Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book features the proceedings of the 4th EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (BDCC 2021). The papers feature detail on cognitive computing and its self-learning systems that use data mining, pattern recognition and natural language processing (NLP) to mirror the way the human brain works. This international conference focuses on technologies from knowledge representation techniques and natural language processing algorithms to dynamic learning approaches. Topics covered include Data Science for Cognitive Analysis, Real-Time Ubiquitous Data Science, Platform for Privacy Preserving Data Science, and Internet-Based Cognitive Platform.
This book constitutes the refereed proceedings of the 18th International Conference on Information Security Practice and Experience, ISPEC 2023, held in Copenhagen, Denmark, in August 2023.The 27 full papers and 8 short papers included in this volume were carefully reviewed and selected from 80 submissions. The main goal of the conference is to promote research on new information security technologies, including their applications and their integration with IT systems in various vertical sectors.
This book constitutes the proceedings of the 16th International Conference on Social, Cultural, and Behavioral Modeling, SBP-BRiMS 2023, which was held in Pittsburgh, PA, USA in September 2023.The 31 full papers presented in this volume were carefully reviewed and selected from 73 submissions. The papers were organized in topical sections as follows: Detecting malign influence; human behavior modeling; and social-cyber behavior modeling.
This book constitutes the refereed proceedings of the 8th International Conference on Information, Communication and Computing Technology, ICICCT 2023, held in New Delhi, India, during May 27, 2023.The 14 full papers included in this book were carefully reviewed and selected from 60 submissions. They were organized in topical sections as follows: global platform for researchers, scientists and practitioners from both academia and industry to present their research and development activities in all the aspects of Pattern Recognition and computational Intelligence techniques.
This book focuses on practical implementation details, telecommunication techniques, security and technology challenges and approaches to implementing quantum technology in modern telecommunication systems. The authors use their extensive practical academic and industrial experience in network technologies and provide details from international projects in quantum cryptography in which they actively participate. Using a variety of examples, analogies, illustrations, tables, and features from practical quantum network realizations, the authors provide a unique view of quantum technology from an engineering telecommunication standpoint, allowing the reader to identify the advantages and challenges of quantum technology.This book also addresses challenges posed by quantum technology such as network organization, passive and active eavesdropping, and future trends in QKD such as Software Defined Networking (SDN) with QKD and application QKD in 5G networks. It is conceived through eight chapters by treating the following thematic units separately: Fundamentals of Quantum Key Distribution, QoS architecture/mode, QoS MAC layer, QoS signaling techniques for key management and session negotiation purpose and QoS routing protocols that minimize the consumption of key material through the equitable utilization of network resources when finding an optimal path. Through numerous information on practical solutions, simulation examples, illustrations, and analysis, readers can easily distinguish the specificity of quantum technology and understand the challenges and methods of practical implementation of quantum cryptography in common telecommunications standards. Researchers working in quantum technology and applied networking security as well as advanced-level students studying computer science and electrical engineering will benefit from this book. Professionals working within these related fields will also benefit from this book.
This textbook discusses the principles of queuing theory and teletraffic engineering in telecommunication networks. The book lays out the rigorous theoretical background while keeping strong links to practical applications and real-life scenarios. The overall goal of this textbook is to provide students with in-depth and broad understanding of the operational framework of teletraffic problems, and therefore the capability to select the most suitable and effective method to solve traffic engineering problems that may arise in real-life. The student will learn to pick and choose from a spectrum of tools, ranging from the simplest mathematical treatment to sophisticated models. The book features practical examples derived from real life, presented and discussed, establishing the links with the theoretical results. Pedagogical materials include end-of-chapter exercises and problems.
This book proposes promising mmWave solutions to promoting safe and reliable vehicular communications. The authors include topics such as channel estimation, multi-user transceiver design, and advanced index modulation. For channel estimation, unique channel properties and hybrid structures are first introduced, followed by the development of a doubly-sparse doubly-selective channel estimator. For multi-user transceiver design, the concept of hybrid block diagonalization (HBD) is first introduced, followed by a generic HBD-based transceiver design to maximize the system capacity. For advanced index modulation, the generalized beamspace modulation for uplink multi-user scenarios are first introduced, followed by the precoded beamspace modulation for the downlink. Finally, this book discusses open problems and future research directions to inspire further studies in the field of mmWave vehicular communications.
