|
Showing 1 - 16 of
16 matches in All Departments
Blockchain technology is a powerful, cost-effective method for
network security. Essentially, it is a decentralized ledger for
storing all committed transactions in trustless environments by
integrating several core technologies such as cryptographic hash,
digital signature and distributed consensus mechanisms. Over the
past few years, blockchain technology has been used in a variety of
network interaction systems such as smart contracts, public
services, Internet of Things (IoT), social networks, reputation
systems and security and financial services. With its widespread
adoption, there has been increased focus on utilizing blockchain
technologies to address network security concerns and
vulnerabilities as well as understanding real-world security
implications. The book begins with an introduction to blockchains,
covering key principles and applications. Further chapters cover
blockchain system architecture, applications and research issues;
blockchain consensuses and incentives; blockchain applications,
projects and implementations; blockchain for internet of things;
blockchain in 5G and 6G networks; edgechain to provide security in
organization based multi agent systems; blockchain driven
privacy-preserving machine learning; performance evaluation of
differential privacy mechanisms in blockchain based smart metering;
scaling-out blockchains with sharding; blockchain for GIS; and
finally blockchain applications in remote sensing big data
management and production.
This book is the world's first book on 6G Mobile Wireless Networks
that aims to provide a comprehensive understanding of key drivers,
use cases, research requirements, challenges and open issues that
are expected to drive 6G research. In this book, we have invited
world-renowned experts from industry and academia to share their
thoughts on different aspects of 6G research. Specifically, this
book covers the following topics: 6G Use Cases, Requirements,
Metrics and Enabling Technologies, PHY Technologies for 6G
Wireless, Reconfigurable Intelligent Surface for 6G Wireless
Networks, Millimeter-wave and Terahertz Spectrum for 6G Wireless,
Challenges in Transport Layer for Tbit/s Communications,
High-capacity Backhaul Connectivity for 6G Wireless, Cloud Native
Approach for 6G Wireless Networks, Machine Type Communications in
6G, Edge Intelligence and Pervasive AI in 6G, Blockchain:
Foundations and Role in 6G, Role of Open-source Platforms in 6G,
and Quantum Computing and 6G Wireless. The overarching aim of this
book is to explore the evolution from current 5G networks towards
the future 6G networks from a service, air interface and network
perspective, thereby laying out a vision for 6G networks. This book
not only discusses the potential 6G use cases, requirements,
metrics and enabling technologies, but also discusses the emerging
technologies and topics such as 6G PHY technologies, reconfigurable
intelligent surface, millimeter-wave and THz communications,
visible light communications, transport layer for Tbit/s
communications, high-capacity backhaul connectivity, cloud native
approach, machine-type communications, edge intelligence and
pervasive AI, network security and blockchain, and the role of
open-source platform in 6G. This book provides a systematic
treatment of the state-of-the-art in these emerging topics and
their role in supporting a wide variety of verticals in the future.
As such, it provides a comprehensive overview of the expected
applications of 6G with a detailed discussion of their requirements
and possible enabling technologies. This book also outlines the
possible challenges and research directions to facilitate the
future research and development of 6G mobile wireless networks.
This book introduces readers to the shell structure, operating
principle, manufacturing process, and control theory for
cylindrical vibratory gyroscopes. The cylindrical vibratory
gyroscope is an important type of Coriolis vibratory gyroscope that
holds considerable potential for development and application. The
main aspects addressed include: operating principle and structure,
theoretical analysis and modeling, dynamic analysis and modeling,
manufacturing process, parameter testing methods, closed-loop
control, and the error compensation mechanism in cylindrical
vibratory gyroscopes.
The book provides an examination of how fog security is changing
the information technology industry and will continue to in the
next decade. The authors first discuss how fog enables key
applications in wireless 5G, the Internet of Things, and big data.
The book then presents an overview of fog/edge computing, focusing
on its relationship with cloud technology, Internet of Things and
the future with the use of secure 5G/6G communication. The book
also presents a comprehensive overview of liabilities in fog/edge
computing within multi-level architectures and the intelligent
management. The last part of the book reviews applications of
fog/edge computing in smart cities, including in Industrial IoT,
edge-based augmented reality, data streaming, and blockchain-based.
Unleashing the Potentials of Blockchain Technology for Healthcare
Industries discusses blockchain and its adaptation in healthcare
industries to provide a secured framework to safeguard healthcare
data, both patient and hospital data. The book integrates key
pillars of blockchain such as foundations, architecture, smart
contracts, adoption, standards, service (BaaS), security, consensus
algorithms, drug discovery process, among others, for fortifying
the current practices in the healthcare industries. In addition, it
offers solutions to the pressing issues currently being faced by
the healthcare processes due to the COVD-19 pandemic. This will be
a valuable resource for medical informaticians, researchers,
healthcare professionals and members of the biomedical field who
are interested in learning more about the potentials of blockchain
in healthcare.
