0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (1)
  • R250 - R500 (15)
  • R500+ (4,482)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Internet > Network computers

5G Heterogeneous Networks - Self-organizing and Optimization (Paperback, 1st ed. 2016): Bo Rong, Xuesong Qiu, Michel Kadoch,... 5G Heterogeneous Networks - Self-organizing and Optimization (Paperback, 1st ed. 2016)
Bo Rong, Xuesong Qiu, Michel Kadoch, Songlin Sun, Wenjing Li
R1,529 Discovery Miles 15 290 Ships in 18 - 22 working days

This SpringerBrief provides state-of-the-art technical reviews on self-organizing and optimization in 5G systems. It covers the latest research results from physical-layer channel modeling to software defined network (SDN) architecture. This book focuses on the cutting-edge wireless technologies such as heterogeneous networks (HetNets), self-organizing network (SON), smart low power node (LPN), 3D-MIMO, and more. It will help researchers from both the academic and industrial worlds to better understand the technical momentum of 5G key technologies.

Industrial Control Systems Security and Resiliency - Practice and Theory (Hardcover, 1st ed. 2019): Craig Rieger, Indrajit Ray,... Industrial Control Systems Security and Resiliency - Practice and Theory (Hardcover, 1st ed. 2019)
Craig Rieger, Indrajit Ray, Quanyan Zhu, Michael A. Haney
R3,557 R3,272 Discovery Miles 32 720 Save R285 (8%) Ships in 9 - 17 working days

This book provides a comprehensive overview of the key concerns as well as research challenges in designing secure and resilient Industrial Control Systems (ICS). It will discuss today's state of the art security architectures and couple it with near and long term research needs that compare to the baseline. It will also establish all discussions to generic reference architecture for ICS that reflects and protects high consequence scenarios. Significant strides have been made in making industrial control systems secure. However, increasing connectivity of ICS systems with commodity IT devices and significant human interaction of ICS systems during its operation regularly introduces newer threats to these systems resulting in ICS security defenses always playing catch-up. There is an emerging consensus that it is very important for ICS missions to survive cyber-attacks as well as failures and continue to maintain a certain level and quality of service. Such resilient ICS design requires one to be proactive in understanding and reasoning about evolving threats to ICS components, their potential effects on the ICS mission's survivability goals, and identify ways to design secure resilient ICS systems. This book targets primarily educators and researchers working in the area of ICS and Supervisory Control And Data Acquisition (SCADA) systems security and resiliency. Practitioners responsible for security deployment, management and governance in ICS and SCADA systems would also find this book useful. Graduate students will find this book to be a good starting point for research in this area and a reference source.

Cloud Computing - 5th International Conference, CloudComp 2014, Guilin, China, October 19-21, 2014, Revised Selected Papers... Cloud Computing - 5th International Conference, CloudComp 2014, Guilin, China, October 19-21, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Victor C. M. Leung, Roy Xiaorong Lai, Min Chen, Jiafu Wan
R2,037 Discovery Miles 20 370 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post conference proceedings of the 5th International Conference on Cloud Computing, CloudComp 2014, held in Guilin, China, in October 2014. The 25 revised full papers were carefully reviewed and selected from 72 submissions and cover topics such as mobile cloud computing, services, applications, IoT on cloud, architectures and big data, cloud-assisted pervasive computing and services, management and virtualization for cloud, cloud security.

Computer Networks - 23rd International Conference, CN 2016, Brunow, Poland, June 14-17, 2016, Proceedings (Paperback, 1st ed.... Computer Networks - 23rd International Conference, CN 2016, Brunow, Poland, June 14-17, 2016, Proceedings (Paperback, 1st ed. 2016)
Piotr Gaj, Andrzej Kwiecien, Piotr Stera
R2,555 Discovery Miles 25 550 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed proceedings of the 23rd International Conference on Computer Networks, CN 2016, held in Brunow, Poland, in June 2016. The 32 full papers and the 4 short papers presented were carefully reviewed and selected from 72 submissions. They are organized in topical sections on computer networks architectures and protocols, teleinformatics and telecommunications, new technologies, queueing theory, and innovative applications.

