![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
This book provides a broad overview of both the technical challenges in sensor network development, and the real-world applications of distributed sensing. Important aspects of distributed computing in large-scale networked sensor systems are analyzed in the context of human behavior understanding, including topics on systems design tools and techniques. Additionally, the book examines a varied range of applications. Features: contains valuable contributions from an international selection of leading experts in the field; presents a high-level introduction to the aims and motivations underpinning distributed sensing; describes decision-making algorithms in the presence of complex sensor networks; provides a detailed analysis of the design, implementation, and development of a distributed network of homogeneous or heterogeneous sensors; reviews the application of distributed sensing to human behavior understanding and autonomous intelligent vehicles; includes a helpful glossary and a list of acronyms.
This book constitutes the refereed proceedings of the 6th IFIP WG 11.11 International Conference, IFIPTM 2012, held in Surat, India, in May 2012. The 12 revised full papers presented together with 8 short papers and the abstracts of 4 keynote talks were carefully reviewed and selected from 51 submissions. Building on the traditions inherited from the iTrust and previous IFIPTM conferences, IFIPTM 2012 is a multi-disciplinary conference focusing on areas such as: trust models, social, economic and behavioural aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management.
This book constitutes the refereed proceedings of the IFIP WG 8.6 International Working Conference on Governance and Sustainability in Information Systems, held in Hamburg, Germany, in September 2011. The 14 revised full papers and 16 research in progress and practice papers presented were carefully reviewed and selected from 47 submissions. The full research papers are organized in the following topical sections:governance, sustainability, design themes, customer and user integration, and future subjects.
The European Conference on Computer and Network Defense draws contributions and participation both from academia and industry, and addresses security from multiple perspectives, including state-of-the-art research in computer network security, intrusion detection, denial-of-service, privacy protection, security policies, and incident response & management. The conference is organized jointly by the Institute of Computer Science of the Foundation for Research and Technology - Hellas (FORTH) and the European Network and Information Security Agency (ENISA).
Web services allow new and improved ways for enterprise applications to communicate and integrate with each other over the Web and, as such, are having a profound effect on both the worlds of business and of software development. The new edition of this bestselling book offers a comprehensive and up to date treatment of web services and Service Oriented Architecture (SOA), giving you all you need to know to gain a solid foundation in this area. Building upon the clear, accessible approach of the first edition, it provides a complete introduction to the concepts, principles, technology and standards of web services. The book also provides an in depth examination of good design and development practises for SOA applications in organisations. Key features A spiral approach to instruction helps readers build on and reinforce basic knowledge as the topics become more advanced. Numerous examples which demonstrate the practical application of the theory are included. Self-test questions, hints, tips and discussion topics feature throughout the book to support self-directed learning. New to this edition Two new chapters have been added on SOA modelling and Cloud Computing technology. A comprehensive real-life case study containing numerous practical examples has been integrated and referenced throughout the entire book to give readers 'hands-on' insight into applying theory to practice, and enhance understanding of the key concepts. Business Process Modelling Notation (BPMN), which is rapidly becoming an industry standard, is used throughout the book. Discussion of software engineering issues related to implementing sound SOA applications is included. Description of new standards, such as BPEL v2.0 is discussed. A Companion Website (www.pearsoned.co.uk/papazoglou) offers detailed coding solutions available to download.
This book constitutes the proceedings of the 15th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance, HAISA 2021, held virtually in July 2021.The 18 papers presented in this volume were carefully reviewed and selected from 30 submissions. They are organized in the following topical sections: attitudes and perspectives; cyber security education; and people and technology.
This volume constitutes the refereed and revised post-conference proceedings of the 5th IFIP WG 5.15 International Conference on Information Technology in Disaster Risk Reduction, ITDRR 2020, in Sofia, Bulgaria, in December 2020.* The 18 full papers and 6 short papers presented were carefully reviewed and selected from 52 submissions. The papers focus on various aspects and challenges of coping with disaster risk reduction. The main topics include areas such as natural disasters, remote sensing, big data, cloud computing, Internet of Things, mobile computing, emergency management, disaster information processing, disaster risk assessment and management. *The conference was held virtually.