This textbook presents comprehensive treatment of the e-business environment and the tools and strategies necessary for success in the digital realm. The author covers a wide range of e-business-related topics, such as e-environment, e-business security, billing and payment systems, supply chain management, digital marketing, customer relationship management, business intelligence, e-business adoption, change management, performance measurement, legal, and regulatory. The book focuses on the ethical and legal issues of e-business and offers practical advice for establishing and maintaining successful e-business operations. The book also discusses the challenges of keeping up with swiftly evolving technology and the ever-changing internet landscape, including online transactions, data security, and administration. The author seeks to advance e-business research and practice by providing a comprehensive and up-to-date overview of the field. The author includes case studies that span various industries and companies, from small startups to large corporations, providing readers with a diverse and practical perspective on e-business.
This book provides readers with an overview of Cloud Computing, starting with historical background on mainframe computers and early networking protocols, leading to current concerns such as hardware and systems security, performance, emerging areas of IoT, Edge Computing, and healthcare etc. Readers will benefit from the in-depth discussion of cloud computing usage and the underlying architectures. The authors explain carefully the "e;why's and how's"e; of Cloud Computing, so engineers will find this book an invaluable source of information to the topic. This third edition includes new material on Cloud Computing Scalability, as well as best practices for using dynamic cloud infrastructure, and cloud operations management with cost optimizations. Several new examples and analysis of cloud security have been added, including ARM architecture and https protocol.Provides practical guidance for software developers engaged in migrating in-house applications to Public Cloud;Describes for IT managers how to improve their Cloud Computing infrastructures;Includes coverage of security concerns with Cloud operating models;Uses several case studies to illustrate the "e;why's and how's"e; of using the Cloud;Examples and options to improve Cloud Computing Scalability.
This book systematically presents the wireless sensing technology, which has become a promising sensing paradigm in recent years. It includes the introduction of underlying sensing principles, wireless signals, sensing methodologies and enabled applications. Meanwhile, it provides case studies to demonstrate how wireless sensing is applied for representative human and object sensing applications.This book also provides a wireless sensing framework as a guidance to understand and design a wireless sensing system or prototype based on their needs. It also presents a critical investigation of the challenges in achieving wireless sensing in both signal-level and application-level contexts. Accordingly, it summarizes the typical solutions to tackle the related challenges.Researchers and advanced-level students in computer science or electrical engineering working on the design of a wireless system will find this book useful as a reference. Professionals working in the wireless sensing industry will also find this book valuable as a reference tool.
This book constitutes the refereed proceedings of the 24th IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2023, held in Valencia, Spain, in September 2023.The 59 papers presented in this book were carefully reviewed and selected from 119 submissions.They provide a comprehensive overview of the major challenges in sustainability of collaborative ecosystems; risks, security and resilience in networks; collaborative value creation and services; collaborative interactions and human-centered networks; skills and enabling technologies; collaborative healthcare and agile production; and AI, digital twins, and intelligent frameworks.
The 9-volume set LNAI 14267-14275 constitutes the proceedings of the 16th International Conference on Intelligent Robotics and Applications, ICIRA 2023, which took place in Hangzhou, China, during July 5-7, 2023.The 413 papers included in these proceedings were carefully reviewed and selected from 630 submissions. They were organized in topical sections as follows:Part I: Human-Centric Technologies for Seamless Human-Robot Collaboration; Multimodal Collaborative Perception and Fusion; Intelligent Robot Perception in Unknown Environments; Vision-Based Human Robot Interaction and Application.Part II: Vision-Based Human Robot Interaction and Application; Reliable AI on Machine Human Reactions; Wearable Sensors and Robots; Wearable Robots for Assistance, Augmentation and Rehabilitation of Human Movements; Perception and Manipulation of Dexterous Hand for Humanoid Robot.Part III: Perception and Manipulation of Dexterous Hand for Humanoid Robot; Medical Imaging for Biomedical Robotics; Advanced Underwater Robot Technologies; Innovative Design and Performance Evaluation of Robot Mechanisms; Evaluation of Wearable Robots for Assistance and Rehabilitation; 3D Printing Soft Robots.Part IV: 3D Printing Soft Robots; Dielectric Elastomer Actuators for Soft Robotics; Human-like Locomotion and Manipulation; Pattern Recognition and Machine Learning for Smart Robots.Part V: Pattern Recognition and Machine Learning for Smart Robots; Robotic Tactile Sensation, Perception, and Applications; Advanced Sensing and Control Technology for Human-Robot Interaction; Knowledge-Based Robot Decision-Making and Manipulation; Design and Control of Legged Robots.Part VI: Design and Control of Legged Robots; Robots in Tunnelling and Underground Space; Robotic Machining of Complex Components; Clinically Oriented Design in Robotic Surgery and Rehabilitation; Visual and Visual-Tactile Perception for Robotics.Part VII: Visual and Visual-Tactile Perception for Robotics; Perception, Interaction, and Control of Wearable Robots; Marine Robotics and Applications; Multi-Robot Systems for Real World Applications; Physical and Neurological Human-Robot Interaction.Part VIII: Physical and Neurological Human-Robot Interaction; Advanced Motion Control Technologies for Mobile Robots; Intelligent Inspection Robotics; Robotics in Sustainable Manufacturing for Carbon Neutrality; Innovative Design and Performance Evaluation of Robot Mechanisms.Part IX: Innovative Design and Performance Evaluation of Robot Mechanisms; Cutting-Edge Research in Robotics.
