![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
Energy efficiency issues for green internet of things (IoT) are investigated in this book, from the perspectives of device-to-device (D2D) communications, machine-to-machine (M2M) communications, and air-ground networks. Specifically, critical green IoT techniques from D2D communications in the cellular network to M2M communications in industrial IoT (IIoT), (from single physical-layer optimization to cross-layer optimization, and from single-layer ground networks to stereoscopic air-ground networks) are discussed in both theoretical problem formulation and simulation result analysis in this book. Internet of Things (IoT) offers a platform that enables sensors and devices to connect seamlessly in an intelligent environment, thus providing intelligence services including monitoring systems, industrial automation, and ultimately smart cities. However, the huge potentials of IoT are constrained by high energy consumption, limited battery capacity, and the slow progress of battery technology. The high energy consumption of IoT device causes communication interruption, information loss, and short network lifetime. Moreover, once deployed, the batteries inside IoT devices cannot be replaced in time. Therefore, energy efficient resource allocation is urgent to be investigated to improve the energy efficiency of IoT, facilitate green IoT, and extend the network lifetime. This book provides readers with a comprehensive overview of the state-of-the-art key technologies, frameworks, related optimization algorithms, and corresponding integrated designs on green IoT. It also presents an easy-to-understand style in a professional manner, making the book suitable for a wider range of readers from students to professionals interested in the green IoT.
This book provides an accessible and comprehensive tutorial on the key enabling technologies for 5G and beyond, covering both the fundamentals and the state-of-the-art 5G standards. The book begins with a historical overview of the evolution of cellular technologies and addresses the questions on why 5G and what is 5G. Following this, six tutorial chapters describe the fundamental technology components for 5G and beyond. These include modern advancements in channel coding, multiple access, massive multiple-input and multiple-output (MIMO), network densification, unmanned aerial vehicle enabled cellular networks, and 6G wireless systems. The second part of this book consists of five chapters that introduce the basics of 5G New Radio (NR) standards developed by 3GPP. These include 5G architecture, protocols, and physical layer aspects. The third part of this book provides an overview of the key 5G NR evolution directions. These directions include ultra-reliable low-latency communication (URLLC) enhancements, operation in unlicensed spectrum, positioning, integrated access and backhaul, air-to-ground communication, and non-terrestrial networks with satellite communication.
This book is the world's first book on 6G Mobile Wireless Networks that aims to provide a comprehensive understanding of key drivers, use cases, research requirements, challenges and open issues that are expected to drive 6G research. In this book, we have invited world-renowned experts from industry and academia to share their thoughts on different aspects of 6G research. Specifically, this book covers the following topics: 6G Use Cases, Requirements, Metrics and Enabling Technologies, PHY Technologies for 6G Wireless, Reconfigurable Intelligent Surface for 6G Wireless Networks, Millimeter-wave and Terahertz Spectrum for 6G Wireless, Challenges in Transport Layer for Tbit/s Communications, High-capacity Backhaul Connectivity for 6G Wireless, Cloud Native Approach for 6G Wireless Networks, Machine Type Communications in 6G, Edge Intelligence and Pervasive AI in 6G, Blockchain: Foundations and Role in 6G, Role of Open-source Platforms in 6G, and Quantum Computing and 6G Wireless. The overarching aim of this book is to explore the evolution from current 5G networks towards the future 6G networks from a service, air interface and network perspective, thereby laying out a vision for 6G networks. This book not only discusses the potential 6G use cases, requirements, metrics and enabling technologies, but also discusses the emerging technologies and topics such as 6G PHY technologies, reconfigurable intelligent surface, millimeter-wave and THz communications, visible light communications, transport layer for Tbit/s communications, high-capacity backhaul connectivity, cloud native approach, machine-type communications, edge intelligence and pervasive AI, network security and blockchain, and the role of open-source platform in 6G. This book provides a systematic treatment of the state-of-the-art in these emerging topics and their role in supporting a wide variety of verticals in the future. As such, it provides a comprehensive overview of the expected applications of 6G with a detailed discussion of their requirements and possible enabling technologies. This book also outlines the possible challenges and research directions to facilitate the future research and development of 6G mobile wireless networks.