How the enabling technologies in 5G as an integral or as a part can
seamlessly fuel the IoT revolution is still very challenging. This
book presents the state-of-the-art solutions to the theoretical and
practical challenges stemming from the integration of 5G enabling
technologies into IoTs in support of a smart 5G-enabled IoT
paradigm, in terms of network design, operation, management,
optimization, privacy and security, and applications. In
particular, the technical focus covers a comprehensive
understanding of 5G-enabled IoT architectures, converged access
networks, privacy and security, and emerging applications of
5G-eabled IoT.
Unleashing the Art of Digital Forensics is intended to describe and
explain the steps taken during a forensic examination, with the
intent of making the reader aware of the constraints and
considerations that apply during a forensic examination in law
enforcement and in the private sector. Key Features: * Discusses
the recent advancements in Digital Forensics and Cybersecurity *
Reviews detailed applications of Digital Forensics for real-life
problems * Addresses the challenges related to implementation of
Digital Forensics and Anti-Forensic approaches * Includes case
studies that will be helpful for researchers * Offers both
quantitative and qualitative research articles, conceptual papers,
review papers, etc. * Identifies the future scope of research in
the field of Digital Forensics and Cybersecurity. This book is
aimed primarily at and will be beneficial to graduates,
postgraduates, and researchers in Digital Forensics and
Cybersecurity.
This book introduces readers to the shell structure, operating
principle, manufacturing process, and control theory for
cylindrical vibratory gyroscopes. The cylindrical vibratory
gyroscope is an important type of Coriolis vibratory gyroscope that
holds considerable potential for development and application. The
main aspects addressed include: operating principle and structure,
theoretical analysis and modeling, dynamic analysis and modeling,
manufacturing process, parameter testing methods, closed-loop
control, and the error compensation mechanism in cylindrical
vibratory gyroscopes.
This book is the world's first book on 6G Mobile Wireless Networks
that aims to provide a comprehensive understanding of key drivers,
use cases, research requirements, challenges and open issues that
are expected to drive 6G research. In this book, we have invited
world-renowned experts from industry and academia to share their
thoughts on different aspects of 6G research. Specifically, this
book covers the following topics: 6G Use Cases, Requirements,
Metrics and Enabling Technologies, PHY Technologies for 6G
Wireless, Reconfigurable Intelligent Surface for 6G Wireless
Networks, Millimeter-wave and Terahertz Spectrum for 6G Wireless,
Challenges in Transport Layer for Tbit/s Communications,
High-capacity Backhaul Connectivity for 6G Wireless, Cloud Native
Approach for 6G Wireless Networks, Machine Type Communications in
6G, Edge Intelligence and Pervasive AI in 6G, Blockchain:
Foundations and Role in 6G, Role of Open-source Platforms in 6G,
and Quantum Computing and 6G Wireless. The overarching aim of this
book is to explore the evolution from current 5G networks towards
the future 6G networks from a service, air interface and network
perspective, thereby laying out a vision for 6G networks. This book
not only discusses the potential 6G use cases, requirements,
metrics and enabling technologies, but also discusses the emerging
technologies and topics such as 6G PHY technologies, reconfigurable
intelligent surface, millimeter-wave and THz communications,
visible light communications, transport layer for Tbit/s
communications, high-capacity backhaul connectivity, cloud native
approach, machine-type communications, edge intelligence and
pervasive AI, network security and blockchain, and the role of
open-source platform in 6G. This book provides a systematic
treatment of the state-of-the-art in these emerging topics and
their role in supporting a wide variety of verticals in the future.
As such, it provides a comprehensive overview of the expected
applications of 6G with a detailed discussion of their requirements
and possible enabling technologies. This book also outlines the
possible challenges and research directions to facilitate the
future research and development of 6G mobile wireless networks.
This book presents state-of-the-art solutions to the theoretical
and practical challenges stemming from the leverage of big data and
its computational intelligence in supporting smart network
operation, management, and optimization. In particular, the
technical focus covers the comprehensive understanding of network
big data, efficient collection and management of network big data,
distributed and scalable online analytics for network big data, and
emerging applications of network big data for computational
intelligence.
