherent to the biological systems is provided by the new area of c- plex networks [34, 30, 8, 13, 12]. Basically, it is an extension of graph theory [10], focusing on the modeling, representation, characterization, analysis and simulation ofcomplexsystemsbyconsideringmanyelementsandtheirinterconnections.C- plex networks concepts and methods have been used to study disease [17], tr- scription networks [5, 6, 4], protein-protein networks [22, 36, 16, 39], metabolic networks [23] and anatomy [40].
This comprehensive text/reference presents a broad-ranging overview of device connectivity in distributed computing environments, supporting the vision of an Internet of Things (IoT). Expert perspectives are provided by an international selection of researchers from both industry and academia, covering issues of communication, security, privacy, interoperability, networking, access control, and authentication. In addition to discussing state-of-the-art research and practice, the book includes corporate analyses offering a balanced view of benefits and limitations, and numerous case studies illustrating the challenges and practical solutions. Topics and features: discusses issues of security and privacy in connected environments, with a specific focus on the impact of the IoT paradigm on enterprise information systems; examines the challenges of managing big data in IoT environments, and proposes cloud computing-based solutions to the limitations inherent in the IoT paradigm; suggests approaches to overcome service-level interoperability problems in the IoT environment; introduces a mobile IoT simulator designed to evaluate the behavior of IoT systems, in addition to a novel approach to manage hyper-connectivity in the IoT; describes the use of the Essence framework to model software development methods, and highlights the benefits of integrating data from smart buildings and IoT devices; presents an asymmetric schema matching mechanism for IoT interoperability, and explores the topic of automatic provenance capture at the middleware level; reviews emerging network topologies and communication technologies, and advises on the adoption of a data distribution service as a middleware platform for IoT systems. This practically-oriented volume serves as a complete reference for students, researchers and practitioners of distributed computing, providing insights into the latest approaches, technologies, and frameworks relevant to the IoT environment.
This book lays out the theoretical foundation of the so-called multi-armed bandit (MAB) problems and puts it in the context of resource management in wireless networks. Part I of the book presents the formulations, algorithms and performance of three forms of MAB problems, namely, stochastic, Markov and adversarial. Covering all three forms of MAB problems makes this book unique in the field. Part II of the book provides detailed discussions of representative applications of the sequential learning framework in cognitive radio networks, wireless LANs and wireless mesh networks. Both individuals in industry and those in the wireless research community will benefit from this comprehensive and timely treatment of these topics. Advanced-level students studying communications engineering and networks will also find the content valuable and accessible.
This book provides scientific research into Cognitive Internet of Things for Smart Society, with papers presented at the 2nd EAI International Conference on Robotic Sensor Networks. The conference explores the integration of networks and robotic technologies, which has become a topic of increasing interest for both researchers and developers from academic fields and industries worldwide. The authors posit that big networks will be the main approach to the next generation of robotic research, with the explosive number of networks models and increasing computational power of computers significantly extending the number of potential applications for robotic technologies while also bringing new challenges to the network's community. The 2nd EAI International Conference on Robotic Sensor Networks was held 25-26 August 2018 at the Kitakyushu International Conference Center (MICE), Kitakyushu, Japan.
This book highlights selected papers presented at the 10th International Symposium on Embedded Computing and System Design (ISED) 2021. This symposium provides a platform for researchers to share the latest scientific achievements of embedded computing and system design. The book is divided into three broad sections. The first section discusses topics like VLSI and testing, circuits and systems with a focus on emerging technologies. The second section discusses topics like embedded hardware and software systems and novel applications. The final section discusses the state-of-the-art technologies involving IoT, artificial intelligence, green and edge computing that demonstrates the issues currently.
This book constitutes the refereed proceedings of the 17th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2022, which was supposed to be held in Lima, Peru, in May 2021, but was held virtually instead due to the COVID-19 pandemic. The 40 revised full papers presented were carefully reviewed and selected from 58 submissions. The papers present a wide range of perspectives and disciplines including (but not limited to) public administration, entrepreneurship, business administration, information technology for development, information management systems, organization studies, philosophy, and management. They are organized in the following topical sections: digital platforms and gig economy; education and health; inclusion and participation; and business innovation and data privacy.
