Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover protections against malware using machine learning algorithms, Blockchain and AI technologies, smart AI-based applications, automated detection-based AI tools, forensics tools, and much more. The authors discuss theoretical, technical, and practical issues related to cyber malware attacks and defense, making it ideal reading material for students, researchers, and developers.
Erfahren Sie mit diesem Buch alles über die angewandte NetzwerktechnikIm privaten Bereich spielt Netzwerktechnik eine eher untergeordnete Rolle. Dabei sorgt sie erst dafür, dass die Kommunikation via Internet funktioniert. Der industrielle Sektor hat die Vorteile des Datenaustauschs mit Hilfe von Netzwerken allmählich erkannt. Doch erst im Rahmen der ¿Industrie 4.0¿ wird laut Valentin Plenk die Datenübertragung in Echtzeit mehr Bedeutung gewinnen. Mit Blick auf diese Entwicklung stellt er in seinem Buch im Sinne der angewandten Netzwerktechnik speziell die höheren Schichten der Netzwerktechnik in den Fokus. Dieses kompakte Lehrbuch zeigt Ihnen anhand von konkreten, in Java ausprogrammierten Beispielen, wie Informationen zwischen Systemen über ein Netzwerk ausgetauscht werden können. Pro Kapitel behandelt dieses Netzwerktechnik-Buch ein bestimmtes Thema. Nach der Einführung in die Grundlagen der Kommunikation geht derAutor zunächst auf Java-Streams, Zeichencodierung sowie die Netzwerkanalyse mit Wireshark ein. Anschließend schenkt Plenk speziell folgenden Datenaustauschformaten sowie Protokollen besonderes Augenmerk:¿ JSON¿ HTML¿ HTTP¿ OPC UA¿ TCP/IP¿ UDP/IPKonkrete Beispiele und Übungen geben Ihnen PraxiseinblickeAuf diese Weise deckt dieses Buch über die angewandte Netzwerktechnik den gesamten Bereich technischer Kommunikation ab, von den Netzwerkprotokollen bis hin zum Versenden von Netzwerktelegrammen. Durch diese breite Themenauswahl bekommen Sie als Leser ein tieferes Verständnis für die typischen Problemstellungen in der Anwendung der Netzwerktechnik. Sie erfahren mehr über die Darstellung von Daten in einem bestimmten Dateiformat und wie Sie Daten mittels Standardprotokollen austauschen können. Zudem lernen Sie, wie Sie eigene, einfache Protokolle auf der Basis von TCP/IP erstellen können. Schwerpunkt des Buches bildet dabei immer die Anwendung von Netzwerken.Mit Hilfe zahlreicher Übungsaufgaben (inklusive Lösungsvorschlägen) sowie Anwendungsbeispielen können Sie Ihren persönlichen Kenntnisstand überprüfen und das Gelernte vertiefen. So sind Sie ideal auf die Praxis vorbereitet. Die zweite Auflage des Buchs ¿Angewandte Netzwerktechnik kompakt¿ wurde um den Themenbereich Webservices ergänzt. Im Abschnitt zu UDP/IP finden Sie jetzt außerdem hilfreiche Codebeispiele für Broadcast und Multicast.
The book gives an overview about automation technology over the last 50 years, based on my own experiences. It is a good summery for automation since 1970 for all who want to know about the context of automation developments and their standards. It is a fundamental summery and enables the reader to get experience in the complex field of automation.In detail the question is arised, whether Industry 4.0, China 2025, IoT, AI are a revolution or more an evolution of timewise established availbale technologies in HW, SW and algorithms. Is the hype about Industry 4.0 justified or not?In that context a timelline since 1970 ist shown for AI, ANN, essential milestones in automation, e.g OSI-model, automation pyramid, standards for bus systems, main SW-languages, robots, AI, ANN, pattern recognittion, Ethernet, the 12 most important international field busses, their main features and characterisitcs, foundation of committees, harmonization and standardization efforts, OPC UA and cloud computing, field devices, PLCs, SCADA, MES, ERP and automation history. All that history is seen in the context of u-controller, DSP (Digital signal processor), FPGAs (Field Programmable Gate Arrays), ASICs (Application-Specific Integrated Circuit) , Chip on Board. It is include the HW-history, from Intel 8080 to octuple multicore processors. In the same way it is shown the history of field device out from laboratory into the field with all difficulties and benefits of that transition. The issues are summerized in a pyramid of complexity. Requirements for robustness and safety are shown for field devices. In the same way it is shown the development of mainframes, workstations and PC's. SAP a leading ERP System is explained in mor detail. Specially it is figured out how SAP works and what has to be considered in working with such kind of system. The differences between MES- and ERP-systems are discussed, specially also for future combined SAP/MES systems. Explained are the problems of middlesized companies (SMEs) in dealing with Industry 4.0 and automation. Further examples are given and discussed for automized quality control in automotvie, PCB-handling, CIGS (Solar cell)-production. Also shown is the upgrade for older products and make them ready for automation standards. In detail the history oft he modern robotics is shown for the automotive industry. In summery also is figured out the Industry 5.0 which is just coming up more and more.
