0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (6)
  • R2,500 - R5,000 (7)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 14 of 14 matches in All Departments

Millimeter-Wave Networks - Beamforming Design and Performance Analysis (Hardcover, 1st ed. 2021): Peng Yang, Wen Wu, Ning... Millimeter-Wave Networks - Beamforming Design and Performance Analysis (Hardcover, 1st ed. 2021)
Peng Yang, Wen Wu, Ning Zhang, Xuemin Shen
R3,935 Discovery Miles 39 350 Ships in 12 - 17 working days

This book provides a comprehensive review and in-depth study on efficient beamforming design and rigorous performance analysis in mmWave networks, covering beam alignment, beamforming training and beamforming-aided caching. Due to significant beam alignment latency between the transmitter and the receiver in existing mmWave systems, this book proposes a machine learning based beam alignment algorithm for mmWave networks to determine the optimal beam pair with a low latency. Then, to analyze and enhance the performance of beamforming training (BFT) protocol in 802.11ad mmWave networks, an analytical model is presented to evaluate the performance of BFT protocol and an enhancement scheme is proposed to improve its performance in high user density scenarios. Furthermore, it investigates the beamforming-aided caching problem in mmWave networks, and proposes a device-to-device assisted cooperative edge caching to alleviate backhaul congestion and reduce content retrieval delay. This book concludes with future research directions in the related fields of study. The presented beamforming designs and the corresponding research results covered in this book, provides valuable insights for practical mmWave network deployment and motivate new ideas for future mmWave networking. This book targets researchers working in the fields of mmWave networks, beamforming design, and resource management as well as graduate students studying the areas of electrical engineering, computing engineering and computer science. Professionals in industry who work in this field will find this book useful as a reference.

Vehicular Networking for Road Safety (Hardcover, 1st ed. 2020): Feng Lyu, Minglu Li, Xuemin Shen Vehicular Networking for Road Safety (Hardcover, 1st ed. 2020)
Feng Lyu, Minglu Li, Xuemin Shen
R2,789 Discovery Miles 27 890 Ships in 10 - 15 working days

The topics addressed in this book are crucial for both the academic community and industry, since the vehicular network has become an essential building block for intelligent transportation systems. The systematic principle of this book provides valuable guidance on the deployment and implementation of V2X-enabled road-safety applications. In addition, this book carries out structured technologies from the MAC layer to the link and network layer, which can provide a general introduction for interested readers with a comprehensive understanding of applying vehicular networks in enhancing road safety, and offers a systematized view for researchers and practitioners in the field of vehicular networks to help them optimize and improve the desired vehicular communication systems. Road safety has always been the first priority for daily commuters on the road. Vehicular networks can be an effective solution to enhance road safety, via which vehicles can exchange cooperative awareness messages rapidly, contributing to better situation awareness and maneuvering cooperation. However, with the fast-changing network topology, intermittent wireless link, and dynamic traffic density, it is challenging to achieve satisfying network performance. This book introduces the background of vehicular networks, provides a comprehensive overview of networking techniques in supporting road-safety applications, states the technical motivations per the MAC, link, and network layer, and proposes/designs vehicular networking technologies at the corresponding layer respectively to guarantee low-latency and reliable V2X communications for road-safety applications. By extending the proposed networking technologies to support all types of vehicular services, this book also outlines open issues and research directions in future 5G and beyond vehicular networks.

Wireless Network Security (Hardcover, 2007 ed.): Yang Xiao, Xuemin Shen, Dingzhu Du Wireless Network Security (Hardcover, 2007 ed.)
Yang Xiao, Xuemin Shen, Dingzhu Du
R4,284 Discovery Miles 42 840 Ships in 12 - 17 working days

This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.

Computational Intelligence in Telecommunications Networks (Hardcover): Witold Pedrycz, Athanasios Vasilakos Computational Intelligence in Telecommunications Networks (Hardcover)
Witold Pedrycz, Athanasios Vasilakos; Contributions by Cynthia Hood, Dushy Tissainayagan, Ioannis Kassotakis, …
R5,050 Discovery Miles 50 500 Ships in 12 - 17 working days

Telecommunications has evolved and grown at an explosive rate in recent years and will undoubtedly continue to do so. As its functions, applications, and technology grow, it becomes increasingly complex and difficult, if not impossible, to meet the demands of a global network using conventional computing technologies. Computational intelligence (CI) is the technology of the future-and the future is now.

