Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book provides comprehensive insights into the theory, models, and unique characteristics of intelligent reflecting surface (IRS) and its appealing applications in wireless information and power transmission for B5G/6G. It is organized as follows:Chapter 1 gives an overview of the fundamentals of IRS, including the signal and channel models of IRS, its hardware architecture, advantages and practical constraints. Chapter 2, 3 and 4 focus on how to optimize the joint design of active and passive beamforming for three types of IRS-aided wireless information/energy transmission systems, namely IRS-aided power transfer (WPT), IRS-aided simultaneous wireless information and power transfer (SWIPT) and IRS-aided wireless powered communication networks (WPCN).Chapter 2 specifically presents a general framework design for IRS-aided WPT systems from the perspectives of energy beamforming design and channel estimation, while the dynamic IRS beamforming design is also discussed.Chapter 3 thoroughly studies the IRS-aided SWIPT for achieving better R-E trade-off, wherein two different designs based on weighted sum-power maximization at energy users (EUs) and under individual quality-of-service (QoS), requirements at both information users (IUs) and EUs are investigated. Chapter 4 presents three paradigms of IRS-aided WPCN, i.e., IRS-aided half-duplex (HD) WPCN, IRS-aided full-duplex (FD) WCPN and IRS-aided multiple-input-multiple-output (MIMO) FD WPCN. The authors present some related emerging topics, e.g., active IRS aided wireless communications and IRS-aided unmanned aerial vehicle (UAV) communications in chapter 5.This book targets postgraduate students studying electrical engineering and computer science, and can be used as a secondary textbook. Professionals, researchers and engineers working in wireless networks will also find this book useful as a reference.
This book provides a complete analysis of molecular communications systems from the paradigm of TCP/IP network stack, and it exploits network theories (e.g. independent functions of a layer into a stack, addressing, flow control, error control, and traffic control) and applies them to biological systems. The authors show how these models can be applied in different areas such as industry, medicine, engineering, biochemistry, biotechnology, computer sciences, and other disciplines. The authors then explain how it is possible to obtain enormous benefits from these practices when applied in medicine, such as enhancing current treatment of diseases and reducing the side effects of drugs and improving the quality of treatment for patients. The authors show how molecular communications systems, in contrast to existing telecommunication paradigms, use molecules as information carriers. They show how sender biological nanomachines (bio-nano machines) encode data on molecules (signal molecules) and release the molecules into the environment. They go on to explain how the molecules then travel through the environment to reach the receiver bio-nano machines, where they biochemically react with the molecules to decipher information. This book is relevant to those studying telecommunications and biomedical students, engineers, masters, PhDs, and researchers.
This volume constitutes selected papers presented at the 10th International Conference on Innovation and New Trends in Information Technology, INTIS 2022, held in Casablanca, Morocco, in May 2022, and 11th International Conference on Innovation and New Trends in Information Technology, INTIS 2023, held in Tangier, Morocco, in May 2023.After the thorough peer review process, 4 papers were selected from the 27 submissions received for INTIS 2022, and 11 papers were selected from the 33 submissions received for INTIS 2023. The presented papers cover the mail topics of data-enabled systems/applications: data source layer, network layer, data layer, learning layer, and reporting layers while considering non-functional properties such as data privacy, security, and ethics.
This book constitutes the refereed proceedings of the 17th IFIP WG 9.4 International Conference on Social Implications of Computers in Developing Countries, ICT4D 2022, which was supposed to be held in Lima, Peru, in May 2021, but was held virtually instead due to the COVID-19 pandemic.The 40 revised full papers presented were carefully reviewed and selected from 58 submissions. The papers present a wide range of perspectives and disciplines including (but not limited to) public administration, entrepreneurship, business administration, information technology for development, information management systems, organization studies, philosophy, and management. They are organized in the following topical sections: digital platforms and gig economy; education and health; inclusion and participation; and business innovation and data privacy.
This book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential knowledge required for conducting research in this field, it covers the foundational concepts of this topic as well. This book also offers a detailed insight into UAV networks from the physical layer security point of view.The authors discuss the appropriate channel models for characterizing various propagation environments that UAV networks are exposed. The state-of-the-art technologies, such as UAV trajectory design, cooperative jamming and reconfigurable intelligent surfaces are covered. The corresponding algorithms for significantly improving the security of UAV networks, along with practical case studies on topics such as energy-efficient and secure UAV networks, elevation angle-distance trade-off for securing UAV networks and securing UAV networks with the aid of reconfigurable intelligent surfaces are presented as well. Last, this book outlines the future challenges and research directions to facilitate further studies on secure UAV networks. This book is suitable reading for graduate students and researchers who are interested in the research areas of UAV networking and communications, IoT security, and physical layer security in wireless networks. Professionals working within these related fields will also benefit from this book.