Cognitive Radio Oriented Wireless Networks - 11th International Conference, CROWNCOM 2016, Grenoble, France, May 30 - June 1,... Cognitive Radio Oriented Wireless Networks - 11th International Conference, CROWNCOM 2016, Grenoble, France, May 30 - June 1, 2016, Proceedings (Paperback, 1st ed. 2016)
Dominique Noguet, Klaus Moessner, Jacques Palicot
R1,542 Discovery Miles 15 420 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed conference proceedings of the 11th International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2016, held in Grenoble, France, May 30 - April 1, 2016. The 62 revised full papers presented were carefully reviewed and selected from numerous submissions and cover the evolution of cognitive radio technology pertaining to 5G networks. The papers are clustered to topics on dynamic spectrum access/management, networking protocols for CR, modeling and theory, HW architecture and implementations, next generation of cognitive networks, standards and business models, emerging applications for cognitive networks.

Computational Intelligence and Intelligent Systems - 7th International Symposium, ISICA 2015, Guangzhou, China, November 21-22,... Computational Intelligence and Intelligent Systems - 7th International Symposium, ISICA 2015, Guangzhou, China, November 21-22, 2015, Revised Selected Papers (Paperback, 1st ed. 2016)
Kangshun Li, Jin Li, Yong Liu, Aniello Castiglione
R1,532 Discovery Miles 15 320 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 7th International Symposium on Intelligence Computation and Applications, ISICA 2015, held in Guangzhou, China, in November 2015. The 77 revised full papers presented were carefully reviewed and selected from 189 submissions. The papers feature the most up-to-date research in analysis and theory of evolutionary computation, neural network architectures and learning; neuro-dynamics and neuro-engineering; fuzzy logic and control; collective intelligence and hybrid systems; deep learning; knowledge discovery; learning and reasoning.

Elements of Cloud Computing Security - A Survey of Key Practicalities (Paperback, 1st ed. 2016): Mohammed M. Alani Elements of Cloud Computing Security - A Survey of Key Practicalities (Paperback, 1st ed. 2016)
Mohammed M. Alani
R1,539 Discovery Miles 15 390 Ships in 18 - 22 working days

This book offers a thorough yet easy-to-read reference guide to various aspects of cloud computing security. It begins with an introduction to the general concepts of cloud computing, followed by a discussion of security aspects that examines how cloud security differs from conventional information security and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. Further, the book discusses attacks launched on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer types, such as side-channel attacks and resource-freeing attacks, are also described. The work closes by providing a set of general security recommendations for the cloud.

Mobile Networks and Management - 6th International Conference, MONAMI 2014, Wurzburg, Germany, September 22-26, 2014, Revised... Mobile Networks and Management - 6th International Conference, MONAMI 2014, Wurzburg, Germany, September 22-26, 2014, Revised Selected Papers (Paperback, 2015 ed.)
Ramon Aguero, Thomas Zinner, Rossitza Goleva, Andreas Timm-Giel, Phuoc Tran-gia
R1,455 Discovery Miles 14 550 Ships in 18 - 22 working days

This book constitutes the post-proceedings of the 6th International ICST Conference on Mobile Networks and Management, MONAMI 2014, held in Wurzburg, Germany, in September 2014. The 22 revised full papers presented were carefully reviewed and selected from 30 submissions. In addition, MONAMI 2014 hosted a workshop on enhanced living environments which also featured 10 papers. The volume is organized thematically in six parts, covering: LTE networks, virtualization and software defined networking, self-organizing networks, energy awareness in wireless networks, wireless networks algorithms and techniques and applications and context-awareness. The workshop on enhanced living environments is organized in thematic sessions on ambient assisted living architectures, human interaction technologies, devises and mobile cloud.