Computational Intelligence in Telecommunications Networks offers an in-depth look at the rapid progress of CI technology and shows its importance in solving the crucial problems of future telecommunications networks. It covers a broad range of topics, from Call Admission Control, congestion control, and QoS-routing for ATM networks, to network design and management, optical, mobile, and active networks, and Intelligent Mobile Agents.

Today's telecommunications professionals need a working knowledge of CI to exploit its potential to overcome emerging challenges. The CI community must become acquainted with those challenges to take advantage of the enormous opportunities the telecommunications field offers. This text meets both those needs, clearly, concisely, and with a depth certain to inspire further theoretical and practical advances.

Vehicular Networking for Road Safety (Paperback, 1st ed. 2020): Feng Lyu, Minglu Li, Xuemin Shen Vehicular Networking for Road Safety (Paperback, 1st ed. 2020)
Feng Lyu, Minglu Li, Xuemin Shen
R2,754 Discovery Miles 27 540 Ships in 10 - 15 working days

The topics addressed in this book are crucial for both the academic community and industry, since the vehicular network has become an essential building block for intelligent transportation systems. The systematic principle of this book provides valuable guidance on the deployment and implementation of V2X-enabled road-safety applications. In addition, this book carries out structured technologies from the MAC layer to the link and network layer, which can provide a general introduction for interested readers with a comprehensive understanding of applying vehicular networks in enhancing road safety, and offers a systematized view for researchers and practitioners in the field of vehicular networks to help them optimize and improve the desired vehicular communication systems. Road safety has always been the first priority for daily commuters on the road. Vehicular networks can be an effective solution to enhance road safety, via which vehicles can exchange cooperative awareness messages rapidly, contributing to better situation awareness and maneuvering cooperation. However, with the fast-changing network topology, intermittent wireless link, and dynamic traffic density, it is challenging to achieve satisfying network performance. This book introduces the background of vehicular networks, provides a comprehensive overview of networking techniques in supporting road-safety applications, states the technical motivations per the MAC, link, and network layer, and proposes/designs vehicular networking technologies at the corresponding layer respectively to guarantee low-latency and reliable V2X communications for road-safety applications. By extending the proposed networking technologies to support all types of vehicular services, this book also outlines open issues and research directions in future 5G and beyond vehicular networks.

Security and Privacy in Smart Grid (Paperback, 1st ed. 2018): Asmaa Abdallah, Xuemin Shen Security and Privacy in Smart Grid (Paperback, 1st ed. 2018)
Asmaa Abdallah, Xuemin Shen
R1,819 Discovery Miles 18 190 Ships in 10 - 15 working days

This SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of participated parties, and the false data injection attacks. Moreover, the authors demonstrate in detail the various proposed techniques to secure the smart grid's different communication networks and preserve the privacy of the involved. Over many years, power grid has generated electricity from central generators and distributed it in one direction from the generation stations to end-users; also, information is one directional so that the grid's control center doesn't get enough information about customers' requirements and consequently can't prevent electricity losses. So, the electricity grid is merged with information and communication technology to form smart grid. The main target of this incorporation is to connect different parties of power grid to exchange information about grid conditions and customers' requirements, and consequently, improve the reliability and efficiency of electricity generation and distribution. That upgrade of the power grid exposes it to the cyber security threats that the communication networks suffer from, such as malicious attacks to forge the electricity consumption readings or price, extract personal information for residential consumers, such as daily habits and life style, or attack some grid's resources and equipment availability using denial-of-service attacks. Also, novel threats are introduced in smart grid due to the power grid nature, such as false data injection attack, in which the adversary compromises several measurement units and injects false information about the grid conditions that mislead the grid's control center to make wrong decisions for the grid and consequently impact on its stability and efficiency.

