Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 18 of 18 matches in All Departments
In the era of Big Data and multi-connectivity via IoTs, protecting and securing multimedia data has become a real necessity and priority for organizations and businesses but this can be a rather difficult task due to the heterogeneous nature of platforms and data sets. It is therefore essential to improve the security level of multimedia information by developing core technologies to prevent the loss and damage of information data during processing and transmission. This book covers innovations and future perspectives in access control and security monitoring of multimedia Information processing and transmission. The authors present cybersecurity, privacy and control methods and technologies integrated with Blockchain and multimedia AI, including encryption and watermarking techniques, wearable-based IoT security methods, multimedia data forensics and deepfake video security monitoring. This will be a useful reference for researchers, engineers and scientists in both academia and industry as well as lecturers and advanced students for developing efficient methods, frameworks and techniques for multimedia information processing security and privacy. It will also be of interest to multimedia platform and system developers and designers.
Although the information and communication technology (ICT) industry accounted for only 2 percent of global greenhouse gas emissions in 2007, the explosive increase in data traffic brought about by a rapidly growing user base of more than a billion wireless subscribers is expected to nearly double that number by 2020. It is clear that now is the time to rethink how we design and build our networks. Green Networking and Communications: ICT for Sustainability brings together leading academic and industrial researchers from around the world to discuss emerging developments in energy-efficient networking and communications. It covers the spectrum of research subjects, including methodologies and architectures for energy efficiency, energy-efficient protocols and networks, energy management, smart grid communications, and communication technologies for green solutions. Examines foraging-inspired radio-communication energy management for green multi-radio networks Considers a cross-layer approach to the design of energy-efficient wireless access networks Investigates the interplay between cooperative device-to-device communications and green LTE cellular networks Considers smart grid energy procurement for green LTE cellular networks Details smart grid networking protocols and standards Considering the spectrum of energy-efficient network components and approaches for reducing power consumption, the book is organized into three sections: Energy Efficiency and Management in Wireless Networks, Cellular Networks, and Smart Grids. It addresses many open research challenges regarding energy efficiency for IT and for wireless sensor networks, including mobile and wireless access networks, broadband access networks, home networks, vehicular networks, intelligent future wireless networks, and smart grids. It also examines emerging standards for energy-efficient protocols.
A cognitive network makes use of the information gathered from the network in order to sense the environment, plan actions according to the input, and make appropriate decisions using a reasoning engine. The ability of cognitive networks to learn from the past and use that knowledge to improve future decisions makes them a key area of interest for anyone whose work involves wireless networks and communications. Cognitive Networks: Applications and Deployments examines recent developments in cognitive networks from the perspective of cutting-edge applications and deployments. Presenting the contributions of internationally renowned experts, it supplies complete and balanced treatment of the fundamentals of both cognitive radio communications and cognitive networks-together with implementation details. The book includes case studies and detailed descriptions of cognitive radio platforms and testbeds that demonstrate how to build real-world cognitive radio systems and network architectures. It begins with an introduction to efficient spectrum management and presents a survey on joint routing and dynamic spectrum access in cognitive radio networks. Next, it examines radio spectrum sensing and network coding and design. It explores intelligent routing in graded cognitive networks and presents an energy-efficient routing protocol for cognitive radio ad hoc networks. The book concludes by considering dynamic radio spectrum access and examining vehicular cognitive networks and applications. Presenting the latest standards and spectrum policy developments, the book's strong practical orientation provides you with the understanding you will need to participate in the development of compliant cognitive systems.
By 2020, if not before, mobile computing and wireless systems are expected to enter the fifth generation (5G), which promises evolutionary if not revolutionary services. What those advanced services will look like, sound like, and feel like is the theme of the book Advances in Mobile Computing and Communications: Perspectives and Emerging Trends in 5G Networks. The book explores futuristic and compelling ideas in latest developments of communication and networking aspects of 5G. As such, it serves as an excellent guide for advanced developers, communication network scientists, researchers, academicians, and graduate students. The authors address computing models, communication architecture, and protocols based on 3G, LTE, LTE-A, 4G, and beyond. Topics include advances in 4G, radio propagation and channel modeling aspects of 4G networks, limited feedback for 4G, and game theory application for power control and subcarrier allocation in OFDMA cellular networks. Additionally, the book covers millimeter-wave technology for 5G networks, multicellular heterogeneous networks, and energy-efficient mobile wireless network operations for 4G and beyond using HetNets. Finally, the authors delve into opportunistic multiconnect networks with P2P WiFi and cellular providers and video streaming over wireless channels for 4G and beyond.