This book offers an accessible guide to ubiquitous computing, with an emphasis on pervasive networking. It addresses various technical obstacles, such as connectivity, levels of service, performance, reliability and fairness. The focus is on describing currently available off-the-shelf technologies, novel algorithms and techniques in areas such as: underwater sensor networks, ant colony based routing, heterogeneous networks, agent based distributed networks, cognitive radio networks, real-time WSN applications, machine translation, intelligent computing and ontology based bit masking. By introducing the core topics and exploring assistive pervasive systems that draw on pervasive networking, the book provides readers with a robust foundation of knowledge on this growing field of research. Written in a straightforward style, the book is also accessible to a broad audience of researchers and designers who are interested in exploring pervasive computing further.
This book is the first publication to give a comprehensive, structured treatment to the important topic of situational awareness in cyber defense. It presents the subject in a logical, consistent, continuous discourse, covering key topics such as formation of cyber situational awareness, visualization and human factors, automated learning and inference, use of ontologies and metrics, predicting and assessing impact of cyber attacks, and achieving resilience of cyber and physical mission. Chapters include case studies, recent research results and practical insights described specifically for this book. Situational awareness is exceptionally prominent in the field of cyber defense. It involves science, technology and practice of perception, comprehension and projection of events and entities in cyber space. Chapters discuss the difficulties of achieving cyber situational awareness - along with approaches to overcoming the difficulties - in the relatively young field of cyber defense where key phenomena are so unlike the more conventional physical world. Cyber Defense and Situational Awareness is designed as a reference for practitioners of cyber security and developers of technology solutions for cyber defenders. Advanced-level students and researchers focused on security of computer networks will also find this book a valuable resource.
This book provides an account of the latest developments in IoT and cloud computing, and their practical applications in various industrial, scientific, business, education, and government domains. The book covers the advanced research and state of the art review of the latest developments in IoT and cloud computing and how they might be employed post-COVID era. The book also identifies challenges and their solutions in this era, shaping the direction for future research and offering emerging topics to investigate further. The book serves as a reference for a broader audience such as researchers, application designers, solution architects, teachers, graduate students, enthusiasts, practitioners, IT managers, decision-makers and policymakers. The book editors are pioneers in the fields of IoT and Cloud computing. Provides an account of the latest developments in IoT and cloud computing and how it can aid in a COVID-19 Era in a variety of applications; Identifies IoT and cloud computing challenges and their solutions, shaping the direction for future research; Serves as a reference for researchers, application designers, solution architects, teachers, and graduate students.
The fourth edition of this classic textbook provides major updates. This edition has completely new chapters on Big Data Platforms (distributed storage systems, MapReduce, Spark, data stream processing, graph analytics) and on NoSQL, NewSQL and polystore systems. It also includes an updated web data management chapter that includes RDF and semantic web discussion, an integrated database integration chapter focusing both on schema integration and querying over these systems. The peer-to-peer computing chapter has been updated with a discussion of blockchains. The chapters that describe classical distributed and parallel database technology have all been updated. The new edition covers the breadth and depth of the field from a modern viewpoint. Graduate students, as well as senior undergraduate students studying computer science and other related fields will use this book as a primary textbook. Researchers working in computer science will also find this textbook useful. This textbook has a companion web site that includes background information on relational database fundamentals, query processing, transaction management, and computer networks for those who might need this background. The web site also includes all the figures and presentation slides as well as solutions to exercises (restricted to instructors).
This comprehensive overview of IoT systems architecture includes in-depth treatment of all key components: edge, communications, cloud, data processing, security, management, and uses. Internet of Things: Concepts and System Design provides a reference and foundation for students and practitioners that they can build upon to design IoT systems and to understand how the specific parts they are working on fit into and interact with the rest of the system. This is especially important since IoT is a multidisciplinary area that requires diverse skills and knowledge including: sensors, embedded systems, real-time systems, control systems, communications, protocols, Internet, cloud computing, large-scale distributed processing and storage systems, AI and ML, (preferably) coupled with domain experience in the area where it is to be applied, such as building or manufacturing automation. Written in a reader-minded approach that starts by describing the problem (why should I care?), placing it in context (what does this do and where/how does it fit in the great scheme of things?) and then describing salient features of solutions (how does it work?), this book covers the existing body of knowledge and design practices, but also offers the author's insights and articulation of common attributes and salient features of solutions such as IoT information modeling and platform characteristics.