Security and Privacy in Mobile Social Networks (Paperback, 2013 ed.): Xiaohui Liang, Rongxing Lu, Xiaodong Lin, Xuemin Shen Security and Privacy in Mobile Social Networks (Paperback, 2013 ed.)
Xiaohui Liang, Rongxing Lu, Xiaodong Lin, Xuemin Shen
R1,727 Discovery Miles 17 270 Ships in 10 - 15 working days

This book focuses on three emerging research topics in mobile social networks (MSNs): privacy-preserving profile matching (PPM) protocols, privacy-preserving cooperative data forwarding (PDF) protocols, and trustworthy service evaluation (TSE) systems. The PPM helps two users compare their personal profiles without disclosing the profiles. The PDF helps users forward data to their friends via multiple cooperative relay peers while preserving their identity and location privacy. The TSE enables users to locally share service reviews on the vendors such that users receive more valuable information about the services not only from vendors but also from their trusted social friends. The authors address both theoretic and practical aspects of these topics by introducing the system model, reviewing the related works, and presenting the solutions. Security and Privacy for Mobile Social Networks further provides the security analysis and the performance evaluation based on real-trace simulations. It also summarizes the future research directions for this rapidly growing area of research. The book will be valuable for researchers and practitioners who work with mobile social networks, communication platforms, wireless communication techniques, and internet applications. "Suitable for any type of reader as an introduction to the topic... The chapters are well motivated and presented... It is recommended for researchers." -ACM Computing Reviews, 21 July 2014

Parallel Algorithms for Optimal Control of Large Scale Linear Systems (Paperback, Softcover reprint of the original 1st ed.... Parallel Algorithms for Optimal Control of Large Scale Linear Systems (Paperback, Softcover reprint of the original 1st ed. 1993)
Zoran Gajic, Xuemin Shen
R1,521 Discovery Miles 15 210 Ships in 10 - 15 working days

Parallel Algorithms for Optimal Control of Large Scale Linear Systems is a comprehensive presentation for both linear and bilinear systems. The parallel algorithms presented in this book are applicable to a wider class of practical systems than those served by traditional methods for large scale singularly perturbed and weakly coupled systems based on the power-series expansion methods. It is intended for scientists and advance graduate students in electrical engineering and computer science who deal with parallel algorithms and control systems, especially large scale systems. The material presented is both comprehensive and unique.

Wireless Network Security (Paperback, Softcover reprint of hardcover 1st ed. 2007): Yang Xiao, Xuemin Shen, Dingzhu Du Wireless Network Security (Paperback, Softcover reprint of hardcover 1st ed. 2007)
Yang Xiao, Xuemin Shen, Dingzhu Du
R4,268 Discovery Miles 42 680 Ships in 10 - 15 working days

This book identifies vulnerabilities in the physical layer, the MAC layer, the IP layer, the transport layer, and the application layer, of wireless networks, and discusses ways to strengthen security mechanisms and services. Topics covered include intrusion detection, secure PHY/MAC/routing protocols, attacks and prevention, immunization, key management, secure group communications and multicast, secure location services, monitoring and surveillance, anonymity, privacy, trust establishment/management, redundancy and security, and dependable wireless networking.

Singularly Perturbed and Weakly Coupled Linear Control Systems - A Recursive Approach (Paperback): Zoran Gajic, Djordjija... Singularly Perturbed and Weakly Coupled Linear Control Systems - A Recursive Approach (Paperback)
Zoran Gajic, Djordjija Petkovski, Xuemin Shen
R1,464 Discovery Miles 14 640 Ships in 10 - 15 working days

This book provides a comprehensive view of current developments in the theory of recursive reduced-order methods for singularly perturbed and weakly coupled linear control systems. The recursive methods offer several advantages: high accuracy can easily be achieved at low cost, parallel processing can be used, results are obtained under mild assumptions, and software and hardware implementation of the control algorithms is highly simplified. The book emphasizes mathematical developments as well as their application to solving practical problems. A number of real world examples demonstrating the usefulness of the theory are included.

Millimeter-Wave Networks - Beamforming Design and Performance Analysis (Paperback, 1st ed. 2021): Peng Yang, Wen Wu, Ning... Millimeter-Wave Networks - Beamforming Design and Performance Analysis (Paperback, 1st ed. 2021)
Peng Yang, Wen Wu, Ning Zhang, Xuemin Shen
R4,192 Discovery Miles 41 920 Ships in 10 - 15 working days

