![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Internet > Network computers
This SpringerBrief presents radio resource allocation schemes for buffer-aided communications systems over fading channels under statistical delay constraints in terms of upper-bounded average delay or delay-outage probability. This Brief starts by considering a source-destination communications link with data arriving at the source transmission buffer. The first scenario, the joint optimal data admission control and power allocation problem for throughput maximization is considered, where the source is assumed to have a maximum power and an average delay constraints. The second scenario, optimal power allocation problems for energy harvesting (EH) communications systems under average delay or delay-outage constraints are explored, where the EH source harvests random amounts of energy from renewable energy sources, and stores the harvested energy in a battery during data transmission. Online resource allocation algorithms are developed when the statistical knowledge of the random channel fading, data arrivals, EH processes governing the system dynamics is unknown a-priori. This Brief continues with a source-relay-destination communications link with buffers available at both source and relay, as part of a multi-hop network. Optimal resource allocation schemes for this 3-node relaying system to maximize its effective capacity under a delay-outage constraint are proposed, with special emphasis on relay roles: Half-duplex (HD) or full-duplex (FD) relay operation. With HD relay, the adaptive link selection relaying problem jointly with both fixed and adaptive power allocation schemes is investigated. Within each transmission frame, either the source-relay link or the relay-destination link is selected to be active depending on the channel conditions. With FD relay under the presence of non-zero residual self-interference (SI). This Brief also presents source and relay power allocation schemes for both cases of available knowledge of the channel state information at transmitter (CSIT): instantaneous or statistical. Professional and researchers working in this related field and advanced-level students in electrical or computer engineering will find the content valuable as a reference.
This book constitutes the refereed proceedings of the 11th International Joint Conference on E-Business and Telecommunications, ICETE 2014, held in Vienna, Austria, in August 2014. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Wireless Information Systems, WINSYS; and International Conference on Signal Processing and Multimedia, SIGMAP. The 27 full papers presented were carefully reviewed and selected from 328 submissions. The papers cover the following key areas of e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless information networks and systems.
Quality-of-Service (QoS) is normally used to describe the non-functional characteristics of Web services and as a criterion for evaluating different Web services. "QoS Management of Web Services" presents a new distributed QoS evaluation framework for these services. Moreover, three QoS prediction methods and two methods for creating fault-tolerant Web services are also proposed in this book. It not only provides the latest research results, but also presents an excellent overview of QoS management of Web sciences, making it a valuable resource for researchers and graduate students in service computing. Zibin Zheng is an associate research fellow at the Shenzhen Research Institute, The Chinese University of Hong Kong, China. Professor Michael R. Lyu also works at the same institute.
This SpringerBrief explores the opportunities and challenges posed by the smart grid. The evolution of the smart grid should allow consumers to directly communicate with their utility provider. However, complex issues such as architecture with legacy support, varying demand response and load management, varying price of power, and so forth can lead to various decision making challenges. It is essential to identify the scope and challenges of the smart grid in a comprehensive manner so as to ensure efficient delivery of sustainable, economic, and secure electricity supplies. This book provides an overview of the smart grid and its key advances in architecture, distribution management, demand-side response and load balancing, smart automation, electric storage, power loss minimization and security. Readers interested in a basic knowledge of electric grid and communication networks will find Evolution of Smart Grids useful. Readers who want more insight on smart grid research will also find this book a valuable resource.
This SpringerBrief covers modeling and analysis of Denial-of-Service attacks in emerging wireless and mobile applications. It uses an application-specific methodology to model and evaluate denial-of-service attacks. Three emerging applications are explored: multi-modal CSMA/CA networks, time-critical networks for the smart grid, and smart phone applications. The authors define a new performance metric to quantify the benefits of backoff misbehavior and show the impacts of a wide range of backoff mishandling nodes on the network performance, and propose a scheme to minimize the delay of time-critical message delivery under jamming attacks in smart grid applications. An investigation on the resilience of mobile services against malware attacks is included to advance understanding of network vulnerabilities associated with emerging wireless networks and offers instrumental guidance into the security design for future wireless and mobile applications. This book is appropriate for students, faculty, engineers, and experts in the technical area of wireless communication, mobile networks and cyber security.
This SpringerBrief examines anti-jamming transmissions in cognitive radio networks (CRNs), including several recent related research topics within this field. The author introduces the transmissions based on uncoordinated spread spectrum to address smart jammers in CRNs. The author applies game theory to investigate the interactions between secondary users and jammers while providing game theoretic solutions to suppress jamming incentives in CRNs. Later chapters evaluate the Nash equilibrium and Stackelberg equilibrium of the jamming games under various network scenarios. Professionals and researchers working in networks, wireless communications and information technology will find Anti-Jamming Transmissions in Cognitive Radio Networks valuable material as a reference. Advanced-level students studying electrical engineering and computer science will also find this brief a useful tool.