Device-to-Device Communications in Cellular Networks (Paperback, 1st ed. 2016): Li Wang, Huan Tang Device-to-Device Communications in Cellular Networks (Paperback, 1st ed. 2016)
Li Wang, Huan Tang
R1,645 Discovery Miles 16 450 Ships in 18 - 22 working days

This SpringerBrief focuses on crucial issues for device-to-device (D2D) communications within the rapidly expanding 4G LTE toward 5G system. Several critical technical challenges in D2D communications are discussed, and D2D standardization activities in 3GPP are provided. Topics range from proximity discovery and mode selection, to resource management. The authors investigate proximity detection solutions for enabling direct user equipment communication by listening to uplink transmission. The problem of mixed mode selection is demonstrated to meet multiple quality of service (QoS) requirements in D2D enabled cellular networks. Finally, the brief explores the problem of designing interference-constrained resource allocation to pair cellular user resources with potential D2D links in cellular D2D underlay, with the goal of improving spectrum efficiency. Device-to-Device Communications in Cellular Networks targets researchers and professionals working in wireless communications and networks. Advanced-level students in electrical engineering and computer science studying wireless communications and networks can also use this material as a study guide.

Cloud Computing - 6th International Conference, CloudComp 2015, Daejeon, South Korea, October 28-29, 2015, Revised Selected... Cloud Computing - 6th International Conference, CloudComp 2015, Daejeon, South Korea, October 28-29, 2015, Revised Selected Papers (Paperback, 1st ed. 2016)
Yin Zhang, Limei Peng, Chan-Hyun Youn
R2,333 Discovery Miles 23 330 Ships in 18 - 22 working days

This book constitutes the proceedings of the 6th International Conference on Cloud Computing, CloudComp 2015, held in Daejeon, South Korea, in October 2015. The 36 revised full papers were carefully reviewed and selected from 89 submissions and cover topics such as virtualization and management on cloud; resource management, models and performance; mobile cloud and media services; pervasive cloud applications, services and testbeds; cloud-enabling techniques and devices.

Virtualized Cloud Data Center Networks: Issues in Resource Management. (Paperback, 1st ed. 2016): Linjiun Tsai, Wanjiun Liao Virtualized Cloud Data Center Networks: Issues in Resource Management. (Paperback, 1st ed. 2016)
Linjiun Tsai, Wanjiun Liao
R1,539 Discovery Miles 15 390 Ships in 18 - 22 working days

This book discusses the characteristics of virtualized cloud networking, identifies the requirements of cloud network management, and illustrates the challenges in deploying virtual clusters in multi-tenant cloud data centers. The book also introduces network partitioning techniques to provide contention-free allocation, topology-invariant reallocation, and highly efficient resource utilization, based on the Fat-tree network structure. Managing cloud data center resources without considering resource contentions among different cloud services and dynamic resource demands adversely affects the performance of cloud services and reduces the resource utilization of cloud data centers. These challenges are mainly due to strict cluster topology requirements, resource contentions between uncooperative cloud services, and spatial/temporal data center resource fragmentation. Cloud data center network resource allocation/reallocation which cope well with such challenges will allow cloud services to be provisioned with predictable network performance, mitigate service performance degradation and even guarantee service level agreements. Virtualized Cloud Data Center Networks: Issues in Resource Management tackles the challenges of managing cloud data center networks and introduces techniques to efficiently deploy large-scale distributed computing applications that require predictable performance in multi-tenant cloud data centers.