This book describes a new, extremely low frequency (ELF)/ very low frequency (VLF) miniaturized transmitter concept, based on the mechanical motion of permanent magnets or electrets. The authors explain how utilizing the very high energy density of modern ferromagnetic and ferroelectric materials, such "e;electromechanical transmitters'' can provide much higher field generation efficiency than conventional antennas, thus enabling practical ELF/VLF wireless communications links. The text begins with the fundamental challenges of such links and provides an historical overview of the attempts that have been made to address these challenges. It then focuses on the design and implementation of practical electromechanical ELF/VLF transmitters, which is an interdisciplinary subject that spans multiple research areas including electromagnetics, power electronics, control systems, and mechanical design. The authors also describe how such transmitters can be combined with receivers and signal processing algorithms to realize complete ELF/VLF links in challenging environments.
This book, fully updated for Python version 3.6+, covers the key ideas that link probability, statistics, and machine learning illustrated using Python modules in these areas. All the figures and numerical results are reproducible using the Python codes provided. The author develops key intuitions in machine learning by working meaningful examples using multiple analytical methods and Python codes, thereby connecting theoretical concepts to concrete implementations. Detailed proofs for certain important results are also provided. Modern Python modules like Pandas, Sympy, Scikit-learn, Tensorflow, and Keras are applied to simulate and visualize important machine learning concepts like the bias/variance trade-off, cross-validation, and regularization. Many abstract mathematical ideas, such as convergence in probability theory, are developed and illustrated with numerical examples. This updated edition now includes the Fisher Exact Test and the Mann-Whitney-Wilcoxon Test. A new section on survival analysis has been included as well as substantial development of Generalized Linear Models. The new deep learning section for image processing includes an in-depth discussion of gradient descent methods that underpin all deep learning algorithms. As with the prior edition, there are new and updated *Programming Tips* that the illustrate effective Python modules and methods for scientific programming and machine learning. There are 445 run-able code blocks with corresponding outputs that have been tested for accuracy. Over 158 graphical visualizations (almost all generated using Python) illustrate the concepts that are developed both in code and in mathematics. We also discuss and use key Python modules such as Numpy, Scikit-learn, Sympy, Scipy, Lifelines, CvxPy, Theano, Matplotlib, Pandas, Tensorflow, Statsmodels, and Keras.This book is suitable for anyone with an undergraduate-level exposure to probability, statistics, or machine learning and with rudimentary knowledge of Python programming.
This book presents Internet transport economics as a new approach to understanding the packet-switching paradigm of Internet infrastructure as a global transport system for data packets. It is a prescient view of the Internet's evolution into a content-centric service platform where the quality of services (QoS) cannot be guaranteed due to the tens of thousands of autonomous systems that enact business decisions on peering, routing, and pricing in a way that determines aspects of the Internet ecosystem like network topology, latency and throughput of traffic flows, and performance of network applications. The trafficking issues created in this environment are a critical concern and barrier for user applications that require real-time responses, such as telesurgery and teleoperation of autonomous vehicles, and the book presents the Internet transport economics model as the solution. While engineering and business are the prevailing lenses through which the Internet is viewed, the book builds its methodological framework around transport. Further delving into economics, it establishes how the Internet can be understood as providing transport services for data packets, whose demand and supply are driven by the QoS metrics of delay and loss, which can be regarded as congestion costs that result in equilibrium rates of traffic flows sent by content providers (CPs). The book goes on to present a stylized model of content provider-to-access provider (CP-AP) service as well as congestion equilibrium and rate equilibrium solution concepts under the Internet transport economics framework. These are used to analyze the problem domains of service differentiation, market structure, and data pricing. Finally, it discusses various potential future applications. This book will be of interest to graduate students and researchers in areas of computer networking and performance evaluation.