This book constitutes the proceedings of the 8th International Conference on Wireless and Satellite Services, WiSATS 2016, held in Cardiff, UK, in September 2016. The conference was formerly known as the International Conference on Personal Satellite Services (PSATS) mainly covering topics in the satellite domain. As the scope of the conference widened to include wireless systems, the conference was renamed WiSATS. The 22 revised papers were selected from 32 submissions and cover a broad range of related state-of-the-art topics in antennas and mobile terminals, symbol precoding and network coding schemes, energy efficient strategies in satellite communication and cloud radio access networks, smart grid communication and optimization, security issues in vehicular ad-hoc networks (VANET) and delay tolerant net-works (DTN), interference mitigation in high throughput geostationary and non-geostationary satellite systems.
This book constitutes the thoroughly refereed selected papers on the 4th Cyber Security and Privacy Innovation Forum, CSP Forum 2015, held in Brussels, Belgium, in April 2015. The 12 revised full papers presented were carefully reviewed and selected from various submissions. The papers are organized in topical sections such as security and privacy in the cloud; security and privacy technologies; risk and trust; research and innovation in cyber security and privacy.
This book provides a hands-on approach to learning ARM assembly language with the use of a TI microcontroller. The book starts with an introduction to computer architecture and then discusses number systems and digital logic. The text covers ARM Assembly Language, ARM Cortex Architecture and its components, and Hardware Experiments using TILM3S1968. Written for those interested in learning embedded programming using an ARM Microcontroller.
This book presents a range of cloud computing platforms for data-intensive scientific applications. It covers systems that deliver infrastructure as a service, including: HPC as a service; virtual networks as a service; scalable and reliable storage; algorithms that manage vast cloud resources and applications runtime; and programming models that enable pragmatic programming and implementation toolkits for eScience applications. Many scientific applications in clouds are also introduced, such as bioinformatics, biology, weather forecasting and social networks. Most chapters include case studies. Cloud Computing for Data-Intensive Applications targets advanced-level students and researchers studying computer science and electrical engineering. Professionals working in cloud computing, networks, databases and more will also find this book useful as a reference.
This Springer Brief introduces wireless sensor networks (WSNs) and the need for resilient WSN operations in application domains. It presents traditional approaches of providing resilient operation of WSNs to ensure continuity of data delivery even when some network sensors fail. The pros and cons of each these approaches are discussed. Also included is an overview of network coding basics, and motivate the use of network coding-based protection in order to combine the advantages, but avoid the disadvantages of the traditional approaches. The authors cover the design and analysis of a centralized approach to network coding-based protection of WSNs. The coverage also includes practical and realistic network situations, and the coding strategies employed. Next discussed is how to recover from data losses using a distributed approach, which is more practical for large scale WSNs. Algorithms for scheduling of transmissions while implementing network coding-based in the two cases of using digital network coding, and analog network coding are covered. Resilient Wireless Sensor Networks includes a concise, but an in-depth coverage of the use of network coding to implement agile and resource efficient protection in WSNs. It will be of interest to professionals and researchers working in the areas of fault tolerance, network coding, and deployment of WSNs in harsh environment. Advanced-level students in electrical engineering and computer science will also find this research valuable as a reference.
This book constitutes the refereed proceedings fo the 14th International Scientific Conference on Information Technologies and Mathematical Modeling, named after A. F. Terpugov, ITMM 2015, held in Anzhero-Sudzhensk, Russia, in November 2015. The 35 full papers included in this volume were carefully reviewed and selected from 89 submissions. They are devoted to new results in the queueing theory and its applications, addressing specialists in probability theory, random processes, mathematical modeling as well as engineers dealing with logical and technical design and operational management of telecommunication and computer networks.
This SpringerBrief presents interference coordination techniques for future 5G cellular networks. Starting with an overview of existing interference management techniques, it focuses on practical interference coordination schemes based on beamforming and user scheduling. The proposed schemes aim to deal with the inter-cell interference in multi-cell MIMO networks, cross-tier interference in device-to-device communications underlaying cellular network, and inter-network interference in cognitive radio networks. The performances of the proposed schemes are evaluated both analytically and numerically in terms of several performance parameters, including the sum rate, multiplexing gain, and outage probability of the networks. The results show that the proposed schemes can significantly reduce the effect of interference and improve the quality of service of the networks. Interference Coordination for 5G Cellular Networks is suitable for researchers and advanced students interested in interference coordination or 5G cellular networks.
