![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
Energy efficiency issues for green internet of things (IoT) are investigated in this book, from the perspectives of device-to-device (D2D) communications, machine-to-machine (M2M) communications, and air-ground networks. Specifically, critical green IoT techniques from D2D communications in the cellular network to M2M communications in industrial IoT (IIoT), (from single physical-layer optimization to cross-layer optimization, and from single-layer ground networks to stereoscopic air-ground networks) are discussed in both theoretical problem formulation and simulation result analysis in this book. Internet of Things (IoT) offers a platform that enables sensors and devices to connect seamlessly in an intelligent environment, thus providing intelligence services including monitoring systems, industrial automation, and ultimately smart cities. However, the huge potentials of IoT are constrained by high energy consumption, limited battery capacity, and the slow progress of battery technology. The high energy consumption of IoT device causes communication interruption, information loss, and short network lifetime. Moreover, once deployed, the batteries inside IoT devices cannot be replaced in time. Therefore, energy efficient resource allocation is urgent to be investigated to improve the energy efficiency of IoT, facilitate green IoT, and extend the network lifetime. This book provides readers with a comprehensive overview of the state-of-the-art key technologies, frameworks, related optimization algorithms, and corresponding integrated designs on green IoT. It also presents an easy-to-understand style in a professional manner, making the book suitable for a wider range of readers from students to professionals interested in the green IoT.
This book presents the characteristics and benefits industrial organizations can reap from the Industrial Internet of Things (IIoT). These characteristics and benefits include enhanced competitiveness, increased proactive decision-making, improved creativity and innovation, augmented job creation, heightened agility to respond to continuously changing challenges, and intensified data-driven decision making. In a straightforward fashion, the book also helps readers understand complex concepts that are core to IIoT enterprises, such as Big Data, analytic architecture platforms, machine learning (ML) and data science algorithms, and the power of visualization to enrich the domains experts' decision making. The book also guides the reader on how to think about ways to define new business paradigms that the IIoT facilitates, as well how to increase the probability of success in managing analytic projects that are the core engine of decision-making in the IIoT enterprise. The book starts by defining an IIoT enterprise and the framework used to efficiently operate. A description of the concepts of industrial analytics, which is a major engine for decision making in the IIoT enterprise, is provided. It then discusses how data and machine learning (ML) play an important role in increasing the competitiveness of industrial enterprises that operate using the IIoT technology and business concepts. Real world examples of data driven IIoT enterprises and various business models are presented and a discussion on how the use of ML and data science help address complex decision-making problems and generate new job opportunities. The book presents in an easy-to-understand manner how ML algorithms work and operate on data generated in the IIoT enterprise. Useful for any industry professional interested in advanced industrial software applications, including business managers and professionals interested in how data analytics can help industries and to develop innovative business solutions, as well as data and computer scientists who wish to bridge the analytics and computer science fields with the industrial world, and project managers interested in managing advanced analytic projects.
This book studies the vulnerability of wireless communications under line-of-sight (LoS) and non-LoS correlated fading environments. The authors theoretically and practically provide physical layer security analyses for several technologies and networks such as Fifth-Generation (5G) networks, Internet of Things (IoT) applications, and Non-orthogonal multiple access (NOMA). The authors have provided these under various practical scenarios, and developed theoretical aspects to validate their proposed applications. Presents physical layer security (PLS) under correlated fading environments, 5G wireless networks, and NOMA networks; Provides end-to-end analyses, combination of channel correlation and outdated CSI and their effects on PL; Includes contributions of PLS research written by global experts in academia and industry.
This book includes novel and state-of-the-art research discussions that articulate and report all research aspects, including theoretical and experimental prototypes and applications that incorporate sustainability into emerging applications. In recent years, sustainability and information and communication technologies (ICT) are highly intertwined, where sustainability resources and its management has attracted various researchers, stakeholders, and industrialists. The energy-efficient communication technologies have revolutionized the various smart applications like smart cities, healthcare, entertainment, and business. The book discusses and articulates emerging challenges in significantly reducing the energy consumption of communication systems and also explains development of a sustainable and energy-efficient mobile and wireless communication network. It includes best selected high-quality conference papers in different fields such as internet of things, cloud computing, data mining, artificial intelligence, machine learning, autonomous systems, deep learning, neural networks, renewable energy sources, sustainable wireless communication networks, QoS, network sustainability, and many other related areas.