Currently, we see a variety of tools and techniques for specifying and implementing business processes. The problem is that there are still gaps and tensions between the different disciplines needed to improve business process execution and improvement in enterprises. Business process modeling, workflow execution and application programming are examples of disciplines that are hosted by different communities and that emerged separately from each other. In particular, concepts have not yet been fully elaborated at the system analysis level. Therefore, practitioners are faced again and again with similar questions in concrete business process projects: Which decomposition mechanism to use? How to find the correct granularity for business process activities? Which implementing technology is the optimal one in a given situation? This work offers an approach to the systematization of the field. The methodology used is explicitly not a comparative analysis of existing tools and techniques - although a review of existing tools is an essential basis for the considerations in the book. Rather, the book tries to provide a landscape of rationales and concepts in business processes with a discussion of alternatives.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Computing and Network Communications (CoCoNet'20), October 14-17, 2020, Chennai, India. The papers presented were carefully reviewed and selected from several initial submissions. The papers are organized in topical sections on Signal, Image and Speech Processing, Wireless and Mobile Communication, Internet of Things, Cloud and Edge Computing, Distributed Systems, Machine Intelligence, Data Analytics, Cybersecurity, Artificial Intelligence and Cognitive Computing and Circuits and Systems. The book is directed to the researchers and scientists engaged in various fields of computing and network communication domains.
With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.
This book is a collection of best selected research papers presented at the Conference on Machine Learning, Deep Learning and Computational Intelligence for Wireless Communication (MDCWC 2020) held during October 22nd to 24th 2020, at the Department of Electronics and Communication Engineering, National Institute of Technology Tiruchirappalli, India. The presented papers are grouped under the following topics (a) Machine Learning, Deep learning and Computational intelligence algorithms (b)Wireless communication systems and (c) Mobile data applications and are included in the book. The topics include the latest research and results in the areas of network prediction, traffic classification, call detail record mining, mobile health care, mobile pattern recognition, natural language processing, automatic speech processing, mobility analysis, indoor localization, wireless sensor networks (WSN), energy minimization, routing, scheduling, resource allocation, multiple access, power control, malware detection, cyber security, flooding attacks detection, mobile apps sniffing, MIMO detection, signal detection in MIMO-OFDM, modulation recognition, channel estimation, MIMO nonlinear equalization, super-resolution channel and direction-of-arrival estimation. The book is a rich reference material for academia and industry.
This book constitutes the refereed proceedings of six International Workshops held as parallel events of the 17th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2021, virtually and in Hersonissos, Crete, Greece, in June 2021: the 6th Workshop on 5G-Putting Intelligence to the Network Edge, 5G-PINE 2021; Artificial Intelligence in Biomedical Engineering and Informatics Workshop, AI-BIO 2021; Workshop on Defense Applications of AI, DAAI 2021; Distributed AI for Resource-Constrained Platforms Workshop, DARE 2021; Energy Efficiency and Artificial Intelligence Workshop, EEAI 2021; and the 10th Mining Humanistic Data Workshop, MHDW 2021. The 24 full papers and 16 short papers presented at these workshops were carefully reviewed and selected from 72 submissions. The papers presented at 5G-PINE focus on the latest AI applications in the telecommunication industry and AI in modern 5G-oriented telecommunications infrastructures. The papers chosen for AI-BIO 2021 present research on the subject of AI, in its broadest sense, in biomedical engineering and health informatics. The DAAI 2021 papers aim at presenting recent evolutions in artificial intelligence applicable to defense and security applications. The papers selected for DARE 2021 address a variety of pertinent and challenging topics within the scope of distributed AI for resource-constrained platforms. The papers presented at EEAI 2021 aim to bring together interdisciplinary approaches that focus on the application of AI-driven solutions for increasing and improving energy efficiency of residential and tertiary buildings and of occupant behavior. The MHDW papers focus on topics such as recommendation systems, sentiment analysis, pattern recognition, data mining, and time series.