This book constitutes the revised selected papers of the First International Conference, ICSD 2023, virtually held in Delhi, India, during July 15¿16, 2023.The book comprises 31 full papers that were selected from a total of 129 submissions. It provides insights into the latest research and advancements in sustainable development through the integration of machine learning, artificial intelligence, and IoT technologies. It serves as a valuable resource for researchers, practitioners, and policymakers working in the field of sustainable development.
This book introduces the concept of approximate computing for software and hardware designs and its impact on the reliability of embedded systems. It presents approximate computing methods and proposes approximate fault tolerance techniques applied to programmable hardware and embedded software to provide reliability at low computational costs. The book also presents fault tolerance techniques based on approximate computing, thus presenting how approximate computing can be applied to safety-critical systems.
This book covers the state-of-the-art research in design of modern electronic systems used in safety-critical applications such as medical devices, aircraft flight control, and automotive systems. The authors discuss lifetime reliability of digital systems, as well as an overview of the latest research in the field of reliability-aware design of integrated circuits. They address modeling approaches and techniques for evaluation and improvement of lifetime reliability for nano-scale CMOS digital circuits, as well as design algorithms that are the cornerstone of Computer Aided Design (CAD) of reliable VLSI circuits. In addition to developing lifetime reliability analysis and techniques for clocked storage elements (such as flip-flops), the authors also describe analysis and improvement strategies targeting commercial digital circuits.
This book has come out of the art project "Icons on Lids of Ammunition Boxes" initiated and led by Sofiia (Sonya) Atlantova and Oleksandr Klymenko. Painted on fragments of empty cartridge containers brought back from the front, the icons are silent witnesses to Russia's covert war against Ukraine in the Donets Basin in 2014-2021. At the same time, they are testimony to the victory of life over death - not only in symbolic but also in real terms. Since the spring of 2015, the project was a volunteer initiative whose revenues support the Pirogov First Volunteer Mobile Hospital. This unit provided medical assistance to military personnel and civilians in the Anti-Terrorist Operation / Joint Forces Operation zone.The contributors to the book include Volodymyr Rafeyenko, Hennadiy Druzenko, Archimandrite Kyrylo Hovorun, George Weigel, and Zoya Chegusova.
Alexander Strashny examinines what defines Ukrainians as a people and makes them tick. Based on an analysis of Ukraine¿s history, everyday life, economy, military affairs, gender, religion, art, music, and other cultural aspects, the Strashny, a trained psychoanlyst and prolific author, outlines those psychological features of Ukrainians that define them as a distinctive nation. Upon examining similarities and differences between Ukrainians and Europeans, on the one hand, and Russians, on the other, the author singles out the fifty most salient features of the Ukrainian outlook, whose combination constitutes the essence of the Ukrainian mentality. The book explains how the population of a relatively small country successfully resists a more powerful and ruthless aggressor.
Die zunehmende Datenflut und der Bedarf an zentralisierten, zugänglichen Speicherlösungen hat die Bedeutung von Netzwerkspeicherlösungen (NAS) in den Vordergrund gerückt. Das Herzstück des Buches bildet die umfassende Anleitung für die Implementierung eines NAS als Web- und Datenbankserver. Es behandelt eingehend die Integration und Verwaltung von NAS in Netzwerkumgebungen. Dabei werden essenzielle Themen wie IP-Konfigurationen, Routing und Switching sowie die Einrichtung von Nutzerkonten und Zugriffsrechten detailliert beleuchtet, um eine sichere und erweiterbare Netzwerkinfrastruktur zu schaffen.Der Bereich Sicherheit erhält eine besondere Betonung. Leserinnen und Leser erhalten Einblick in Firewall-Konfigurationen, den Umgang mit SSL-Zertifikaten, die Einrichtung von VPNs und Strategien zur Abwehr von DDoS-Angriffen. Zudem werden präventive Maßnahmen und Methoden zur Überwachung und Alarmierung, die die Integrität und Sicherheit des NAS gewährleisten, eingehend besprochen.Speicherstrategien sind ein weiterer zentraler Punkt des Buches, wo verschiedene RAID-Konfigurationen und -Level unter die Lupe genommen werden, um ein umfassendes Verständnis ihrer Vor- und Nachteile zu vermitteln. Ergänzt wird dieser Teil durch praxisnahe Erläuterungen zu Methoden der Speichereffizienz, einschließlich Thin Provisioning und Daten Deduplizierung.Das Buch wendet sich an IT-Professionals und technikaffine Heimanwender gleichermaßen, die das volle Potenzial eines NAS-Systems ausschöpfen möchten. Es dient als Wegweiser, um die technischen Möglichkeiten moderner Netzwerkspeicher voll auszunutzen und in anspruchsvollen Anwendungen effektiv zu nutzen.