This book studies the vulnerability of wireless communications under line-of-sight (LoS) and non-LoS correlated fading environments. The authors theoretically and practically provide physical layer security analyses for several technologies and networks such as Fifth-Generation (5G) networks, Internet of Things (IoT) applications, and Non-orthogonal multiple access (NOMA). The authors have provided these under various practical scenarios, and developed theoretical aspects to validate their proposed applications. Presents physical layer security (PLS) under correlated fading environments, 5G wireless networks, and NOMA networks; Provides end-to-end analyses, combination of channel correlation and outdated CSI and their effects on PL; Includes contributions of PLS research written by global experts in academia and industry.
This book presents an in-depth study on the recent advances in Wireless Sensor Networks (WSNs). The authors describe the existing WSN applications and discuss the research efforts being undertaken in this field. Theoretical analysis and factors influencing protocol design are also highlighted. The authors explore state-of-the-art protocols for WSN protocol stack in transport, routing, data link, and physical layers. Moreover, the synchronization and localization problems in WSNs are investigated along with existing solutions. Furthermore, cross-layer solutions are described. Finally, developing areas of WSNs including sensor-actor networks, multimedia sensor networks, and WSN applications in underwater and underground environments are explored. The book is written in an accessible, textbook style, and includes problems and solutions to assist learning. Key Features: The ultimate guide to recent advances and research into WSNs Discusses the most important problems and issues that arise when programming and designing WSN systems Shows why the unique features of WSNs - self-organization, cooperation, correlation -- will enable new applications that will provide the end user with intelligence and a better understanding of the environment Provides an overview of the existing evaluation approaches for WSNs including physical testbeds and software simulation environments Includes examples and learning exercises with a solutions manual; supplemented by an accompanying website containing PPT-slides. "Wireless Sensor Networks" is an essential textbook for advanced students on courses in wireless communications, networking and computer science. It will also be of interest to researchers, system and chip designers, network planners, technical mangers and other professionals in these fields.
This book constitutes the refereed post-conference proceedings of the 7th Russian Supercomputing Days, RuSCDays 2021, held in Moscow, Russia, in September 2021.The 37 revised full papers and 3 short papers presented were carefully reviewed and selected from 99 submissions. The papers are organized in the following topical sections: supercomputer simulation; HPC, BigData, AI: architectures, technologies, tools; and distributed and cloud computing.
Performance of Web Services provides innovative techniques to improve the performance of Web Services, as well as QoS (Quality of Service) requirements. This includes Qos performance, reliability and security. The author presents two levels of Web Services: the "kernel" (ithe SOAP engine which delivers messages from one point to another through various networks), and the "server side" (which processes heavy load / requests). The primary objective of this book is execution of applications delivered in a timely fashion. Case studies and examples are provided throughout this book.
This book features research presented and discussed during the Research & Innovation Forum (Rii Forum) 2020. As such, this book offers a unique insight into emerging topics, issues and developments pertinent to the fields of technology, innovation and education and their social impact. Papers included in this book apply inter- and multi-disciplinary approaches to query such issues as technology-enhanced teaching and learning, smart cities, information systems, cognitive computing and social networking. What brings these threads of the discussion together is the question of how advances in computer science - which are otherwise largely incomprehensible to researchers from other fields - can be effectively translated and capitalized on so as to make them beneficial for society as a whole. In this context, Rii Forum and Rii Forum proceedings offer an essential venue where diverse stakeholders, including academics, the think tank sector and decision-makers, can engage in a meaningful dialogue with a view to improving the applicability of advances in computer science.
