|
Showing 1 - 10 of
10 matches in All Departments
A comprehensive and up-to-date survey of 5G technologies and
applications In 5G Wireless Communication Networks, a team of
distinguished researchers delivers an expert treatment of the
technical details of modern 5G wireless networks and the
performance gains they make possible. The book examines the recent
progress in research and development in the area, covering related
topics on fundamental 5G requirements and its enabling
technologies. The authors survey 5G service architecture and
summarize enabling technologies, including highly dense small cell
and heterogeneous networks, device-to-device communications
underlaying cellular networks, fundamentals of non-orthogonal
multiple access in 5G new radio and its applications. Readers will
also find: A thorough introduction to 5G wireless networks,
including discussions of anticipated growth in mobile data traffic
Comprehensive explorations of dense small cell and heterogeneous
networks Practical discussions of the most recent developments in
5G research and enabling technologies Recent advancement of
non-orthogonal multiple access and its role in current and future
wireless systems. Perfect for graduate students, professors,
industry professionals, and engineers with an interest in wireless
communication, 5G Wireless Communication Networks will also benefit
undergraduate and graduate students and researchers seeking an
up-to-date and accessible new resource about 5G networks.
An expert presentation of 5G security, privacy, and network
performance In 5G Wireless Network Security and Privacy, a team of
veteran engineers delivers a robust and accessible discussion of 5G
security solutions, including physical layer security,
authentication, and mobility management. In the book, the
distinguished authors expertly cover the requirements of 5G
wireless network security and privacy, with explorations of
existing solutions and vulnerabilities from security architecture
and mechanism perspectives. Readers will learn to enhance the
security and network performance of 5G wireless networks in
contexts like vehicle-to-vehicle and vehicle-to-infrastructure
communications, industrial automation, health services, smart
cities, and smart homes. They will develop a comprehensive
understanding of 5G wireless network security as they move through
the book’s 11 insightful chapters, developing in-depth knowledge
on the current state of 5G security and coming developments in the
field. Readers will also find: A thorough introduction to legacy
cellular network security, including network performance
development from 1G to 4G In-depth treatments of 5G network
security, including the motivation and objectives of 5G wireless
network security Comprehensive explorations of wireless security
solutions, including cryptographic approaches and physical layer
security Fulsome discussions of the security architecture of
cellular networks, including 3G and 4G security Perfect for
researchers and professionals working in the field of cybersecurity
and 5G wireless networks, 5G Wireless Network Security and Privacy
will also earn a place in the libraries of engineers, computer
scientists, and graduate students studying 5G network security and
privacy.
In today's fast paced, infocentric environment, professionals
increasingly rely on networked information technology to do
business. Unfortunately, with the advent of such technology came
new and complex problems that continue to threaten the
availability, integrity, and confidentiality of our electronic
information. It is therefore absolutely imperative to take measures
to protect and defend information systems by ensuring their
security and non-repudiation. Information Assurance skillfully
addresses this issue by detailing the sufficient capacity networked
systems need to operate while under attack, and itemizing failsafe
design features such as alarms, restoration protocols, and
management configurations to detect problems and automatically
diagnose and respond. Moreover, this volume is unique in providing
comprehensive coverage of both state-of-the-art survivability and
security techniques, and the manner in which these two components
interact to build robust Information Assurance (IA).
