Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 25 of 31 matches in All Departments
This book presents novel RIS-Based Smart Radio techniques, targeting at achieving high-quality channel links in cellular communications via design and optimization of the RIS construction. Unlike traditional antenna arrays, three unique characteristics of the RIS will be revealed in this book. First, the built-in programmable configuration of the RIS enables analog beamforming inherently without extra hardware or signal processing. Second, the incident signals can be controlled to partly reflect and partly transmit through the RIS simultaneously, adding more flexibility to signal transmission. Third, the RIS has no digital processing capability to actively send signals nor any radio frequency (RF) components. As such, it is necessary to develop novel channel estimation and communication protocols, design joint digital and RIS-based analog beamforming schemes and perform interference control via mixed reflection and transmission. This book also investigates how to integrate the RIS to legacy communication systems. RIS techniques are further investigated in this book (benefited from its ability to actively shape the propagation environment) to achieve two types of wireless applications, i.e., RF sensing and localization. The influence of the sensing objectives on the wireless signal propagation can be potentially recognized by the receivers, which are then utilized to identify the objectives in RF sensing. Unlike traditional sensing techniques, RIS-aided sensing can actively customize the wireless channels and generate a favorable massive number of independent paths interacting with the sensing objectives. It is desirable to design RIS-based sensing algorithms, and optimize RIS configurations. For the second application, i.e., RIS aided localization, an RIS is deployed between the access point (AP) and users. The AP can then analyze reflected signals from users via different RIS configurations to obtain accurate locations of users. However, this is a challenging task due to the dynamic user topology, as well as the mutual influence between multiple users and the RIS. Therefore, the operations of the RIS, the AP, and multiple users need to be carefully coordinated. A new RIS-based localization protocol for device cooperation and an RIS configuration optimization algorithm are also required. This book targets researchers and graduate-level students focusing on communications and networks. Signal processing engineers, computer and information scientists, applied mathematicians and statisticians, who work in RIS research and development will also find this book useful.
Recently machine learning schemes have attained significant attention as key enablers for next-generation wireless systems. Currently, wireless systems are mostly using machine learning schemes that are based on centralizing the training and inference processes by migrating the end-devices data to a third party centralized location. However, these schemes lead to end-devices privacy leakage. To address these issues, one can use a distributed machine learning at network edge. In this context, federated learning (FL) is one of most important distributed learning algorithm, allowing devices to train a shared machine learning model while keeping data locally. However, applying FL in wireless networks and optimizing the performance involves a range of research topics. For example, in FL, training machine learning models require communication between wireless devices and edge servers via wireless links. Therefore, wireless impairments such as uncertainties among wireless channel states, interference, and noise significantly affect the performance of FL. On the other hand, federated-reinforcement learning leverages distributed computation power and data to solve complex optimization problems that arise in various use cases, such as interference alignment, resource management, clustering, and network control. Traditionally, FL makes the assumption that edge devices will unconditionally participate in the tasks when invited, which is not practical in reality due to the cost of model training. As such, building incentive mechanisms is indispensable for FL networks. This book provides a comprehensive overview of FL for wireless networks. It is divided into three main parts: The first part briefly discusses the fundamentals of FL for wireless networks, while the second part comprehensively examines the design and analysis of wireless FL, covering resource optimization, incentive mechanism, security and privacy. It also presents several solutions based on optimization theory, graph theory, and game theory to optimize the performance of federated learning in wireless networks. Lastly, the third part describes several applications of FL in wireless networks.
This book provides the fundamental knowledge of the classical matching theory problems. It builds up the bridge between the matching theory and the 5G wireless communication resource allocation problems. The potentials and challenges of implementing the semi-distributive matching theory framework into the wireless resource allocations are analyzed both theoretically and through implementation examples. Academics, researchers, engineers, and so on, who are interested in efficient distributive wireless resource allocation solutions, will find this book to be an exceptional resource.
