Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Wired/Wireless Internet Communications
  • Language: en
  • Pages: 338

Wired/Wireless Internet Communications

  • Type: Book
  • -
  • Published: 2018-12-28
  • -
  • Publisher: Springer

This book constitutes the proceedings of the 16th IFIP International Conference on Wired/Wireless Internet Communications, WWIC 2018, held in Boston, MA, USA, in June 2018. The 26 regular papers presented in this volume were carefully reviewed and selected from 42 submissions. They were organized in topical sections named: IoT and sensor networks; learning-based networking; network deployment; network security; aerial networks; and vehicular and content delivery networks.

AKASHVANI
  • Language: en
  • Pages: 52

AKASHVANI

"Akashvani" (English) is a programme journal of ALL INDIA RADIO, it was formerly known as The Indian Listener. It used to serve the listener as a bradshaw of broadcasting ,and give listener the useful information in an interesting manner about programmes, who writes them, take part in them and produce them along with photographs of performing artists. It also contains the information of major changes in the policy and service of the organisation. The Indian Listener (fortnightly programme journal of AIR in English) published by The Indian State Broadcasting Service, Bombay, started on 22 December, 1935 and was the successor to the Indian Radio Times in English, which was published beginning ...

Mobile Ad Hoc Networking
  • Language: en
  • Pages: 690

Mobile Ad Hoc Networking

"An excellent book for those who are interested in learning the current status of research and development . . . [and] who want to get a comprehensive overview of the current state-of-the-art." —E-Streams This book provides up-to-date information on research and development in the rapidly growing area of networks based on the multihop ad hoc networking paradigm. It reviews all classes of networks that have successfully adopted this paradigm, pointing out how they penetrated the mass market and sparked breakthrough research. Covering both physical issues and applications, Mobile Ad Hoc Networking: Cutting Edge Directions offers useful tools for professionals and researchers in diverse areas...

Wired/Wireless Internet Communications
  • Language: en
  • Pages: 413

Wired/Wireless Internet Communications

  • Type: Book
  • -
  • Published: 2010-05-12
  • -
  • Publisher: Springer

Beginning with the first event in 2002, the International Conference on Wired/ Wireless Internet Communications (WWIC) has continuously been established as a highly selective conference focusing on integration and co-existence of rapidly dev- oping wireless network technologies and their applications related to the Internet. To do so WWIC provides an international forum for presenting and discussing cutti- edge research in this domain, and the 8th edition of WWIC, held at Luleå University in June 2010, continued this tradition. The WWIC 2010 call for papers attracted 45 submissions from more than 25 countries and each contribution was subject to thorough peer review by recognized int- national experts that acted as members of the Technical Program Committee. The selection process resulted in 16 accepted papers, which were thematically grouped into 5 technical sessions. The major themes of WWIC 2010 were cooperation, management of multimedia traffic, advancing IEEE 802.11, cognitive optimization, mesh and multi-hop networks, security, signaling, control, and wireless sensor networks.

Cognitive Radio Technology Applications for Wireless and Mobile Ad Hoc Networks
  • Language: en
  • Pages: 370

Cognitive Radio Technology Applications for Wireless and Mobile Ad Hoc Networks

  • Type: Book
  • -
  • Published: 2013-06-30
  • -
  • Publisher: IGI Global

Radio interference is a problem that has plagued air communication since its inception. Advances in cognitive radio science help to mitigate these concerns. Cognitive Radio Technology Applications for Wireless and Mobile Ad Hoc Networks provides an in-depth exploration of cognitive radio and its applications in mobile and/or wireless network settings. The book combines a discussion of existing literature with current and future research to create an integrated approach that is useful both as a textbook for students of computer science and as a reference book for researchers and practitioners engaged in solving the complex problems and future challenges of cognitive radio technologies.

Empire and Gunpowder
  • Language: en
  • Pages: 181

Empire and Gunpowder

This book focuses on the relation between technology, warfare and state in South Asia in the eighteenth and the nineteenth centuries. It explores how gunpowder and artillery played a pivotal role in the military ascendancy of the East India Company in India. The monograph argues that the contemporary Indian military landscape was extremely dynamic, with contemporary indigenous polities (Mysore, the Maratha Confederacy and the Khalsa Kingdom) attempting to transform their military systems by modelling their armies on European lines. It shows how the Company established an edge through an efficient bureaucracy and a standardised manufacturing system, while the Indian powers primarily focused on continuous innovation and failed to introduce standardisation of production. Drawing on archival records from India and the UK, this volume makes a significant intervention in our understanding of the rise of the British Empire in South Asia. It will be of great interest to scholars and researchers of history, especially military history, military and strategic studies and South Asian studies.

Proceedings of the Tenth International Conference on Mathematics and Computing
  • Language: en
  • Pages: 270
Proceedings of International Conference on Advanced Computing Applications
  • Language: en
  • Pages: 837

Proceedings of International Conference on Advanced Computing Applications

This book gathers selected high-quality research papers presented at the 2nd International Conference on Advanced Computing Applications (ICACA 2021), held virtually during 27––28 March 2021. The book is divided into four sections. These are communication and computing, signal processing and multimedia, computational intelligence and data analytics and decision computing. The topics covered are advanced communication technologies, IoT-based systems and applications, network security and reliability, virtualization technologies, compressed sensors and multimedia applications, signal image and video processing, machine learning, pattern recognitions, intelligent computing, big data analytics, analytics in bio-computing, AI-driven 6G mobile wireless networks and autonomous driving.

THE UNCANNY
  • Language: en
  • Pages: 163

THE UNCANNY

  • Type: Book
  • -
  • Published: 2022-09-19
  • -
  • Publisher: Notion Press

There are things unknown. We don't always see them, but we sense them. Have you ever been alone and felt that someone was watching you? Afraid to turn around, lest you catch a ghostly visage out of the corner of your eye? One reason we consume the supernatural is to experience stimulation. Exposure to terrifying acts, or even the anticipation of those acts, can stimulate us mentally and physically in opposing ways: negatively (in fear or anxiety) or positively (in the form of excitement or joy). Welcome to The Uncanny – a compendium of twelve tales inspired by events from our own experiences. It's time for that coffee break and a deep dive into the realms of the unknown.

Circuits and Systems for Security and Privacy
  • Language: en
  • Pages: 382

Circuits and Systems for Security and Privacy

  • Type: Book
  • -
  • Published: 2016-05-25
  • -
  • Publisher: CRC Press

Circuits and Systems for Security and Privacy begins by introducing the basic theoretical concepts and arithmetic used in algorithms for security and cryptography, and by reviewing the fundamental building blocks of cryptographic systems. It then analyzes the advantages and disadvantages of real-world implementations that not only optimize power, area, and throughput but also resist side-channel attacks. Merging the perspectives of experts from industry and academia, the book provides valuable insight and necessary background for the design of security-aware circuits and systems as well as efficient accelerators used in security applications.