Browse Results

Showing 1,876 through 1,900 of 21,665 results

5G Mobile Communications

by Wei Xiang Kan Zheng Xuemin Sherman Shen

This book provides a comprehensive overview of the emerging technologies for next-generation 5G mobile communications, with insights into the long-term future of 5G. Written by international leading experts on the subject, this contributed volume covers a wide range of technologies, research results, and networking methods. Key enabling technologies for 5G systems include, but are not limited to, millimeter-wave communications, massive MIMO technology and non-orthogonal multiple access.5G will herald an even greater rise in the prominence of mobile access based upon both human-centric and machine-centric networks. Compared with existing 4G communications systems, unprecedented numbers of smart and heterogeneous wireless devices will be accessing future 5G mobile systems. As a result, a new paradigm shift is required to deal with challenges on explosively growing requirements in mobile data traffic volume (1000x), number of connected devices (10–100x), typical end-user data rate (10–100x), and device/network lifetime (10x). Achieving these ambitious goals calls for revolutionary candidate technologies in future 5G mobile systems. Designed for researchers and professionals involved with networks and communication systems, 5G Mobile Communications is a straightforward, easy-to-read analysis of the possibilities of 5G systems.

IBM Sametime 8.5.2 Administration Guide

by Gabriella Davis Marie L. Scott Thomas Duff

The IBM Lotus Sametime 8.5.2 Administration Guide uses a practical, no-nonsense approach to give you the essential information you need. Using realistic scenarios, you learn how to configure and maintain your environment to meet your needs and take advantage of the flexibility offered in Sametime 8.5.2. If you are responsible for installing and administering Sametime 8.5.2, then this book is for you. If you're completely new to Sametime administration, this book will serve as your roadmap. If you're making the jump from a prior version of Sametime, then you'll see how Sametime 8.5.2 differs and how you work with the new configuration. Even if you already have Sametime 8.5.2 up and running, this guide will answer those questions you may still have of why and how the various server components work.

Global Mobile Satellite Communications Theory: For Maritime, Land and Aeronautical Applications

by Stojče Dimov Ilčev

This book discusses current theory regarding global mobile satellite communications (GMSC) for maritime, land (road and rail), and aeronautical applications. It covers how these can enable connections between moving objects such as ships, road and rail vehicles and aircrafts on one hand, and on the other ground telecommunications subscribers through the medium of communications satellites, ground earth stations, Terrestrial Telecommunication Networks (TTN), Internet Service Providers (ISP) and other wireless and landline telecommunications providers. This new edition covers new developments and initiatives that have resulted in land and aeronautical applications and the introduction of new satellite constellations in non-geostationary orbits and projects of new hybrid satellite constellations. The book presents current GMSC trends, mobile system concepts and network architecture using a simple mode of style with understandable technical information, characteristics, graphics, illustrations and mathematics equations. The first edition of Global Mobile Satellite Communications (Springer, 2005) was split into two books for the second edition—one on applications and one on theory. This book presents global mobile satellite communications theory.

Utility Communication Networks and Services: Specification, Deployment and Operation (CIGRE Green Books)

by Carlos Samitier

This CIGRE green book begins by addressing the specification and provision of communication services in the context of operational applications for electrical power utilities, before subsequently providing guidelines on the deployment or transformation of networks to deliver these specific communication services. Lastly, it demonstrates how these networks and their services can be monitored, operated, and maintained to ensure that the requisite high level of service quality is consistently achieved.

On Privacy-Preserving Protocols for Smart Metering Systems: Security and Privacy in Smart Grids

by Fábio Borges de Oliveira

This book presents current research in privacy-preserving protocols for smart grids. It contains several approaches and compares them analytically and by means of simulation. In particular, the book introduces asymmetric DC-Nets, which offer an ideal combination of performance and features in comparison with homomorphic encryption; data anonymization via cryptographic protocols; and data obfuscation by means of noise injection or by means of the installation of storage banks. The author shows that this theory can be leveraged into several application scenarios, and how asymmetric DC-Nets are generalizations of additive homomorphic encryption schemes and abstractions of symmetric DC-Nets. The book provides the reader with an understanding about smart grid scenarios, the privacy problem, and the mathematics and algorithms used to solve it.