This book constitutes the refereed proceedings of the 17th IFIP WG 12.5 International Conference on Artificial Intelligence Applications and Innovations, AIAI 2021, held virtually and in Hersonissos, Crete, Greece, in June 2021. The 50 full papers and 11 short papers presented were carefully reviewed and selected from 113 submissions. They cover a broad range of topics related to technical, legal, and ethical aspects of artificial intelligence systems and their applications and are organized in the following sections: adaptive modeling/ neuroscience; AI in biomedical applications; AI impacts/ big data; automated machine learning; autonomous agents; clustering; convolutional NN; data mining/ word counts; deep learning; fuzzy modeling; hyperdimensional computing; Internet of Things/ Internet of energy; machine learning; multi-agent systems; natural language; recommendation systems; sentiment analysis; and smart blockchain applications/ cybersecurity. Chapter "Improving the Flexibility of Production Scheduling in Flat Steel Production Through Standard and AI-based Approaches: Challenges and Perspective" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Multiple antenna (MIMO) techniques are an essential component of any contemporary wireless communication system because they can significantly improve the performance over conventional single-antenna links. While MIMO techniques are relatively well understood at the link level, the interaction of multiple MIMO links and their impact on performance at the system level necessitate fundamentally new investigations. We propose a book that investigates the theoretical foundations of MIMO networks consisting of multiple simultaneous MIMO links and applies these principles in the design of next-generation wireless networks. About ten years ago, the information theoretic foundations of MIMO techniques were developed and showed the promise of using multiple antennas at both the transmitter and receiver of a wireless link. An enormous amount of research ensued to develop practical techniques for achieving these promised gains. Within the last few years, the information theory community has again made significant breakthroughs, this time in the understanding of multiuser MIMO systems. Currently in industry, new wideband wireless standards, including EV-DO Rev C, UMTS LTE, and WiMax, are under development to meet the insatiable demands for high-rate, ubiquitous wireless services. For the first time, and for all of these standards, MIMO technology will play an integral role in meeting the aggressive performance requirements for increased data rates, decreased latency, and improved coverage. Motivated by the confluence of these two eventsa "the emergence of multiuser MIMO theory and the development of commercial MIMO-based systemsa "we propose to connect the two worlds with a bookthat combines theory and practice. This book would provide a systematic survey of MIMO systems, starting with a review of MIMO link-level techniques and conventional single-antenna system-level techniques, summarizing the latest results in multiuser MIMO systems and developments in cross-layer techniques, and applying these techniques to the analysis and design of both current and future packet-based wireless networks. In addition to providing theoretical results, the book would serve as a reference for practicing communication engineers by providing useful descriptions of spatial channel models and system simulation methodologies for MIMO networks
This book presents best selected research papers presented at the First International Conference on Integrated Intelligence Enable Networks and Computing (IIENC 2020), held from May 25 to May 27, 2020, at the Institute of Technology, Gopeshwar, India (Government Institute of Uttarakhand Government and affiliated to Uttarakhand Technical University). The book includes papers in the field of intelligent computing. The book covers the areas of machine learning and robotics, signal processing and Internet of things, big data and renewable energy sources.
This book constitutes Part II of the refereed four-volume post-conference proceedings of the 4th IFIP TC 12 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2010, held in Nanchang, China, in October 2010. The 352 revised papers presented were carefully selected from numerous submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including simulation models and decision-support systems for agricultural production, agricultural product quality testing, traceability and e-commerce technology, the application of information and communication technology in agriculture, and universal information service technology and service systems development in rural areas.
The book proposes new technologies and discusses innovative solutions to various problems in the field of communication, circuits, and systems, as reflected in high-quality papers presented at International Conference on Communication, Circuits, and Systems (IC3S 2020) held at KIIT, Bhubaneswar, India from 16 - 18 October 2020. It brings together new works from academicians, scientists, industry professionals, scholars, and students together to exchange research outcomes and open up new horizons in the areas of signal processing, communications, and devices.
This book includes high-quality papers presented at the International Conference on Communication, Computing and Electronics Systems 2020, held at the PPG Institute of Technology, Coimbatore, India, on 21-22 October 2020. The book covers topics such as automation, VLSI, embedded systems, integrated device technology, satellite communication, optical communication, RF communication, microwave engineering, artificial intelligence, deep learning, pattern recognition, Internet of Things, precision models, bioinformatics, and healthcare informatics.