This book covers the basic theory of mean field game (MFG) and its applications in wireless networks. It starts with an overview of the current and future state-of-the-art in 5G and 6G wireless networks. Then, a tutorial is presented for MFG, mean-field-type game (MFTG), and prerequisite fields of study such as optimal control theory and differential games. This book also includes a literature survey of MFG-based research in wireless network technologies such as ultra-dense networks (UDNs), device-to-device (D2D) communications, internet-of-things (IoT), unmanned aerial vehicles (UAVs), and mobile edge networks (MENs). Several applications of MFG and MFTG in UDNs, social networks, and multi-access edge computing networks (MECNs) are introduced as well. Applications of MFG covered in this book are divided in three parts. The first part covers three single-population MFG research works or case studies in UDNs including ultra-dense D2D networks, ultra-dense UAV networks, and dense-user MECNs. The second part centers on a multiple-population MFG (MPMFG) modeling of belief and opinion evolution in social networks. It focuses on a recently developed MPMFG framework and its application in analyzing the behavior of users in a multiple-population social network. Finally, the last part concentrates on an MFTG approach to computation offloading in MECN. The computation offloading algorithms are designed for energy- and time-efficient offloading of computation-intensive tasks in an MECN. This book targets advanced-level students, professors, researchers, scientists, and engineers in the fields of communications and networks. Industry managers and government employees working in these same fields will also find this book useful.
The Chinese artist Liu Ye's meticulous, colorful canvases convey his love of literature in the first publication dedicated to his paintings of books. The Beijing-based artist Liu Ye is known for his precise, deftly rendered representational paintings. Drawn equally from contemporary culture and old master painting, Liu's wide-ranging visual touchstones include Piet Mondrian, Miffy the Bunny, and Prada advertisements. In this new publication devoted to his book paintings, the artist examines the book as both a physical object and cultural totem. Playing with geometry and perspective, Liu creates extraordinary and disorienting portraits of this most familiar subject. Liu's Book Painting series, begun in 2013, depicts close-up views of books that are turned open to reveal empty pages, an approach that emphasizes the object's form over its content. Rendering books' material structure-endpapers, binding, spine-in sensual detail, these paintings indicate an obsession with the book as an object and a lifelong love of literature. Liu's father was a children's book author who introduced him to Western writers at a young age, fueling his curiosity and imagination. Many of the books in Liu's father's collection were banned in Cultural Revolution-era China and the artist read them secretly throughout his childhood. This formative experience figures in his popular Banned Books series and in his book paintings in general. Published on the occasion of a solo exhibition presented at David Zwirner, New York, in 2020, this catalogue includes new writing by the acclaimed poet Zhu Zhu, who traces the evolution of the book form in Liu's work, as well as an interview with the artist by Hans Ulrich Obrist.
The book offers a succinct overview of the technical components of blockchain networks, also known as distributed digital ledger networks. Written from an academic perspective, it surveys ongoing research challenges as well as existing literature. Several chapters illustrate how the mathematical tools of game theory and algorithmic mechanism design can be applied to the analysis, design, and improvement of blockchain network protocols. Using an engineering perspective, insights are provided into how the economic interests of different types of participants shape the behaviors of blockchain systems. Readers are thus provided with a paradigm for developing blockchain consensus protocols and distributed economic mechanisms that regulate the interactions of system participants, thus leading to desired cooperative behaviors in the form of system equilibria. This book will be a vital resource for students and scholars of this budding field.
This book provides the state-of-the-art research on aerial communications coexisting with terrestrial networks from physical, MAC, network, and application layer perspectives. It includes thorough discussion of control issues, access techniques and resource sharing between cellular communication and aerial communications to accommodate larger volumes of traffic and to provide better service to users. Other challenges are explored in this text are: identification of services, radio resource allocation and resource management for aerial links, self-organizing aerial networks, aerial offloading, and performance evaluation of aerial communications. This volume will be a highly useful resource for students, researchers and engineers interested in obtaining comprehensive information on the design, evaluation, and applications of aerial access networks and communications.