This book provides a Mathematical Theory of Distributed Sensor Networks. It introduces the Mathematical & Computational Structure by discussing what they are, their applications and how they differ from traditional systems. It also explains how mathematics are utilized to provide efficient techniques implementing effective coverage, deployment, transmission, data processing, signal processing, and data protection within distributed sensor networks. Finally, it discusses some important challenges facing mathematics to get more incite to the multidisciplinary area of distributed sensor networks. -This book will help design engineers to set up WSN-based applications providing better use of resources while optimizing processing costs. -This book is highly useful for graduate students starting their first steps in research to apprehend new approaches and understand the mathematics behind them and face promising challenges. -This book aims at presenting a formal framework allowing to show how mathematical theories can be used to provide distributed sensor modeling and to solve important problems such as coverage hole detection and repair. -This book aims at presenting the current state of the art in formal issues related to sensor networking. It can be used as a handbook for different classes at the graduate level and the undergraduate level. It is self contained and comprehensive, presenting a complete picture of the discipline of optical network engineering including modeling functions, controlling quality of service, allocation resources, monitoring traffic, protecting infrastructure, and conducting planning. This book addresses a large set of theoretical aspects. It is designed for specialists in ad hoc and wireless sensor networks and does not include discusses on very promising areas such as homotopy, computational geometry, and wavelet transforms.
This book provides the reader with a comprehensive selection of cutting-edge algorithms, technologies, and applications. The volume offers new insights into a range of fundamentally important topics in network architectures, network security, and network applications. It serves as a reference for researchers and practitioners by featuring research contributions exemplifying research done in the field of network systems. In addition, the book highlights several key topics in both theoretical and practical aspects of networking. These include wireless sensor networks, performance of TCP connections in mobile networks, photonic data transport networks, security policies, credentials management, data encryption for network transmission, risk management, live TV services, and multicore energy harvesting in distributed systems.
This book constitutes the refereed proceedings of the First Workshop on Embracing Global Computing in Emerging Economies, EGC 2015, held in Almaty, Kazakhstan, in February 2015. The 13 revised full papers presented were carefully reviewed and selected from 28 submissions. The papers focus on the topic in two ways: one part is directly relevant to the problems of delivering cloud services in an emerging economy such as Kazakhstan, the other part represents ICT innovation by scientists of the region.
This book constitutes the proceedings of the 8th International Conference on Ad Hoc Networks, ADHOCNETS 2016, held in Ottawa, Canada, September 26-17, 2016. The 34 revised full papers presented were carefully reviewed and selected from 46 submissions. The papers provide visions, trends, challenges and opportunities in the area of ad hoc networking and emerging applications. The conference also features two workshops on ad hoc network security and vulnerability, and convergence of wireless directional network systems and software defined networking, respectively.
This book constitutes the refereed post-conference proceedings of the International Conference on Safety and Security in Internet of Things , SaSeIoT 2016, which was collocated with InterIoT and took place in Paris, France, in October 2016. The 14 revised full papers were carefully reviewed and selected from 22 submissions and cover all aspects of the latest research findings in the area of Internet of Things (IoT).
This book constitutes the refereed proceedings of the 19th International Conference on Distributed and Computer and Communication Networks, DCCN 2016, held in Moscow, Russia, in November 2016. The 50 revised full papers and the 6 revised short papers presented were carefully reviewed and selected from 141 submissions. The papers cover the following topics: computer and communication networks architecture optimization; control in computer and communication networks; performance and QoS/QoE evaluation in wireless networks; analytical modeling and simulation of next-generation communications systems; queuing theory and reliability theory applications in computer networks; wireless 4G/5G networks, cm- and mm-wave radio technologies; RFID technology and its application in intellectual transportation networks; internet of things, wearables, and applications of distributed information systems; probabilistic and statistical models in information systems; mathematical modeling of high-tech systems; mathematical modeling and control problems; distributed and cloud computing systems, big data analytics.
This book constitutes the proceedings of the International Conference on Ad Hoc Networks, ADHOCNETS 2015, held in September 2015 in Italy. The 17 regular and 3 invited papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics such as physical layer; MAC and routing; mobility in networks; self-organization, virtualization and localization; cloud, virtualization and prototypage; security and fault tolerance in wireless mobile networks.
