Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 10 of 10 matches in All Departments
With the growing popularity of "big data", the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue. In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium. The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems. The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collector's strategies, the authors propose a contract model and a multi-armed bandit model respectively. The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study users' strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria.
This book targets major issues in terrestrial-satellite communication networks and presents the solutions. While the terrestrial networks can achieve high-speed data service at low cost, satellite based access is one way to complement terrestrial based networks to ensure ubiquitous, 100% geographic coverage. The coexistence and cooperation between terrestrial and satellite networks are of great potential in future communication networks, and satellite radio access networks has already been considered in the fifth-generation (5G) networks to be supported for phase 2. Therefore, it is important to study the architectures of terrestrial-satellite networks, as well as the possible techniques and challenges. The authors introduce the technique of beamforming in satellite communication systems, which is an efficient transmitting method for multiple access, and they discuss the main challenges as well as prospective applications. The authors introduce possible methods for interference cancelation reception in terrestrial-satellite communication networks when reusing the frequency band between the two networks. Due to the limitation of spectrum resources, spectrum sharing will become one of the important issues in terrestrial-satellite communication networks. The problems of spectrum coexistence between GEO and Terrestrial Systems and between GEO and NEGO systems are also discussed. Finally, taking both the two system into consideration, the resource allocation problem will be more complex due to the coupling between resources and the interference. Based on this, the authors propose several resource allocation schemes in different scenarios of terrestrial-satellite communication networks, which can optimize the capacity performance of the system. The expected audience for this book includes (but not limited to) graduate students, professors, researchers, scientists, practitioners, engineers, industry managers, and government researchers working in the field of satellite communications and networks. The expected audience for this book includes (but not limited to) graduate students, professors, researchers, scientists, practitioners, engineers, industry managers, and government researchers working in the field of satellite communications and networks.
This book mainly discusses the most important issues in artificial intelligence-aided future networks, such as applying different ML approaches to investigate solutions to intelligently monitor, control and optimize networking. The authors focus on four scenarios of successfully applying machine learning in network space. It also discusses the main challenge of network traffic intelligent awareness and introduces several machine learning-based traffic awareness algorithms, such as traffic classification, anomaly traffic identification and traffic prediction. The authors introduce some ML approaches like reinforcement learning to deal with network control problem in this book. Traditional works on the control plane largely rely on a manual process in configuring forwarding, which cannot be employed for today's network conditions. To address this issue, several artificial intelligence approaches for self-learning control strategies are introduced. In addition, resource management problems are ubiquitous in the networking field, such as job scheduling, bitrate adaptation in video streaming and virtual machine placement in cloud computing. Compared with the traditional with-box approach, the authors present some ML methods to solve the complexity network resource allocation problems. Finally, semantic comprehension function is introduced to the network to understand the high-level business intent in this book. With Software-Defined Networking (SDN), Network Function Virtualization (NFV), 5th Generation Wireless Systems (5G) development, the global network is undergoing profound restructuring and transformation. However, with the improvement of the flexibility and scalability of the networks, as well as the ever-increasing complexity of networks, makes effective monitoring, overall control, and optimization of the network extremely difficult. Recently, adding intelligence to the control plane through AI&ML become a trend and a direction of network development This book's expected audience includes professors, researchers, scientists, practitioners, engineers, industry managers, and government research workers, who work in the fields of intelligent network. Advanced-level students studying computer science and electrical engineering will also find this book useful as a secondary textbook.
An expert presentation of 5G security, privacy, and network performance In 5G Wireless Network Security and Privacy, a team of veteran engineers delivers a robust and accessible discussion of 5G security solutions, including physical layer security, authentication, and mobility management. In the book, the distinguished authors expertly cover the requirements of 5G wireless network security and privacy, with explorations of existing solutions and vulnerabilities from security architecture and mechanism perspectives. Readers will learn to enhance the security and network performance of 5G wireless networks in contexts like vehicle-to-vehicle and vehicle-to-infrastructure communications, industrial automation, health services, smart cities, and smart homes. They will develop a comprehensive understanding of 5G wireless network security as they move through the book’s 11 insightful chapters, developing in-depth knowledge on the current state of 5G security and coming developments in the field. Readers will also find: A thorough introduction to legacy cellular network security, including network performance development from 1G to 4G In-depth treatments of 5G network security, including the motivation and objectives of 5G wireless network security Comprehensive explorations of wireless security solutions, including cryptographic approaches and physical layer security Fulsome discussions of the security architecture of cellular networks, including 3G and 4G security Perfect for researchers and professionals working in the field of cybersecurity and 5G wireless networks, 5G Wireless Network Security and Privacy will also earn a place in the libraries of engineers, computer scientists, and graduate students studying 5G network security and privacy.