This book provides an accessible and comprehensive tutorial on the key enabling technologies for 5G and beyond, covering both the fundamentals and the state-of-the-art 5G standards. The book begins with a historical overview of the evolution of cellular technologies and addresses the questions on why 5G and what is 5G. Following this, six tutorial chapters describe the fundamental technology components for 5G and beyond. These include modern advancements in channel coding, multiple access, massive multiple-input and multiple-output (MIMO), network densification, unmanned aerial vehicle enabled cellular networks, and 6G wireless systems. The second part of this book consists of five chapters that introduce the basics of 5G New Radio (NR) standards developed by 3GPP. These include 5G architecture, protocols, and physical layer aspects. The third part of this book provides an overview of the key 5G NR evolution directions. These directions include ultra-reliable low-latency communication (URLLC) enhancements, operation in unlicensed spectrum, positioning, integrated access and backhaul, air-to-ground communication, and non-terrestrial networks with satellite communication.
The Critical Infrastructure Protection Survey recently released by Symantec found that 53% of interviewed IT security experts from international companies experienced at least ten cyber attacks in the last five years, and financial institutions were often subject to some of the most sophisticated and large-scale cyber attacks and frauds. The book by Baldoni and Chockler analyzes the structure of software infrastructures found in the financial domain, their vulnerabilities to cyber attacks and the existing protection mechanisms. It then shows the advantages of sharing information among financial players in order to detect and quickly react to cyber attacks. Various aspects associated with information sharing are investigated from the organizational, cultural and legislative perspectives. The presentation is organized in two parts: Part I explores general issues associated with information sharing in the financial sector and is intended to set the stage for the vertical IT middleware solution proposed in Part II. Nonetheless, it is self-contained and details a survey of various types of critical infrastructure along with their vulnerability analysis, which has not yet appeared in a textbook-style publication elsewhere. Part II then presents the CoMiFin middleware for collaborative protection of the financial infrastructure. The material is presented in an accessible style and does not require specific prerequisites. It appeals to both researchers in the areas of security, distributed systems, and event processing working on new protection mechanisms, and practitioners looking for a state-of-the-art middleware technology to enhance the security of their critical infrastructures in e.g. banking, military, and other highly sensitive applications. The latter group will especially appreciate the concrete usage scenarios included.
With the diversification of Internet services and the increase in mobile users, efficient management of network resources has become an extremely important issue in the field of wireless communication networks (WCNs). Adaptive resource management is an effective tool for improving the economic efficiency of WCN systems as well as network design and construction, especially in view of the surge in mobile device demands. This book presents modelling methods based on queueing theory and Markov processes for a wide variety of WCN systems, as well as precise and approximate analytical solution methods for the numerical evaluation of the system performance. This is the first book to provide an overview of the numerical analyses that can be gleaned by applying queueing theory, traffic theory and other analytical methods to various WCN systems. It also discusses the recent advances in the resource management of WCNs, such as broadband wireless access networks, cognitive radio networks, and green cloud computing. It assumes a basic understanding of computer networks and queueing theory, and familiarity with stochastic processes is also recommended. The analysis methods presented in this book are useful for first-year-graduate or senior computer science and communication engineering students. Providing information on network design and management, performance evaluation, queueing theory, game theory, intelligent optimization, and operations research for researchers and engineers, the book is also a valuable reference resource for students, analysts, managers and anyone in the industry interested in WCN system modelling, performance analysis and numerical evaluation.
This book provides basic knowledge of advanced microcontrollers associated with large systems and devices. The book determines the feasibility of the advanced controllers from an Industry 4.0 perspective, which is associated with Integrated Internet of Things (IIoT) when developing larger smart cities. Also, it describes potential applications, key areas of Industry 4.0, and controlling applications with microcontrollers. Chapters include IoT with integrated control applications in smart city paradigm; agriculture, public safety, women and child care & welfare; healthcare, water management, government and administration; environmental impact, energy with management of information systems; and safety, education, transportation systems with advanced controllers.
Communications: Wireless in Developing Countries and Networks of the Future The present book contains the proceedings of two conferences held at the World Computer Congress 2010 in Brisbane, Australia (September 20-23) organized by the International Federation for Information Processing (IFIP): the Third IFIP TC 6 Int- national Conference on Wireless Communications and Information Technology for Developing Countries (WCITD 2010) and the IFIP TC 6 International Network of the Future Conference (NF 2010). The main objective of these two IFIP conferences on communications is to provide a platform for the exchange of recent and original c- tributions in wireless networks in developing countries and networks of the future. There are many exiting trends and developments in the communications industry, several of which are related to advances in wireless networks, and next-generation Internet. It is commonly believed in the communications industry that a new gene- tion should appear in the next ten years. Yet there are a number of issues that are being worked on in various industry research and development labs and universities towards enabling wireless high-speed networks, virtualization techniques, smart n- works, high-level security schemes, etc. We would like to thank the members of the Program Committees and the external reviewers and we hope these proceedings will be very useful to all researchers int- ested in the fields of wireless networks and future network technologies.