This book provides a comprehensive review and in-depth discussion of the state-of-the-art research literature and propose energy-efficient computation offloading and resources management for mobile edge computing (MEC), covering task offloading, channel allocation, frequency scaling and resource scheduling. Since the task arrival process and channel conditions are stochastic and dynamic, the authors first propose an energy efficient dynamic computing offloading scheme to minimize energy consumption and guarantee end devices' delay performance. To further improve energy efficiency combined with tail energy, the authors present a computation offloading and frequency scaling scheme to jointly deal with the stochastic task allocation and CPU-cycle frequency scaling for minimal energy consumption while guaranteeing the system stability. They also investigate delay-aware and energy-efficient computation offloading in a dynamic MEC system with multiple edge servers, and introduce an end-to-end deep reinforcement learning (DRL) approach to select the best edge server for offloading and allocate the optimal computational resource such that the expected long-term utility is maximized. Finally, the authors study the multi-task computation offloading in multi-access MEC via non-orthogonal multiple access (NOMA) and accounting for the time-varying channel conditions. An online algorithm based on DRL is proposed to efficiently learn the near-optimal offloading solutions. Researchers working in mobile edge computing, task offloading and resource management, as well as advanced level students in electrical and computer engineering, telecommunications, computer science or other related disciplines will find this book useful as a reference. Professionals working within these related fields will also benefit from this book.
With the rapid penetration of technology in varied application domains, the existing cities are getting connected more seamlessly. Cities becomes smart by inducing ICT in the classical city infrastructure for its management. According to McKenzie Report, about 68% of the world population will migrate towards urban settlements in near future. This migration is largely because of the improved Quality of Life (QoL) and livelihood in urban settlements. In the light of urbanization, climate change, democratic flaws, and rising urban welfare expenditures, smart cities have emerged as an important approach for society's future development. Smart cities have achieved enhanced QoL by giving smart information to people regarding healthcare, transportation, smart parking, smart traffic structure, smart home, smart agronomy, community security etc. Typically, in smart cities data is sensed by the sensor devices and provided to end users for further use. The sensitive data is transferred with the help of internet creating higher chances for the adversaries to breach the data. Considering the privacy and security as the area of prime focus, this book covers the most prominent security vulnerabilities associated with varied application areas like healthcare, manufacturing, transportation, education and agriculture etc. Furthermore, the massive amount of data being generated through ubiquitous sensors placed across the smart cities needs to be handled in an effective, efficient, secured and privacy preserved manner. Since a typical smart city ecosystem is data driven, it is imperative to manage this data in an optimal manner. Enabling technologies like Internet of Things (IoT), Natural Language Processing (NLP), Blockchain Technology, Deep Learning, Machine Learning, Computer vision, Big Data Analytics, Next Generation Networks and Software Defined Networks (SDN) provide exemplary benefits if they are integrated in the classical city ecosystem in an effective manner. The application of Artificial Intelligence (AI) is expanding across many domains in the smart city, such as infrastructure, transportation, environmental protection, power and energy, privacy and security, governance, data management, healthcare, and more. AI has the potential to improve human health, prosperity, and happiness by reducing our reliance on manual labor and accelerating our progress in the sciences and technologies. NLP is an extensive domain of AI and is used in collaboration with machine learning and deep learning algorithms for clinical informatics and data processing. In modern smart cities, blockchain provides a complete framework that controls the city operations and ensures that they are managed as effectively as possible. Besides having an impact on our daily lives, it also facilitates many areas of city management.
