|
Showing 1 - 7 of
7 matches in All Departments
The IoT topology defines the way various components communicate
with each other within a network. Topologies can vary greatly in
terms of security, power consumption, cost, and complexity.
Optimizing the IoT topology for different applications and
requirements can help to boost the network's performance and save
costs. More importantly, optimizing the topology robustness can
ensure security and prevent network failure at the foundation
level. In this context, this book examines the optimization schemes
for topology robustness in the IoT, helping readers to construct a
robustness optimization framework, from self-organizing to
intelligent networking. The book provides the relevant theoretical
framework and the latest empirical research on robustness
optimization of IoT topology. Starting with the self-organization
of networks, it gradually moves to genetic evolution. It also
discusses the application of neural networks and reinforcement
learning to endow the node with self-learning ability to allow
intelligent networking. This book is intended for students,
practitioners, industry professionals, and researchers who are
eager to comprehend the vulnerabilities of IoT topology. It helps
them to master the research framework for IoT topology robustness
optimization and to build more efficient and reliable IoT
topologies in their industry.
|
Quality, Reliability, Security and Robustness in Heterogeneous Systems - 13th International Conference, QShine 2017, Dalian, China, December 16 -17, 2017, Proceedings (Paperback, 1st ed. 2018)
Lei Wang, Tie Qiu, Wenbing Zhao
|
R1,469
Discovery Miles 14 690
|
Ships in 10 - 15 working days
|
This book constitutes the refereed post-conference proceedings of
the 13th International Conference on Quality, Reliability, Security
and Robustness in Heterogeneous Networks, QShine 2017, held in
Dalian, China, in December 2017. The 25 revised full papers were
carefully reviewed and selected from 43 submissions. The papers are
organized thematically in tracks, starting with mobile and wireless
networks, quality and reliability, wireless networking algorithms
and protocols, and smart applications.
The IoT topology defines the way various components communicate
with each other within a network. Topologies can vary
greatly in terms of security, power consumption,
cost, and complexity. Optimizing the IoT
topology for different applications and requirements
can help to boost the network’s performance and save
costs. More importantly, optimizing the topology robustness can
ensure security and prevent network
failure at the foundation level. In this context, this
book examines the optimization
schemes for topology robustness in the
IoT, helping readers to construct a robustness
optimization framework, from self-organizing to
intelligent networking. The book provides the relevant
theoretical framework and the latest empirical
research on robustness optimization of IoT
topology. Starting with the self-organization of
networks, it gradually moves to genetic evolution.
It also discusses the application of neural
networks and reinforcement learning to endow the
node with self-learning ability to allow intelligent
networking. This book is intended for students, practitioners,
industry professionals, and researchers who are eager to
comprehend the vulnerabilities of IoT topology. It helps them
to master the research framework for IoT topology
robustness optimization and to build more efficient and
reliable IoT topologies in their industry.
|
Wireless Algorithms, Systems, and Applications - 17th International Conference, WASA 2022, Dalian, China, November 24-26, 2022, Proceedings, Part II (Paperback, 1st ed. 2022)
Lei Wang, Michael Segal, Jenhui Chen, Tie Qiu
|
R2,902
Discovery Miles 29 020
|
Ships in 10 - 15 working days
|
The three-volume set constitutes the proceedings of the 17th
International Conference on Wireless Algorithms, Systems, and
Applications, WASA 2022, which was held during October 28-30, 2022.
The conference took place in Dalian, China.The 95 full and 62 short
papers presented in these proceedings were carefully reviewed and
selected from 265 submissions. The contributions in algorithms,
systems; and applications of internet of things;information
processing and data management;radar and sonar networks
|
Wireless Algorithms, Systems, and Applications - 17th International Conference, WASA 2022, Dalian, China, November 24-26, 2022, Proceedings, Part III (Paperback, 1st ed. 2022)
Lei Wang, Michael Segal, Jenhui Chen, Tie Qiu
|
R2,904
Discovery Miles 29 040
|
Ships in 10 - 15 working days
|
The three-volume set constitutes the proceedings of the 17th
International Conference on Wireless Algorithms, Systems, and
Applications, WASA 2022, which was held during October 28-30, 2022.
The conference took place in Dalian, China.The 95 full and 62 short
papers presented in these proceedings were carefully reviewed and
selected from 265 submissions. The contributions in theoretical
frameworks and analysis of fundamental cross-layer protocol and
network design and performance issues; distributed and localized
algorithm design and analysis; information and coding theory for
wireless networks; localization; mobility models and mobile social
networking; underwater and underground networks; vehicular
networks; algorithms, systems, and applications of edge computing
|
Wireless Algorithms, Systems, and Applications - 17th International Conference, WASA 2022, Dalian, China, November 24-26, 2022, Proceedings, Part I (Paperback, 1st ed. 2022)
Lei Wang, Michael Segal, Jenhui Chen, Tie Qiu
|
R2,904
Discovery Miles 29 040
|
Ships in 10 - 15 working days
|
The three-volume set constitutes the proceedings of the 17th
International Conference on Wireless Algorithms, Systems, and
Applications, WASA 2022, which was held during November 24th-26th,
2022. The conference took place in Dalian, China.The 95 full and 62
short papers presented in these proceedings were carefully reviewed
and selected from 265 submissions. The contributions in
cyber-physical systems including intelligent transportation systems
and smart healthcare systems; security and privacy; topology
control and coverage; energy-efficient algorithms, systems and
protocol design
|
|