You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A comprehensive review to the theory, application and research of machine learning for future wireless communications In one single volume, Machine Learning for Future Wireless Communications provides a comprehensive and highly accessible treatment to the theory, applications and current research developments to the technology aspects related to machine learning for wireless communications and networks. The technology development of machine learning for wireless communications has grown explosively and is one of the biggest trends in related academic, research and industry communities. Deep neural networks-based machine learning technology is a promising tool to attack the big challenge in w...
This book focuses on the modeling, optimization, and applications of 5G green mobile communication networks, aimed at improving energy efficiency and spectrum utilization in 5G systems. It offers a balance between theoretical analysis and engineering practice, providing in-depth studies of a number of major topics, such as energy consumption models, optimization, system design, implementation, and performance evaluation. It also discusses four aspects of green communication in detail: cellular networks, resource management, wireless transmissions and multi-media communications. Further, this unique book comprehensively and systematically discusses green optimization in wireless mobile communications. As such it is a valuable resource for researchers, engineers, and graduate students in various fields, including telecommunications engineering, electrical and electronic engineering, and computer engineering, particularly those interested in green communications.
This book is dedicated to the issues of security, trust and privacy models, and architectures in IoT environments. The authors aim to capture the latest research and contributions from academy, industry, and other stakeholders on new security models, architectures, protocols, and standards for ensuring security, privacy, and trustworthiness to IoT systems. The authors discuss the convergence of IoT, software agents, and edge computing to introduce social features into IoT systems, combining trustworthiness and reputation information collected by agents at the edge with security and privacy mechanisms. They also cover experimental and simulated campaigns that evaluate strategies to improve the security and privacy of the IoT world, and at the same time the ability to prevent and deter deceptive behaviors. The book is relevant for researchers, professionals, academics, and students.
This book delves into cutting-edge research in cyberspace and outer space security, encompassing both theoretical and experimental aspects. It provides mitigation measures and strategies to address the identified challenges within. It covers a spectrum of topics including techniques and strategies for enhancing cyberspace security, combating ransomware attacks, and securing autonomous vehicles. Additionally, it explores security and surveillance systems involving autonomous vehicles, resilience schemes against security attacks using blockchain for autonomous vehicles, security analysis of autonomous drones (UAVs), the cybersecurity kill chain, the internet of drones (IoD), and cyberspace sol...
This book constitutes the proceedings of the Second International Conference on 5G for Future Wireless Networks, 5GWN 2019, held in Changsa, China, in February 2019. The 13 full papers were selected from 34 submissions and present the state of the art and practical applications of 5G technologies. The papers are arranged thematically on optimization theory and applications, intelligent computing technology for 5G applications, resource allocation and management, and security and privacy in emerging 5G applications.
This book constitutes the refereed proceedings of the Second International Conference, UbiSec 2022, held in Zhangjiajie, China, during December 28–31, 2022. The 34 full papers and 4 short papers included in this book were carefully reviewed and selected from 98 submissions. They were organized in topical sections as follows: cyberspace security, cyberspace privacy, cyberspace anonymity and short papers.
This book constitutes the refereed proceedings of the 5th International Symposium on Security in Computing and Communications, SSCC 2017, held in Manipal, India, in September 2017. The 21 revised full papers presented together with 13 short papers were carefully reviewed and selected from 84 submissions. The papers focus on topics such as cryptosystems, algorithms, primitives; security and privacy in networked systems; system and network security; steganography, visual cryptography, image forensics; applications security.
Big Data Analytics is on the rise in the last years of the current decade. Data are overwhelming the computation capacity of high performance servers. Cloud, grid, edge and fog computing are a few examples of the current hype. Computational Intelligence offers two faces to deal with the development of models: on the one hand, the crisp approach, which considers for every variable an exact value and, on the other hand, the fuzzy focus, which copes with values between two boundaries. This book presents 114 papers from the 4th International Conference on Fuzzy Systems and Data Mining (FSDM 2018), held in Bangkok, Thailand, from 16 to 19 November 2018. All papers were carefully reviewed by program committee members, who took into consideration the breadth and depth of the research topics that fall within the scope of FSDM. The acceptance rate was 32.85% . Offering a state-of-the-art overview of fuzzy systems and data mining, the publication will be of interest to all those whose work involves data science.
Despite the political instability characterizing twentieth-century Taiwan, the value of baseball in the lives of Taiwanese has been a constant since the game was introduced in 1895. The game first gained popularity on the island under the Japanese occupation, and that popularity continued after World War II despite the withdrawal of the Japanese and an official lack of support from the new state power, the Chinese Nationalist Party.