You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book aims to provide a vision that can combine the best of both Artificial Intelligence (AI) and communication networks for designing the deployment trajectory to establish flexible Unmanned Aerial Vehicles (UAV) communication networks.This book will discuss the major challenges that can face deploying unmanned aerial vehicles in emergent networks. It will focus on possible applications of UAV in a Smart City environment where they can be supported by Internet of Things (IoT), wireless sensor networks, as well as 5G, and beyond. This book presents the possible problems and solutions, the network integration of the UAV and compare the communication technologies to be used.This book will be a collection of original contributions regarding state of the art AI/ML based solutions in UAV communication networks which can be used for routing protocol design, transport layer optimization, user/application behaviour prediction, communication network optimization, security, and anomaly detection.
This is an open access book. Big data is a large-scale and complex data set based on modern information technology. It has the characteristics of scale and diversity, and its information processing and storage capabilities have been significantly improved. The application of big data technology is to fully mine and analyze data, build cooperation and interaction between teachers and students, encourage students to communicate and interact with teachers, and give full play to the education and teaching effect of big data. In order to improve teaching quality and efficiency as much as possible, all kinds of teaching in the new era must have strong flexibility and foresight, so as to adapt to t...
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations. With everything becoming increasingly interconnected via the Internet, data security becomes paramount. As technology advances, people need to secure their data communication processes. Personal data security, including data integrity and confidentiality, is particularly vulnerable. Therefore, the concept of cyber security forensics emerges to ensure data security for everyone, addressing issues such as data control, hijacking, and threats to personal devices such as mobile phones, laptops, and other smart...
Blockchain and cryptocurrencies like Bitcoin have hogged the headlines for a long time. But after the hype and the money, there is a lot of technical work to be done, and developers in particular need to understand in some depth what foundations they are actually building their project on. There is quite a bit of basic to work in the Block chain which we have to understand, and the general security in p2p networking demands of Blockchain, before diving into the first Blockchain project. All these concepts are explained by simple concepts from scratch. Cryptocurrencies and decentralized applications are extremely popular, but not well understood technically, which is why we are presenting the classifications of all the cryptocurrency topics. This opens the Blockchain application categories, which helps to choose a blockchain use case, followed by a chapter on how to optimize and enhance a Blockchain application. Security is always a concern in decentralized application, which is why we tried to address all the visible concerns in the blockchain technology space and help to build a secure blockchain.
This proceedings constitutes the refereed proceedings of the 15th EAI International Conference on Communications and Networking, ChinaCom 2020, held in November 2020 in Shanghai, China. Due to COVID-19 pandemic the conference was held virtually. The 54 papers presented were carefully selected from 143 submissions. The papers are organized in topical sections on Transmission Optimization in Edge Computing; Performance and Scheduling Optimization in Edge Computing; Mobile Edge Network System; Communication Routing and Control; Transmission and Load Balancing; Edge Computing and Distributed Machine Learning; Deep Learning.
This two-volume set constitutes the refereed proceedings of the 16th International Conference on Collaborative Computing: Networking, Applications, and Worksharing, CollaborateCom 2020, held in Shanghai, China, in October 2020. The 61 full papers and 16 short papers presented were carefully reviewed and selected from 211 submissions. The papers reflect the conference sessions as follows: Collaborative Applications for Network and E-Commerce; Optimization for Collaborate System; Cloud and Edge Computing; Artificial Intelligence; AI Application and Optimization; Classification and Recommendation; Internet of Things; Collaborative Robotics and Autonomous Systems; Smart Transportation.
The three-volume set constitutes the proceedings of the 17th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2022, which was held during October 28-30, 2022. The conference took place in Dalian, China.The 95 full and 62 short papers presented in these proceedings were carefully reviewed and selected from 265 submissions. The contributions in theoretical frameworks and analysis of fundamental cross-layer protocol and network design and performance issues; distributed and localized algorithm design and analysis; information and coding theory for wireless networks; localization; mobility models and mobile social networking; underwater and underground networks; vehicular networks; algorithms, systems, and applications of edge computing
The paper aims to give some new kinds of operational laws named as neutrality addition and scalar multiplication for the pairs of linguistic interval-valued intuitionistic neutrosophic fuzzy number. The main idea behind these operations is to include the linguistic interval-valued intuitionistic neutrosophic fuzzy number of the decision-maker and score function. We define the linguistic interval-valued intuitionistic neutrosophic fuzzy number and operational laws. We introduce the three geometric operators including, linguistic interval-valued intuitionistic neutrosophic fuzzy weighted geometric operator, linguistic interval-valued intuitionistic neutrosophic fuzzy ordered weighted geometric operator and linguistic interval-valued intuitionistic neutrosophic fuzzy weighted hybrid geometric operator.
The book covers a variety of topics in Information and Communications Technology (ICT) and their impact on innovation and business. The authors discuss various innovations, business and industrial motivations, and impact on humans and the interplay between those factors in terms of finance, demand, and competition. Topics discussed include the convergence of Machine to Machine (M2M), Internet of Things (IoT), Social, and Big Data. They also discuss AI and its integration into technologies from machine learning, predictive analytics, security software, to intelligent agents, and many more. Contributions come from academics and professionals around the world. Covers the most recent practices in ICT related topics pertaining to technological growth, innovation, and business; Presents a survey on the most recent technological areas revolutionizing how humans communicate and interact; Features four sections: IoT, Wireless Ad Hoc & Sensor Networks, Fog Computing, and Big Data Analytics.