You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
M-health can be defined as the ‘emerging mobile communications and network technologies for healthcare systems.' This book paves the path toward understanding the future of m-health technologies and services and also introducing the impact of mobility on existing e-health and commercial telemedical systems. M-Health: Emerging Mobile Health Systems presents a new and forward-looking source of information that explores the present and future trends in the applications of current and emerging wireless communication and network technologies for different healthcare scenaria. It also provides a discovery path on the synergies between the 2.5G and 3G systems and other relevant computing and info...
Advances in Computational Intelligence and Learning: Methods and Applications presents new developments and applications in the area of Computational Intelligence, which essentially describes methods and approaches that mimic biologically intelligent behavior in order to solve problems that have been difficult to solve by classical mathematics. Generally Fuzzy Technology, Artificial Neural Nets and Evolutionary Computing are considered to be such approaches. The Editors have assembled new contributions in the areas of fuzzy sets, neural sets and machine learning, as well as combinations of them (so called hybrid methods) in the first part of the book. The second part of the book is dedicated to applications in the areas that are considered to be most relevant to Computational Intelligence.
Security for Wireless Sensor Networks using Identity-Based Cryptography introduces identity-based cryptographic schemes for wireless sensor networks. It starts with an exhaustive survey of the existing layered approach to WSN security—detailing its pros and cons. Next, it examines new attack vectors that exploit the layered approach to security. After providing the necessary background, the book presents a cross-layer design approach that addresses authentication, integrity, and encryption. It also examines new ID-based key management mechanisms using a cross-layer design perspective. In addition, secure routing algorithms using ID-based cryptography are also discussed. Supplying readers with the required foundation in elliptic curve cryptography and identity-based cryptography, the authors consider new ID-based security solutions to overcome cross layer attacks in WSN. Examining the latest implementations of ID-based cryptography on sensors, the book combines cross-layer design principles along with identity-based cryptography to provide you with a new set of security solutions that can boost storage, computation, and energy efficiency in your wireless sensor networks.
Foundations of Computational Intelligence Volume 2: Approximation Reasoning: Theoretical Foundations and Applications Human reasoning usually is very approximate and involves various types of - certainties. Approximate reasoning is the computational modelling of any part of the process used by humans to reason about natural phenomena or to solve real world problems. The scope of this book includes fuzzy sets, Dempster-Shafer theory, multi-valued logic, probability, random sets, and rough set, near set and hybrid intelligent systems. Besides research articles and expository papers on t- ory and algorithms of approximation reasoning, papers on numerical experiments and real world applications ...
Fourth Generation (4G) wireless communication systems support current and emergent multimedia services such as mobile TV, social networks and gaming, high-definition TV, video teleconferencing, and messaging services. These systems feature the All-over-IP concept and boast improved quality of service. Several important R&D activities are currently under way in the field of wireless communications for 4G systems, but the coverage is widespread in the literature. Transmission Techniques for 4G Systems presents a compilation of the latest developments in the field of wireless communications for 4G systems, including evolved Multimedia Broadcast and Multicast Service (eMBMS). Topics include: Tra...
This book highlights the emerging field of intelligent computing and developing smart systems. It includes chapters discussing the outcome of challenging research related to distributed computing, smart machines and their security related research, and also covers next-generation communication techniques and the networking technologies that have the potential to build the future communication infrastructure. Bringing together computing, communications and other aspects of intelligent and smart computing, it contributes to developing a roadmap for future research on intelligent systems.
Green Communications and Networking introduces novel solutions that can bring about significant reductions in energy consumption in the information and communication technology (ICT) industry-as well as other industries, including electric power. Containing the contributions of leading experts in the field, it examines the latest research advances
Mobile manipulators combine the advantages of mobile platforms and robotic arms, extending their operational range and functionality to large spaces and remote, demanding, and/or dangerous environments. They also bring complexity and difficulty in dynamic modeling and control system design.
This comprehensive technical guide explains game theory basics, architectures, protocols, security, models, open research issues, and cutting-edge advances and applications. Describing how to employ game theory in infrastructure-based wireless networks and multihop networks to reduce power consumption, it facilitates quick and easy reference to related optimization and algorithm methodologies. The book explains how to apply the game theoretic model to address resource allocation, congestion control, attacks, routing, energy management, packet forwarding, and MAC.