Listen and Talk - Full-duplex Cognitive Radio Networks (Paperback, 1st ed. 2016): Yun Liao, Lingyang Song, Zhu Han Listen and Talk - Full-duplex Cognitive Radio Networks (Paperback, 1st ed. 2016)
Yun Liao, Lingyang Song, Zhu Han
R1,656 Discovery Miles 16 560 Ships in 18 - 22 working days

This brief focuses on the use of full-duplex radio in cognitive radio networks, presenting a novel spectrum sharing protocol that allows the secondary users to simultaneously sense and access the vacant spectrum. This protocol, called "Listen-and-talk" (LAT), is evaluated by both mathematical analysis and computer simulations in comparison with other existing protocols, including the listen-before-talk protocol. In addition to LAT-based signal processing and resource allocation, the brief discusses techniques such as spectrum sensing and dynamic spectrum access. The brief proposes LAT as a suitable access scheme for cognitive radio networks, which can support the quality-of-service requirements of these high priority applications. Fundamental theories and key techniques of cognitive radio networks are also covered. Listen and Talk: Full-duplex Cognitive Radio Networks is designed for researchers, developers, and professionals involved in cognitive radio networks. Advanced-level students studying signal processing or simulations will also find the content helpful since it moves beyond traditional cognitive radio networks into future applications for the technology.

QoS Management of Web Services (Paperback, 2013 ed.): Zibin Zheng, Michael R. Lyu QoS Management of Web Services (Paperback, 2013 ed.)
Zibin Zheng, Michael R. Lyu
R3,027 Discovery Miles 30 270 Ships in 18 - 22 working days

Quality-of-Service (QoS) is normally used to describe the non-functional characteristics of Web services and as a criterion for evaluating different Web services. QoS Management of Web Services presents a new distributed QoS evaluation framework for these services. Moreover, three QoS prediction methods and two methods for creating fault-tolerant Web services are also proposed in this book. It not only provides the latest research results, but also presents an excellent overview of QoS management of Web sciences, making it a valuable resource for researchers and graduate students in service computing. Zibin Zheng is an associate research fellow at the Shenzhen Research Institute, The Chinese University of Hong Kong, China. Professor Michael R. Lyu also works at the same institute.

Spatial Network Data - Concepts and Techniques for Summarization (Paperback, 1st ed. 2016): Dev Oliver Spatial Network Data - Concepts and Techniques for Summarization (Paperback, 1st ed. 2016)
Dev Oliver
R1,529 Discovery Miles 15 290 Ships in 18 - 22 working days

This brief explores two of the main challenges of spatial network data analysis: the many connected components in the spatial network and the many candidates that have to be processed. Within this book, these challenges are conceptualized, well-defined problems are explored, and critical techniques are discussed.The process of summarizing spatial network data entails finding a compact description or representation of observations or activities on large spatial or spatiotemporal networks. However, summarizing spatial network data can be computationally challenging for various reasons, depending on the domain. The content has applications for professionals, organizations, and researchers in transportation safety, public safety, public health, disaster response, and related fields.

IAENG Transactions on Engineering Technologies - Special Issue of the International MultiConference of Engineers and Computer... IAENG Transactions on Engineering Technologies - Special Issue of the International MultiConference of Engineers and Computer Scientists 2012 (Paperback, 2013 ed.)
Gi-Chul Yang, Sio-Iong Ao, Xu Huang, Oscar Castillo
R5,011 Discovery Miles 50 110 Ships in 18 - 22 working days

This volume contains revised and extended research articles written by prominent researchers participating in the conference. Topics covered include engineering physics, communications systems, control theory, automation, engineering mathematics, scientific computing, industrial engineering, and industrial applications. IAENG Transactions on Engineering Technologies: Special Issue of the International MultiConference of Engineers and Computer Scientists 2012 offers the state of art of tremendous advances in engineering technologies and physical science and applications, and also serves as an excellent reference work for researchers and graduate students working with/on engineering technologies and physical science and applications.

