Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 20 of 20 matches in All Departments
This textbook reviews the theory, applications, and latest breakthroughs in Delay Tolerant Networks (DTNs). Presenting a specific focus on Opportunistic Mobile Networks (OMNs), the text considers the influence of human aspects, and examines emerging forms of inter-node cooperation. Features: contains review terms and exercises in each chapter, with the solutions and source code available at an associated website; introduces the fundamentals of DTNs, covering OMNs, PSNs, and MOONs; describes the ONE simulator, explaining how to set up a simulation project; provides detailed insights into the development and testing of protocols, together with a set of best practices for increased productivity and optimized performance; examines human aspects in the context of communication networks, from human-centric applications to the impact of emotion on human-network interplay; proposes various schemes for inter-node cooperation in DTNs/OMNs; presents a detailed discussion on aspects of heterogeneity in DTNs.
An oft-repeated adage among telecommunication providers goes, "There are ve things that matter: reliability, reliability, reliability, time to market, and cost. If you can't do all ve, at least do the rst three. " Yet, designing and operating reliable networks and services is a Herculean task. Building truly reliable components is unacceptably expensive, forcing us to c- struct reliable systems out of unreliable components. The resulting systems are inherently complex, consisting of many different kinds of components running a variety of different protocols that interact in subtle ways. Inter-networkssuch as the Internet span multiple regions of administrative control, from campus and cor- rate networks to Internet Service Providers, making good end-to-end performance a shared responsibility borne by sometimes uncooperative parties. Moreover, these networks consist not only of routers, but also lower-layer devices such as optical switches and higher-layer components such as rewalls and proxies. And, these components are highly con gurable, leaving ample room for operator error and buggy software. As if that were not dif cult enough, end users understandably care about the performance of their higher-level applications, which has a complicated relationship with the behavior of the underlying network. Despite these challenges, researchers and practitioners alike have made trem- dous strides in improving the reliability of modern networks and services.
Wireless ad-hoc network communication technologies have experienced a steep growth in research and significant advancements in recent times due to their important advantages. These benefits help to set-up a network fast in situations where there is no existing network set-up, or when setting up a fixed infrastructure network is considered infeasible. However, there are challenges that still need to be addressed. This indispensable guidebook provides a comprehensive resource on the new ideas and results in the areas of mobile ad-hoc networks and other ad-hoc computing systems in the wireless communication technology field. Wireless ad-hoc networks are explored by leading experts in the field from both academia and industry, with discussions on various challenges in varied environments, standards, routing mechanisms, etc. This reader-friendly, broad-ranging text features in-depth descriptions of terminologies and concepts related to the diverse subject areas germane to wireless ad hoc communication. Features: Provides an accessible, comprehensive overview of the state-of-the-art technology of wireless ad-hoc networks Includes reader-friendly discussions for practitioners, directions for future research, and helpful lists of terms and definitions Offers a set of summary questions at the end of each chapter to help readers assess their understanding of the various concepts Presents insight into the practical significance of these topics in real-world scenarios Designed, in structure and content, to aid the learning process with the intension of making the book useful at all learning levels Supplies supportive PowerPoint presentation slides and solutions to aid lecturers at www.springer.com/978-1-84800-327-9 This wide-ranging and highly useful guide will be a valuable reference/text in the field for researchers, engineers and strategists needing to know about this technology. It is also an ideal textbook for graduate students wishing to learn more about the topic. Key Topics: Routing Mobility Management Quality of Service Support Congestion Control Security Trust Management"
Overview and Goals Wireless communication technologies are undergoing rapid advancements. The last few years have experienced a steep growth in research in the area of wireless mesh networks (WMNs). The attractiveness of WMNs, in general, is attributed to their characteristics such as the ability to dynamically self-organize and self-con?gure, coupled with the ability to maintain mesh connectivity leading, in effect, to low set-up/installation costs, simpler maintenance tasks, and service coverage with high reliability and fault-tolerance. WMNs also support their integration with existing wireless networks such as cellular networks, WLANs, wireless-?delity (Wi-Fi), and worldwide interoperability of microwave access (WiMAX). WMNs have found u- ful applications in a broad range of domains such as broadband home networking, commercial/business networking, and community networking - particularly attr- tive in offering broadband wireless access with low initial installation and set-up costs. Even though WMNs have emerged to be attractive and they hold great promises for our future, there are several challenges that need to be addressed. Some of the wellknownchallenges areattributedtoissuesrelatingtoscalability(signi?cantdrop in throughput with the increase in the number of nodes), multicasting, offering qu- ity of service guarantees, energy ef?ciency, and security. This handbook attempts to provide a comprehensive guide on fundamental key topics coupled with new ideas and results in the areas of WMNs. The book has been prepared keeping in mind that it needs to prove itself to be a valuable resource dealing with both the important core and the specialized issues in WMNs.
