You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A comprehensive treatment of Age of Information, this cutting-edge text includes detailed exposition and real-world applications.
This book delves into cutting-edge research in cyberspace and outer space security, encompassing both theoretical and experimental aspects. It provides mitigation measures and strategies to address the identified challenges within. It covers a spectrum of topics including techniques and strategies for enhancing cyberspace security, combating ransomware attacks, and securing autonomous vehicles. Additionally, it explores security and surveillance systems involving autonomous vehicles, resilience schemes against security attacks using blockchain for autonomous vehicles, security analysis of autonomous drones (UAVs), the cybersecurity kill chain, the internet of drones (IoD), and cyberspace sol...
Understand the cutting-edge technology of semantic communications and its growing applications Semantic communications constitute a revolution in wireless technology, combining semantic theory with wireless communication. In a semantic communication, essential information is encoded at the source, drastically reducing the required data usage, and then decoded at the destination in such a way that all key information is recovered, even if transmission is damaged or incomplete. Enhancing the correspondence between background knowledge at source and destination can drive the data usage requirement even lower, producing ultra-efficient information exchanges with ultra-low semantic ambiguity. Wir...
This book focuses specifically on physical layer security, a burgeoning topic in security. It consists of contributions from the leading research groups in this emerging area, and for the first time important high-impact results are collected together.
This book addresses privacy in dynamical systems, with applications to smart metering, traffic estimation, and building management. In the first part, the book explores statistical methods for privacy preservation from the areas of differential privacy and information-theoretic privacy (e.g., using privacy metrics motivated by mutual information, relative entropy, and Fisher information) with provable guarantees. In the second part, it investigates the use of homomorphic encryption for the implementation of control laws over encrypted numbers to support the development of fully secure remote estimation and control. Chiefly intended for graduate students and researchers, the book provides an essential overview of the latest developments in privacy-aware design for dynamical systems.
Modern, current, and future communications/processing aspects motivate basic information-theoretic research for a wide variety of systems for which we do not have the ultimate theoretical solutions (for example, a variety of problems in network information theory as the broadcast/interference and relay channels, which mostly remain unsolved in terms of determining capacity regions and the like). Technologies such as 5/6G cellular communications, Internet of Things (IoT), and mobile edge networks, among others, not only require reliable rates of information measured by the relevant capacity and capacity regions, but are also subject to issues such as latency vs. reliability, availability of s...
Experts in data analytics and power engineering present techniques addressing the needs of modern power systems, covering theory and applications related to power system reliability, efficiency, and security. With topics spanning large-scale and distributed optimization, statistical learning, big data analytics, graph theory, and game theory, this is an essential resource for graduate students and researchers in academia and industry with backgrounds in power systems engineering, applied mathematics, and computer science.
Rediscovering Kurdistan’s Cultures and Identities: The Call of the Cricket offers insight into little-known aspects of the social and cultural activity and changes taking place in different parts of Kurdistan (Turkey, Iraq, Syria and Iran), linking different theoretical approaches within a postcolonial perspective. The first chapter presents the book’s approach to postcolonial theory and gives a brief introduction to the historical context of Kurdistan. The second, third and fourth chapters focus on the Kurdish context, examining ethical changes as revealed in Kurdish literary and cinema narratives, the socio-political role of the Kurdish cultural institutions and the practices of countering othering of Kurdish migrants living in Istanbul. The fifth chapter offers an analysis of the nineteenth-century missionary translations of the Bible into the Kurdish language. The sixth chapter examines the formation of Chaldo-Assyrian identity in the context of relations with the Kurds after the overthrow of the Ba’ath regime in 2003. The last chapter investigates the question of the Yezidis’ identity, based on Yezidi oral works and statements about their self-identification.
This handbook provides thorough, in-depth, and well-focused developments of artificial intelligence (AI), machine learning (ML), deep learning (DL), natural language processing (NLP), cryptography, and blockchain approaches, along with their applications focused on healthcare systems. Handbook of AI-Based Models in Healthcare and Medicine: Approaches, Theories, and Applications highlights different approaches, theories, and applications of intelligent systems from a practical as well as a theoretical view of the healthcare domain. It uses a medically oriented approach in its discussions of human biology, healthcare, and medicine and presents NLP-based medical reports and medicine enhancements. The handbook includes advanced models of ML and DL for the management of healthcare systems and also discusses blockchain-based healthcare management. In addition, the handbook offers use cases where AI, ML, and DL can help solve healthcare complications. Undergraduate and postgraduate students, academicians, researchers, and industry professionals who have an interest in understanding the applications of ML/DL in the healthcare setting will want this reference on their bookshelf.
The book presents theoretical and experimental approaches, quantitative and qualitative analyses, and simulations in wireless ad-hoc and sensor networks. It further explains the power and routing optimization in underwater sensor networks, advanced cross-layer framework, challenges and security issues in underwater sensor networks, and the use of machine learning and deep learning techniques for security implementations in wireless ad-hoc and sensor networks. This book: Discusses mobile ad-hoc network routing issues and challenges with node mobility and resource limitations Covers the internet of vehicles, autonomous vehicle architecture, and design of heterogeneous wireless sensor networks ...