![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
This book studies the vulnerability of wireless communications under line-of-sight (LoS) and non-LoS correlated fading environments. The authors theoretically and practically provide physical layer security analyses for several technologies and networks such as Fifth-Generation (5G) networks, Internet of Things (IoT) applications, and Non-orthogonal multiple access (NOMA). The authors have provided these under various practical scenarios, and developed theoretical aspects to validate their proposed applications. Presents physical layer security (PLS) under correlated fading environments, 5G wireless networks, and NOMA networks; Provides end-to-end analyses, combination of channel correlation and outdated CSI and their effects on PL; Includes contributions of PLS research written by global experts in academia and industry.
This book presents an in-depth study on the recent advances in Wireless Sensor Networks (WSNs). The authors describe the existing WSN applications and discuss the research efforts being undertaken in this field. Theoretical analysis and factors influencing protocol design are also highlighted. The authors explore state-of-the-art protocols for WSN protocol stack in transport, routing, data link, and physical layers. Moreover, the synchronization and localization problems in WSNs are investigated along with existing solutions. Furthermore, cross-layer solutions are described. Finally, developing areas of WSNs including sensor-actor networks, multimedia sensor networks, and WSN applications in underwater and underground environments are explored. The book is written in an accessible, textbook style, and includes problems and solutions to assist learning. Key Features: The ultimate guide to recent advances and research into WSNs Discusses the most important problems and issues that arise when programming and designing WSN systems Shows why the unique features of WSNs - self-organization, cooperation, correlation -- will enable new applications that will provide the end user with intelligence and a better understanding of the environment Provides an overview of the existing evaluation approaches for WSNs including physical testbeds and software simulation environments Includes examples and learning exercises with a solutions manual; supplemented by an accompanying website containing PPT-slides. "Wireless Sensor Networks" is an essential textbook for advanced students on courses in wireless communications, networking and computer science. It will also be of interest to researchers, system and chip designers, network planners, technical mangers and other professionals in these fields.
This book constitutes the refereed post-conference proceedings of the 7th Russian Supercomputing Days, RuSCDays 2021, held in Moscow, Russia, in September 2021.The 37 revised full papers and 3 short papers presented were carefully reviewed and selected from 99 submissions. The papers are organized in the following topical sections: supercomputer simulation; HPC, BigData, AI: architectures, technologies, tools; and distributed and cloud computing.
Performance of Web Services provides innovative techniques to improve the performance of Web Services, as well as QoS (Quality of Service) requirements. This includes Qos performance, reliability and security. The author presents two levels of Web Services: the "kernel" (ithe SOAP engine which delivers messages from one point to another through various networks), and the "server side" (which processes heavy load / requests). The primary objective of this book is execution of applications delivered in a timely fashion. Case studies and examples are provided throughout this book.
This book features research presented and discussed during the Research & Innovation Forum (Rii Forum) 2020. As such, this book offers a unique insight into emerging topics, issues and developments pertinent to the fields of technology, innovation and education and their social impact. Papers included in this book apply inter- and multi-disciplinary approaches to query such issues as technology-enhanced teaching and learning, smart cities, information systems, cognitive computing and social networking. What brings these threads of the discussion together is the question of how advances in computer science - which are otherwise largely incomprehensible to researchers from other fields - can be effectively translated and capitalized on so as to make them beneficial for society as a whole. In this context, Rii Forum and Rii Forum proceedings offer an essential venue where diverse stakeholders, including academics, the think tank sector and decision-makers, can engage in a meaningful dialogue with a view to improving the applicability of advances in computer science.
This book constitutes the refereed proceedings of the 12th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2011, held in Sao Paulo, Brazil, in October 2011. The 61 revised papers presented were carefully selected from numerous submissions. They provide a comprehensive overview of recent advances in various collaborative network (CN) domains and their applications with a particular focus on adaptation of the networks and their value creation, specifically emphasizing topics related to evolution from social networking to collaborative networks; social capital; value chains; co-creation of complex products; performance management; behavioral aspects in collaborative networks; collaborative networks planning and modeling; benefit analysis and sustainability issues, as well as including important technical and scientific challenges in applying CNs to areas such as advanced logistics networks, business process modeling, service orientation, and other emerging application domains such as ageing, tourism, crisis, and emergency scenarios.
This book proposes new technologies and discusses future solutions for ICT design infrastructures, as reflected in high-quality papers presented at the 5th International Conference on ICT for Sustainable Development (ICT4SD 2020), held in Goa, India, on 23-24 July 2020. The conference provided a valuable forum for cutting-edge research discussions among pioneering researchers, scientists, industrial engineers, and students from all around the world. Bringing together experts from different countries, the book explores a range of central issues from an international perspective.