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer. The text explains how to deal with black hole attacks in mobile ad hoc networks and describes how to detect misbehaving nodes in vehicular ad hoc networks. It identifies a pragmatic and energy efficient security layer for wireless sensor networks and covers the taxonomy of security protocols for wireless sensor communications. Exploring recent trends in the research and development of multihop network security, the book outlines possible defenses against packet-dropping attacks in wireless multihop ad hoc networks.Complete with expectations for the future in related areas, this is an ideal reference for researchers, industry professionals, and academics. Its comprehensive coverage also makes it suitable for use as a textbook in graduate-level electrical engineering programs.
Security for Multihop Wireless Networks provides broad coverage of the security issues facing multihop wireless networks. Presenting the work of a different group of expert contributors in each chapter, it explores security in mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes that can help you secure your wireless networks, the book covers cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical, MAC, network, transport, and application layers and details proven methods for strengthening security mechanisms in each layer. The text explains how to deal with black hole attacks in mobile ad hoc networks and describes how to detect misbehaving nodes in vehicular ad hoc networks. It identifies a pragmatic and energy efficient security layer for wireless sensor networks and covers the taxonomy of security protocols for wireless sensor communications. Exploring recent trends in the research and development of multihop network security, the book outlines possible defenses against packet-dropping attacks in wireless multihop ad hoc networks.Complete with expectations for the future in related areas, this is an ideal reference for researchers, industry professionals, and academics. Its comprehensive coverage also makes it suitable for use as a textbook in graduate-level electrical engineering programs.
Although the information and communication technology (ICT) industry accounted for only 2 percent of global greenhouse gas emissions in 2007, the explosive increase in data traffic brought about by a rapidly growing user base of more than a billion wireless subscribers is expected to nearly double that number by 2020. It is clear that now is the time to rethink how we design and build our networks. Green Networking and Communications: ICT for Sustainability brings together leading academic and industrial researchers from around the world to discuss emerging developments in energy-efficient networking and communications. It covers the spectrum of research subjects, including methodologies and architectures for energy efficiency, energy-efficient protocols and networks, energy management, smart grid communications, and communication technologies for green solutions. Examines foraging-inspired radio-communication energy management for green multi-radio networks Considers a cross-layer approach to the design of energy-efficient wireless access networks Investigates the interplay between cooperative device-to-device communications and green LTE cellular networks Considers smart grid energy procurement for green LTE cellular networks Details smart grid networking protocols and standards Considering the spectrum of energy-efficient network components and approaches for reducing power consumption, the book is organized into three sections: Energy Efficiency and Management in Wireless Networks, Cellular Networks, and Smart Grids. It addresses many open research challenges regarding energy efficiency for IT and for wireless sensor networks, including mobile and wireless access networks, broadband access networks, home networks, vehicular networks, intelligent future wireless networks, and smart grids. It also examines emerging standards for energy-efficient protocols.
Guiding readers through the basics of these rapidly emerging networks to more advanced concepts and future expectations, Mobile Ad hoc Networks: Current Status and Future Trends identifies and examines the most pressing research issues in Mobile Ad hoc Networks (MANETs). Containing the contributions of leading researchers, industry professionals, and academics, this forward-looking reference provides an authoritative perspective of the state of the art in MANETs. The book includes surveys of recent publications that investigate key areas of interest such as limited resources and the mobility of mobile nodes. It considers routing, multicast, energy, security, channel assignment, and ensuring quality of service. Also suitable as a text for graduate students, the book is organized into three sections:
Illustrating the role MANETs are likely to play in future networks, this book supplies the foundation and insight you will need to make your own contributions to the field. It includes coverage of routing protocols, modeling and simulations tools, intelligent optimization techniques to multicriteria routing, security issues in FHAMIPv6, connecting moving smart objects to the Internet, underwater sensor networks, wireless mesh network architecture and protocols, adaptive routing provision using Bayesian inference, and adaptive flow control in transport layer using genetic algorithms.
This book constitutes thoroughly refereed post-conference proceedings of the International Applied Soft Computing and Communication Networks (ACN 2020) held in VIT, Chennai, India, during October 14-17, 2020. The research papers presented were carefully reviewed and selected from several initial submissions. The book is directed to the researchers and scientists engaged in various fields of intelligent systems.
This book constitutes best selected research papers presented at the International Applied Soft Computing and Communication Networks (ACN 2019) held in Trivandrum, Kerala, India during December 18 - 21, 2019. The papers are organized in topical sections on real time and multimedia communications, security and privacy, network management and software-defined networks, Internet of Things (IoT) and cyber-physical systems, intelligent distributed systems, mobile computing and vehicle communications, surveillance networks and visual intelligence, and emerging topics. The book is a reference for researchers and scientists engaged in various fields of intelligent systems.