A comprehensive and up-to-date survey of 5G technologies and applications In 5G Wireless Communication Networks, a team of distinguished researchers delivers an expert treatment of the technical details of modern 5G wireless networks and the performance gains they make possible. The book examines the recent progress in research and development in the area, covering related topics on fundamental 5G requirements and its enabling technologies. The authors survey 5G service architecture and summarize enabling technologies, including highly dense small cell and heterogeneous networks, device-to-device communications underlaying cellular networks, fundamentals of non-orthogonal multiple access in 5G new radio and its applications. Readers will also find: A thorough introduction to 5G wireless networks, including discussions of anticipated growth in mobile data traffic Comprehensive explorations of dense small cell and heterogeneous networks Practical discussions of the most recent developments in 5G research and enabling technologies Recent advancement of non-orthogonal multiple access and its role in current and future wireless systems. Perfect for graduate students, professors, industry professionals, and engineers with an interest in wireless communication, 5G Wireless Communication Networks will also benefit undergraduate and graduate students and researchers seeking an up-to-date and accessible new resource about 5G networks.
This is a full-text English translation of the TCM classic on pediatrics written by QIAN Yi (1032-1113 CE). It covers syndrome identification and treatment of diseases in infants and young children. The book consists of three parts: Part I is about diagnosis of children's diseases and their recommended treatments. There are 81 articles covering a wide range of clinical patterns. Part II reports 23 case studies and provides an invaluable record of the clinical practices at that time. Part III contains over one hundred medicinal formulas for use in various treatment plans.
This book targets major issues in terrestrial-satellite communication networks and presents the solutions. While the terrestrial networks can achieve high-speed data service at low cost, satellite based access is one way to complement terrestrial based networks to ensure ubiquitous, 100% geographic coverage. The coexistence and cooperation between terrestrial and satellite networks are of great potential in future communication networks, and satellite radio access networks has already been considered in the fifth-generation (5G) networks to be supported for phase 2. Therefore, it is important to study the architectures of terrestrial-satellite networks, as well as the possible techniques and challenges. The authors introduce the technique of beamforming in satellite communication systems, which is an efficient transmitting method for multiple access, and they discuss the main challenges as well as prospective applications. The authors introduce possible methods for interference cancelation reception in terrestrial-satellite communication networks when reusing the frequency band between the two networks. Due to the limitation of spectrum resources, spectrum sharing will become one of the important issues in terrestrial-satellite communication networks. The problems of spectrum coexistence between GEO and Terrestrial Systems and between GEO and NEGO systems are also discussed. Finally, taking both the two system into consideration, the resource allocation problem will be more complex due to the coupling between resources and the interference. Based on this, the authors propose several resource allocation schemes in different scenarios of terrestrial-satellite communication networks, which can optimize the capacity performance of the system. The expected audience for this book includes (but not limited to) graduate students, professors, researchers, scientists, practitioners, engineers, industry managers, and government researchers working in the field of satellite communications and networks. The expected audience for this book includes (but not limited to) graduate students, professors, researchers, scientists, practitioners, engineers, industry managers, and government researchers working in the field of satellite communications and networks.
This SpringerBrief provides an in-depth look at the key issues that affect the performance of heterogeneous networks and presents schemes that can effectively tackle these issues. In particular, this book discusses unbalanced traffic load among the macro and micro Base Stations (BSs) caused by the transmit power disparity, and a load-balancing based mobile association scheme to balance the traffic load among the macro and micro BSs. This book also introduces a fractional frequency reuse (FFR) scheme with proper power control to help reduce interference at the UEs which are most vulnerable to such intra-cell interference. The last section investigates radio resource allocation issues for heterogeneous networks with cooperative relays, and proposes a resource allocation framework that could achieve proportional fairness among the UEs. Numerical results are provided to demonstrate the effectiveness of the proposed solutions in tackling the problem and improving network performance. Resource Management for Heterogeneous Networks in LTE-A Systems is designed for researchers and professionals working in networking and resource management. The content is also valuable for advanced-level students in computer science and electrical engineering.
In today's fast paced, infocentric environment, professionals
increasingly rely on networked information technology to do
business. Unfortunately, with the advent of such technology came
new and complex problems that continue to threaten the
availability, integrity, and confidentiality of our electronic
information. It is therefore absolutely imperative to take measures
to protect and defend information systems by ensuring their
security and non-repudiation. Information Assurance skillfully
addresses this issue by detailing the sufficient capacity networked
systems need to operate while under attack, and itemizing failsafe
design features such as alarms, restoration protocols, and
management configurations to detect problems and automatically
diagnose and respond. Moreover, this volume is unique in providing
comprehensive coverage of both state-of-the-art survivability and
security techniques, and the manner in which these two components
interact to build robust Information Assurance (IA).
|
You may like...
Mission Impossible 6: Fallout
Tom Cruise, Henry Cavill, …
Blu-ray disc
(1)
|