This book includes novel and state-of-the-art research discussions that articulate and report all research aspects, including theoretical and experimental prototypes and applications that incorporate sustainability into emerging applications. In recent years, sustainability and information and communication technologies (ICT) are highly intertwined, where sustainability resources and its management has attracted various researchers, stakeholders, and industrialists. The energy-efficient communication technologies have revolutionized the various smart applications like smart cities, healthcare, entertainment, and business. The book discusses and articulates emerging challenges in significantly reducing the energy consumption of communication systems and also explains development of a sustainable and energy-efficient mobile and wireless communication network. It includes best selected high-quality conference papers in different fields such as internet of things, cloud computing, data mining, artificial intelligence, machine learning, autonomous systems, deep learning, neural networks, renewable energy sources, sustainable wireless communication networks, QoS, network sustainability, and many other related areas.
This edited book presents point of view and the work being undertaken by active researchers in the domain of IOT and its applications with societal impact. The book is useful to other researchers for the understanding of the research domain and different points of views expressed by the experts in their contributed chapters. The contributions are from both industry and academia; hence, it provides a rich source of both theoretical and practical work going on in the research domain of IOT.
This book presents refereed proceedings of the Third International Conference on Advances in Cyber Security, ACeS 2021, held in Penang, Malaysia, in August 2021. The 36 full papers were carefully reviewed and selected from 92 submissions. The papers are organized in the following topical sections: Internet of Things, Industry 4.0 and Blockchain, and Cryptology; Digital Forensics and Surveillance, Botnet and Malware, DDoS, and Intrusion Detection/Prevention; Ambient Cloud and Edge Computing, SDN, Wireless and Cellular Communication; Governance, Social Media, Mobile and Web, Data Privacy, Data Policy and Fake News.
This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook-Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text.
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.
"Designing for Network and Service Continuity in Wireless Mesh Networks" describes performance predictability of the new wireless mesh network paradigm, and describes considerations in designing networks from the perspective of survivability and service continuity metrics. The work provides design insights for network design researchers and industry professionals. It includes designs for new mesh networks and extensions of existing networks with predictable performance.
This two-volume set, CCIS 1453 and CCIS 1454, constitutes refereed proceedings of the 6th International Conference on Data Mining and Big Data, DMBD 2021, held in Guangzhou, China, in October 2021. The 57 full papers and 28 short papers presented in this two-volume set were carefully reviewed and selected from 258 submissions. The papers present the latest research on advantages in theories, technologies, and applications in data mining and big data. The volume covers many aspects of data mining and big data as well as intelligent computing methods applied to all fields of computer science, machine learning, data mining and knowledge discovery, data science, etc.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fourth International Conference on Information and Communication Technology for Intelligent Systems, which was held in Ahmedabad, India. Divided into two volumes, the book discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fourth International Conference on Information and Communication Technology for Intelligent Systems, which was held in Ahmedabad, India. Divided into two volumes, the book discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.
This book constitutes selected and revised papers presented at the First International Conference on Optimization, Learning Algorithms and Applications, OL2A 2021, held in Braganca, Portugal, in July 2021. Due to the COVID-19 pandemic the conference was held online. The 39 full papers and 13 short papers were thoroughly reviewed and selected from 134 submissions. They are organized in the topical sections on optimization theory; robotics; measurements with the internet of things; optimization in control systems design; deep learning; data visualization and virtual reality; health informatics; data analysis; trends in engineering education.
This proceeding features papers discussing big data innovation for sustainable cognitive computing. The papers feature details on cognitive computing and its self-learning systems that use data mining, pattern recognition and natural language processing (NLP) to mirror the way the human brain works. This international conference focuses on cognitive computing technologies, from knowledge representation techniques and natural language processing algorithms to dynamic learning approaches. Topics covered include Data Science for Cognitive Analysis, Real-Time Ubiquitous Data Science, Platform for Privacy Preserving Data Science, and Internet-Based Cognitive Platform. The 2nd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (BDCC 2019) took place in Coimbatore, India on December 12-13, 2019. Contains proceedings from 2nd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (BDCC 2019), Coimbatore, India, December 12-13, 2019; Features topics ranging from Data Science for Cognitive Analysis to Internet-Based Cognitive Platforms; Includes contributions from researchers, academics, and professionals from around the world.
This volume constitutes the refereed proceedings of the 8th Workshop on Engineering Applications, WEA 2021, held in Medellin, Colombia, in October 2021. Due to the COVID-19 pandemic the conference was held in a hybrid mode. The 33 revised full papers and 11 short papers presented in this volume were carefully reviewed and selected from 127 submissions. The papers are organized in the following topical sections: computational intelligence; bioengineering; Internet of Things (IoT); optimization and operations research; engineering applications.
