![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Internet > Network computers
In this book, experts from academia and industry present the latest advances in scientific theory relating to applied electromagnetics and examine current and emerging applications particularly within the fields of electronics, communications, and computer technology. The book is based on presentations delivered at APPEIC 2015, the 2nd Applied Electromagnetic International Conference, held in Krabi, Thailand in December 2015. The conference provided an ideal platform for researchers and specialists to deliver both theoretically and practically oriented contributions on a wide range of topics relevant to the theme of nurturing applied electromagnetics for human technology. Many novel aspects were addressed, and the contributions selected for this book highlight the relevance of advances in applied electromagnetics to a variety of industrial engineering problems and identify exciting futu re directions for research.
This book constitutes the proceedings of the 16th International Conference on Information Technologies and Mathematical Modelling, ITMM 2017, held in Kazan, Russia, in September/October 2017. The 31 papers presented in this volume were carefully reviewed and selected from 85 submissions. The conference covers various aspects of mathematical modeling and information technologies, focusing on probabilistic methods and models, queueing theory and communication networks.
This book covers three major parts of Big Data: concepts, theories and applications. Written by world-renowned leaders in Big Data, this book explores the problems, possible solutions and directions for Big Data in research and practice. It also focuses on high level concepts such as definitions of Big Data from different angles; surveys in research and applications; and existing tools, mechanisms, and systems in practice. Each chapter is independent from the other chapters, allowing users to read any chapter directly. After examining the practical side of Big Data, this book presents theoretical perspectives. The theoretical research ranges from Big Data representation, modeling and topology to distribution and dimension reducing. Chapters also investigate the many disciplines that involve Big Data, such as statistics, data mining, machine learning, networking, algorithms, security and differential geometry. The last section of this book introduces Big Data applications from different communities, such as business, engineering and science. Big Data Concepts, Theories and Applications is designed as a reference for researchers and advanced level students in computer science, electrical engineering and mathematics. Practitioners who focus on information systems, big data, data mining, business analysis and other related fields will also find this material valuable.
This book constitutes the refereed proceedings of the 23nd International Conference on Information and Software Technologies, ICIST 2017, held in Druskininkai, Lithuania, in October 2017. The 51 papers presented were carefully reviewed and selected from 135 submissions. The papers are organized in topical sections on information systems; business intelligence for information and software systems; software engineering; information technology applications.
This book investigates the problem of reducing operating cost for a video streaming content delivery network (CDN), including both the CDN's energy and traffic costs. It first introduces the key issues and design choices of representative real-world CDNs, and discusses the energy saving techniques for data centers and CDNs. Then, based on a measurement study on a large video streaming CDN, it reveals an inherent conflict between improving a video streaming CDN's energy efficiency for energy saving, and maintaining the CDN's ISP-friendly server selection policy. Further, it discusses a cost-aware capacity provisioning algorithm that not only allows the service capacity of a CDN's server clusters in numerous ISPs to be dynamically planned, but also means that the overall operating cost, including both the energy consumptions and the cross-ISP traffics, can be further optimized. In addition it uses the workload derived from real-world measurement and also implements real values of the actual power and bandwidth prices to evaluate the capacity provisioning algorithm, showing that it can significantly reduce the overall operating cost of a video streaming CDN, and effectively avoid frequent server switches. Lastly, the book outlines a number of potential research directions regarding cost-aware content delivery. The measurement, analysis, and optimization methodologies and results presented in this book are of particular interest to researchers in the Internet and networking area.
This book constitutes the refereed proceedings of the 5th International Symposium on Security in Computing and Communications, SSCC 2017, held in Manipal, India, in September 2017. The 21 revised full papers presented together with 13 short papers were carefully reviewed and selected from 84 submissions. The papers focus on topics such as cryptosystems, algorithms, primitives; security and privacy in networked systems; system and network security; steganography, visual cryptography, image forensics; applications security.
This book constitutes the refereed proceedings of the 7th EAI International Conference on Game Theory for Networks, GameNets 2017, held in Knoxville, Tennessee, USA, in May 2017. The 10 conference papers and 5 invited papers presented cover topics such as smart electric grid, Internet of Things (IoT), social networks, networks security, mobile service markets, and epidemic control.