Industrial IoT (IIoT) and Industry 4.0 are newly developing and fast emerging domains of interest among students, researchers, and professionals in academia and industry. Due to the popular demand of this topic, Introduction to Industrial Internet of Things and Industry 4.0 is written to serve a diverse readership from the domains of computer science and engineering, mechanical engineering, information technology, industrial engineering, electronics engineering, and other related branches of engineering. Based on the lead author's massive open online courses (MOOCs), this book can be used as a textbook on the emerging paradigm of Industry 4.0 and IIoT, as well as a reference for professionals working in sectors of IIoT. The book covers the significant aspects of IIoT in detail, including sensors, actuators, data transmission, and data acquisition, which form the core of IIoT. Topics and concepts are presented in a comprehensive manner, so that readers can develop expertise and knowledge. The book helps beginners to gain a basic idea of Industry 4.0 and IIoT as the first section is an overview of IoT applications, infrastructure-based protocols, cloud computing, and fog computing. The second section is designed to impart a basic knowledge of Industry 4.0 and IIoT as well as of the different phases of development in industry. Delving into more advanced areas, other sections in the book cover: The business models and reference architecture of IIoT The technological aspects of Industry 4.0 and IIoT Predictive and prescriptive analytics applied in IIoT-based implementations Applications and case studies of IIoT Key enabling technologies of IIoT To aid students and professional master IIoT and Industry 4.0, the book includes conceptual questions, exercises, and learning objectives.
Industrial IoT (IIoT) and Industry 4.0 are newly developing and fast emerging domains of interest among students, researchers, and professionals in academia and industry. Due to the popular demand of this topic, Introduction to Industrial Internet of Things and Industry 4.0 is written to serve a diverse readership from the domains of computer science and engineering, mechanical engineering, information technology, industrial engineering, electronics engineering, and other related branches of engineering. Based on the lead author's massive open online courses (MOOCs), this book can be used as a textbook on the emerging paradigm of Industry 4.0 and IIoT, as well as a reference for professionals working in sectors of IIoT. The book covers the significant aspects of IIoT in detail, including sensors, actuators, data transmission, and data acquisition, which form the core of IIoT. Topics and concepts are presented in a comprehensive manner, so that readers can develop expertise and knowledge. The book helps beginners to gain a basic idea of Industry 4.0 and IIoT as the first section is an overview of IoT applications, infrastructure-based protocols, cloud computing, and fog computing. The second section is designed to impart a basic knowledge of Industry 4.0 and IIoT as well as of the different phases of development in industry. Delving into more advanced areas, other sections in the book cover: The business models and reference architecture of IIoT The technological aspects of Industry 4.0 and IIoT Predictive and prescriptive analytics applied in IIoT-based implementations Applications and case studies of IIoT Key enabling technologies of IIoT To aid students and professional master IIoT and Industry 4.0, the book includes conceptual questions, exercises, and learning objectives.
The last few years have witnessed rapid advancements in information and coding theory research and applications. This book provides a comprehensive guide to selected topics, both ongoing and emerging, in information and coding theory. Consisting of contributions from well-known and high-profile researchers in their respective specialties, topics that are covered include source coding; channel capacity; linear complexity; code construction, existence and analysis; bounds on codes and designs; space-time coding; LDPC codes; and codes and cryptography.All of the chapters are integrated in a manner that renders the book as a supplementary reference volume or textbook for use in both undergraduate and graduate courses on information and coding theory. As such, it will be a valuable text for students at both undergraduate and graduate levels as well as instructors, researchers, engineers, and practitioners in these fields.Supporting Powerpoint Slides are available upon request for all instructors who adopt this book as a course text.
Overview and Goals Wireless communication technologies are undergoing rapid advancements. The last few years have experienced a steep growth in research in the area of wireless sensor networks (WSNs). In WSNs, communication takes place with the help of spatially distributedautonomoussensornodesequippedtosensespeci?cinformation. WSNs, especially the ones that have gained much popularity in the recent years, are, ty- cally, ad hoc in nature and they inherit many characteristics/features of wireless ad hoc networks such as the ability for infrastructure-less setup, minimal or no reliance on network planning, and the ability of the nodes to self-organize and self-con?gure without the involvement of a centralized network manager, router, access point, or a switch. These features help to set up WSNs fast in situations where there is no existing network setup or in times when setting up a ?xed infrastructure network is considered infeasible, for example, in times of emergency or during relief - erations. WSNs ?nd a variety of applications in both the military and the civilian population worldwide such as in cases of enemy intrusion in the battle?eld, object tracking, habitat monitoring, patient monitoring, ?re detection, and so on. Even though sensor networks have emerged to be attractive and they hold great promises for our future, there are several challenges that need to be addressed. Some of the well-known challenges are attributed to issues relating to coverage and deployment, scalability, quality-of-service, size, computational power, energy ef?ciency, and security.