This book constitutes the refereed post-conference proceedings of the International Conference on Machine Learning and Intelligent Communications, MLICOM 2016, held in Shanghai, China in August 2016. The 41 revised full papers were carefully reviewed and selected from 47 submissions. The papers are organized thematically: data mining in heterogeneous networks, decentralized learning for wireless communication systems, intelligent cooperative/distributed coding, intelligent cooperative networks, Intelligent massive MIMO, time coded multi-user MIMO System based on three dimensional complementary codes, intelligent positioning and navigation systems, intelligent spectrum allocation schemes, machine learning algorithm & cognitive radio networks, machine learning for multimedia.
This book constitutes the proceedings of the Third International Conference on Internet of Things (IoT) Technologies for HealthCare, HealthyIoT 2016, held in Vasteras, Sweden, October 18-19, 2016. The conference also included the First Workshop on Emerging eHealth through Internet of Things (EHIoT 2016). IoT as a set of existing and emerging technologies, notions and services provides many solutions to delivery of electronic healthcare, patient care, and medical data management. The 31 revised full papers presented along with 9 short papers were carefully reviewed and selected from 43 submissions in total. The papers cover topics such as healthcare support for the elderly, real-time monitoring systems, security, safety and communication, smart homes and smart caring environments, intelligent data processing and predictive algorithms in e-Health, emerging eHealth IoT applications, signal processing and analysis, and smartphones as a healthy thing.
This brief offers a valuable resource on principles of quality-of-service (QoS) provisioning and the related link-layer resource management techniques for high data-rate wireless networks. The primary emphasis is on protocol modeling and analysis. It introduces media access control (MAC) protocols, standards of wireless local area networks (WLANs), wireless personal area networks (WPANs), and wireless body area networks (WBANs), discussing their key technologies, applications, and deployment scenarios. The main analytical approaches and models for performance analysis of the fundamental resource scheduling mechanisms, including the contention-based, reservation-based, and hybrid MAC, are presented. To help readers understand and evaluate system performance, the brief contains a range of simulation results. In addition, a thorough bibliography provides an additional tool. This brief is an essential resource for engineers, researchers, students, and users of wireless networks.
This book provides a candid assessment and practical knowledge about the current technological advancements of the wireless healthcare system. This book presents the competencies of modeling e-health framework, medical wireless body sensor networks, communication technologies for mobile health, nanotechnology innovations in medicine, security issues for medical records, personalized services in healthcare applications, and Big Data for wireless health. This book covers multiple research perspectives in order to address the strong need for interdisciplinary research in the area of wireless health, such as the interactive research among biomedical sensor technology, intelligent textiles and advanced wireless network technology. The interactions involve experts from multidisciplinary fields including medical, information technology and computing fields. Designed as a study tool for graduate students, researchers, and medical professionals, this book is also valuable for business managers, entrepreneurs, and investors within the medical and healthcare industries. It is useful for anyone who cares about the future opportunities in healthcare systems.
This SpringerBrief offers two concrete design examples for traffic offloading. The first is an optimal resource allocation for small-cell based traffic offloading that aims at minimizing mobile users' data cost. The second is an optimal resource allocation for device-to-device assisted traffic offloading that also minimizes the total energy consumption and cellular link usage (while providing an overview of the challenging issues). Both examples illustrate the importance of proper resource allocation to the success of traffic offloading, show the consequent performance advantages of executing optimal resource allocation, and present the methodologies to achieve the corresponding optimal offloading solution for traffic offloading in heterogeneous cellular networks. The authors also include an overview of heterogeneous cellular networks and explain different traffic offloading paradigms ranging from uplink traffic offloading through small cells to downlink traffic offloading via mobile device-to-device cooperation. This brief is an excellent resource for postgraduate students studying advanced-level topics in wireless communications and networking. Researchers, engineers and professionals working in related fields will also find this brief a valuable resource tool. |
You may like...
Micro-Nanorobotic Manipulation Systems…
Toshio Fukuda, Fumihito Arai, …
Hardcover
R5,070
Discovery Miles 50 700
Vicinal Diaryl Substituted Heterocycles…
M. R. Yadav, P. R. Murumkar, …
Paperback
Handbook of Pediatric Brain Imaging…
Hao Huang, Timothy Roberts
Paperback
R3,531
Discovery Miles 35 310
Retargetable Processor System…
Andreas Wieferink, Heinrich Meyr, …
Hardcover
R2,743
Discovery Miles 27 430
Advances in Physical Organic Chemistry…
Ian Williams, Nick Williams
Hardcover
R5,460
Discovery Miles 54 600
5G IoT and Edge Computing for Smart…
Akash Kumar Bhoi, Victor Hugo Costa de Albuquerque, …
Paperback
R2,588
Discovery Miles 25 880
|