This book constitutes the refereed proceedings of the 23rd IFIP WG 5.5 Working Conference on Virtual Enterprises, PRO-VE 2022, held in Lisbon, Portugal, in September 2022.The 55 papers presented were carefully reviewed and selected from 119 submissions. They provide a comprehensive overview of major challenges and recent advances in various domains related to the digital transformation and collaborative networks and their applications with a strong focus on the following areas related to the main theme of the conference: sustainable collaborative networks; sustainability via digitalization; analysis and assessment of business ecosystems; human factors in collaboration 4.0; maintenance and life-cycle management; policies and new digital services; safety and collaboration management; simulation and optimization; complex collaborative systems and ontologies; value co-creation in digitally enabled ecosystems; digitalization strategy in collaborative enterprises' networks; pathways and tools for DIHs; socio-technical perspectives on smart product-service systems; knowledge transfer and accelerated innovation in FoF; interoperability of IoT and CPS for industrial CNs; sentient immersive response network; digital tools and applications for collaborative healthcare; collaborative networks and open innovation in education 4.0; collaborative learning networks with industry and academia; and industrial workshop.
T¿his book constitutes the proceedings of the 36th International Conference on Architecture of Computing Systems, ARCS 2023, which took place in Athens, Greece, in June 2023.The 18 full papers in this volume were carefully reviewed and selected from 35 submissions.ARCS provides a platform covering newly emerging and cross-cutting topics, such as autonomous and ubiquitous systems, reconfigurable computing and acceleration, neural networks and artificial intelligence. The selected papers cover a variety of topics from the ARCS core domains, including energy efficiency, applied machine learning, hardware and software system security, reliable and fault-tolerant systems and organic computing.Back to top
This book covers several essential aspects of pervasive ambient backscatter communication, one of the most cutting-edge technologies for Internet-of-Things. It begins with introductory Part I, which presents visions, basic concepts, principles, and paradigms of ambient backscatter. Also, a taxonomy of state-of-the-art ambient backscatter systems is provided from the perspective of the OSI model. Part II and III study how ambient backscatter systems work on the communication and networking levels. Specifically, Part II discusses in detail how to make use of ambient WiFi signals to provide high-throughput backscatter communications with WiFi 1 (chapter 5), WiFi 2-3 (chapter 4), WiFi 4 (chapter 3), WiFi 5-6 (chapter 6) standards. Further, Part III includes several of the most advanced ambient backscatter network solutions, which are made possible by the first multi-hop backscatter (chapter 7), first backscatter mesh (chapter 8), and multiprotocol backscatter (chapter 9). On top of reliable communication and networks, we propose two novel applications that are thought impossible before, lightweight spatial sound recording over the air (chapter 10) and self-powered wireless wearables for healthcare (chapter 11). To conclude the monograph, we point out critical challenges for realizing the vision of pervasive backscatter IoTs and potential directions of ambient backscatter applications. The book provides an in-depth understanding of ambient backscatter technologies. In particular, we mainly take ubiquitous WiF signals as the communication sources and adopt a top-down approach to introduce three crucial subjects: WiFi backscatter communication, ambient backscatter network, and self-powered application systems. For each subject, we carefully divide it into several relatively independent topics, which come with the latest advances in pervasive backscatter and include extensive discussions of closely related state-of-the-art methodologies.
This book constitutes the refereed proceedings of the 18th International Workshop on Security, IWSEC 2023, which took place as a hybrid event in Yokohama, Japan, during August 29¿31, 2023. This event was held in hybrid mode.The 14 full papers presented in this book were carefully reviewed and selected from 47 submissions. They were organized in topical sections as follows: System and Hardware Security; Symmetric Key Cryptography; Public Key Cryptography; Zero Knowledge Proofs; and Card Based Cryptography.