This book presents novel RIS-Based Smart Radio techniques, targeting at achieving high-quality channel links in cellular communications via design and optimization of the RIS construction. Unlike traditional antenna arrays, three unique characteristics of the RIS will be revealed in this book. First, the built-in programmable configuration of the RIS enables analog beamforming inherently without extra hardware or signal processing. Second, the incident signals can be controlled to partly reflect and partly transmit through the RIS simultaneously, adding more flexibility to signal transmission. Third, the RIS has no digital processing capability to actively send signals nor any radio frequency (RF) components. As such, it is necessary to develop novel channel estimation and communication protocols, design joint digital and RIS-based analog beamforming schemes and perform interference control via mixed reflection and transmission. This book also investigates how to integrate the RIS to legacy communication systems. RIS techniques are further investigated in this book (benefited from its ability to actively shape the propagation environment) to achieve two types of wireless applications, i.e., RF sensing and localization. The influence of the sensing objectives on the wireless signal propagation can be potentially recognized by the receivers, which are then utilized to identify the objectives in RF sensing. Unlike traditional sensing techniques, RIS-aided sensing can actively customize the wireless channels and generate a favorable massive number of independent paths interacting with the sensing objectives. It is desirable to design RIS-based sensing algorithms, and optimize RIS configurations. For the second application, i.e., RIS aided localization, an RIS is deployed between the access point (AP) and users. The AP can then analyze reflected signals from users via different RIS configurations to obtain accurate locations of users. However, this is a challenging task due to the dynamic user topology, as well as the mutual influence between multiple users and the RIS. Therefore, the operations of the RIS, the AP, and multiple users need to be carefully coordinated. A new RIS-based localization protocol for device cooperation and an RIS configuration optimization algorithm are also required. This book targets researchers and graduate-level students focusing on communications and networks. Signal processing engineers, computer and information scientists, applied mathematicians and statisticians, who work in RIS research and development will also find this book useful.
This book discusses how to plan the time-variant placements of the UAVs served as base station (BS)/relay, which is very challenging due to the complicated 3D propagation environments, as well as many other practical constraints such as power and flying speed. Spectrum sharing with existing cellular networks is also investigated in this book. The emerging unmanned aerial vehicles (UAVs) have been playing an increasing role in the military, public, and civil applications. To seamlessly integrate UAVs into future cellular networks, this book will cover two main scenarios of UAV applications as follows. The first type of applications can be referred to as UAV Assisted Cellular Communications. Second type of application is to exploit UAVs for sensing purposes, such as smart agriculture, security monitoring, and traffic surveillance. Due to the limited computation capability of UAVs, the real-time sensory data needs to be transmitted to the BS for real-time data processing. The cellular networks are necessarily committed to support the data transmission for UAVs, which the authors refer to as Cellular assisted UAV Sensing. To support real-time sensing streaming, the authors design joint sensing and communication protocols, develop novel beamforming and estimation algorithms, and study efficient distributed resource optimization methods. This book targets signal processing engineers, computer and information scientists, applied mathematicians and statisticians, as well as systems engineers to carve out the role that analytical and experimental engineering has to play in UAV research and development. Undergraduate students, industry managers, government research agency workers and general readers interested in the fields of communications and networks will also want to read this book.
This SpringerBrief investigates cross layer resource allocation in unlicensed LTE (Long Term Evolution) HetNets. Specifically, the authors study and cover the radio access management of unlicensed LTE to allow efficient spectrum utilization and harmonious coexistence with other unlicensed systems in this brief. Efficient radio access protocols are developed to allow unlicensed LTE users to fair share channel access with unlicensed users in different systems, including Wi-Fi and unlicensed LTE of other operators. An analytical model is developed to study the performance of the proposed protocols. To achieve efficient spectrum sharing among various unlicensed users, the authors further formulate a resource allocation problem based on Nobel Prize winning game theory framework, and propose efficient algorithms to achieve the maximal user utility. Opportunistic traffic offloading from licensed band to unlicensed bands is also investigated, based on the network formation game. By exploiting the characteristics of mobile social networks, the offloading performance can be further enhanced. This brief targets researchers and engineers from both academia and industry interested in the development of LTE over unlicensed bands, as well as the design and implementation of cross layer radio resource management. Students studying electrical engineering and computer science will also find this brief useful for their studies.