This book presents an in-depth study on the recent advances in Wireless Sensor Networks (WSNs). The authors describe the existing WSN applications and discuss the research efforts being undertaken in this field. Theoretical analysis and factors influencing protocol design are also highlighted. The authors explore state-of-the-art protocols for WSN protocol stack in transport, routing, data link, and physical layers. Moreover, the synchronization and localization problems in WSNs are investigated along with existing solutions. Furthermore, cross-layer solutions are described. Finally, developing areas of WSNs including sensor-actor networks, multimedia sensor networks, and WSN applications in underwater and underground environments are explored. The book is written in an accessible, textbook style, and includes problems and solutions to assist learning. Key Features: The ultimate guide to recent advances and research into WSNs Discusses the most important problems and issues that arise when programming and designing WSN systems Shows why the unique features of WSNs - self-organization, cooperation, correlation -- will enable new applications that will provide the end user with intelligence and a better understanding of the environment Provides an overview of the existing evaluation approaches for WSNs including physical testbeds and software simulation environments Includes examples and learning exercises with a solutions manual; supplemented by an accompanying website containing PPT-slides. "Wireless Sensor Networks" is an essential textbook for advanced students on courses in wireless communications, networking and computer science. It will also be of interest to researchers, system and chip designers, network planners, technical mangers and other professionals in these fields.
This book features research presented and discussed during the Research & Innovation Forum (Rii Forum) 2020. As such, this book offers a unique insight into emerging topics, issues and developments pertinent to the fields of technology, innovation and education and their social impact. Papers included in this book apply inter- and multi-disciplinary approaches to query such issues as technology-enhanced teaching and learning, smart cities, information systems, cognitive computing and social networking. What brings these threads of the discussion together is the question of how advances in computer science - which are otherwise largely incomprehensible to researchers from other fields - can be effectively translated and capitalized on so as to make them beneficial for society as a whole. In this context, Rii Forum and Rii Forum proceedings offer an essential venue where diverse stakeholders, including academics, the think tank sector and decision-makers, can engage in a meaningful dialogue with a view to improving the applicability of advances in computer science.
This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.
This book constitutes the refereed post-conference proceedings of the 7th Russian Supercomputing Days, RuSCDays 2021, held in Moscow, Russia, in September 2021.The 37 revised full papers and 3 short papers presented were carefully reviewed and selected from 99 submissions. The papers are organized in the following topical sections: supercomputer simulation; HPC, BigData, AI: architectures, technologies, tools; and distributed and cloud computing.
Performance of Web Services provides innovative techniques to improve the performance of Web Services, as well as QoS (Quality of Service) requirements. This includes Qos performance, reliability and security. The author presents two levels of Web Services: the "kernel" (ithe SOAP engine which delivers messages from one point to another through various networks), and the "server side" (which processes heavy load / requests). The primary objective of this book is execution of applications delivered in a timely fashion. Case studies and examples are provided throughout this book.
This book constitutes the refereed proceedings of the 12th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2011, held in Sao Paulo, Brazil, in October 2011. The 61 revised papers presented were carefully selected from numerous submissions. They provide a comprehensive overview of recent advances in various collaborative network (CN) domains and their applications with a particular focus on adaptation of the networks and their value creation, specifically emphasizing topics related to evolution from social networking to collaborative networks; social capital; value chains; co-creation of complex products; performance management; behavioral aspects in collaborative networks; collaborative networks planning and modeling; benefit analysis and sustainability issues, as well as including important technical and scientific challenges in applying CNs to areas such as advanced logistics networks, business process modeling, service orientation, and other emerging application domains such as ageing, tourism, crisis, and emergency scenarios.
This book proposes new technologies and discusses future solutions for ICT design infrastructures, as reflected in high-quality papers presented at the 5th International Conference on ICT for Sustainable Development (ICT4SD 2020), held in Goa, India, on 23-24 July 2020. The conference provided a valuable forum for cutting-edge research discussions among pioneering researchers, scientists, industrial engineers, and students from all around the world. Bringing together experts from different countries, the book explores a range of central issues from an international perspective.