This book proposes secure schemes to address security challenges in secure automatic dependent surveillance-broadcast systems (ADS-B) from five different angles. First, the authors examine encryption schemes applied to the ADS-B environment for protecting messages confidentiality. Second, they propose an ADS-B broadcast authentication scheme with batch verification by employing an identity-based signature. Third, they present ADS-B broadcast authentication scheme based on a digital signature with message recovery, which provides a feature that the message is recoverable from the signature. Fourth, they propose a new cryptographic solution to ADS-B security. Finally, they propose an accurate and efficient cognitive aircraft location verification scheme preserving aircraft location privacy by utilizing a grid-based k-nearest neighbor algorithm. In summary, the authors show how ADS-B data links can greatly enhance flight safety by these proposed schemes without sacrificing data security.Proposes several secure schemes to address security challenges in secure automatic dependent surveillance-broadcast systems (ADS-B);Provides extensive experiments and evaluates the proposed schemes using real-world data;Shows how ADS-B data links can greatly enhance safety without sacrificing data security
This book constitutes the proceedings of the 29th International Conference on Parallel and Distributed Computing, Euro-Par 2023, held in Limassol, Cyprus, in August/September 2023.The 49 full papers presented in this volume were carefully reviewed and selected from 164 submissions. They are covering the following topics: programming, compilers and performance; scheduling, resource management, cloud, edge computing, and workflows; architectures and accelerators; data analytics, AI, and computational science; theory and algorithms; multidisciplinary, and domain-specific and applied parallel and distributed computing.
This book constitutes the refereed proceedings of the 29th International Conference on Collaboration Technologies and Social Computing, CollabTech 2023, held in Osaka, Japan, during August 29¿September 1, 2023, in hybrid mode.The 8 full papers presented in this book together with 12 short papers were carefully reviewed and selected from 31 submissions. The papers focus on innovative technical, human and organizational approaches to expand collaboration support including computer science, management science, design science, cognitive and social science.
This book constitutes the thoroughly refereed post-workshop proceedings of the 4th International Workshop on Reproducible Research in Pattern Recognition, RRPR 2022, held in Montreal, Canada, in August 2022. The 5 revised full papers presented together with 4 short papers, were carefully reviewed and selected from 9 submissions. The papers were organized into three main categories
This book constitutes the refereed proceedings of the 23rd International Conference on Innovations for Community Services, I4CS 2023, held in Bamberg, Germany, in September 2023.The 15 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 38 submissions. One invited talk in full-paper length is included in the volume. The papers focus on topics such as distributed architectures and frameworks for community services, advanced applications regarding digital communities on the move, new trends of socialization covering the ambient work and living of digital societies.
This book reports on the latest advances from both industry and academia on ubiquitous intelligence and how it is enabled by 5G/6G communication technologies. The authors cover network protocol and architecture design, machine learning and artificial intelligence, coordinated control and digital twins technologies, and security and privacy enhancement for ubiquitous intelligence. The authors include recent studies of performance analysis and enhancement of the Internet of Things, cyber-physical systems, edge computing, and cyber twins, all of which provide importance guidance and theoretical tools for developing future ubiquitous intelligence. The content of the book will be of interest to students, educators, and researchers in academia, industry, and research laboratories.Provides comprehensive coverage of enabling communications, computing, and control technologies for ubiquitous intelligence;Presents a novel paradigm of ubiquitous intelligence powered by broadband communications, computing, and control;Includes a review of 5G/6G communication technologies, network protocol and architecture design, and ubiquitous computing.
This book constitutes the refereed proceedings of the 14th International Workshop on Post-Quantum Cryptography, PQCrypto 2022, held in College Park, MD, USA, in August 14¿18, 2023.The 25 full papers presented in this book were carefully reviewed and selected from 51 submissions. They are categorized in the following topical sections: code-based cryptography; group-action-based cryptography; isogenye-based cryptography; lattice-based cryptography; multivariate cryptography; quantum algorithms, cryptanalysis and models; post-quantum protocols; side channel cryptanalysis and countermeasures.
This two-volume set LNAI 13995 and LNAI 13996 constitutes the refereed proceedings of the 15th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2023, held in Phuket, Thailand, during July 24-26, 2023.The 65 full papers presented in these proceedings were carefully reviewed and selected from 224 submissions. The papers of the 2 volume-set are organized in the following topical sections: Case-Based Reasoning and Machine Comprehension; Computer Vision; Data Mining and Machine Learning; Knowledge Integration and Analysis; Speech and Text Processing; and Resource Management and Optimization.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.