This book constitutes the refereed proceedings of the 5th Multidisciplinary International Symposium on Disinformation in Open Online Media, MISDOOM 2023, which was held in Amsterdam, The Netherlands, during November 21¿22, 2023.The 13 full papers presented in this book were carefully reviewed and selected from 19 submissions. The papers focus on misinformation, disinformation, hate speech, disinformation campaigns, social network analysis, large language models, generative AI, and multi-modal embeddings.
While reporting on the war in Ukraine, George Butler has created striking and intimate illustrations to introduce us to the people behind the headlines. His drawings, made in a variety of places, from missile-scarred streets to nursing homes, vividly capture stories of family, tragedy and perseverance. These powerful portraits of war and conflict are a timely reminder of the humanity we all share and our universal need for peace. A stunning, illuminating and sensitive look at stories that deserve to be told.
The benefits of digitalisation do not lie in the use of new technologies for existing processes, but in organisational changes and new business models. The book highlights the composable enterprise as the guiding principle for successful digital transformation and associated cost reductions and revenue increases. What does it mean? A composable enterprise is organised in a decentralised process-oriented way. This allows the enterprise to react quickly to new situations, develop or change processes and business models. The information systems are based on platform architectures. A paradigm shift to monolithic applications.Sector concepts for industry, consulting and universities show how organisation and application architectures interlock in the composable enterprise.The reader receives inspiration, a foundation and a compass for the digital transformation of a company to the composable enterprise.
This book overviews the drivers behind the smart city vision, describes its dimensions and introduces the reference architecture. It further enumerates and classifies threats targeting the smart city concept, links corresponding attacks, and traces the impact of these threats on operations, society and the environment. This book also introduces analytics-driven situational awareness, provides an overview of the respective solutions and highlights the prevalent limitations of these methods. The research agenda derived from the study emphasizes the demand and challenges for developing holistic approaches to transition these methods to practice equipping the user with extensive knowledge regarding the detected attack instead of a sole indicator of ongoing malicious events. It introduces a cyber-situational awareness framework that can be integrated into smart city operations to provide timely evidence-based insights regarding cyber incidents and respective system responses to assist decision-making. This book targets researchers working in cybersecurity as well as advanced-level computer science students focused on this field. Cybersecurity operators will also find this book useful as a reference guide.
This book constitutes the refereed proceedings of the 34th Australasian Database Conference on Databases Theory and Applications, ADC 2023, held in Melbourne, VIC, Australia, during November 1-3, 2023.The 26 full papers presented in this volume are carefully reviewed and selected from 41 submissions. They were organized in topical sections named: Mining Complex Types of Data, Natural Language Processing and Text Analysis, Machine Learning and Computer Vision, Database Systems and Data Storage, Data Quality and Fairness for Graphs and Graph Mining and Graph Algorithms.
This book constitutes the proceedings of the 28th Nordic Conference, NordSec 2023, held in Oslo, Norway, during November 16¿17, 2023.The 18 full papers included in this volume were carefully reviewed and selected from 55 submissions. This volume focuses on a broad range of topics within IT security and privacy.
This book constitutes the refereed proceedings of the 43rd SGAI International Conference on Artificial Intelligence, AI 2023, held in Cambridge, UK, during December 12¿14, 2023.The 27 full papers and 20 short papers included in this book are carefully reviewed and selected from 67 submissions. They were organized in topical sections as follows: Technical Papers: Speech and Natural Language Analysis, Image Analysis, Neural Nets, Case Based Reasoning and Short Technical Papers. Application Papers: Machine Learning Applications, Machine Vision Applications, Knowledge Discovery and Data Mining Applications, other AI Applications and Short Application Papers.