This book constitutes the refereed proceedings of the 12th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2011, held in Sao Paulo, Brazil, in October 2011. The 61 revised papers presented were carefully selected from numerous submissions. They provide a comprehensive overview of recent advances in various collaborative network (CN) domains and their applications with a particular focus on adaptation of the networks and their value creation, specifically emphasizing topics related to evolution from social networking to collaborative networks; social capital; value chains; co-creation of complex products; performance management; behavioral aspects in collaborative networks; collaborative networks planning and modeling; benefit analysis and sustainability issues, as well as including important technical and scientific challenges in applying CNs to areas such as advanced logistics networks, business process modeling, service orientation, and other emerging application domains such as ageing, tourism, crisis, and emergency scenarios.
This book proposes new technologies and discusses future solutions for ICT design infrastructures, as reflected in high-quality papers presented at the 5th International Conference on ICT for Sustainable Development (ICT4SD 2020), held in Goa, India, on 23-24 July 2020. The conference provided a valuable forum for cutting-edge research discussions among pioneering researchers, scientists, industrial engineers, and students from all around the world. Bringing together experts from different countries, the book explores a range of central issues from an international perspective.
This book includes novel and state-of-the-art research discussions that articulate and report all research aspects, including theoretical and experimental prototypes and applications that incorporate sustainability into emerging applications. In recent years, sustainability and information and communication technologies (ICT) are highly intertwined, where sustainability resources and its management has attracted various researchers, stakeholders, and industrialists. The energy-efficient communication technologies have revolutionized the various smart applications like smart cities, healthcare, entertainment, and business. The book discusses and articulates emerging challenges in significantly reducing the energy consumption of communication systems and also explains development of a sustainable and energy-efficient mobile and wireless communication network. It includes best selected high-quality conference papers in different fields such as internet of things, cloud computing, data mining, artificial intelligence, machine learning, autonomous systems, deep learning, neural networks, renewable energy sources, sustainable wireless communication networks, QoS, network sustainability, and many other related areas.
This edited book presents point of view and the work being undertaken by active researchers in the domain of IOT and its applications with societal impact. The book is useful to other researchers for the understanding of the research domain and different points of views expressed by the experts in their contributed chapters. The contributions are from both industry and academia; hence, it provides a rich source of both theoretical and practical work going on in the research domain of IOT.
This book presents refereed proceedings of the Third International Conference on Advances in Cyber Security, ACeS 2021, held in Penang, Malaysia, in August 2021. The 36 full papers were carefully reviewed and selected from 92 submissions. The papers are organized in the following topical sections: Internet of Things, Industry 4.0 and Blockchain, and Cryptology; Digital Forensics and Surveillance, Botnet and Malware, DDoS, and Intrusion Detection/Prevention; Ambient Cloud and Edge Computing, SDN, Wireless and Cellular Communication; Governance, Social Media, Mobile and Web, Data Privacy, Data Policy and Fake News.
This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook-Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text.
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.
"Designing for Network and Service Continuity in Wireless Mesh Networks" describes performance predictability of the new wireless mesh network paradigm, and describes considerations in designing networks from the perspective of survivability and service continuity metrics. The work provides design insights for network design researchers and industry professionals. It includes designs for new mesh networks and extensions of existing networks with predictable performance.
This two-volume set, CCIS 1453 and CCIS 1454, constitutes refereed proceedings of the 6th International Conference on Data Mining and Big Data, DMBD 2021, held in Guangzhou, China, in October 2021. The 57 full papers and 28 short papers presented in this two-volume set were carefully reviewed and selected from 258 submissions. The papers present the latest research on advantages in theories, technologies, and applications in data mining and big data. The volume covers many aspects of data mining and big data as well as intelligent computing methods applied to all fields of computer science, machine learning, data mining and knowledge discovery, data science, etc.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fourth International Conference on Information and Communication Technology for Intelligent Systems, which was held in Ahmedabad, India. Divided into two volumes, the book discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fourth International Conference on Information and Communication Technology for Intelligent Systems, which was held in Ahmedabad, India. Divided into two volumes, the book discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.