The information infrastructure - comprising computers, embedded devices, networks and software systems - is vital to operations in every sector: chemicals, commercial facilities, communications, critical manufacturing, dams, defense industrial base, emergency services, energy, financial services, food and agriculture, government facilities, healthcare and public health, information technology, nuclear reactors, materials and waste, transportation systems, and water and wastewater systems. Global business and industry, governments, indeed society itself, cannot function if major components of the critical information infrastructure are degraded, disabled or destroyed.Critical Infrastructure Protection XIV describes original research results and innovative applications in the interdisciplinary field of critical infrastructure protection. Also, it highlights the importance of weaving science, technology and policy in crafting sophisticated, yet practical, solutions that will help secure information, computer and network assets in the various critical infrastructure sectors. Areas of coverage include: Aviation Infrastructure Security; Vehicle Infrastructure Security; Telecommunications Systems Security; Industrial Control Systems Security; Cyber-Physical Systems Security; and Infrastructure Modeling and Simulation. This book is the fourteenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.10 on Critical Infrastructure Protection, an international community of scientists, engineers, practitioners and policy makers dedicated to advancing research, development and implementation efforts focused on infrastructure protection. The book contains a selection of sixteen edited papers from the Fourteenth Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection, held at SRI International, Arlington, Virginia, USA in the spring of 2020. Critical Infrastructure Protection XIV is an important resource for researchers, faculty members and graduate students, as well as for policy makers, practitioners and other individuals with interests in homeland security.
This book constitutes selected and revised papers presented at the First International Conference on Optimization, Learning Algorithms and Applications, OL2A 2021, held in Braganca, Portugal, in July 2021. Due to the COVID-19 pandemic the conference was held online. The 39 full papers and 13 short papers were thoroughly reviewed and selected from 134 submissions. They are organized in the topical sections on optimization theory; robotics; measurements with the internet of things; optimization in control systems design; deep learning; data visualization and virtual reality; health informatics; data analysis; trends in engineering education.
This edited book presents point of view and the work being undertaken by active researchers in the domain of IOT and its applications with societal impact. The book is useful to other researchers for the understanding of the research domain and different points of views expressed by the experts in their contributed chapters. The contributions are from both industry and academia; hence, it provides a rich source of both theoretical and practical work going on in the research domain of IOT.
This book constitutes the thoroughly refereed post conference papers of the Third International Conference on Blockchain and Trustworthy Systems, Blocksys 2021, held in Guangzhou, China, in August 2021.*The 38 full papers and the 12 short papers were carefully reviewed and selected from 98 submissions. The papers are organized in topical sections: Contents Blockchain and Data Mining; Performance Optimization of Blockchain; Blockchain Security and Privacy; Theories and Algorithms for Blockchain; Blockchain and Internet of Things; Blockchain and Smart Contracts; Blockchain Services and Applications; Trustworthy System Development.*
This book presents refereed proceedings of the Third International Conference on Advances in Cyber Security, ACeS 2021, held in Penang, Malaysia, in August 2021. The 36 full papers were carefully reviewed and selected from 92 submissions. The papers are organized in the following topical sections: Internet of Things, Industry 4.0 and Blockchain, and Cryptology; Digital Forensics and Surveillance, Botnet and Malware, DDoS, and Intrusion Detection/Prevention; Ambient Cloud and Edge Computing, SDN, Wireless and Cellular Communication; Governance, Social Media, Mobile and Web, Data Privacy, Data Policy and Fake News.
This book introduces the state-of-the-art algorithms for data and computation privacy. It mainly focuses on searchable symmetric encryption algorithms and privacy preserving multi-party computation algorithms. This book also introduces algorithms for breaking privacy, and gives intuition on how to design algorithm to counter privacy attacks. Some well-designed differential privacy algorithms are also included in this book. Driven by lower cost, higher reliability, better performance, and faster deployment, data and computing services are increasingly outsourced to clouds. In this computing paradigm, one often has to store privacy sensitive data at parties, that cannot fully trust and perform privacy sensitive computation with parties that again cannot fully trust. For both scenarios, preserving data privacy and computation privacy is extremely important. After the Facebook-Cambridge Analytical data scandal and the implementation of the General Data Protection Regulation by European Union, users are becoming more privacy aware and more concerned with their privacy in this digital world. This book targets database engineers, cloud computing engineers and researchers working in this field. Advanced-level students studying computer science and electrical engineering will also find this book useful as a reference or secondary text.