The book focuses on both theory and applications in the broad areas
of communication technology, computer science and information
security. This two volume book contains the Proceedings of 4th
International Conference on Advanced Computing, Networking and
Informatics. This book brings together academic scientists,
professors, research scholars and students to share and disseminate
information on knowledge and scientific research works related to
computing, networking, and informatics to discuss the practical
challenges encountered and the solutions adopted. The book also
promotes translation of basic research into applied investigation
and convert applied investigation into practice.
|
Algorithms and Architectures for Parallel Processing - 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part II (Paperback, 2014 ed.)
Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, …
|
R1,645
Discovery Miles 16 450
|
Ships in 10 - 15 working days
|
This two volume set LNCS 8630 and 8631 constitutes the proceedings
of the 14th International Conference on Algorithms and
Architectures for Parallel Processing, ICA3PP 2014, held in Dalian,
China, in August 2014. The 70 revised papers presented in the two
volumes were selected from 285 submissions. The first volume
comprises selected papers of the main conference and papers of the
1st International Workshop on Emerging Topics in Wireless and
Mobile Computing, ETWMC 2014, the 5th International Workshop on
Intelligent Communication Networks, IntelNet 2014, and the 5th
International Workshop on Wireless Networks and Multimedia, WNM
2014. The second volume comprises selected papers of the main
conference and papers of the Workshop on Computing, Communication
and Control Technologies in Intelligent Transportation System, 3C
in ITS 2014, and the Workshop on Security and Privacy in Computer
and Network Systems, SPCNS 2014.
|
Algorithms and Architectures for Parallel Processing - 14th International Conference, ICA3PP 2014, Dalian, China, August 24-27, 2014. Proceedings, Part I (Paperback, 2014 ed.)
Xiang-he Sun, Wenyu Qu, Ivan Stojmenovic, Wanlei Zhou, Zhiyang Li, …
|
R1,692
Discovery Miles 16 920
|
Ships in 10 - 15 working days
|
This two volume set LNCS 8630 and 8631 constitutes the proceedings
of the 14th International Conference on Algorithms and
Architectures for Parallel Processing, ICA3PP 2014, held in Dalian,
China, in August 2014. The 70 revised papers presented in the two
volumes were selected from 285 submissions. The first volume
comprises selected papers of the main conference and papers of the
1st International Workshop on Emerging Topics in Wireless and
Mobile Computing, ETWMC 2014, the 5th International Workshop on
Intelligent Communication Networks, IntelNet 2014, and the 5th
International Workshop on Wireless Networks and Multimedia, WNM
2014. The second volume comprises selected papers of the main
conference and papers of the Workshop on Computing, Communication
and Control Technologies in Intelligent Transportation System, 3C
in ITS 2014, and the Workshop on Security and Privacy in Computer
and Network Systems, SPCNS 2014.
How the enabling technologies in 5G as an integral or as a part can
seamlessly fuel the IoT revolution is still very challenging. This
book presents the state-of-the-art solutions to the theoretical and
practical challenges stemming from the integration of 5G enabling
technologies into IoTs in support of a smart 5G-enabled IoT
paradigm, in terms of network design, operation, management,
optimization, privacy and security, and applications. In
particular, the technical focus covers a comprehensive
understanding of 5G-enabled IoT architectures, converged access
networks, privacy and security, and emerging applications of
5G-eabled IoT.
This book presents state-of-the-art solutions to the theoretical
and practical challenges stemming from the leverage of big data and
its computational intelligence in supporting smart network
operation, management, and optimization. In particular, the
technical focus covers the comprehensive understanding of network
big data, efficient collection and management of network big data,
distributed and scalable online analytics for network big data, and
emerging applications of network big data for computational
intelligence.
This book discusses accountability and privacy in network security
from a technical perspective, providing a comprehensive overview of
the latest research, as well as the current challenges and open
issues. Further, it proposes a set of new and innovative solutions
to balance privacy and accountability in networks in terms of their
content, flow and service, using practical deep learning techniques
for encrypted traffic analysis and focusing on the application of
new technologies and concepts. These solutions take into account
various key components (e.g. the in-network cache) in network
architectures and adopt the emerging blockchain technique to ensure
the security and scalability of the proposed architectures. In
addition, the book examines in detail related studies on
accountability and privacy, and validates the architectures using
real-world datasets. Presenting secure and scalable solutions that
can detect malicious behaviors in the network in a timely manner
without compromising user privacy, the book offers a valuable
resource for undergraduate and graduate students, researchers, and
engineers working in the fields of network architecture and
cybersecurity.
|
You may like...
Perfectly Poppy
Tricia Stone-Shumaker
Hardcover
R517
R482
Discovery Miles 4 820
|