Radio Frequency Modulation Made Easy (SpringerBriefs in Electrical and Computer Engineering)

by Saleh Faruque

This book introduces Radio Frequency Modulation to a broad audience. The author blends theory and practice to bring readers up-to-date in key concepts, underlying principles and practical applications of wireless communications. The presentation is designed to be easily accessible, minimizing mathematics and maximizing visuals.

Out-thinking Organizational Communications: The Impact of Digital Transformation (Management for Professionals)

by Joachim Klewes Dirk Popp Manuela Rost-Hein

This book demonstrates the challenges for Corporate Communications in the era of the Industrial Internet and the Internet of things, and how companies can adapt their communication strategies to meet them. The Industrial Internet and the Internet of Things herald a transformation in our economy, industry and society. As such, it is high time that companies adjust both their communication strategies and the structure of their communications to reflect these changes. In this book, experts from the corporate world, academia, professional associations, government organizations and NGOs discuss various challenges – from Corporate and Leadership Communication and Employer Branding to Change/Personnel Management and changes in the supply chain – that can be confronted in everyday working environment. Revealing contributions from an interdisciplinary mix of perspectives help offer a more detailed picture of what future programs and standards might look like. The book also features best practice cases that offer practical insights into addressing the Corporate Communications challenges that are to come.

Data Deduplication for Data Optimization for Storage and Network Systems

by Daehee Kim Sejun Song Baek-Young Choi

This book introduces fundamentals and trade-offs of data de-duplication techniques. It describes novel emerging de-duplication techniques that remove duplicate data both in storage and network in an efficient and effective manner. It explains places where duplicate data are originated, and provides solutions that remove the duplicate data. It classifies existing de-duplication techniques depending on size of unit data to be compared, the place of de-duplication, and the time of de-duplication. Chapter 3 considers redundancies in email servers and a de-duplication technique to increase reduction performance with low overhead by switching chunk-based de-duplication and file-based de-duplication. Chapter 4 develops a de-duplication technique applied for cloud-storage service where unit data to be compared are not physical-format but logical structured-format, reducing processing time efficiently. Chapter 5 displays a network de-duplication where redundant data packets sent by clients are encoded (shrunk to small-sized payload) and decoded (restored to original size payload) in routers or switches on the way to remote servers through network. Chapter 6 introduces a mobile de-duplication technique with image (JPEG) or video (MPEG) considering performance and overhead of encryption algorithm for security on mobile device.

Components and Services for IoT Platforms: Paving the Way for IoT Standards

by Georgios Keramidas Nikolaos Voros Michael Hübner

This book serves as a single-source reference to the state-of-the-art in Internet of Things (IoT) platforms, services, tools, programming languages, and applications. In particular, the authors focus on IoT-related requirements such as low-power, time-to-market, connectivity, reliability, interoperability, security, and privacy. Authors discuss the question of whether we need new IoT standardization bodies or initiatives, toward a fully connected, cyber-physical world. Coverage includes the research outcomes of several, current European projects related to IoT platforms, services, APIs, tools, and applications.

QoE Management in Wireless Networks (SpringerBriefs in Electrical and Computer Engineering)

by Ying Wang Wen'An Zhou Ping Zhang

This SpringerBrief presents research results on QoE management schemes for mobile services, including user services, and resource allocation. Along with a review of the research literature, it offers a data-driven architecture for personalized QoE management in wireless networks. The primary focus is on introducing efficient personalized character extraction mechanisms, e.g., context-aware Bayesian graph model, and cooperative QoE management mechanisms. Moreover, in order to demonstrate in the effectiveness of the QoE model, a QoE measurement platform is described and its collected data examined. The brief concludes with a discussion of future research directions. The example mechanisms and the data-driven architecture provide useful insights into the designs of QoE management, and motivate a new line of thinking for users' satisfaction in future wireless networks.

Industrial Internet of Things: Cybermanufacturing Systems (Springer Series in Wireless Technology)

by Sabina Jeschke Christian Brecher Houbing Song Danda B. Rawat

This book develops the core system science needed to enable the development of a complex industrial internet of things/manufacturing cyber-physical systems (IIoT/M-CPS). Gathering contributions from leading experts in the field with years of experience in advancing manufacturing, it fosters a research community committed to advancing research and education in IIoT/M-CPS and to translating applicable science and technology into engineering practice. Presenting the current state of IIoT and the concept of cybermanufacturing, this book is at the nexus of research advances from the engineering and computer and information science domains. Readers will acquire the core system science needed to transform to cybermanufacturing that spans the full spectrum from ideation to physical realization.