This two-volume set constitutes the refereed proceedings of the 17th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2021, held in October 2021. Due to COVID-19 pandemic the conference was held virtually.The 62 full papers and 7 short papers presented were carefully reviewed and selected from 206 submissions. The papers reflect the conference sessions as follows: Optimization for Collaborate System; Optimization based on Collaborative Computing; UVA and Traffic system; Recommendation System; Recommendation System & Network and Security; Network and Security; Network and Security & IoT and Social Networks; IoT and Social Networks & Images handling and human recognition; Images handling and human recognition & Edge Computing; Edge Computing; Edge Computing & Collaborative working; Collaborative working & Deep Learning and application; Deep Learning and application; Deep Learning and application; Deep Learning and application & UVA.
"Designing for Network and Service Continuity in Wireless Mesh Networks" describes performance predictability of the new wireless mesh network paradigm, and describes considerations in designing networks from the perspective of survivability and service continuity metrics. The work provides design insights for network design researchers and industry professionals. It includes designs for new mesh networks and extensions of existing networks with predictable performance.
This handbook covers recent advances in the integration of three areas, namely, cloud computing, cyber-physical systems, and the Internet of things which is expected to have a tremendous impact on our daily lives. It contains a total of thirteen peer-reviewed and edited chapters. This book covers topics such as context-aware cyber-physical systems, sustainable cloud computing, fog computing, and cloud monitoring; both the theoretical and practical aspects belonging to these topics are discussed. All the chapters also discuss open research challenges in the areas mentioned above. Finally, the handbook presents three use cases regarding healthcare, smart buildings and disaster management to assist the audience in understanding how to develop next-generation IoT- and cloud-enabled cyber-physical systems. This timely handbook is edited for students, researchers, as well as professionals who are interested in the rapidly growing fields of cloud computing, cyber-physical systems, and the Internet of things.
This two-volume set, CCIS 1453 and CCIS 1454, constitutes refereed proceedings of the 6th International Conference on Data Mining and Big Data, DMBD 2021, held in Guangzhou, China, in October 2021. The 57 full papers and 28 short papers presented in this two-volume set were carefully reviewed and selected from 258 submissions. The papers present the latest research on advantages in theories, technologies, and applications in data mining and big data. The volume covers many aspects of data mining and big data as well as intelligent computing methods applied to all fields of computer science, machine learning, data mining and knowledge discovery, data science, etc.
This book constitutes the refereed proceedings of the First International Conference on Advanced Research in Technologies, Information, Innovation and Sustainability, ARTIIS 2021, held in La Libertad, Ecuador, in November 2021. The 53 full papers and 2 short contributions were carefully reviewed and selected from 155 submissions. The volume covers a variety of topics, such as computer systems organization, software engineering, information storage and retrieval, computing methodologies, artificial intelligence, and others. The papers are logically organized in the following thematic blocks: Computing Solutions; Data Intelligence; Ethics, Security, and Privacy; Sustainability.
This book gathers papers addressing state-of-the-art research in all areas of information and communication technologies and their applications in intelligent computing, cloud storage, data mining and software analysis. It presents the outcomes of the Fourth International Conference on Information and Communication Technology for Intelligent Systems, which was held in Ahmedabad, India. Divided into two volumes, the book discusses the fundamentals of various data analysis techniques and algorithms, making it a valuable resource for researchers and practitioners alike.