KEY FEATURES
* The first and (so far) only book to combine coverage of both
security AND survivability in a networked information technology
setting
* Leading industry and academic researchers provide
state-of-the-art survivability and security techniques and explain
how these components interact in providing information
assurance
* Additional focus on security and survivability issues in wireless
networks
With the growing popularity of "big data", the potential value of
personal data has attracted more and more attention. Applications
built on personal data can create tremendous social and economic
benefits. Meanwhile, they bring serious threats to individual
privacy. The extensive collection, analysis and transaction of
personal data make it difficult for an individual to keep the
privacy safe. People now show more concerns about privacy than ever
before. How to make a balance between the exploitation of personal
information and the protection of individual privacy has become an
urgent issue. In this book, the authors use methodologies from
economics, especially game theory, to investigate solutions to the
balance issue. They investigate the strategies of stakeholders
involved in the use of personal data, and try to find the
equilibrium. The book proposes a user-role based methodology to
investigate the privacy issues in data mining, identifying four
different types of users, i.e. four user roles, involved in data
mining applications. For each user role, the authors discuss its
privacy concerns and the strategies that it can adopt to solve the
privacy problems. The book also proposes a simple game model to
analyze the interactions among data provider, data collector and
data miner. By solving the equilibria of the proposed game, readers
can get useful guidance on how to deal with the trade-off between
privacy and data utility. Moreover, to elaborate the analysis on
data collector's strategies, the authors propose a contract model
and a multi-armed bandit model respectively. The authors discuss
how the owners of data (e.g. an individual or a data miner) deal
with the trade-off between privacy and utility in data mining.
Specifically, they study users' strategies in collaborative
filtering based recommendation system and distributed
classification system. They built game models to formulate the
interactions among data owners, and propose learning algorithms to
find the equilibria.
This book targets major issues in terrestrial-satellite
communication networks and presents the solutions. While the
terrestrial networks can achieve high-speed data service at low
cost, satellite based access is one way to complement terrestrial
based networks to ensure ubiquitous, 100% geographic coverage. The
coexistence and cooperation between terrestrial and satellite
networks are of great potential in future communication networks,
and satellite radio access networks has already been considered in
the fifth-generation (5G) networks to be supported for phase 2.
Therefore, it is important to study the architectures of
terrestrial-satellite networks, as well as the possible techniques
and challenges. The authors introduce the technique of beamforming
in satellite communication systems, which is an efficient
transmitting method for multiple access, and they discuss the main
challenges as well as prospective applications. The authors
introduce possible methods for interference cancelation reception
in terrestrial-satellite communication networks when reusing the
frequency band between the two networks. Due to the limitation of
spectrum resources, spectrum sharing will become one of the
important issues in terrestrial-satellite communication networks.
The problems of spectrum coexistence between GEO and Terrestrial
Systems and between GEO and NEGO systems are also discussed.
Finally, taking both the two system into consideration, the
resource allocation problem will be more complex due to the
coupling between resources and the interference. Based on this, the
authors propose several resource allocation schemes in different
scenarios of terrestrial-satellite communication networks, which
can optimize the capacity performance of the system. The expected
audience for this book includes (but not limited to) graduate
students, professors, researchers, scientists, practitioners,
engineers, industry managers, and government researchers working in
the field of satellite communications and networks. The expected
audience for this book includes (but not limited to) graduate
students, professors, researchers, scientists, practitioners,
engineers, industry managers, and government researchers working in
the field of satellite communications and networks.
This book targets major issues in terrestrial-satellite
communication networks and presents the solutions. While the
terrestrial networks can achieve high-speed data service at low
cost, satellite based access is one way to complement terrestrial
based networks to ensure ubiquitous, 100% geographic coverage. The
coexistence and cooperation between terrestrial and satellite
networks are of great potential in future communication networks,
and satellite radio access networks has already been considered in
the fifth-generation (5G) networks to be supported for phase 2.
Therefore, it is important to study the architectures of
terrestrial-satellite networks, as well as the possible techniques
and challenges. The authors introduce the technique of beamforming
in satellite communication systems, which is an efficient
transmitting method for multiple access, and they discuss the main
challenges as well as prospective applications. The authors
introduce possible methods for interference cancelation reception
in terrestrial-satellite communication networks when reusing the
frequency band between the two networks. Due to the limitation of
spectrum resources, spectrum sharing will become one of the
important issues in terrestrial-satellite communication networks.
The problems of spectrum coexistence between GEO and Terrestrial
Systems and between GEO and NEGO systems are also discussed.