Advanced Sensing Techniques for Cognitive Radio (SpringerBriefs in Electrical and Computer Engineering)

by Guodong Zhao Wei Zhang Shaoqian Li

This SpringerBrief investigates advanced sensing techniques to detect and estimate the primary receiver for cognitive radio systems. Along with a comprehensive overview of existing spectrum sensing techniques, this brief focuses on the design of new signal processing techniques, including the region-based sensing, jamming-based probing, and relay-based probing. The proposed sensing techniques aim to detect the nearby primary receiver and estimate the cross-channel gain between the cognitive transmitter and primary receiver. The performance of the proposed algorithms is evaluated by simulations in terms of several performance parameters, including detection probability, interference probability, and estimation error. The results show that the proposed sensing techniques can effectively sense the primary receiver and improve the cognitive transmission throughput. Researchers and postgraduate students in electrical engineering will find this an exceptional resource.

Fiber-Wireless Convergence in Next-Generation Communication Networks: Systems, Architectures, and Management (Optical Networks)

by Massimo Tornatore Gee-Kung Chang Georgios Ellinas

This book investigates new enabling technologies for Fi-Wi convergence. The editors discuss Fi-Wi technologies at the three major network levels involved in the path towards convergence: system level, network architecture level, and network management level. The main topics will be: a. At system level: Radio over Fiber (digitalized vs. analogic, standardization, E-band and beyond) and 5G wireless technologies; b. Network architecture level: NGPON, WDM-PON, BBU Hotelling, Cloud Radio Access Networks (C-RANs), HetNets. c. Network management level: SDN for convergence, Next-generation Point-of-Presence, Wi-Fi LTE Handover, Cooperative MultiPoint.

Artificial Neural Networks: A Practical Course

by Ivan Nunes da Silva Danilo Hernane Spatti Rogerio Andrade Flauzino Luisa Helena Liboni Silas Franco dos Reis Alves

This book provides comprehensive coverage of neural networks, their evolution, their structure, the problems they can solve, and their applications. The first half of the book looks at theoretical investigations on artificial neural networks and addresses the key architectures that are capable of implementation in various application scenarios. The second half is designed specifically for the production of solutions using artificial neural networks to solve practical problems arising from different areas of knowledge. It also describes the various implementation details that were taken into account to achieve the reported results. These aspects contribute to the maturation and improvement of experimental techniques to specify the neural network architecture that is most appropriate for a particular application scope. The book is appropriate for students in graduate and upper undergraduate courses in addition to researchers and professionals.

LTE-A Cellular Networks: Multi-hop Relay for Coverage, Capacity and Performance Enhancement

by Abid Yahya

In this book, three different methods are presented to enhance the capacity and coverage area in LTE-A cellular networks. The scope involves the evaluation of the effect of the RN location in terms of capacity and the determination of the optimum location of the relay that provides maximum achievable data rate for users with limited interference at the cell boundaries. This book presents a new model to enhance both capacity and coverage area in LTE-A cellular network by determining the optimum location for the RN with limited interference. The new model is designed to enhance the capacity of the relay link by employing two antennas in RN. This design enables the relay link to absorb more users at cell edge regions. An algorithm called the Balance Power Algorithm (BPA) is developed to reduce MR power consumption. The book pertains to postgraduate students and researchers in wireless & mobile communications.

Massive MIMO Meets Small Cell: Backhaul and Cooperation (SpringerBriefs in Electrical and Computer Engineering)

by Howard H. Yang Tony Q.S. Quek

This brief explores the utilization of large antenna arrays in massive multiple-input-multiple-output (MIMO) for both interference suppression, where it can improve cell-edge user rates, and for wireless backhaul in small cell networks, where macro base stations can forward data to small access points in an energy efficient way. Massive MIMO is deemed as a critical technology for next generation wireless technology. By deploying an antenna array that has active elements in excess of the number of users, massive MIMO not only provides tremendous diversity gain but also powers new aspects for network design to improve performance. This brief investigates a better utilization of the excessive spatial dimensions to improve network performance. It combines random matrix theory and stochastic geometry to develop an analytical framework that accounts for all the key features of a network, including number of antenna array, base station density, inter-cell interference, random base station deployment, and network traffic load. The authors explore the impact from different network parameters through numerical analysis.Researchers in wireless network design will find this to be an exceptional resource, as will advanced-level students or professionals working in networking and information systems design.