Energy efficiency issues for green internet of things (IoT) are investigated in this book, from the perspectives of device-to-device (D2D) communications, machine-to-machine (M2M) communications, and air-ground networks. Specifically, critical green IoT techniques from D2D communications in the cellular network to M2M communications in industrial IoT (IIoT), (from single physical-layer optimization to cross-layer optimization, and from single-layer ground networks to stereoscopic air-ground networks) are discussed in both theoretical problem formulation and simulation result analysis in this book. Internet of Things (IoT) offers a platform that enables sensors and devices to connect seamlessly in an intelligent environment, thus providing intelligence services including monitoring systems, industrial automation, and ultimately smart cities. However, the huge potentials of IoT are constrained by high energy consumption, limited battery capacity, and the slow progress of battery technology. The high energy consumption of IoT device causes communication interruption, information loss, and short network lifetime. Moreover, once deployed, the batteries inside IoT devices cannot be replaced in time. Therefore, energy efficient resource allocation is urgent to be investigated to improve the energy efficiency of IoT, facilitate green IoT, and extend the network lifetime. This book provides readers with a comprehensive overview of the state-of-the-art key technologies, frameworks, related optimization algorithms, and corresponding integrated designs on green IoT. It also presents an easy-to-understand style in a professional manner, making the book suitable for a wider range of readers from students to professionals interested in the green IoT.
This book presents the characteristics and benefits industrial organizations can reap from the Industrial Internet of Things (IIoT). These characteristics and benefits include enhanced competitiveness, increased proactive decision-making, improved creativity and innovation, augmented job creation, heightened agility to respond to continuously changing challenges, and intensified data-driven decision making. In a straightforward fashion, the book also helps readers understand complex concepts that are core to IIoT enterprises, such as Big Data, analytic architecture platforms, machine learning (ML) and data science algorithms, and the power of visualization to enrich the domains experts' decision making. The book also guides the reader on how to think about ways to define new business paradigms that the IIoT facilitates, as well how to increase the probability of success in managing analytic projects that are the core engine of decision-making in the IIoT enterprise. The book starts by defining an IIoT enterprise and the framework used to efficiently operate. A description of the concepts of industrial analytics, which is a major engine for decision making in the IIoT enterprise, is provided. It then discusses how data and machine learning (ML) play an important role in increasing the competitiveness of industrial enterprises that operate using the IIoT technology and business concepts. Real world examples of data driven IIoT enterprises and various business models are presented and a discussion on how the use of ML and data science help address complex decision-making problems and generate new job opportunities. The book presents in an easy-to-understand manner how ML algorithms work and operate on data generated in the IIoT enterprise. Useful for any industry professional interested in advanced industrial software applications, including business managers and professionals interested in how data analytics can help industries and to develop innovative business solutions, as well as data and computer scientists who wish to bridge the analytics and computer science fields with the industrial world, and project managers interested in managing advanced analytic projects. |
![]() ![]() You may like...
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, …
Hardcover
R4,233
Discovery Miles 42 330
Cyber-Physical Systems - Foundations…
Houbing Song, Danda B. Rawat, …
Paperback
Advances in Wireless Communications and…
Roumen Kountchev, Aniket Mahanti, …
Hardcover
R4,370
Discovery Miles 43 700
Research Trends in Graph Theory and…
Daniela Ferrero, Leslie Hogben, …
Hardcover
R3,543
Discovery Miles 35 430
Handbook of Integration of Cloud…
Rajiv Ranjan, Karan Mitra, …
Hardcover
R6,309
Discovery Miles 63 090
Smart and Sustainable Collaborative…
Luis M. Camarinha-Matos, Xavier Boucher, …
Hardcover
R6,500
Discovery Miles 65 000
Advances in Computing and Network…
Sabu M. Thampi, Erol Gelenbe, …
Hardcover
R8,756
Discovery Miles 87 560
|