Ultra-Reliable Low-Latency Communications (URLLC) was introduced into 5G networks to facilitate machine to machine communication for such applications as the Internet of Things. But designing URLLC systems, with disjointed treatment of the topic in the literature, has proven challenging. In this work, the authors present a comprehensive coverage of the URLLC including the motivation, theory, practical enablers and future evolution. The unified level of details provides a balanced coverage between its fundamental communication- and information theoretic background and its practical enablers, including 5G system design aspects. The authors conclude by offering an outlook on URLLC evolution in the sixth-generation (6G) era towards dependable and resilient wireless communications. This is the first book to give the reader a complete, yet concise, introduction to the theoretical and application oriented aspects of a topic at the core of both 5G and 6G wireless communication systems. As such, it is essential reading for designers and students of such systems.
This book discusses wireless communication systems from a transceiver and digital signal processing perspective. It is intended to be an advanced and thorough overview for key wireless communication technologies. A wide variety of wireless communication technologies, communication paradigms and architectures are addressed, along with state-of-the-art wireless communication standards. The author takes a practical, systems-level approach, breaking up the technical components of a wireless communication system, such as compression, encryption, channel coding, and modulation. This book combines hardware principles with practical communication system design. It provides a comprehensive perspective on emerging 5G mobile networks, explaining its architecture and key enabling technologies, such as M-MIMO, Beamforming, mmWaves, machine learning, and network slicing. Finally, the author explores the evolution of wireless mobile networks over the next ten years towards 5G and beyond (6G), including use-cases, system requirements, challenges and opportunities.
The aim of this book is to provide latest research findings, innovative research results, methods, and development techniques from both theoretical and practical perspectives related to the emerging areas of broad-band and wireless computing. Information networks of today are going through a rapid evolution. Different kinds of networks with different characteristics are emerging and they are integrating in heterogeneous networks. For these reasons, there are many interconnection problems which may occur at different levels of the hardware and software design of communicating entities and communication networks. These kinds of networks need to manage an increasing usage demand, provide support for a significant number of services, guarantee their QoS, and optimize the network resources. The success of all-IP networking and wireless technology has changed the ways of living the people around the world. The progress of electronic integration and wireless communications is going to pave the way to offer people the access to the wireless networks on the fly, based on which all electronic devices will be able to exchange the information with each other in ubiquitous way whenever necessary.
This book provides a comprehensive review and in-depth discussion of the state-of-the-art research literature and propose energy-efficient computation offloading and resources management for mobile edge computing (MEC), covering task offloading, channel allocation, frequency scaling and resource scheduling. Since the task arrival process and channel conditions are stochastic and dynamic, the authors first propose an energy efficient dynamic computing offloading scheme to minimize energy consumption and guarantee end devices' delay performance. To further improve energy efficiency combined with tail energy, the authors present a computation offloading and frequency scaling scheme to jointly deal with the stochastic task allocation and CPU-cycle frequency scaling for minimal energy consumption while guaranteeing the system stability. They also investigate delay-aware and energy-efficient computation offloading in a dynamic MEC system with multiple edge servers, and introduce an end-to-end deep reinforcement learning (DRL) approach to select the best edge server for offloading and allocate the optimal computational resource such that the expected long-term utility is maximized. Finally, the authors study the multi-task computation offloading in multi-access MEC via non-orthogonal multiple access (NOMA) and accounting for the time-varying channel conditions. An online algorithm based on DRL is proposed to efficiently learn the near-optimal offloading solutions.Researchers working in mobile edge computing, task offloading and resource management, as well as advanced level students in electrical and computer engineering, telecommunications, computer science or other related disciplines will find this book useful as a reference. Professionals working within these related fields will also benefit from this book.