IBM WebSphere Portal 8: Web Experience Factory And The Cloud

by Chelis Camargo Helmar Martens

This book is written in simple, easy to understand format with lots of screenshots and step-by-step explanations. If you are an IBM WebSphere Portal developer, looking to develop and enhance enterprise portals by understanding the complete portal project lifecycle, then this is the best guide for you. This book assumes that you have a fundamental knowledge of working in the WebSphere Portal environment.

Observing the Volcano World: Volcano Crisis Communication (Advances in Volcanology)

by Carina J. Fearnley Deanne K. Bird Katharine Haynes William J. McGuire Gill Jolly

This open access book provides a comprehensive overview of volcanic crisis research, the goal being to establish ways of successfully applying volcanology in practice and to identify areas that need to be addressed for future progress. It shows how volcano crises are managed in practice, and helps to establish best practices. Consequently the book brings together authors from all over the globe who work with volcanoes, ranging from observatory volcanologists, disaster practitioners and government officials to NGO-based and government practitioners to address three key aspects of volcanic crises. First, the book explores the unique nature of volcanic hazards, which makes them a particularly challenging threat to forecast and manage, due in part to their varying spatial and temporal characteristics. Second, it presents lessons learned on how to best manage volcanic events based on a number of crises that have shaped our understanding of volcanic hazards and crises management. Third, it discusses the diverse and wide-ranging aspects of communication involved in crises, which merge old practices and new technologies to accommodate an increasingly challenging and globalised world. The information and insights presented here are essential to tapping established knowledge, moving towards more robust volcanic crises management, and understanding how the volcanic world is perceived from a range of standpoints and contexts around the globe.

Energy and Bandwidth-Efficient Wireless Transmission (Signals and Communication Technology)

by Wei Gao

This book introduces key modulation and predistortion techniques for approaching power and spectrum-efficient transmission for wireless communication systems. The book presents a combination of theoretical principles, practical implementations, and actual tests. It focuses on power and spectrally efficient modulation and transmission techniques in the portable wireless communication systems, and introduces currently developed and designed RF transceivers in the latest wireless markets. Most materials, design examples, and design strategies used are based on the author’s two decades of work in the digital communication fields, especially in the areas of the digital modulations, demodulations, digital signal processing, and linearization of power amplifiers. The applications of these practical products and equipment cover the satellite communications on earth station systems, microwave communication systems, 2G GSM and 3G WCDMA mobile communication systems, and 802.11 WLAN systems.>

Security Challenges and Approaches in Internet of Things (SpringerBriefs in Electrical and Computer Engineering)

by Sridipta Misra Muthucumaru Maheswaran Salman Hashmi

This book provides a comprehensive survey of the security and privacy research advancements in Internet of Things (IoT). The book lays the context for the discussion by introducing a system model for IoT. Since IoT is very varied and has been introduced in many different contexts, the system model introduced plays a crucial role in integrating the concepts into a coherent framework. After the system model, the book introduces the vulnerable features of the IoT. By providing a comprehensive discussion of the vulnerable features, the book highlights the problem areas of IoT that should be studied concerning security and privacy. Using the vulnerable features as a motivation, the book presents a vast survey of existing security and privacy approaches for IoT. The survey is a good way for the reader to pick up interesting directions of research that have already been explored and also hints at directions that could take additional investigation. Finally, the book presents four case studies that provide a detailed view of how some of the security and privacy concerns are addressed in specific problem areas.

Information Fusion for Cyber-Security Analytics (Studies in Computational Intelligence #691)

by Izzat M Alsmadi George Karabatis Ahmed Aleroud

This book highlights several gaps that have not been addressed in existing cyber security research. It first discusses the recent attack prediction techniques that utilize one or more aspects of information to create attack prediction models. The second part is dedicated to new trends on information fusion and their applicability to cyber security; in particular, graph data analytics for cyber security, unwanted traffic detection and control based on trust management software defined networks, security in wireless sensor networks & their applications, and emerging trends in security system design using the concept of social behavioral biometric. The book guides the design of new commercialized tools that can be introduced to improve the accuracy of existing attack prediction models. Furthermore, the book advances the use of Knowledge-based Intrusion Detection Systems (IDS) to complement existing IDS technologies. It is aimed towards cyber security researchers.