This book constitutes the refereed proceedings of the International Symposium on Security in Computing and Communications, SSCC 2014, held in Delhi, India, in September 2013. The 36 revised full papers presented together with 12 work-in-progress papers were carefully reviewed and selected from 132 submissions. The papers are organized in topical sections on security and privacy in networked systems; authentication and access control systems; encryption and cryptography; system and network security; work-in-progress.
This book constitutes the refereed proceedings of the 13th International Conference on Ad-hoc, Mobile and Wireless Networks, ADHOC-NOW 2014, held in Benidorm, Spain, in June 2014. The 33 revised full papers presented were carefully reviewed and selected from 78 submissions. The papers address such diverse topics as routing, cellular networks, MAC and physical layer, mobile ad hoc, sensor and robot networks, localization and security, vehicular ad-hoc networks.
This book constitutes the thoroughly refereed proceedings of the Second International Conference, GreeNets 2012, held in Gaudia, Spain, in October 2012. The 11 revised full papers presented were carefully selected and reviewed. These papers represent 23.68% of the submissions and cover topics such as communications and networking, energy-efficient network architecture and protocols, systems and technologies, and energy-efficient management.
This volume is the first part of a four-volume set (CCIS 190, CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed proceedings of the First International Conference on Computing and Communications, ACC 2011, held in Kochi, India, in July 2011. The 68 revised full papers presented in this volume were carefully reviewed and selected from a large number of submissions. The papers are organized in topical sections on ad hoc networks; advanced micro architecture techniques; autonomic and context-aware computing; bioinformatics and bio-computing; cloud, cluster, grid and P2P computing; cognitive radio and cognitive networks; cyber forensics; database and information systems.
This volume is the third part of a four-volume set (CCIS 190,
CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed
proceedings of the First International Conference on Computing and
Communications, ACC 2011, held in Kochi, India, in July 2011. The
70 revised full papers presented in this volume were
carefully
This volume is the fourth part of a four-volume set (CCIS 190,
CCIS 191, CCIS 192, CCIS 193), which constitutes the refereed
proceedings of the First International Conference on on Computing
and Communications, ACC 2011, held in Kochi, India, in July 2011.
The 62 revised full papers presented in this volume were
carefully
By 2020, if not before, mobile computing and wireless systems are expected to enter the fifth generation (5G), which promises evolutionary if not revolutionary services. What those advanced services will look like, sound like, and feel like is the theme of the book Advances in Mobile Computing and Communications: Perspectives and Emerging Trends in 5G Networks. The book explores futuristic and compelling ideas in latest developments of communication and networking aspects of 5G. As such, it serves as an excellent guide for advanced developers, communication network scientists, researchers, academicians, and graduate students. The authors address computing models, communication architecture, and protocols based on 3G, LTE, LTE-A, 4G, and beyond. Topics include advances in 4G, radio propagation and channel modeling aspects of 4G networks, limited feedback for 4G, and game theory application for power control and subcarrier allocation in OFDMA cellular networks. Additionally, the book covers millimeter-wave technology for 5G networks, multicellular heterogeneous networks, and energy-efficient mobile wireless network operations for 4G and beyond using HetNets. Finally, the authors delve into opportunistic multiconnect networks with P2P WiFi and cellular providers and video streaming over wireless channels for 4G and beyond.
A cognitive network makes use of the information gathered from the network in order to sense the environment, plan actions according to the input, and make appropriate decisions using a reasoning engine. The ability of cognitive networks to learn from the past and use that knowledge to improve future decisions makes them a key area of interest for anyone whose work involves wireless networks and communications. Cognitive Networks: Applications and Deployments examines recent developments in cognitive networks from the perspective of cutting-edge applications and deployments. Presenting the contributions of internationally renowned experts, it supplies complete and balanced treatment of the fundamentals of both cognitive radio communications and cognitive networks-together with implementation details. The book includes case studies and detailed descriptions of cognitive radio platforms and testbeds that demonstrate how to build real-world cognitive radio systems and network architectures. It begins with an introduction to efficient spectrum management and presents a survey on joint routing and dynamic spectrum access in cognitive radio networks. Next, it examines radio spectrum sensing and network coding and design. It explores intelligent routing in graded cognitive networks and presents an energy-efficient routing protocol for cognitive radio ad hoc networks. The book concludes by considering dynamic radio spectrum access and examining vehicular cognitive networks and applications. Presenting the latest standards and spectrum policy developments, the book's strong practical orientation provides you with the understanding you will need to participate in the development of compliant cognitive systems.
|
You may like...
Revealing Revelation - How God's Plans…
Amir Tsarfati, Rick Yohn
Paperback
(5)
|