This book provides a wide scope of contributions related to optoelectronic device application in a variety of robotic systems for diverse purposes. The contributions are focused on optoelectronic sensors and analyzing systems, 3D and 2D machine vision technologies, robot navigation, pose estimations, robot operation in cyclic procedures, control schemes, motion controllers, and intelligent algorithms and vision systems. Applications of these technologies are outlined for unmanned aerial vehicles, autonomous and mobile robots, industrial inspection applications, cultural heritage documentation, and structural health monitoring. Also discussed are recent advanced research in measurement and others areas where 3D and 2D machine vision and machine control play an important role. Surveys and reviews about optoelectronic and vision-based applications are also included. These topics are of interest to readers from a diverse group including those working in optoelectronics, and electrical, electronic and computer engineering.
Das Buch "5G und 6G: Technologien, die die Welt verändern - Die Schlüsseltechnologien des 21. Jahrhunderts und ihre Auswirkungen auf unser Leben" ist ein umfassendes Kompendium, das die revolutionären Netzwerktechnologien 5G und 6G in all ihren Facetten beleuchtet. Von den technischen Grundlagen und Spezifikationen bis hin zu den vielfältigen Anwendungsmöglichkeiten in Industrie, Medizin und Alltag bietet dieses Werk einen tiefgreifenden Einblick in die Technologien, die die Grundlage für die nächste Generation der globalen Kommunikation bilden.Die Sicherheitsaspekte, von Verschlüsselung bis hin zu Risikomanagement, werden ebenso gründlich analysiert wie die wirtschaftlichen und gesellschaftlichen Implikationen. Dabei werden auch ethische und regulatorische Fragen nicht ausgespart. Ein besonderer Fokus liegt auf den Herausforderungen und Zukunftsaussichten, die diese Schlüsseltechnologien mit sich bringen.Dieses Buch ist nicht nur ein unverzichtbares Nachschlagewerk für Fachleute und Forscher, sondern auch eine fundierte Informationsquelle für alle, die sich für die weitreichenden Auswirkungen dieser bahnbrechenden Technologien interessieren. Es bietet eine ganzheitliche Perspektive auf die komplexen Zusammenhänge und ist damit ein Muss für jeden, der die digitale Transformation und ihre Auswirkungen auf die Gesellschaft verstehen möchte.
P2P, Grid, Cloud, and Internet computing technologies have been very fast established as breakthrough paradigms for solving complex problems by enabling aggregation and sharing of an increasing variety of distributed computational resources at large scale.Grid Computing originated as a paradigm for high performance computing, as an alternative to expensive supercomputers through different forms of large-scale distributed computing. P2P Computing emerged as a new paradigm after client-server and web-based computing and has shown useful to the development of social networking, Business to Business (B2B), Business to Consumer (B2C), Business to Government (B2G), Business to Employee (B2E), and so on. Cloud Computing has been defined as a ¿computing paradigm where the boundaries of computing are determined by economic rationale rather than technical limits¿. Cloud computing has fast become the computing paradigm with applicability and adoption in all application domains and providing utility computing at large scale. Finally, Internet Computing is the basis of any large-scale distributed computing paradigms; it has very fast developed into a vast area of flourishing field with enormous impact on today¿s information societies serving thus as a universal platform comprising a large variety of computing forms such as Grid, P2P, Cloud, and Mobile computing. The aim of the book is to provide latest research findings, innovative research results, methods, and development techniques from both theoretical and practical perspectives related to P2P, Grid, Cloud, and Internet Computing as well as to reveal synergies among such large-scale computing paradigms.
This book consists of selected peer-reviewed articles from the International Conference on Computer Vision, High Performance Computing, Smart Devices and Networks (CHSN-2020), held at JNTU, Kakinada, India. The theme and areas of the conference include vast scope for latest concepts and trends in communication engineering, information theory and networks, signal, image and speech processing, wireless and mobile communication, Internet of Things, and cybersecurity for societal causes and humanitarian applications.
This book argues that hate speech is not protected. Based on an examination of Supreme Court case law and First Amendment theory, the book finds that hate speech lies outside the Supreme Court's hierarchy of speech protection because it advances no ideas of social value.