This book features high-quality research papers presented at the International Conference on Advanced Computing and Intelligent Engineering (ICACIE 2017). It includes sections describing technical advances in the fields of advanced computing and intelligent engineering, which are based on the presented articles. Intended for postgraduate students and researchers working in the discipline of computer science and engineering, the proceedings also appeal to researchers in the domain of electronics as it covers hardware technologies and future communication technologies.
This textbook reviews the theory, applications, and latest breakthroughs in Delay Tolerant Networks (DTNs). Presenting a specific focus on Opportunistic Mobile Networks (OMNs), the text considers the influence of human aspects, and examines emerging forms of inter-node cooperation. Features: contains review terms and exercises in each chapter, with the solutions and source code available at an associated website; introduces the fundamentals of DTNs, covering OMNs, PSNs, and MOONs; describes the ONE simulator, explaining how to set up a simulation project; provides detailed insights into the development and testing of protocols, together with a set of best practices for increased productivity and optimized performance; examines human aspects in the context of communication networks, from human-centric applications to the impact of emotion on human-network interplay; proposes various schemes for inter-node cooperation in DTNs/OMNs; presents a detailed discussion on aspects of heterogeneity in DTNs.
An oft-repeated adage among telecommunication providers goes, "There are ve things that matter: reliability, reliability, reliability, time to market, and cost. If you can't do all ve, at least do the rst three. " Yet, designing and operating reliable networks and services is a Herculean task. Building truly reliable components is unacceptably expensive, forcing us to c- struct reliable systems out of unreliable components. The resulting systems are inherently complex, consisting of many different kinds of components running a variety of different protocols that interact in subtle ways. Inter-networkssuch as the Internet span multiple regions of administrative control, from campus and cor- rate networks to Internet Service Providers, making good end-to-end performance a shared responsibility borne by sometimes uncooperative parties. Moreover, these networks consist not only of routers, but also lower-layer devices such as optical switches and higher-layer components such as rewalls and proxies. And, these components are highly con gurable, leaving ample room for operator error and buggy software. As if that were not dif cult enough, end users understandably care about the performance of their higher-level applications, which has a complicated relationship with the behavior of the underlying network. Despite these challenges, researchers and practitioners alike have made trem- dous strides in improving the reliability of modern networks and services.
Overview and Goals Wireless communication technologies are undergoing rapid advancements. The past few years have experienced a steep growth in research in the area of wireless ad hoc networks. The attractiveness of ad hoc networks, in general, is attributed to their characteristics/features such as ability for infrastructure-less setup, minimal or no reliance on network planning and the ability of the nodes to self-organize and self-configure without the involvement of a centralized n- work manager, router, access point or a switch. These features help to set up a network fast in situations where there is no existing network setup or in times when setting up a fixed infrastructure network is considered infeasible, for example, in times of emergency or during relief operations. Even though ad hoc networks have emerged to be attractive and they hold great promises for our future, there are several challenges that need to be addressed. Some of the well-known challenges are attributed to issues relating to scalability, quality-of-service, energy efficiency and security.
Overview and Goals Wireless communication technologies are undergoing rapid advancements. The last few years have experienced a steep growth in research in the area of wireless mesh networks (WMNs). The attractiveness of WMNs, in general, is attributed to their characteristics such as the ability to dynamically self-organize and self-con?gure, coupled with the ability to maintain mesh connectivity leading, in effect, to low set-up/installation costs, simpler maintenance tasks, and service coverage with high reliability and fault-tolerance. WMNs also support their integration with existing wireless networks such as cellular networks, WLANs, wireless-?delity (Wi-Fi), and worldwide interoperability of microwave access (WiMAX). WMNs have found u- ful applications in a broad range of domains such as broadband home networking, commercial/business networking, and community networking - particularly attr- tive in offering broadband wireless access with low initial installation and set-up costs. Even though WMNs have emerged to be attractive and they hold great promises for our future, there are several challenges that need to be addressed. Some of the wellknownchallenges areattributedtoissuesrelatingtoscalability(signi?cantdrop in throughput with the increase in the number of nodes), multicasting, offering qu- ity of service guarantees, energy ef?ciency, and security. This handbook attempts to provide a comprehensive guide on fundamental key topics coupled with new ideas and results in the areas of WMNs. The book has been prepared keeping in mind that it needs to prove itself to be a valuable resource dealing with both the important core and the specialized issues in WMNs.