Reading without meditation is sterile; meditation without reading is liable to error; prayer without meditation is lukewarm; meditation without prayer is unfruitful; prayer, when it is fervent, wins contemplation, but to obtain contemplation without prayer would be rare, even miraculous. Bernhard de Clairvaux (12th century) NobodycandenythatIP-basedtra?chasinvadedourdailylifeinmanyways and no one can escape from its di?erent forms of appearance. However, most people are not aware of this fact. From the usage of mobile phones - either as simple telephone or for data transmissions - over the new form of telephone service Voice over IP (VoIP), up to the widely used Internet at the users own PC, in all instances the transmission of the information, encoded in a digital form, relies on the Internet Protocol (IP). So, we should take a brief glimpse at this protocol and its constant companions such as TCP and UDP, which have revolutionized the communication system over the past 20 years. The communication network has experienced a fundamental change, which was dominated up to end of the eighties of the last century by voice appli- tion.Butfromthemiddleoftheninetieswehaveobservedadecisivemigration in the data transmission. If the devoted reader of this monograph reads the title 'IP tra?c theory and performance', she/he may ask, why do we have to be concerned with mod- ing IP tra?c, and why do we have to consider and get to know new concepts.
This book is concerned with the fault estimation problem for network systems. Firstly, to improve the existing adaptive fault estimation observer, a novel so-called intermediate estimator is proposed to identify the actuator or sensor faults in dynamic control systems with high accuracy and convergence speed. On this basis, by exploiting the properties of network systems such as multi-agent systems and large-scale interconnected systems, this book introduces the concept of distributed intermediate estimator; faults in different nodes can be estimated simultaneously; meanwhile, satisfactory consensus performances can be obtained via compensation based protocols. Finally, the characteristics of the new fault estimation methodology are verified and discussed by a series of experimental results on networked multi-axis motion control systems. This book can be used as a reference book for researcher and designer in the field of fault diagnosis and fault-tolerant control and can also be used as a reference book for senior undergraduate and graduate students in colleges and universities.
This is an open access book. Important tasks must be completed on time and with guaranteed quality; that is the consensus reached by system designers and users. However, for too long, important tasks have often been given unnecessary urgency, and people intuitively believe that important tasks should be executed first so that their performance can be guaranteed. Actually, in most cases, their performance can be guaranteed even if they are executed later, and the "early" resources can be utilized for other, more urgent tasks. Therefore, confusing importance with urgency hinders the proper use of system resources. In 2007, mixed criticality was proposed to indicate that a system may contain tasks of various importance levels. Since then, system designers and users have distinguished between importance and urgency. In the industrial field, due to the harsh environment they operate in, industrial wireless networks' quality of service (QoS) has always been a bottleneck restricting their applications. Therefore, this book introduces criticality to label important data, which is then allocated more transmission resources, ensuring that important data's QoS requirements can be met to the extent possible. To help readers understand how to apply mixed-criticality data to industrial wireless networks, the content is divided into three parts. First, we introduce how to integrate the model of mixed-criticality data into industrial wireless networks. Second, we explain how to analyze the schedulability of mixed-criticality data under existing scheduling algorithms. Third, we present a range of novel scheduling algorithms for mixed-criticality data. If you want to improve the QoS of industrial wireless networks, this book is for you.
This open access book constitutes the refereed post-conference proceedings of the First IFIP International Cross-Domain Conference on Internet of Things, IFIPIoT 2018, held at the 24th IFIP World Computer Congress, WCC 2018, in Poznan, Poland, in September 2018. The 12 full papers presented were carefully reviewed and selected from 24 submissions. Also included in this volume are 4 WCC 2018 plenary contributions, an invited talk and a position paper from the IFIP domain committee on IoT. The papers cover a wide range of topics from a technology to a business perspective and include among others hardware, software and management aspects, process innovation, privacy, power consumption, architecture, applications.
This book offers a compilation of technical papers presented at the International Research Symposium on Computing and Network Sustainability (IRSCNS 2018) held in Goa, India on 30-31st August 2018. It covers areas such as sustainable computing and security, sustainable systems and technologies, sustainable methodologies and applications, sustainable networks applications and solutions, user-centered services and systems and mobile data management. Presenting novel and recent technologies, it is a valuable resource for researchers and industry professionals alike.
