Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
It presents MTD-based research efforts to protect cloud data centers, along with network and security risk-aware approaches to place Virtual Machines (VM) in cloud data centers.
This book investigates data security approaches in Heterogeneous Communications Networks (HCN). First, the book discusses the urgent need for a decentralized data management architecture in HCN. The book investigates preliminaries and related research to help readers obtain a comprehensive picture of the research topic. Second, the book presents three blockchain-based approaches for data management in HCN: data provenance, data query, and data marketing. Finally, based on the insights and experiences from the presented approaches, the book discusses future research directions.
This book presents theoretical research between wireless communications, networking, and economics using the framework of contract theory.
The authors rely on estimation theory and signal processing to develop SI-cancellation algorithms by generating an estimate of the received SI and subtracting it from the received signal.The authors also cover two new SI-cancellation methods using the new concept of active signal injection (ASI) for full-duplex MIMO-OFDM systems.
This book introduces applications of RFID on the Internet of things, under the emerging technologies for tag search, anonymous RFID authentication, and identification of networked tags.
This book presents the current research on safety message dissemination in vehicular networks, covering medium access control and relay selection for multi-hop safety message broadcast.
It also introduces several privacy enhancing aggregation techniques including multidimensional data aggregation, subset data aggregation, multifunctional data aggregation, data aggregation with fault tolerance, data aggregation with differential privacy, and data aggregation with integrity protection.
This book covers a series of security and privacy issues in network coding, and introduces three concrete mechanisms to address them. While network coding can help improve network performance, the adoption of network coding can be greatly limited unless security and privacy threats are addressed.
Representative programming frameworks are also presented, as well as software defined networking (SDN) and network function virtualization (NFV) technologies as key cloud networking technologies. The authors illustrate that SDN and NFV can be applied to benefit the big data processing by proposing a cloud networking framework.
Specifically, the secure health data aggregation explores social spots to help forward health data and enable users to select the optimal relay according to their social ties and health data priority.
This book explores the challenges and opportunities in exploiting cloud technologies for 5G, ranging from radio access network (RAN) to the evolved packet core (EPC).
This book presents a thorough examination of index modulation, an emerging 5G modulation technique. First, the basic spatial modulation system for the spatial domain is introduced. Then, the development of a generalized pre-coding aided quadrature spatial modulation system as well as a virtual spatial modulation system are presented.
This book lays out the theoretical foundation of the so-called multi-armed bandit (MAB) problems and puts it in the context of resource management in wireless networks.
This book focuses on the design and analysis of protocols for cooperative wireless networks, especially at the medium access control (MAC) layer and for crosslayer design between the MAC layer and the physical layer.
This book examines recent research on designing online charging and discharging strategies for mobile electric vehicles (EVs) in smart grid.
This book mainly discusses the most important issues in artificial intelligence-aided future networks, such as applying different ML approaches to investigate solutions to intelligently monitor, control and optimize networking.
This book provides the fundamental knowledge of the classical matching theory problems. The potentials and challenges of implementing the semi-distributive matching theory framework into the wireless resource allocations are analyzed both theoretically and through implementation examples.
Following underwater acoustic channel modeling, this book investigates the relationship between coherence time and transmission distances. It considers the power allocation issues of two typical transmission scenarios, namely short-range transmission and medium-long range transmission.
This book addresses the fundamental design and technical challenges for fifth generation (5G) wireless channel models, including multi-frequency bands and multi-scenarios. The book presents a strong vision for 5G wireless communication networks based on current market trends, proven technologies, and future directions. The book helps enable researchers and industry professionals to come up with novel ideas in the area of wireless heterogeneity, to minimize traffic accidents, to improve traffic efficiency, and to foster the development of new applications such as mobile infotainment. The book acts as a comprehensive reference for students, instructors, researchers, engineers, and other professionals, building their understanding of 5G and in designing 5G systems.Addresses fundamental design and technical challenges for 5G wireless channel models;Presents how to create reliable statistical channel models to capture the propagation properties between transmitters and receivers;Pertinent to researchers, engineers, and professionals in 5G.
A significant and convenient approach to detection and analysis of biological, environmental and agricultural items is the harnessing of features in widely available smartphones to create field-deployable scientific instruments, allowing measurements to be made onsite and in real-time.
This book provides a comprehensive picture of mobile big data starting from data sources to mobile data driven applications.
This book provides a comprehensive picture of mobile big data starting from data sources to mobile data driven applications.
This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless security and privacy related issues Recent advances in wireless communication technologies have enabled the large-scale deployment of next-generation wireless networks, and many other wireless applications are emerging.
The coexistence and cooperation between terrestrial and satellite networks are of great potential in future communication networks, and satellite radio access networks has already been considered in the fifth-generation (5G) networks to be supported for phase 2.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.