Mobility Modeling for Vehicular Communication Networks (Paperback, 1st ed. 2015): Khadige Abboud, Weihua Zhuang Mobility Modeling for Vehicular Communication Networks (Paperback, 1st ed. 2015)
Khadige Abboud, Weihua Zhuang
R1,582 Discovery Miles 15 820 Ships in 18 - 22 working days

This brief presents a stochastic microscopic mobility model that describes the temporal changes of intervehicle distances. The model is consistent with simulated and empirical vehicle traffic patterns. Using stochastic lumpability methods, the proposed mobility model is mapped into an aggregated mobility model that describes the mobility of a group of vehicles. In addition, the proposed mobility model is used to analyze the spatiotemporal VANET topology. Two metrics are proposed to characterize the impact of vehicle mobility on VANET topology: the time period between successive changes in communication link state (connection and disconnection) and the time period between successive changes in node's one-hop neighborhood. Using the proposed lumped group mobility model, the two VANET topology metrics are probabilistically characterized for different vehicular traffic flow conditions. Furthermore, the limiting behavior of a system of two-hop vehicles and the overlap-state of their coverage ranges is modeled, and the steady-state number of common vehicle neighbors between the two vehicles is approximately derived. The proposed mobility model will facilitate mathematical analysis in VANETs. The spatiotemporal VANET topology analysis provides a useful tool for the development of mobility-aware vehicular network protocols. Mobility Modeling for Vehicular Communication Networks is designed for researchers, developers, and professionals involved with vehicular communications. It is also suitable for advanced-level students interested in communications, transport infrastructure, and infotainment applications.

Software Defined Networking Applications in Distributed Datacenters (Paperback, 1st ed. 2016): Heng Qi, Keqiu Li Software Defined Networking Applications in Distributed Datacenters (Paperback, 1st ed. 2016)
Heng Qi, Keqiu Li
R1,561 Discovery Miles 15 610 Ships in 18 - 22 working days

This SpringerBrief provides essential insights on the SDN application designing and deployment in distributed datacenters. In this book, three key problems are discussed: SDN application designing, SDN deployment and SDN management. This book demonstrates how to design the SDN-based request allocation application in distributed datacenters. It also presents solutions for SDN controller placement to deploy SDN in distributed datacenters. Finally, an SDN management system is proposed to guarantee the performance of datacenter networks which are covered and controlled by many heterogeneous controllers. Researchers and practitioners alike will find this book a valuable resource for further study on Software Defined Networking.

Cognitive MAC Designs for OSA Networks (Paperback, 2014 ed.): Mahsa Derakhshani, Tho Le-Ngoc Cognitive MAC Designs for OSA Networks (Paperback, 2014 ed.)
Mahsa Derakhshani, Tho Le-Ngoc
R1,645 Discovery Miles 16 450 Ships in 18 - 22 working days

This SpringerBrief presents recent advances in the cognitive MAC designs for opportunistic spectrum access (OSA) networks. It covers the basic MAC functionalities and MAC enhancements of IEEE 802.11. Later chapters discuss the existing MAC protocols for OSA and classify them based on characteristic features. The authors provide new research in adaptive carrier sensing-based MAC designs tailored for OSA, which optimize spectrum utilization and ensure a peaceful coexistence of licensed and unlicensed systems. Analytically devised via optimization and game-theoretic approaches, these adaptive MAC designs are shown to effectively reduce collisions between both primary and secondary network users. Researchers and professionals working in wireless communications and networks will find this content valuable. This brief is also a useful study guide for advanced-level students in computer science and electrical engineering.

Radio Frequency Channel Coding Made Easy (Paperback, 1st ed. 2016): Saleh Faruque Radio Frequency Channel Coding Made Easy (Paperback, 1st ed. 2016)
Saleh Faruque
R1,956 Discovery Miles 19 560 Ships in 18 - 22 working days

This book introduces Radio Frequency Channel Coding to a broad audience. The author blends theory and practice to bring readers up-to-date in key concepts, underlying principles and practical applications of wireless communications. The presentation is designed to be easily accessible, minimizing mathematics and maximizing visuals.