A 21st century clean energy economy demands a 21st century electricity grid, yet the communication networks of many utilities today are ill-equipped for smart grid evolution. This must-read text/reference presents an application-centric approach to the development of smart grid communication architecture and network transformation. The coverage includes in-depth reviews of such cutting-edge applications as advanced metering infrastructure, distribution automation, demand response, and synchrophasors as well as more traditional utility applications like SCADA systems. Providing detailed insights derived from the authors pivotal research on smart grid communications and extensive consulting experience, the book explains how electric power companies can transform their networks to best meet the challenges of tomorrow s smart grids. Topics and features: examines a range of exciting utility applications made possible through smart grid evolution; describes the core-edge network architecture for smart grids, introducing the concept of wide area and field area networks (WANs and FANs); explains how the network design paradigm for smart grids differs from that for more established data networks, and discusses network security in smart grids; provides an overview of communication network technologies for WANs and FANs, covering OPGW, PLC, and LTE and MPLS technology; investigates secure data-centric data management and data analytics for smart grids; discusses the transformation of a network from conventional modes of utility operation to an integrated network based on the smart grid architecture framework.This comprehensive and practical guide will be of great interest to all professionals engaged in the planning, operation, and regulation of smart grids. Students studying courses on smart grids will also find the book to be an invaluable resource."
System Level Design of Reconfigurable Systems-on-Chip provides insight in the challenges and difficulties encountered during the design of reconfigurable Systems-on-Chip (SoCs). Reconfiguration is becoming an important part of System-on-Chip design to cope with the increasing demands for simultaneous flexibility and computational power. The book focuses on system level design issues for reconfigurable SoCs, and provides information on reconfiguration aspects of complex SoCs and how they can be implemented in practice. It is divided in three parts. The first part provides background information and requirements on reconfigurable technologies and systems. The second one identifies existing methodological gaps, and introduces a design flow for developing reconfigurable Systems-on-Chip. The high level part of the design flow can be covered by two C++ based methodologies: one based on SystemC and one based on OCAPI-XL, both including appropriate extensions to handle reconfiguration issues. Finally, the third part of the book presents reconfigurable SoCs from the perspective of the designer, through three indicative case studies from the wireless and multimedia communication domain.
This volume presents papers from the 10th Working Conference of the IFIP WG 8.6 on the adoption and diffusion of information systems and technologies. This book explores the dynamics of how some technological innovation efforts succeed while others fail. The book looks to expand the research agenda, paying special attention to the areas of theoretical perspectives, methodologies, and organizational sectors.
This volume contains the workshopproceedings of the accompanying workshops of the 14th Financial Cryptograpy and Data Security International Conference 2010, held on Tenerife, Canary Islands, Spain, January 25-28, 2010. FinancialCryptographyandData Securityis a majorinternationalforumfor research, advanced development, education, exploration, and debate regarding information assurance, with a speci?c focus on commercial contexts. The c- ference covers all aspects of securing transactions and systems and especially encourages original work focusing on both fundamental and applied real-world deployments on all aspects surrounding commerce security. Three workshops were co-located with FC 2010: the Workshop on Real-Life CryptographicProtocolsandStandardization(RLCPS),theWorkshoponEthics in Computer Security Research (WECSR), and the Workshop on Lightweight Cryptography for Resource-Constrained Devices (WLC). Intimate and colorful by tradition, the high-quality program was not the only attraction of FC. In the past, FC conferences have been held in highly research-synergistic locations such as Tobago, Anguilla, Dominica, Key West, Guadelupe, Bermuda, the Grand Cayman, and Cozumel Mexico. 2010 was the ?rst year that the conference was held on European soil, in the Spanish Canary Islands, in Atlantic waters, a few miles across Morocco. Over 100 researchers from more than 20 countries were in attendance. |
![]() ![]() You may like...
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, …
Hardcover
R4,233
Discovery Miles 42 330
Advances in Computing and Network…
Sabu M. Thampi, Erol Gelenbe, …
Hardcover
R8,756
Discovery Miles 87 560
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, …
Paperback
|