Advances in Network Systems: Architectures, Security, and Applications (Advances in Intelligent Systems and Computing #461)

by Maciej Grzenda Ali Ismail Awad Janusz Furtak Jarosław Legierski

This book provides the reader with a comprehensive selection of cutting–edge algorithms, technologies, and applications. The volume offers new insights into a range of fundamentally important topics in network architectures, network security, and network applications. It serves as a reference for researchers and practitioners by featuring research contributions exemplifying research done in the field of network systems. In addition, the book highlights several key topics in both theoretical and practical aspects of networking. These include wireless sensor networks, performance of TCP connections in mobile networks, photonic data transport networks, security policies, credentials management, data encryption for network transmission, risk management, live TV services, and multicore energy harvesting in distributed systems.

Vehicular Cyber Physical Systems: Adaptive Connectivity and Security

by Danda B. Rawat Chandra Bajracharya

This book provides probabilistic, deterministic and geolocation-aware approaches for adaptive connectivity, robust security and privacy-aware communications for vehicular cyber physical systems (CPS). It presents mathematical models and numerical results obtained from experiments and simulations, and a trade-off between connectivity, security and privacy for vehicular communications.Connectivity between vehicles is crucial for vehicular CPS. Intelligent vehicular CPS provides not only road safety and traffic efficiency by exchanging information among vehicles, but also offers infotainment services to passengers using a variety of wireless technologies to forward the traffic/trajectory information with Vehicle-to-Vehicle (V2V), vehicular ad hoc network (VANET), and Vehicle-to-Roadside-to-Vehicle (V2R2V) communications. The book covers how to ensure that the message received from other vehicles is secure and trustworthy, rather than malicious. Further, it reveals how to make sure that the privacy of participants is not revealed while validating the received message. Researchers and professionals working with vehicular networks, smart systems, cyber physical systems, and mobile privacy will find this book valuable.

Casting Off: How A City Girl Found Happiness On The High Seas

by Emma Bamford

As a journalist for the Independent, Emma Bamford is swept along with the London rat race, lost amongst the egos of Fleet Street. Surrounded by budget cuts and bullies, the thrill of a breaking news story is no longer enough. And at 31, still struggling to get to a fourth date and surrounded by friends settling down to married life and babies, Emma decides to grasp her life by the roots and reclaim her freedom...by running away to sea and joining a complete stranger (and his cat) on a yacht in Borneo.Reflective yet humorous and self-deprecating, we share Emma's excitement and fear at leaving a good job for an unknown adventure, and join her as she travels to some of the most exotic places in the world and starts to realise what really matters in life. She discovers the supreme awkwardness of sharing a tiny space with total strangers, the unimaginable beauty of paradise islands and secret jungle rivers, glimpses lost tribes, works all hours for demanding superyacht owners, and has a terrifyingly near miss with pirates. Fending off romantic propositions from a Moldovan pig farmer and a Sri Lanken village chief amongst others, Emma finds adventure and happiness in the most unlikely places.From planning each day meticulously to learning to let go and leave things to chance, Emma's story shows that it is possible to break free and find happiness – and love – on your own terms.

Handbook of Integrated CSR Communication (CSR, Sustainability, Ethics & Governance)

by Sandra Diehl Matthias Karmasin Barbara Mueller Ralf Terlutter Franzisca Weder

This handbook pursues an integrated communication approach. Drawing on the various fields of organizational communication and their relevance for CSR, it addresses innovative topics such as big data, social media, and the convergence of communication channels, as well as the roles they play in a successfully integrated CSR communication program. Further aspects covered include the analysis of sector-specific, cross-cultural, and ethical challenges related to the effective communication of CSR. This handbook is unique in its consistent focus on integrated communication. It is of interest not only for the scientific discourse, but will also benefit those corporations that not only seek to operate in a socially responsible manner, but also to communicate their efforts to their various stakeholders. Besides its significant value for researchers and professionals, the book can also be used as a reference for undergraduate and graduate students interested in successful CSR communication.

Refine Search

Showing 1,876 through 1,900 of 21,665 results