Transactions on Computational Collective Intelligence XXII (Paperback, 1st ed. 2016): Ngoc Thanh Nguyen, Ryszard Kowalczyk Transactions on Computational Collective Intelligence XXII (Paperback, 1st ed. 2016)
Ngoc Thanh Nguyen, Ryszard Kowalczyk
R1,973 Discovery Miles 19 730 Ships in 18 - 22 working days

These transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as the semantic Web, social networks, and multi-agent systems. TCCI strives to cover new methodological, theoretical and practical aspects of CCI understood as the form of intelligence that emerges from the collaboration and competition of many individuals (artificial and/or natural). The application of multiple computational intelligence technologies, such as fuzzy systems, evolutionary computation, neural systems, consensus theory, etc., aims to support human and other collective intelligence and to create new forms of CCI in natural and/or artificial systems. This twenty-second issue contains 11 carefully selected and revised contributions.

Cognitive Radio Oriented Wireless Networks - 10th International Conference, CROWNCOM 2015, Doha, Qatar, April 21-23, 2015,... Cognitive Radio Oriented Wireless Networks - 10th International Conference, CROWNCOM 2015, Doha, Qatar, April 21-23, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Mark Weichold, Mounir Hamdi, Muhammad Zeeshan Shakir, Mohamed Abd Allah, George K. Karagiannidis, …
R1,546 Discovery Miles 15 460 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 10th International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2015, held in Doha, Qatar, in April 2015. The 66 revised full papers presented were carefully reviewed and selected from 110 submissions and cover the evolution of cognitive radio technology pertaining to 5G networks. The papers are clustered to topics on dynamic spectrum access/management, networking protocols for CR, modeling and theory, HW architecture and implementations, next generation of cognitive networks, standards and business models, and emerging applications for cognitive networks.

Structured Peer-to-Peer Systems - Fundamentals of Hierarchical Organization, Routing, Scaling, and Security (Paperback, 2013... Structured Peer-to-Peer Systems - Fundamentals of Hierarchical Organization, Routing, Scaling, and Security (Paperback, 2013 ed.)
Dmitry Korzun, Andrei Gurtov
R3,631 Discovery Miles 36 310 Ships in 18 - 22 working days

The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and bandwidth resources of end users, the P2P approach enables high performance of data distribution which is hard to achieve with traditional client-server architectures. The P2P computing community is also being actively utilized for software updates to the Internet, P2PSIP VoIP, video-on-demand, and distributed backups. The recent introduction of the identifier-locator split proposal for future Internet architectures poses another important application for DHTs, namely mapping between host permanent identity and changing IP address. The growing complexity and scale of modern P2P systems requires the introduction of hierarchy and intelligence in routing of requests. Structured Peer-to-Peer Systems covers fundamental issues in organization, optimization, and tradeoffs of present large-scale structured P2P systems, as well as, provides principles, analytical models, and simulation methods applicable in designing future systems. Part I presents the state-of-the-art of structured P2P systems, popular DHT topologies and protocols, and the design challenges for efficient P2P network topology organization, routing, scalability, and security. Part II shows that local strategies with limited knowledge per peer provide the highest scalability level subject to reasonable performance and security constraints. Although the strategies are local, their efficiency is due to elements of hierarchical organization, which appear in many DHT designs that traditionally are considered as flat ones. Part III describes methods to gradually enhance the local view limit when a peer is capable to operate with larger knowledge, still partial, about the entire system. These methods were formed in the evolution of hierarchical organization from flat DHT networks to hierarchical DHT architectures, look-ahead routing, and topology-aware ranking. Part IV highlights some known P2P-based experimental systems and commercial applications in the modern Internet. The discussion clarifies the importance of P2P technology for building present and future Internet systems.