This book constitutes the refereed proceedings of the 13th International Joint Conference on E-Business and Telecommunications, ICETE 2016, held in Lisbon, Portugal, in July 2016. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International Conference on E-Business, ICE-B; International Conference on Optical Communication Systems, OPTICS; International Conference on Security and Cryptography, SECRYPT; International Conference on Signal Processing and Multimedia, SIGMAP; International Conference on Wireless Information Systems, WINSYS.The 20 full papers presented together with an invited paper in this volume were carefully reviewed and selected from 241 submissions. The papers cover the following key areas of e-business and telecommunications: data communication networking; e-business; optical communication systems; security and cryptography; signal processing and multimedia applications; wireless networks and mobile systems.
This book gives a broad look at both fundamental networking technology and new areas that support it and use it. It is a concise introduction to the most prominent, recent technological topics in computer networking. Topics include network technology such as wired and wireless networks, enabling technologies such as data centers, software defined networking, cloud and grid computing and applications such as networks on chips, space networking and network security. The accessible writing style and non-mathematical treatment makes this a useful book for the student, network and communications engineer, computer scientist and IT professional.
This book introduces a number of recent developments on connectivity of communication networks, ranging from connectivity of large static networks and connectivity of highly dynamic networks to connectivity of small to medium sized networks. This book also introduces some applications of connectivity studies in network optimization, in network localization, and in estimating distances between nodes. The book starts with an overview of the fundamental concepts, models, tools, and methodologies used for connectivity studies. The rest of the chapters are divided into four parts: connectivity of large static networks, connectivity of highly dynamic networks, connectivity of small to medium sized networks, and applications of connectivity studies.
The book titled Advanced Computational and Communication Paradigms: Proceedings of International Conference on ICACCP 2017, Volume 2 presents refereed high-quality papers of the First International Conference on Advanced Computational and Communication Paradigms (ICACCP 2017) organized by the Department of Computer Science and Engineering, Sikkim Manipal Institute of Technology, held from 8- 10 September 2017. ICACCP 2017 covers an advanced computational paradigms and communications technique which provides failsafe and robust solutions to the emerging problems faced by mankind. Technologists, scientists, industry professionals and research scholars from regional, national and international levels are invited to present their original unpublished work in this conference. There were about 550 technical paper submitted. Finally after peer review, 142 high-quality papers have been accepted and registered for oral presentation which held across 09 general sessions and 05 special sessions along with 04 keynote address and 06 invited talks. This volume comprises 77 accepted papers of ICACCP 2017.
This brief focuses on introducing a novel mathematical framework, referred as hypergraph theory, to model and solve the multiple interferer scenarios for future wireless communication networks. First, in Chap. 1, the authors introduce the basic preliminaries of hypergraph theory in general, and develop two hypergraph based polynomial algorithms, i.e., hypergraph coloring and hypergraph clustering. Then, in Chaps. 2 and 3, the authors present two emerging applications of hypergraph coloring and hypergraph clustering in Device-to-Device (D2D) underlay communication networks, respectively, in order to show the advantages of hypergraph theory compared with the traditional graph theory. Finally, in Chap. 4, the authors discuss the limitations of using hypergraph theory in future wireless networks and briefly present some other potential applications. This brief introduces the state-of-the-art research on the hypergraph theory and its applications in wireless communications. An efficient framework is provided for the researchers, professionals and advanced level students who are interested in the radio resource allocation in the heterogeneous networks to solve the resource allocation and interference management problems.
This book constitutes the proceedings of the 15th International Conference on Service-Oriented Computing, ICSOC 2017, held in malaga, Spain, in November 2017. The 33 full papers presented together with 20 short papers and 4 keynotes in this volume were carefully reviewed and selected from 179 submissions. The selected papers cover a wide variety of important topics in the area of service-oriented computing, including foundational issues on service discovery and service-systems design, business process modelling and management, economics of service-systems engineering, as well as services on the cloud, social networks, the Internet of Things (IoT), and data analytics. The chapter "Risk-based Proactive Process Adaptation" is available open access under a CC BY 4.0 license via link.springer.com.