This brief focuses on introducing a novel mathematical framework, referred as hypergraph theory, to model and solve the multiple interferer scenarios for future wireless communication networks. First, in Chap. 1, the authors introduce the basic preliminaries of hypergraph theory in general, and develop two hypergraph based polynomial algorithms, i.e., hypergraph coloring and hypergraph clustering. Then, in Chaps. 2 and 3, the authors present two emerging applications of hypergraph coloring and hypergraph clustering in Device-to-Device (D2D) underlay communication networks, respectively, in order to show the advantages of hypergraph theory compared with the traditional graph theory. Finally, in Chap. 4, the authors discuss the limitations of using hypergraph theory in future wireless networks and briefly present some other potential applications. This brief introduces the state-of-the-art research on the hypergraph theory and its applications in wireless communications. An efficient framework is provided for the researchers, professionals and advanced level students who are interested in the radio resource allocation in the heterogeneous networks to solve the resource allocation and interference management problems.
This brief introduces overlapping coalition formation games (OCF games), a novel mathematical framework from cooperative game theory that can be used to model, design and analyze cooperative scenarios in future wireless communication networks. The concepts of OCF games are explained, and several algorithmic aspects are studied. In addition, several major application scenarios are discussed. These applications are drawn from a variety of fields that include radio resource allocation in dense wireless networks, cooperative spectrum sensing for cognitive radio networks, and resource management for crowd sourcing. For each application, the use of OCF games is discussed in detail in order to show how this framework can be used to solve relevant wireless networking problems. Overlapping Coalition Formation Games in Wireless Communication Networks provides researchers, students and practitioners with a concise overview of existing works in this emerging area, exploring the relevant fundamental theories, key techniques, and significant applications.
This brief focuses on the use of full-duplex radio in cognitive radio networks, presenting a novel spectrum sharing protocol that allows the secondary users to simultaneously sense and access the vacant spectrum. This protocol, called "Listen-and-talk" (LAT), is evaluated by both mathematical analysis and computer simulations in comparison with other existing protocols, including the listen-before-talk protocol. In addition to LAT-based signal processing and resource allocation, the brief discusses techniques such as spectrum sensing and dynamic spectrum access. The brief proposes LAT as a suitable access scheme for cognitive radio networks, which can support the quality-of-service requirements of these high priority applications. Fundamental theories and key techniques of cognitive radio networks are also covered. Listen and Talk: Full-duplex Cognitive Radio Networks is designed for researchers, developers, and professionals involved in cognitive radio networks. Advanced-level students studying signal processing or simulations will also find the content helpful since it moves beyond traditional cognitive radio networks into future applications for the technology.
The brief focuses on applying sublinear algorithms to manage critical big data challenges. The text offers an essential introduction to sublinear algorithms, explaining why they are vital to large scale data systems. It also demonstrates how to apply sublinear algorithms to three familiar big data applications: wireless sensor networks, big data processing in Map Reduce and smart grids. These applications present common experiences, bridging the theoretical advances of sublinear algorithms and the application domain. Sublinear Algorithms for Big Data Applications is suitable for researchers, engineers and graduate students in the computer science, communications and signal processing communities.
This unified treatment of game theory focuses on finding state-of-the-art solutions to issues surrounding the next generation of wireless and communications networks. Future networks will rely on autonomous and distributed architectures to improve the efficiency and flexibility of mobile applications, and game theory provides the ideal framework for designing efficient and robust distributed algorithms. This book enables readers to develop a solid understanding of game theory, its applications and its use as an effective tool for addressing wireless communication and networking problems. The key results and tools of game theory are covered, as are various real-world technologies including 3G networks, wireless LANs, sensor networks, dynamic spectrum access and cognitive networks. The book also covers a wide range of techniques for modeling, designing and analysing communication networks using game theory, as well as state-of-the-art distributed design techniques. This is an ideal resource for communications engineers, researchers, and graduate and undergraduate students.
Device-to-Device (D2D) communication will become a key feature supported by next generation cellular networks, a topic of enormous importance to modern communication. Currently, D2D serves as an underlay to the cellular network as a means to increase spectral efficiency. Although D2D communication brings large benefits in terms of system capacity, it also causes interference as well as increased computation complexity to cellular networks as a result of spectrum sharing. Thus, efficient resource management must be performed to guarantee a target performance level of cellular communication. This brief presents the state-of-the-art research on resource management for D2D communication underlaying cellular networks. Those who work with D2D communication will use this book's information to help ensure their work is as efficient as possible. Along with the survey of existing work, this book also includes the fundamental theories, key techniques, and applications.