AI to Prevent Remote Human-to-Human VR & Trafficking Program is a proposed program that would use artificial intelligence (AI) to prevent human trafficking in virtual reality (VR). The program would use a variety of AI techniques, including machine learning and deep learning, to detect suspicious activity in VR, identify victims and perpetrators of human trafficking, and educate and empower users about human trafficking and how to stay safe in VR.The program is still in the early stages of development, but it has the potential to be a powerful tool for preventing human trafficking in VR. VR is a new and emerging technology, and human traffickers have already begun to use it to exploit victims. AI can help to combat this by providing law enforcement and other organizations with the tools they need to identify and rescue victims of human trafficking in VR.The program is also designed to educate and empower users about human trafficking and how to stay safe in VR. This is important because many users are not aware of the risks associated with VR, and they may be more likely to be trafficked if they do not know how to protect themselves.The AI to Prevent Remote Human-to-Human VR & Trafficking Program is a promising new initiative that has the potential to make a real difference in the fight against human trafficking.
The book presents the proceedings of the 30th Biennial Symposium on Communications 2021 (BSC21), a prestigious international research conference in communications, information theory, and signal processing. Started in 1962 by Queen's University, Canada, the Symposium is now presented by the Canadian Society of Information Theory. Its 30th edition was hosted virtually by The University of Saskatchewan and held in Saskatoon from June 28 to 30, 2021. Topics include Communication and Information Theory, Coding and Signal Processing for Communications, and Multiple Antenna Systems and Cooperative Communications.
This book presents a collection of high-quality research works and professional perspectives arising from the call for papers of the Privacy Symposium 2022; an international conference aimed towards the promotion of international dialogue, cooperation and knowledge sharing on data protection regulations, compliance and emerging technologies.Gathering legal and technology expertise, this publication provides cutting-edge perspectives on the convergence of international data protection regulations, as well as data protection compliance of emerging technologies, such as: Artificial Intelligence, e-health, blockchain, edge computing, Internet of things, V2X and Smart Grids.It includes selected papers from the Privacy Symposium conference 2022 (PSC 2022) call for papers, encompassing relevant topics, including: international law and comparative law in data protection cross-border data transfers emerging technologies and data protection compliance data protection by design technologic solutions for data protection compliance data protection good practices across industries and verticals cybersecurity and data protection assessment and certification of data protection compliance, and data subject rights implementationThis publication includes papers authored by academics and professionals involved on various areas of data protection, technical, legal and compliance services.Chapter 10 is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com
This book focuses on a wide range of breakthroughs related to digital biometrics and forensics. The authors introduce the concepts, techniques, methods, approaches and trends needed by cybersecurity specialists and educators for keeping current their biometrics and forensics knowledge. Furthermore, the book provides a glimpse of future directions where biometrics and forensics techniques, policies, applications, and theories are headed. Topics include multimodal biometrics, soft biometrics, mobile biometrics, vehicle biometrics, vehicle forensics, integrity verification of digital content, people identification, biometric-based cybercrime investigation, among others. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse digital biometrics and forensics experts in the listed fields and edited by prominent biometrics and forensics researchers and specialists.
Social media, a digital connection phenomenon, has transformed the way we communicate, interact, and share information in the 21st century. It has become an integral part of our daily lives, redefining the dynamics of human connection and the dissemination of information.At its core, social media is a virtual platform that enables individuals, businesses, and organizations to connect with people worldwide. It has transcended geographical boundaries, allowing us to bridge gaps, exchange ideas, and form communities across the globe. Whether it's Facebook, Twitter, Instagram, or newer platforms like TikTok, these networks facilitate real-time conversations and engagement, bringing people closer together.One of the most remarkable aspects of social media is its role as a catalyst for change. Movements, activism, and awareness campaigns have found a powerful voice through platforms like Twitter and Instagram. Users can share their experiences, opinions, and concerns, giving rise to global discussions on important issues such as social justice, climate change, and public health.Moreover, social media has revolutionized the way we consume and create content. It has birthed a new era of influencers and content creators who have leveraged their platforms to reach and influence massive audiences. From fashion trends to culinary delights, social media drives popular culture, impacting everything from what we wear to what we eat.Yet, social media isn't without its challenges. Concerns about privacy, online harassment, and the spread of fake news have raised important questions about the responsible use of these platforms. It's crucial to strike a balance between the benefits and potential downsides of social media to ensure its continued positive impact on society.