Embedded System Technology - 13th National Conference, ESTC 2015, Beijing, China, October 10-11, 2015, Revised Selected Papers... Embedded System Technology - 13th National Conference, ESTC 2015, Beijing, China, October 10-11, 2015, Revised Selected Papers (Paperback, 1st ed. 2015)
Xing Zhang, Zhonghai Wu, Xingmian Sha
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th National Conference on Embedded System Technology, ESTC 2015, held in Beijing, China, in October 2015. The 18 revised full papers presented were carefully reviewed and selected from 63 papers. The topics cover a broad range of fields focusing on research about embedded system technologies, such as smart hardware, system and network, applications and algorithm.

The Semantic Web and Web Science - 8th Chinese Conference, CSWS 2014, Wuhan, China, August 8-12, 2014, Revised Selected Papers... The Semantic Web and Web Science - 8th Chinese Conference, CSWS 2014, Wuhan, China, August 8-12, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Dongyan Zhao, Jianfeng Du, Haofen Wang, Peng Wang, Donghong Ji, …
R2,058 Discovery Miles 20 580 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed papers of the 8th Chinese Conference on The Semantic Web and Web Science, CSWS 2014, held in Wuhan, China, in August 2014. The 22 research papers presented were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections such as ontology reasoning and learning; semantic data generation and management; and semantic technology and applications.

Wireless Sensor Networks for Structural Health Monitoring (Paperback, 1st ed. 2016): Jiannong Cao, Xuefeng Liu Wireless Sensor Networks for Structural Health Monitoring (Paperback, 1st ed. 2016)
Jiannong Cao, Xuefeng Liu
R1,656 Discovery Miles 16 560 Ships in 18 - 22 working days

This brief covers the emerging area of wireless sensor network (WSN)-based structural health monitoring (SHM) systems, and introduces the authors' WSN-based platform called SenetSHM. It helps the reader differentiate specific requirements of SHM applications from other traditional WSN applications, and demonstrates how these requirements are addressed by using a series of systematic approaches. The brief serves as a practical guide, explaining both the state-of-the-art technologies in domain-specific applications of WSNs, as well as the methodologies used to address the specific requirements for a WSN application. In particular, the brief offers instruction for problem formulation and problem solving based on the authors' own experiences implementing SenetSHM. Seven concise chapters cover the development of hardware and software design of SenetSHM, as well as in-field experiments conducted while testing the platform. The brief's exploration of the SenetSHM platform is a valuable feature for civil engineers designing their own similar SHM products, and the various concrete examples of problem formulation and algorithm design will make this an essential read for practitioners, researchers and students alike.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Teaching Statistics - A Bag of Tricks
Andrew Gelman, Deborah Nolan Hardcover R3,117 Discovery Miles 31 170
Statistics for Management and Economics
Gerald Keller, Nicoleta Gaciu Paperback R1,209 R1,135 Discovery Miles 11 350
Antiviral Methods and Protocols
Derek Kinchington, Raymond F. Schinazi Hardcover R2,729 Discovery Miles 27 290
Multivariate Analysis
Kanti V. Mardia, J.T Kent, … Paperback R3,329 R3,115 Discovery Miles 31 150
Infectious Microecology - Theory and…
Lanjuan Li Hardcover R4,143 Discovery Miles 41 430
Theory of Rank Tests
Zbynek Sidak, Pranab K. Sen, … Hardcover R2,423 Discovery Miles 24 230
Viruses and Man: A History of…
Milton W. Taylor Hardcover R5,177 R4,856 Discovery Miles 48 560
Novel Therapeutic Agents for the…
Vibeke Strand, David L. Scot, … Hardcover R7,192 Discovery Miles 71 920
Safety and Practice for Organic Food
Debabrata Biswas, Shirley A. Micallef Paperback R4,013 Discovery Miles 40 130
International Symposium: Retroviruses…
Robert C. Gallo, Dominique Stehelin, … Hardcover R5,470 Discovery Miles 54 700

 

Partners