Erfahren Sie mit diesem Buch alles über die angewandte NetzwerktechnikIm privaten Bereich spielt Netzwerktechnik eine eher untergeordnete Rolle. Dabei sorgt sie erst dafür, dass die Kommunikation via Internet funktioniert. Der industrielle Sektor hat die Vorteile des Datenaustauschs mit Hilfe von Netzwerken allmählich erkannt. Doch erst im Rahmen der ¿Industrie 4.0¿ wird laut Valentin Plenk die Datenübertragung in Echtzeit mehr Bedeutung gewinnen. Mit Blick auf diese Entwicklung stellt er in seinem Buch im Sinne der angewandten Netzwerktechnik speziell die höheren Schichten der Netzwerktechnik in den Fokus. Dieses kompakte Lehrbuch zeigt Ihnen anhand von konkreten, in Java ausprogrammierten Beispielen, wie Informationen zwischen Systemen über ein Netzwerk ausgetauscht werden können. Pro Kapitel behandelt dieses Netzwerktechnik-Buch ein bestimmtes Thema. Nach der Einführung in die Grundlagen der Kommunikation geht derAutor zunächst auf Java-Streams, Zeichencodierung sowie die Netzwerkanalyse mit Wireshark ein. Anschließend schenkt Plenk speziell folgenden Datenaustauschformaten sowie Protokollen besonderes Augenmerk:¿ JSON¿ HTML¿ HTTP¿ OPC UA¿ TCP/IP¿ UDP/IPKonkrete Beispiele und Übungen geben Ihnen PraxiseinblickeAuf diese Weise deckt dieses Buch über die angewandte Netzwerktechnik den gesamten Bereich technischer Kommunikation ab, von den Netzwerkprotokollen bis hin zum Versenden von Netzwerktelegrammen. Durch diese breite Themenauswahl bekommen Sie als Leser ein tieferes Verständnis für die typischen Problemstellungen in der Anwendung der Netzwerktechnik. Sie erfahren mehr über die Darstellung von Daten in einem bestimmten Dateiformat und wie Sie Daten mittels Standardprotokollen austauschen können. Zudem lernen Sie, wie Sie eigene, einfache Protokolle auf der Basis von TCP/IP erstellen können. Schwerpunkt des Buches bildet dabei immer die Anwendung von Netzwerken.Mit Hilfe zahlreicher Übungsaufgaben (inklusive Lösungsvorschlägen) sowie Anwendungsbeispielen können Sie Ihren persönlichen Kenntnisstand überprüfen und das Gelernte vertiefen. So sind Sie ideal auf die Praxis vorbereitet. Die zweite Auflage des Buchs ¿Angewandte Netzwerktechnik kompakt¿ wurde um den Themenbereich Webservices ergänzt. Im Abschnitt zu UDP/IP finden Sie jetzt außerdem hilfreiche Codebeispiele für Broadcast und Multicast.
This book constitutes the proceedings of the 22st International Conference on Embedded Computer Systems: Architectures, Modeling, and Simulation, SAMOS 2021, which took place in July 2022 in Samos, Greece. The 11 full papers and 7 short papers presented in this volume were carefully reviewed and selected from 45 submissions. The conference covers a wide range of embedded systems design aspects, including machine learning accelerators, and power management and programmable dataflow systems.
Ein älterer Herr schreibt seine Erfahrungen aus den ersten Jahren der IT. Damals wurde noch lange nicht erkannt, was für einen gigantischen Wandel sie in der Geschichte des Menschen bringen würde.Erfolge der IT und der dabei auch so übliche "Flops" sowie auch seine eigenen halten sich im Buch so etwa die Waage. Es wurde versucht, die technischen Details durch eine möglichst präzise Beschreibung auch für Laien auf diesem Gebiet etwas verdaulicher zu gestalten. Die Fachwörter sind auf Englisch besser bekannt als auf Deutsch und werden darum in dieser Sprache belassen. Die beim Niederschreiben unausweichlich aufkommende Assoziation leitet über zu menschlichen Anekdoten, Episoden und anderen Abschweifungen. Oft amüsant. Oft nachdenklich. Von denen er aber unweigerlich sehr bald wieder in die Realität der immer rasender sich entwickelnden Computer-Welt zurückkommt.
This book constitutes the proceedings of the 12th International Congress on Telematics and Computing, WITCOM 2023, held in Puerto Vallarta, Mexico, in November 2023. The 35 full papers presented in this volume were carefully reviewed and selected from 88 submissions. The papers are focused on the topics of artificial intelligence techniques, data science, blockchain, environment monitoring, cybersecurity, education, and software for communications protocols.
This book constitutes the refereed proceedings of the 21st International Conference on Software Engineering and Formal Methods, SEFM 2023, held in Eindhoven, The Netherlands, during November 6-10, 2023.The 18 regular papers presented in this book, together with 1 invited paper and 1 tool paper, were carefully reviewed and selected from 41 submissions. The SEFM conference series aims to bring together researchers and practitioners from academia, industry and government, to advance the state of the art in formal methods, to facilitate their uptake in the software industry, and to encourage their integration within practical software engineering methods and tools.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.