Overview and Goals Wireless communication technologies are undergoing rapid advancements. The last few years have experienced a steep growth in research in the area of wireless sensor networks (WSNs). In WSNs, communication takes place with the help of spatially distributedautonomoussensornodesequippedtosensespeci?cinformation. WSNs, especially the ones that have gained much popularity in the recent years, are, ty- cally, ad hoc in nature and they inherit many characteristics/features of wireless ad hoc networks such as the ability for infrastructure-less setup, minimal or no reliance on network planning, and the ability of the nodes to self-organize and self-con?gure without the involvement of a centralized network manager, router, access point, or a switch. These features help to set up WSNs fast in situations where there is no existing network setup or in times when setting up a ?xed infrastructure network is considered infeasible, for example, in times of emergency or during relief - erations. WSNs ?nd a variety of applications in both the military and the civilian population worldwide such as in cases of enemy intrusion in the battle?eld, object tracking, habitat monitoring, patient monitoring, ?re detection, and so on. Even though sensor networks have emerged to be attractive and they hold great promises for our future, there are several challenges that need to be addressed. Some of the well-known challenges are attributed to issues relating to coverage and deployment, scalability, quality-of-service, size, computational power, energy ef?ciency, and security.
IoT is emerging as a popular area of research and has piqued the interest of academics and scholars across the world. This book serves as a textbook and a single point of reference for readers looking to delve further into this domain. Written by leading experts in the field, this lucid and comprehensive work provides a clear understanding of the operation and scope of the IoT. Along with the description of the basic outline and technologies associated with the subject, the book discusses the IoT case studies and hands-on exercises, enabling readers to visualise the vastly interdisciplinary nature of its applications. The book also serves curious, non-technical readers, enabling them to understand necessary concepts and terminologies associated with the IoT.
This book provides an in-depth understanding of Internet of Things (IoT) technology. It highlights several of today's research and technological challenges of translating the concept of the IoT into a practical, technologically feasible, and business-viable solution. It introduces two novel technologies--sensor-cloud and fog computing--as the crucial enablers for the sensing and compute backbone of the IoT. The book discusses these two key enabling technologies of IoT that include a wide range of practical design issues and the futuristic possibilities and directions involving sensor networks and cloud and fog computing environments towards the realization and support of IoT. Classroom presentations and solutions to end of chapter questions are available to instructors who use the book in their classes.
This comprehensive text covers fundamental concepts of smart grid technologies, integrating the tools and techniques of cloud computing and data management for application in smart grids. Different cloud and data management approaches are explained, highlighting energy management, information management, and security in the smart grid. The concepts of plug-in hybrid electric vehicle and virtual energy storage are explained in separate chapters. The text covers recent trends in cloud computing and data analytics in the field of smart grid. A glossary of important technical terms is provided for the benefit of the readers.
Wireless sensor networks are an emerging technology with a wide range of applications in military and civilian domains. The book begins by detailing the basic principles and concepts of wireless sensor networks, including information gathering, energy management and the structure of sensory nodes. It proceeds to examine advanced topics, covering localisation, topology, security and evaluation of wireless sensor networks, highlighting international research being carried out in this area. Finally, it features numerous examples of applications of this technology to a range of domains, such as wireless, multimedia, underwater and underground wireless sensor networks. The concise but clear presentation of the important principles, techniques and applications of wireless sensor networks makes this guide an excellent introduction for anyone new to the subject, as well as an ideal reference for practitioners and researchers.
This book presents new research contributions in the above-mentioned fields. Information and communication technologies (ICT) have an integral role in today's society. Four major driving pillars in the field are computing, which nowadays enables data processing in unprecedented speeds, informatics, which derives information stemming for processed data to feed relevant applications, networking, which interconnects the various computing infrastructures and cybersecurity for addressing the growing concern for secure and lawful use of the ICT infrastructure and services. Its intended readership covers senior undergraduate and graduate students in Computer Science and Engineering and Electrical Engineering, as well as researchers, scientists, engineers, ICT managers, working in the relevant fields and industries.
This book uses tutorials and new material to describe the basic concepts of soft-computing which potentially can be used in real-life sensor network applications. It is organized in a manner that exemplifies the use of an assortment of soft-computing applications for solving different problems in sensor networking. Written by worldwide experts, the chapters provide a balanced mixture of different problems concerning channel access, routing, coverage, localization, lifetime maximization and target tracking using emerging soft-computing applications.
|
You may like...
Labour Relations in South Africa
Dr Hanneli Bendeman, Dr Bronwyn Dworzanowski-Venter
Paperback
|