Finally, taking both the two system into consideration, the
resource allocation problem will be more complex due to the
coupling between resources and the interference. Based on this, the
authors propose several resource allocation schemes in different
scenarios of terrestrial-satellite communication networks, which
can optimize the capacity performance of the system. The expected
audience for this book includes (but not limited to) graduate
students, professors, researchers, scientists, practitioners,
engineers, industry managers, and government researchers working in
the field of satellite communications and networks. The expected
audience for this book includes (but not limited to) graduate
students, professors, researchers, scientists, practitioners,
engineers, industry managers, and government researchers working in
the field of satellite communications and networks.
This SpringerBrief provides an in-depth look at the key issues that
affect the performance of heterogeneous networks and presents
schemes that can effectively tackle these issues. In particular,
this book discusses unbalanced traffic load among the macro and
micro Base Stations (BSs) caused by the transmit power disparity,
and a load-balancing based mobile association scheme to balance the
traffic load among the macro and micro BSs. This book also
introduces a fractional frequency reuse (FFR) scheme with proper
power control to help reduce interference at the UEs which are most
vulnerable to such intra-cell interference. The last section
investigates radio resource allocation issues for heterogeneous
networks with cooperative relays, and proposes a resource
allocation framework that could achieve proportional fairness among
the UEs. Numerical results are provided to demonstrate the
effectiveness of the proposed solutions in tackling the problem and
improving network performance. Resource Management for
Heterogeneous Networks in LTE-A Systems is designed for researchers
and professionals working in networking and resource management.
The content is also valuable for advanced-level students in
computer science and electrical engineering.
This is a full-text English translation of the TCM classic on
pediatrics written by QIAN Yi (1032-1113 CE). It covers syndrome
identification and treatment of diseases in infants and young
children. The book consists of three parts: Part I is about
diagnosis of children's diseases and their recommended treatments.
There are 81 articles covering a wide range of clinical patterns.
Part II reports 23 case studies and provides an invaluable record
of the clinical practices at that time. Part III contains over one
hundred medicinal formulas for use in various treatment plans.
This book mainly discusses the most important issues in artificial
intelligence-aided future networks, such as applying different ML
approaches to investigate solutions to intelligently monitor,
control and optimize networking. The authors focus on four
scenarios of successfully applying machine learning in network
space. It also discusses the main challenge of network traffic
intelligent awareness and introduces several machine learning-based
traffic awareness algorithms, such as traffic classification,
anomaly traffic identification and traffic prediction. The authors
introduce some ML approaches like reinforcement learning to deal
with network control problem in this book. Traditional works on the
control plane largely rely on a manual process in configuring
forwarding, which cannot be employed for today's network
conditions. To address this issue, several artificial intelligence
approaches for self-learning control strategies are introduced. In
addition, resource management problems are ubiquitous in the
networking field, such as job scheduling, bitrate adaptation in
video streaming and virtual machine placement in cloud computing.
Compared with the traditional with-box approach, the authors
present some ML methods to solve the complexity network resource
allocation problems. Finally, semantic comprehension function is
introduced to the network to understand the high-level business
intent in this book. With Software-Defined Networking (SDN),
Network Function Virtualization (NFV), 5th Generation Wireless
Systems (5G) development, the global network is undergoing profound
restructuring and transformation. However, with the improvement of
the flexibility and scalability of the networks, as well as the
ever-increasing complexity of networks, makes effective monitoring,
overall control, and optimization of the network extremely
difficult. Recently, adding intelligence to the control plane
through AI&ML become a trend and a direction of network
development This book's expected audience includes professors,
researchers, scientists, practitioners, engineers, industry
managers, and government research workers, who work in the fields
of intelligent network. Advanced-level students studying computer
science and electrical engineering will also find this book useful
as a secondary textbook.
|
You may like...
Wish
Blu-ray disc
R763
R557
Discovery Miles 5 570
|