This book is the world's first book on 6G Mobile Wireless Networks that aims to provide a comprehensive understanding of key drivers, use cases, research requirements, challenges and open issues that are expected to drive 6G research. In this book, we have invited world-renowned experts from industry and academia to share their thoughts on different aspects of 6G research. Specifically, this book covers the following topics: 6G Use Cases, Requirements, Metrics and Enabling Technologies, PHY Technologies for 6G Wireless, Reconfigurable Intelligent Surface for 6G Wireless Networks, Millimeter-wave and Terahertz Spectrum for 6G Wireless, Challenges in Transport Layer for Tbit/s Communications, High-capacity Backhaul Connectivity for 6G Wireless, Cloud Native Approach for 6G Wireless Networks, Machine Type Communications in 6G, Edge Intelligence and Pervasive AI in 6G, Blockchain: Foundations and Role in 6G, Role of Open-source Platforms in 6G, and Quantum Computing and 6G Wireless. The overarching aim of this book is to explore the evolution from current 5G networks towards the future 6G networks from a service, air interface and network perspective, thereby laying out a vision for 6G networks. This book not only discusses the potential 6G use cases, requirements, metrics and enabling technologies, but also discusses the emerging technologies and topics such as 6G PHY technologies, reconfigurable intelligent surface, millimeter-wave and THz communications, visible light communications, transport layer for Tbit/s communications, high-capacity backhaul connectivity, cloud native approach, machine-type communications, edge intelligence and pervasive AI, network security and blockchain, and the role of open-source platform in 6G. This book provides a systematic treatment of the state-of-the-art in these emerging topics and their role in supporting a wide variety of verticals in the future. As such, it provides a comprehensive overview of the expected applications of 6G with a detailed discussion of their requirements and possible enabling technologies. This book also outlines the possible challenges and research directions to facilitate the future research and development of 6G mobile wireless networks.
The three-volume set CCIS 1467, CCIS 1468, and CCIS 1469 constitutes the thoroughly refereed proceedings of the 7th International Conference on Life System Modeling and Simulation, LSMS 2021, and of the 7th International Conference on Intelligent Computing for Sustainable Energy and Environment, ICSEE 2021, held in Hangzhou, China, in October 2021. The 159 revised papers presented were carefully reviewed and selected from over 430 submissions. The papers of this volume are organized in topical sections on: Medical Imaging and Analysis Using Intelligence Computing; Biomedical signal processing, imaging, visualization and surgical robotics; Computational method in taxonomy study and neural dynamics; Intelligent medical apparatus, clinical applications and intelligent design of biochips; Power and Energy Systems; Computational Intelligence in Utilization of Clean and Renewable Energy Resources, and Intelligent Modelling, Control and Supervision for Energy Saving and Pollution Reduction; Intelligent Methods in Developing Electric Vehicles, Engines and Equipment; Intelligent Control Methods in Energy Infrastructure Development and Distributed Power Generation Systems; Intelligent Modeling, Simulation and Control of Power Electronics and Power Networks; Intelligent Techniques for Sustainable Energy and Green Built Environment, Water Treatment and Waste Management; Intelligent Robot and Simulation; Intelligent Data Processing, Analysis and Control in Complex Systems; Advanced Neural Network Theory and Algorithms; Advanced Computational Methods and Applications; Fuzzy, Neural, and Fuzzy-neuro Hybrids; Intelligent Modelling, Monitoring, and Control of Complex Nonlinear Systems; Intelligent manufacturing, autonomous systems, intelligent robotic systems; Computational Intelligence and Applications. |
![]() ![]() You may like...
Lorentzian Geometry and Related Topics…
Maria A. Canadas-Pinedo, Joseluis Flores, …
Hardcover
Harmonic Morphisms Between Riemannian…
Paul Baird, John C. Wood
Hardcover
R5,957
Discovery Miles 59 570
Yamabe-type Equations on Complete…
Paolo Mastrolia, Marco Rigoli, …
Hardcover
R1,621
Discovery Miles 16 210
Holomorphic Morse Inequalities and…
Xiaonan Ma, George Marinescu
Hardcover
R3,873
Discovery Miles 38 730
Geometric and Harmonic Analysis on…
Ali Baklouti, Takaaki Nomura
Hardcover
R3,041
Discovery Miles 30 410
Developments in Functional Equations and…
Janusz Brzdek, Krzysztof Cieplinski, …
Hardcover
R3,759
Discovery Miles 37 590
|