Omni-resonant Fabry-Pérot (FP) cavities are a promising new approach to broadband solar energy harvesting. They can overcome the limitations of traditional resonant absorption schemes, which are typically narrowband and require precise matching between the cavity resonance and the wavelength of the incident light.In an omni-resonant FP cavity, the resonant bandwidth is broadened by carefully sculpting the spatio-temporal structure of the incident light. This can be done by using a light preconditioning system that introduces angular dispersion into the incident beam. When the angular dispersion of the incident light is equal in magnitude but opposite in sign to the angular dispersion of the cavity, all wavelengths within a selected band can resonate simultaneously.This results in continuous-wavelength coherent perfect absorption (CPA), which can significantly boost the external quantum efficiency (EQE) of solar cells. In a recent study, researchers demonstrated that a combination of CPA and omni-resonance can lead to a doubling of the photocurrent harvested in the near-infrared spectral range of 660-740 nm in a hydrogenated amorphous silicon (a-Si:H) PIN-diode solar cell.Omni-resonant FP cavities have several advantages over traditional resonant absorption schemes. First, they are broadband, meaning that they can absorb light over a wide range of wavelengths. Second, they are tolerant of misalignment, meaning that they do not require precise matching between the cavity resonance and the wavelength of the incident light. Third, they are scalable, meaning that they can be fabricated using standard thin-film deposition techniques.These advantages make omni-resonant FP cavities a promising candidate for use in next-generation solar cells. They could also be used in other applications where broadband resonant absorption is desired, such as optical sensors and optical filters.
The book discusses how Unmanned Aerial Vehicles (UAVs) can leverage the sub-6 GHz massive MIMO to address cell selection and interference issues in future wireless networks. The book takes a close look at utilizing UAVs to achieving direct and efficient device-to device (D2D) communications in the sky. Also, the key 6G enablers (cell-free architectures, artificial intelligence, reconfigurable intelligent surfaces, THz communications, and non-terrestrial networks) for UAV communication are broached, and the primary technological challenges of each enabler are discussed extensively. Furthermore, the book covers the design of adaptable UAVs to operate in diverse and harsh environmental conditions. Additionally, the existing UAVs' networking protocols and how these can be greatly enhanced to address the issue of intermittent network changes and channel impairments are discussed. The prospects and societal benefits envisioned in future UAVs are also presented.
This book presents the basic concepts, principles and technologies of wireless communication. The author focuses on the characteristics of the channel, the performance degradation, and various technologies to improve the performance of the wireless communication system. The upper technologies involved in building wireless performance are also discussed, and a prototype of the system is presented.
This book aims at developing a reader's thorough understanding of the challenges and opportunities of two categories of networks, namely k-covered wireless sensor networks and k-barrier covered wireless sensor networks. It presents a variety of theoretical studies based on percolation theory, convexity theory, and applied computational geometry, as well as the algorithms and protocols that are essential to their design, analysis, and development. Particularly, this book focuses on the cover, sense, and inform (CSI) paradigm with a goal to build a unified framework, where connected k-coverage (or k-barrier coverage), sensor scheduling, and geographic data forwarding, gathering, and delivery are jointly considered. It provides the interested reader with a fine study of the above networks, which can be covered in introductory and advanced courses on wireless sensor networks. This book is useful to senior undergraduate and graduate students in computer science, computer engineering, electrical engineering, information science, information technology, mathematics, and any related discipline. Also, it is of interest to computer scientists, researchers, and practitioners in academia and industry with interest in these two networks from their deployment until data gathering and delivery.
This book first presents a tutorial on Federated Learning (FL) and its role in enabling Edge Intelligence over wireless edge networks. This provides readers with a concise introduction to the challenges and state-of-the-art approaches towards implementing FL over the wireless edge network. Then, in consideration of resource heterogeneity at the network edge, the authors provide multifaceted solutions at the intersection of network economics, game theory, and machine learning towards improving the efficiency of resource allocation for FL over the wireless edge networks. A clear understanding of such issues and the presented theoretical studies will serve to guide practitioners and researchers in implementing resource-efficient FL systems and solving the open issues in FL respectively.