This book constitutes the post-conference proceedings of the Second EAI International Conference on Smart Grid Inspired Future Technologies, SmartGIFT 2017, held in London, UK, in March 2017. The revised full papers are presented in four tracks: Track 1 - Communications, Networks and Architectures; Track 2 - Smart Control and Operation; Track 3 - Grid and Components; and Track 4 - Data Management and Grid Analytics. Aside from the technical paper presentations, the book also contains five invited talks and two technical workshops. The two workshops organized were: the Improving the Robustness of Urban Electricity Network (IRENE) and Wireless Communications and Networking Technologies for Connected Smart Grids (WCSG). The IRENE workshop aimed to address the new dimension of threats in the critical infrastructures through demonstration of IRENE methodologies and approaches. The WCSG workshop aimed to gain insights into key challenges, understanding and design criteria of employing wireless technologies to develop and implement future smart grids related services and applications.
This book constitutes the thoroughly refereed post-conference proceedings of the Second International Conference on Industrial IoT Technologies and Applications, IoT 2017, held in Wuhu, China, in March 2017. The volume contains 25 papers carefully reviewed and selected from 41 submissions focusing on topics such as big data, cloud computing, Internet of things, areas of control, mobile computing, and security.
This book constitutes the revised selected papers of the 11th International Workshop on Information Search, Integration and Personalization, ISIP 2016, held in Lyon, France, in November 2016. The 8 revised full papers presented were carefully reviewed and selected from 13 papers submitted to these post-conference proceedings from 30 conference presentations. The papers are organized in topical sections on exploratory analysis, mobility data analysis, and management of large data graphs.
The two-volume set LNICST 209-210 constitutes the post-conference proceedings of the 11th EAI International Conference on Communications and Networking, ChinaCom 2016, held in Chongqing, China, in September 2016. The total of 107 contributions presented in these volumes are carefully reviewed and selected from 181 submissions. The book is organized in topical sections on MAC schemes, traffic algorithms and routing algorithms, security, coding schemes, relay systems, optical systems and networks, signal detection and estimation, energy harvesting systems, resource allocation schemes, network architecture and SDM, heterogeneous networks, IoT (Internet of Things), hardware design and implementation, mobility management, SDN and clouds, navigation, tracking and localization, future mobile networks.
The two-volume set LNICST 209-210 constitutes the post-conference proceedings of the 11th EAI International Conference on Communications and Networking, ChinaCom 2016, held in Chongqing, China, in September 2016.The total of 107 contributions presented in these volumes are carefully reviewed and selected from 181 submissions. The book is organized in topical sections on MAC schemes, traffic algorithms and routing algorithms, security, coding schemes, relay systems, optical systems and networks, signal detection and estimation, energy harvesting systems, resource allocation schemes, network architecture and SDM, heterogeneous networks, IoT (Internet of Things), hardware design and implementation, mobility management, SDN and clouds, navigation, tracking and localization, future mobile networks.
Learn how to implement and build a neural network with this non-technical, project-based book as your guide. As you work through the chapters, you'll build an electronics project, providing a hands-on experience in training a network. There are no prerequisites here and you won't see a single line of computer code in this book. Instead, it takes a hardware approach using very simple electronic components. You'll start off with an interesting non-technical introduction to neural networks, and then construct an electronics project. The project isn't complicated, but it illustrates how back propagation can be used to adjust connection strengths or "weights" and train a network. By the end of this book, you'll be able to take what you've learned and apply it to your own projects. If you like to tinker around with components and build circuits on a breadboard, Neural Networks for Electronics Hobbyists is the book for you. What You'll Learn Gain a practical introduction to neural networks Review techniques for training networks with electrical hardware and supervised learning Understand how parallel processing differs from standard sequential programming Who This Book Is For Anyone interest in neural networks, from electronic hobbyists looking for an interesting project to build, to a layperson with no experience. Programmers familiar with neural networks but have only implemented them using computer code will also benefit from this book.