This book provides a comprehensive review and in-depth study on efficient beamforming design and rigorous performance analysis in mmWave networks, covering beam alignment, beamforming training and beamforming-aided caching. Due to significant beam alignment latency between the transmitter and the receiver in existing mmWave systems, this book proposes a machine learning based beam alignment algorithm for mmWave networks to determine the optimal beam pair with a low latency. Then, to analyze and enhance the performance of beamforming training (BFT) protocol in 802.11ad mmWave networks, an analytical model is presented to evaluate the performance of BFT protocol and an enhancement scheme is proposed to improve its performance in high user density scenarios. Furthermore, it investigates the beamforming-aided caching problem in mmWave networks, and proposes a device-to-device assisted cooperative edge caching to alleviate backhaul congestion and reduce content retrieval delay. This book concludes with future research directions in the related fields of study. The presented beamforming designs and the corresponding research results covered in this book, provides valuable insights for practical mmWave network deployment and motivate new ideas for future mmWave networking. This book targets researchers working in the fields of mmWave networks, beamforming design, and resource management as well as graduate students studying the areas of electrical engineering, computing engineering and computer science. Professionals in industry who work in this field will find this book useful as a reference.

Sustainable Wireless Networks (Paperback, 2013 ed.): Zhongming Zheng, Lin X. Cai, Xuemin Shen Sustainable Wireless Networks (Paperback, 2013 ed.)
Zhongming Zheng, Lin X. Cai, Xuemin Shen
R1,624 Discovery Miles 16 240 Ships in 10 - 15 working days

This brief focuses on network planning and resource allocation by jointly considering cost and energy sustainability in wireless networks with sustainable energy. The characteristics of green energy and investigating existing energy-efficient green approaches for wireless networks with sustainable energy is covered in the first part of this brief. The book then addresses the random availability and capacity of the energy supply. The authors explore how to maximize the energy sustainability of the network and minimize the failure probability that the mesh access points (APs) could deplete their energy and put the network out of service due to the unreliable energy supply. This brief also studies network resource management issues in green wireless networks to minimize cost. It jointly considers the relay node (RN) placement and sub-carrier allocation (RNP-SA) issues in wireless networks with sustainable energy, and then formulates the problem into a mixed integer non-linear programming problem. Concise and informative, this brief is a useful resource for professionals or researchers studying wireless networks, communication networks, and energy efficiency. Advanced-level students interested in energy technology or communications engineering will also find the material valuable.

Realizing the Metaverse - A Communications and Networking Perspective: Wei Yang Bryan Lim, Dusit Niyato, Jun-Shan Zhang, Zehui... Realizing the Metaverse - A Communications and Networking Perspective
Wei Yang Bryan Lim, Dusit Niyato, Jun-Shan Zhang, Zehui Xiong, Xuemin Shen
R3,165 Discovery Miles 31 650 Ships in 10 - 15 working days
Secure IP Mobility Management for VANET (Paperback, 2013 ed.): Sanaa Taha, Xuemin Shen Secure IP Mobility Management for VANET (Paperback, 2013 ed.)
Sanaa Taha, Xuemin Shen
R1,259 Discovery Miles 12 590 Out of stock

This brief presents the challenges and solutions for VANETs' security and privacy problems occurring in mobility management protocols including Mobile IPv6 (MIPv6), Proxy MIPv6 (PMIPv6), and Network Mobility (NEMO). The authors give an overview of the concept of the vehicular IP-address configurations as the prerequisite step to achieve mobility management for VANETs, and review the current security and privacy schemes applied in the three mobility management protocols. Throughout the brief, the authors propose new schemes and protocols to increase the security of IP addresses within VANETs including an anonymous and location privacy-preserving scheme for the MIPv6 protocol, a mutual authentication scheme that thwarts authentication attacks, and a fake point-cluster based scheme to prevent attackers from localizing users inside NEMO-based VANET hotspots. The brief concludes with future research directions. Professionals and researchers will find the analysis and new privacy schemes outlined in this brief a valuable addition to the literature on VANET management.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Penguin Multi Purpose Wood Glue (125ml)
R29 R23 Discovery Miles 230
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Loot
Nadine Gordimer Paperback  (2)
R383 R310 Discovery Miles 3 100
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Elvis
Austin Butler, Tom Hanks, … DVD R133 Discovery Miles 1 330
Bostik Crystal Clear Tape
R43 Discovery Miles 430
Gym Towel & Bag
R78 Discovery Miles 780
Nasal Cannula - Adult
R12 Discovery Miles 120
Minions 2 - The Rise Of Gru
DVD R133 Discovery Miles 1 330
And So I Roar
Abi Dare Paperback R415 R289 Discovery Miles 2 890

 

Partners