This book constitutes selected and revised papers presented at the First International Conference on Optimization, Learning Algorithms and Applications, OL2A 2021, held in Braganca, Portugal, in July 2021. Due to the COVID-19 pandemic the conference was held online. The 39 full papers and 13 short papers were thoroughly reviewed and selected from 134 submissions. They are organized in the topical sections on optimization theory; robotics; measurements with the internet of things; optimization in control systems design; deep learning; data visualization and virtual reality; health informatics; data analysis; trends in engineering education.
This proceeding features papers discussing big data innovation for sustainable cognitive computing. The papers feature details on cognitive computing and its self-learning systems that use data mining, pattern recognition and natural language processing (NLP) to mirror the way the human brain works. This international conference focuses on cognitive computing technologies, from knowledge representation techniques and natural language processing algorithms to dynamic learning approaches. Topics covered include Data Science for Cognitive Analysis, Real-Time Ubiquitous Data Science, Platform for Privacy Preserving Data Science, and Internet-Based Cognitive Platform. The 2nd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (BDCC 2019) took place in Coimbatore, India on December 12-13, 2019. Contains proceedings from 2nd EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (BDCC 2019), Coimbatore, India, December 12-13, 2019; Features topics ranging from Data Science for Cognitive Analysis to Internet-Based Cognitive Platforms; Includes contributions from researchers, academics, and professionals from around the world.
This volume constitutes the refereed proceedings of the 8th Workshop on Engineering Applications, WEA 2021, held in Medellin, Colombia, in October 2021. Due to the COVID-19 pandemic the conference was held in a hybrid mode. The 33 revised full papers and 11 short papers presented in this volume were carefully reviewed and selected from 127 submissions. The papers are organized in the following topical sections: computational intelligence; bioengineering; Internet of Things (IoT); optimization and operations research; engineering applications.
This book discusses cybersecurity issues of smart grid cyber-physical systems, focusing on the detection techniques against false data injection attacks. The authors discuss passive and proactive techniques that combat and mitigate two categories of false data injection attacks, false measurement data injections and false command data injections in smart grid cyber-physical systems. These techniques are easy to follow for either professionals or beginners. With this book, readers can quickly get an overview of this topic and get ideas of new solutions for false data injections in smart grid cyber-physical systems. Readers include researchers, academics, students, and professionals. Presents a comprehensive summary for the detection techniques of false data injection attacks in smart grid cyber-physical systems; Reviews false data injections for either measurement data or command data; Analyzes passive and proactive approaches to smart grid cyber-physical systems.
This handbook covers recent advances in the integration of three areas, namely, cloud computing, cyber-physical systems, and the Internet of things which is expected to have a tremendous impact on our daily lives. It contains a total of thirteen peer-reviewed and edited chapters. This book covers topics such as context-aware cyber-physical systems, sustainable cloud computing, fog computing, and cloud monitoring; both the theoretical and practical aspects belonging to these topics are discussed. All the chapters also discuss open research challenges in the areas mentioned above. Finally, the handbook presents three use cases regarding healthcare, smart buildings and disaster management to assist the audience in understanding how to develop next-generation IoT- and cloud-enabled cyber-physical systems. This timely handbook is edited for students, researchers, as well as professionals who are interested in the rapidly growing fields of cloud computing, cyber-physical systems, and the Internet of things.
This book constitutes the thoroughly revised selected papers from the 17th International Symposium, FACS 2021, which was hel virtually in October 2021. The 7 full papers and 1 short contribution were carefully reviewed and selected from 16 submissions and are presented in the volume together with 1 invited paper. FACS 2021 is concerned with how formal methods can be applied to component-based software and system development. The book is subdivided into two blocks: Modelling & Composition and Verification. Chapter "A Linear Parallel Algorithm to Compute Bisimulation and Relational Coarsest Partitions" is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com. |
![]() ![]() You may like...
Querying XML - XQuery, XPath, and…
Jim Melton, Stephen Buxton
Paperback
R1,568
Discovery Miles 15 680
OCR AS/A level Chemistry A Student Book…
Victoria Stutt, Dave Scott, …
Paperback
R1,176
Discovery Miles 11 760
|