Are you involved in designing the next generation of wireless networks? With spectrum becoming an ever scarcer resource, it is critical that new systems utilize all available frequency bands as efficiently as possible. The revolutionary technology presented in this book will be at the cutting edge of future wireless communications. Dynamic Spectrum Access and Management in Cognitive Radio Networks provides you with an all-inclusive introduction to this emerging technology, outlining the fundamentals of cognitive radio-based wireless communication and networking, spectrum sharing models, and the requirements for dynamic spectrum access. In addition to the different techniques and their applications in designing dynamic spectrum access methods, you ll also find state-of-the-art dynamic spectrum access schemes, including classifications of the different schemes and the technical details of each scheme. This is a perfect introduction for graduate students and researchers, as well as a useful self-study guide for practitioners.
Do you need to improve wireless system performance? Learn how to maximise the efficient use of resources with this systematic and authoritative account of wireless resource management. Basic concepts, optimization tools and techniques, and application examples, are thoroughly described and analysed, providing a unified framework for cross-layer optimization of wireless networks. State-of-the-art research topics and emerging applications, including dynamic resource allocation, cooperative networks, ad hoc/personal area networks, UWB, and antenna array processing, are examined in depth. If you are involved in the design and development of wireless networks, as a researcher, graduate student or professional engineer, this is a must-have guide to getting the best possible performance from your network.
Recently machine learning schemes have attained significant attention as key enablers for next-generation wireless systems. Currently, wireless systems are mostly using machine learning schemes that are based on centralizing the training and inference processes by migrating the end-devices data to a third party centralized location. However, these schemes lead to end-devices privacy leakage. To address these issues, one can use a distributed machine learning at network edge. In this context, federated learning (FL) is one of most important distributed learning algorithm, allowing devices to train a shared machine learning model while keeping data locally. However, applying FL in wireless networks and optimizing the performance involves a range of research topics. For example, in FL, training machine learning models require communication between wireless devices and edge servers via wireless links. Therefore, wireless impairments such as uncertainties among wireless channel states, interference, and noise significantly affect the performance of FL. On the other hand, federated-reinforcement learning leverages distributed computation power and data to solve complex optimization problems that arise in various use cases, such as interference alignment, resource management, clustering, and network control. Traditionally, FL makes the assumption that edge devices will unconditionally participate in the tasks when invited, which is not practical in reality due to the cost of model training. As such, building incentive mechanisms is indispensable for FL networks. This book provides a comprehensive overview of FL for wireless networks. It is divided into three main parts: The first part briefly discusses the fundamentals of FL for wireless networks, while the second part comprehensively examines the design and analysis of wireless FL, covering resource optimization, incentive mechanism, security and privacy. It also presents several solutions based on optimization theory, graph theory, and game theory to optimize the performance of federated learning in wireless networks. Lastly, the third part describes several applications of FL in wireless networks.
This book covers the basic theory of mean field game (MFG) and its applications in wireless networks. It starts with an overview of the current and future state-of-the-art in 5G and 6G wireless networks. Then, a tutorial is presented for MFG, mean-field-type game (MFTG), and prerequisite fields of study such as optimal control theory and differential games. This book also includes a literature survey of MFG-based research in wireless network technologies such as ultra-dense networks (UDNs), device-to-device (D2D) communications, internet-of-things (IoT), unmanned aerial vehicles (UAVs), and mobile edge networks (MENs). Several applications of MFG and MFTG in UDNs, social networks, and multi-access edge computing networks (MECNs) are introduced as well. Applications of MFG covered in this book are divided in three parts. The first part covers three single-population MFG research works or case studies in UDNs including ultra-dense D2D networks, ultra-dense UAV networks, and dense-user MECNs. The second part centers on a multiple-population MFG (MPMFG) modeling of belief and opinion evolution in social networks. It focuses on a recently developed MPMFG framework and its application in analyzing the behavior of users in a multiple-population social network. Finally, the last part concentrates on an MFTG approach to computation offloading in MECN. The computation offloading algorithms are designed for energy- and time-efficient offloading of computation-intensive tasks in an MECN. This book targets advanced-level students, professors, researchers, scientists, and engineers in the fields of communications and networks. Industry managers and government employees working in these same fields will also find this book useful.