This book gathers extended contributions to the workshop on Long-Term Digital Care, LTC-2021, organized by the Universita Politecnica delle Marche (UNIVPM), Ancona, Italy, and the Hochschule Konstanz (HTWG), Germany, in November 2021, and funded by the DAAD Joint Mobility Program. It covers innovative, practice-oriented approaches that are expected to foster digital health care, with a special focus on improving internationalization and accessibility. The book, which bridges between technological and social disciplines, reports on selected studies with the main goals of: establishing a comparison of Long-Term Digital Care approaches, with focus on exchange and networking processes; defining practical roadmaps for digital social innovation; establishing concepts and methods for process evaluation and sustainability. It offers a timely snapshot on technologies for patient monitoring and assistant systems, medical data analysis and image processing, digital platforms and advanced diagnostics techniques, and discusses important concepts relating to traceable process evaluation, networking and accessibility. It aims at informing, yet it is also intended to inspire and foster a stronger collaboration across disciplines, countries, as well as academic and professional institutions.
This book provides insights into IoT, its applications, and various implementation techniques. The authors first discuss the IoT design methodology to define the domain model. They then cover various connection methodologies used in IoT such as Ethernet, Wi-Fi, low powered wide area network (LPWAN), Bluetooth, RFID, cellular, and satellite, and more, along with their challenges. An example is made on the designing process using Arduino, which offers smart, connected, and secure elements; they also illustrate the integration of IoT with Blockchain, cloud, machine learning, big data, embedded software, sensors, etc. The book going on to cover the future of IoT in various sectors and how IoT will continue to be game-changing technology.
This book examines the critical differences between current and next-generation Si technologies (CMOS, BiCMOS and SiC) and technology platforms (e.g. system-on-chip) in mm-wave wireless applications. We provide a basic overview of the two technologies from a technical standpoint, followed by a review of the state-of-the-art of several key building blocks in wireless systems. The influences of system requirements on the choice of semiconductor technology are vital to understanding the merits of CMOS and BiCMOS devices - e.g., output power, battery life, adjacent channel interference, cost restrictions, and so forth. These requirements, in turn, affect component-level design and performance metrics of oscillators, mixers, power and low-noise amplifiers, as well as phase-locked loops and data converters. Finally, the book offers a peek into the next generation of wireless technologies such as THz -band systems and future 6G applications.
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-secure cryptosystem guarantees that the malicious third party cannot guess anything regarding the plain text or the key, even in the case of full access to the cipher text. Despite this advantage, there are only a few real-world implementations of perfect secrecy due to some well-known limitations. Any simple, straightforward modeling can pave the way for further advancements in the implementation, especially in environments with time and resource constraints such as IoT. This book takes one step towards this goal via presenting a hybrid combinatorial-Boolean model for perfectly-secure cryptography in IoT. In this book, we first present an introduction to information-theoretic cryptography as well as perfect secrecy and its real-world implementations. Then we take a systematic approach to highlight information-theoretic cryptography as a convergence point for existing trends in research on cryptography in IoT. Then we investigate combinatorial and Boolean cryptography and show how they are seen almost everywhere in the ecosystem and the life cycle of information-theoretic IoT cryptography. We finally model perfect secrecy in IoT using Boolean functions, and map the Boolean functions to simple, well-studied combinatorial designs like Latin squares.This book is organized in two parts. The first part studie s information-theoretic cryptography and the promise it holds for cryptography in IoT. The second part separately discusses combinatorial and Boolean cryptography, and then presents the hybrid combinatorial-Boolean model for perfect secrecy in IoT.
This book examines whether the integration of edge intelligence (EI) and blockchain (BC) can open up new horizons for providing ubiquitous intelligent services. Accordingly, the authors conduct a summarization of the recent research efforts on the existing works for EI and BC, further painting a comprehensive picture of the limitation of EI and why BC could benefit EI. To examine how to integrate EI and BC, the authors discuss the BC-driven EI and tailoring BC to EI, including an overview, motivations, and integrated frameworks. Finally, some challenges and future directions are explored. The book explores the technologies associated with the integrated system between EI and BC, and further bridges the gap between immature BC and EI-amicable BC.Explores the integration of edge intelligence (EI) and blockchain (BC), including their integrated motivations, frameworks and challenges;Presents how BC-driven EI can realize computing-power management, data administration, and model optimization;Describes how to tailor BC to better support EI, including flexible consensus protocol, effective incentive mechanism, intellectuality smart contract, and scalable BC system tailoring;Presents some key research challenges and future directions for the integrated system.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.