This book discusses cybersecurity issues of smart grid cyber-physical systems, focusing on the detection techniques against false data injection attacks. The authors discuss passive and proactive techniques that combat and mitigate two categories of false data injection attacks, false measurement data injections and false command data injections in smart grid cyber-physical systems. These techniques are easy to follow for either professionals or beginners. With this book, readers can quickly get an overview of this topic and get ideas of new solutions for false data injections in smart grid cyber-physical systems. Readers include researchers, academics, students, and professionals. Presents a comprehensive summary for the detection techniques of false data injection attacks in smart grid cyber-physical systems; Reviews false data injections for either measurement data or command data; Analyzes passive and proactive approaches to smart grid cyber-physical systems.
This handbook covers recent advances in the integration of three areas, namely, cloud computing, cyber-physical systems, and the Internet of things which is expected to have a tremendous impact on our daily lives. It contains a total of thirteen peer-reviewed and edited chapters. This book covers topics such as context-aware cyber-physical systems, sustainable cloud computing, fog computing, and cloud monitoring; both the theoretical and practical aspects belonging to these topics are discussed. All the chapters also discuss open research challenges in the areas mentioned above. Finally, the handbook presents three use cases regarding healthcare, smart buildings and disaster management to assist the audience in understanding how to develop next-generation IoT- and cloud-enabled cyber-physical systems. This timely handbook is edited for students, researchers, as well as professionals who are interested in the rapidly growing fields of cloud computing, cyber-physical systems, and the Internet of things.
This book constitutes the thoroughly revised selected papers from the 17th International Symposium, FACS 2021, which was hel virtually in October 2021. The 7 full papers and 1 short contribution were carefully reviewed and selected from 16 submissions and are presented in the volume together with 1 invited paper. FACS 2021 is concerned with how formal methods can be applied to component-based software and system development. The book is subdivided into two blocks: Modelling & Composition and Verification. Chapter "A Linear Parallel Algorithm to Compute Bisimulation and Relational Coarsest Partitions" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
This book presents the proceedings of The EAI International Conference on Computer Science: Applications in Engineering and Health Services (COMPSE 2019). The conference highlighted the latest research innovations and applications of algorithms designed for optimization applications within the fields of Science, Computer Science, Engineering, Information Technology, Management, Finance and Economics and Health Systems. Focusing on a variety of methods and systems as well as practical examples, this conference is a significant resource for post graduate-level students, decision makers, and researchers in both public and private sectors who are seeking research-based methods for modelling uncertain and unpredictable real-world problems.
This proceedings presents the papers of the 3rd EAI International Conference on Robotic Sensor Networks (ROSENET 2019). The conference explores the integration of networks and robotic technologies, which has become a topic of increasing interest for both researchers and developers from academic fields and industries worldwide. The authors posit that big networks will be the main approach to the next generation of robotic research, The book discusses how the explosive number of network models and increasing computational power of computers significantly extends the number of potential applications for robotic technologies while also bringing new challenges to each network's community. The conference provided a platform for researchers to share up-to-date scientific achievements in this field. The conference took place August 17, 2019, Kitakyushu, Japan. Presents the proceedings of the 3rd EAI International Conference on Robotic Sensor Networks (ROSENET 2019), August 17, 2019, Kitakyushu, Japan Features papers on robotic technologies for healthcare, medicine, military and more Includes perspectives from a multi-disciplinary selection of global researchers, academics, and professionals
This book features selected papers presented at the 3rd International Conference on Wireless Communications and Applications (ICWCA 2019), held at Hainan University, China. Focusing on applications of the latest smart theories and approaches, and recent advances in the field, it covers topics such as OFDM and multi-carrier techniques; smart antenna and space-time signal processing; MIMO, multi-user MIMO, and massive MIMO; modulation, coding, and diversity techniques; dynamic spectrum access and cognitive radio; interference management and radio resource allocation; equalization techniques; synchronization, estimation, and detection techniques; and wireless multiple access (e.g. CDMA, OFDMA, NOMA, ). |
![]() ![]() You may like...
Numerical Methods for Bifurcation…
Eusebius J. Doedel, Laurette S. Tuckermann, …
Hardcover
R2,614
Discovery Miles 26 140
Finite Elements and Fast Iterative…
Howard Elman, David Silvester, …
Hardcover
R4,587
Discovery Miles 45 870
Differential Equations with Linear…
Matthew R. Boelkins, Jack L. Goldberg, …
Hardcover
R3,047
Discovery Miles 30 470
Information Theory - Poincare Seminar…
Bertrand Duplantier, Vincent Rivasseau
Hardcover
R3,621
Discovery Miles 36 210
Hausdorff Calculus - Applications to…
Yingjie Liang, Wen Chen, …
Hardcover
R4,588
Discovery Miles 45 880
Pile Foundations and Pile-driving…
United States. - Army. - Corps of Engineers.
Hardcover
R711
Discovery Miles 7 110
|