The smart grid will transform the way power is delivered, consumed and accounted for. Adding intelligence through the newly networked grid will increase reliability and power quality, improve responsiveness, increase efficiency and provide a platform for new applications. This one-stop reference covers the state-of-the-art theory, key strategies, protocols, applications, deployment aspects and experimental studies of communication and networking technologies for the smart grid. Through the book's twenty chapters, a team of expert authors cover topics ranging from architectures and models through to integration of plug-in hybrid vehicles and security. Essential information is provided for researchers to make progress in the field and to allow power systems engineers to optimize communication systems for the smart grid.
Learn about the key technologies and understand the state of the art in research for full-duplex communication networks and systems with this comprehensive and interdisciplinary guide. Incorporating physical, MAC, network, and application layer perspectives, it explains the fundamental theories on which full-duplex communications are built, and lays out the techniques needed for network design, analysis and optimization. Techniques covered in detail include self-interference cancellation and signal processing algorithms, physical layer algorithms, methods for efficient resource allocation, and game theory. Potential applications and networking schemes are discussed, including full-duplex cognitive radio networks, cooperative networks, and heterogeneous networks. The first book to focus exclusively on full-duplex communications, this is an indispensable reference for both researchers and practitioners designing the next generation of wireless networks.
This SpringerBrief mainly focuses on effective big data analytics for CPS, and addresses the privacy issues that arise on various CPS applications. The authors develop a series of privacy preserving data analytic and processing methodologies through data driven optimization based on applied cryptographic techniques and differential privacy in this brief. This brief also focuses on effectively integrating the data analysis and data privacy preservation techniques to provide the most desirable solutions for the state-of-the-art CPS with various application-specific requirements. Cyber-physical systems (CPS) are the "next generation of engineered systems," that integrate computation and networking capabilities to monitor and control entities in the physical world. Multiple domains of CPS typically collect huge amounts of data and rely on it for decision making, where the data may include individual or sensitive information, for e.g., smart metering, intelligent transportation, healthcare, sensor/data aggregation, crowd sensing etc. This brief assists users working in these areas and contributes to the literature by addressing data privacy concerns during collection, computation or big data analysis in these large scale systems. Data breaches result in undesirable loss of privacy for the participants and for the entire system, therefore identifying the vulnerabilities and developing tools to mitigate such concerns is crucial to build high confidence CPS. This Springerbrief targets professors, professionals and research scientists working in Wireless Communications, Networking, Cyber-Physical Systems and Data Science. Undergraduate and graduate-level students interested in Privacy Preservation of state-of-the-art Wireless Networks and Cyber-Physical Systems will use this Springerbrief as a study guide.
This book constitutes the proceedings of the Second International Conference on Big Data Computing and Communications, BigCom 2016, held in Shenyang, China, in July 2016. The 39 papers presented in this volume were carefully reviewed and selected from 90 submissions. BigCom is an international symposium dedicated to addressing the challenges emerging from big data related computing and networking. The conference is targeted to attract researchers and practitioners who are interested in Big Data analytics, management, security and privacy, communication and high performance computing in its broadest sense.
This unique text helps make sense of big data in engineering applications using tools and techniques from signal processing. It presents fundamental signal processing theories and software implementations, reviews current research trends and challenges, and describes the techniques used for analysis, design and optimization. Readers will learn about key theoretical issues such as data modelling and representation, scalable and low-complexity information processing and optimization, tensor and sublinear algorithms, and deep learning and software architecture, and their application to a wide range of engineering scenarios. Applications discussed in detail include wireless networking, smart grid systems, and sensor networks and cloud computing. This is the ideal text for researchers and practising engineers wanting to solve practical problems involving large amounts of data, and for students looking to grasp the fundamentals of big data analytics. |
You may like...
|