This book constitutes the refereed proceedings of the 21st International Symposium on Fundamentals of Computation Theory, FCT 2017, held in Bordeaux, France, in September 2017. The 29 revised full papers and 5 invited papers presented were carefully reviewed and selected from 99 submissions. The papers cover topics of all aspects of theoretical computer science, in particular algorithms, complexity, formal and logical methods.
This SpringerBrief presents the design and performance evaluation of communication protocols based on dissimilarity metrics for wireless multihop networks. Dissimilarity metrics are used to infer the network topology based solely on local information to efficiently disseminate packets throughout the network, reducing both redundancy and congestion which is covered in this brief. The performance evaluation of the proposed communication protocols has been conducted by both meticulous simulation and real experimentation in a wireless multi-hop testbed. The obtained results in this brief corroborate the hypothesis regarding the validity of dissimilarity metrics, which can be used to design efficient communication protocols. This SpringerBrief is a good starting point for advanced-level students studying computer science and electrical engineering, as well as researchers and professionals working in this field.
This is the first book to introduce UUDN for 5G, including the concept, challenges, architecture and key technologies. The new network architecture based on "de-cellular" and "user-centric" is proposed with three kinds of decoupling: user plane and control plane decoupling from radio access, control and transmission decoupling from network, local service and network service decoupling. Key characteristics of UUDN are provided, including four aspects: Intelligent network knows user, Moving network follows user, Dynamic network serves user, and Secured network protects user. Four promising technology directions are discussed in detail, including dynamic APs grouping (DAPGing) method, intelligent networking, advanced interference management and user-centric security. The authors also include a UUDN solution, illustrated with numerology and evaluation results as a practical example. Finally, further research directions of UUDN are analyzed. This book gives an overall introduction of UUDN for people who are interested and just begin their study, as well as some suggestions on further research for experts involved in academic, industrial and standardization activities on relative fields.
This book constitutes the refereed proceedings of the Third International Conference on Future Network Systems and Security, FNSS 2017, held in Gainesville, FL, USA, during August/September 2017. The 15 full papers presented were carefully reviewed and selected from 42 submissions. The papers are organized in topical sections on protocol design and secure implementation, security protocols and attack countermeasures, big data and future applications.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th EAI International Conference on Sensor Systems and Software, S-Cube 2016, held in Sophia Antipolis, Nice, France, in December 2016. The 15 revised full papers and 5 invited papers cover technologies for wireless sensor networks, smart city and industry 4.0 applications, and smart sensing.
This brief focuses on stochastic energy optimization for distributed energy resources in smart grids. Along with a review of drivers and recent developments towards distributed energy resources, this brief presents research challenges of integrating millions of distributed energy resources into the grid. The brief then proposes a novel three-level hierarchical architecture for effectively integrating distributed energy resources into smart grids. Under the proposed hierarchical architecture, distributed energy resource management algorithms at the three levels (i.e., smart home, smart neighborhood, and smart microgrid) are developed in this brief based on stochastic optimization that can handle the involved uncertainties in the system. |
![]() ![]() You may like...
Handbook of Integration of Cloud…
Rajiv Ranjan, Karan Mitra, …
Hardcover
R6,164
Discovery Miles 61 640
Advances in Wireless Communications and…
Roumen Kountchev, Aniket Mahanti, …
Hardcover
R4,463
Discovery Miles 44 630
Federated Learning for Wireless Networks
Choong Seon Hong, Latif U. Khan, …
Hardcover
R4,475
Discovery Miles 44 750
Iterative Learning Stabilization and…
Limin Wang, Ridong Zhang, …
Hardcover
R2,970
Discovery Miles 29 700
Smart and Sustainable Collaborative…
Luis M. Camarinha-Matos, Xavier Boucher, …
Hardcover
R6,649
Discovery Miles 66 490
Privacy-Preserving in Edge Computing
Longxiang Gao, Tom H. Luan, …
Hardcover
R4,130
Discovery Miles 41 300
Computational Intelligence in Data…
Vallidevi Krishnamurthy, Suresh Jaganathan, …
Hardcover
R2,621
Discovery Miles 26 210
|