Network hardware Books
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Multi-Agent System Engineering: 9th European Workshop on Modelling Autonomous Agents in a Multi-Agent World, MAAMAW'99 Valencia, Spain, June 30 - July 2, 1999 Proceedings
Book SynopsisIn the ten years since the first MAAMAW was held in 1989, at King's College, Cambridge, the field of Multi-Agent Systems (MAS) has flourished. It has attracted an increasing amount of theoretical and applied research. During this decade, important efforts have been made to establish the scientific and technical foundations of MAS. MAAMAW publications are testimony to the progress achieved in key areas such as agent modelling and reasoning, multi-agent interaction and communication, and multi-agent organisation and social structure. Research results have covered a wide range of inter-related topics in each area including agent architectures, reasoning models, logics, conflict resolution, negotiation, resource allocation, load balancing, learning; social behaviour and interaction, languages and protocols, interagent and agent-human communication, social models, agent roles, norms and social laws, and static and dynamic organisational structures. The feasibility and the viability of the proposed models and techniques have been demonstrated through MAS applications in heterogeneous domains including electronic commerce, co-operative work, telecommunications, social and biological systems, robotics, office and business automation, public administration, social simulations and banking. As the applicability of the technology became understood, the multi-agent paradigm has been progressively accepted by product managers and system developers, giving rise to a considerable amount of business expectation from industry. These expectations do not rest on the concept or metaphor of agent, but on the development of MAS useful in an industrial setting, with real-time systems presenting the biggest challenge.Table of ContentsEngineering Aspects of Multi-agent Systems.- Agent-Oriented Software Engineering.- Specification of Bahavioural Requirements within Compositional Multi-agent System Design.- Agent-Oriented Design.- A Developer’s Perspective on Multi-agent System Design.- Multi-agent Systems Framework.- A Development Environment for the Realization of Open and Scalable Multi-agent Systems.- Modelling Agents in Hard Real-Time Environments.- Multi-agent Systems on the Internet: Extending the Scope of Coordination towards Security and Topology.- Languages and Protocols.- Protocol Engineering for Multi-agent Interaction.- Designing Agent Communication Languages for Multi-agent Systems.- A Temporal Agent Communication Language for Dynamic Multi-agent Systems.- Multi-paradigm Languages Supporting Multi-agent Development.- Negotiation and Cooperation.- An Efficient Argumentation Framework for Negotiating Autonomous Agents.- Negotiating Service Provisioning.- Cooperative Plan Selection Through Trust.- Extending Social Reasoning to Cope with Multiple Partner Coalitions.- Formal Models.- Basic Mental Attitudes of a Collaborating Agent: Cognitive Primitives for MAS.- Subjective Situations.- Formal Analysis of Models for the Dynamics of Trust Based on Experiences.
£40.49
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Springer Handbook of Geographic Information
Book SynopsisComputer science provides a powerful tool that was virtually unknown three generations ago. Some of the classical fields of knowledge are geodesy (surveying), cartography, and geography. Electronics have revolutionized geodetic methods. Cartography has faced the dominance of the computer that results in simplified cartographic products. All three fields make use of basic components such as the Internet and databases. The Springer Handbook of Geographic Information is organized in three parts, Basics, Geographic Information and Applications. Some parts of the basics belong to the larger field of computer science. However, the reader gets a comprehensive view on geographic information because the topics selected from computer science have a close relation to geographic information. The Springer Handbook of Geographic Information is written for scientists at universities and industry as well as advanced and PhD students.Trade ReviewFrom the reviews:“This book provides an encyclopedic survey of geoinformation through 31 chapters contributed by specialists from around the globe. … This book is both timely and up-to-date. The editors have done a very good job spanning the relevant topics for such a handbook, and each chapter is very detailed technically … . This volume is intended as a reference manual for specialists in this area or for researchers needing specialist knowledge. Summing Up: Recommended. Graduate students, researchers/faculty, and professionals/practitioners.” (R. A. Kolvoord, Choice, Vol. 50 (5), January, 2013)“It attempts to provide a comprehensive overview of the state of the art and current practices in the generation, analysis, and distribution of geographic information. … This book would be a good starting place for novices in the field. The exposition of the material is more suited for professionals with a technological focus, such as technologists, engineers, analysts, and cartographers, but managers looking for reasonably comprehensive tutorials about the specific topics covered in this book should find the relevant sections useful.” (R. M. Malyankar, ACM Computing Reviews, January, 2013)Table of ContentsPart A Basics - Computer ScienceModelers and theorists consider geographic information (GI) as being a subtopic of computer science. Many aspects of geographic information are almost pure information technology while others are more geographic information. Part A is dedicated to the topics which have a close relation to information technology, including modeling, mathematics and statistics, databases, encoding, as well as data mining and knowledge discovery.Chap. 1 Modeling of Geographic Information (C. RoswellChap. 2 Mathematics and Geostatistics (F. Gielsdorf, L. Gründig, T. Hillmann)Chap. 3 Databases (T. Brinkhoff, W. Kresse)Chap. 4 Encoding of Geographic Information (C. Portele)Chap. 5 Data Mining and Knowledge Discovery (S.-L. Wang, W.-Z. Shi)Part B Geographic InformationPart B addresses all geographic information topics that primarily are more specific to space and time. Staring with on the description of geographic information systems (GIS), the following chapters cover geodetic foundations, the capture of spatial and temporal data and their visualization (cartography) as well as web mapping technologies. Chap. 6 Geographic Information Systems (GIS) (N. Bartelme) Chap. 7 Change Detection (J. Théau)Chap. 8 Geodesy (M. Becker)Chap. 9 Data Capture and Geosensor Networks (J. Skaloud, M. Cramer, N. Haala, J.-O. Wallgrün, S. Nittel, W. Kresse) Chap. 10 Geometry, Topology and Graph Theory (G. Gröger, B. George)Chap. 11 Portrayal and Cartography (P. Hardy, K. Field)Chap. 12 Geospatial Metadata (D. Danko)Chap. 13 Standards for Geographic Information (W. Kresse, D. Danko, K. Fadaie)Chap. 14 Web Mapping and Web Cartography (A. Neumann)Chap. 15 Geospatial Semantic Web (J. Brodeur)Chap. 16 Registration of Geospatial Information Elements (C.D. O'Brien, R. Lott)Chap. 17 Security for Geospatial Information Systems (A. Matheus)Part C ApplicationsPart C presents a selection of typical and important applications of geographic information. Some of the chapters address applications which may be considered as a specialization of geographic information, such as cadastre. In most of the other cases, geographic information systems (GIS) are only a tool for managing spatiotemporal data, as in planning, defense, and geology. The chapters open up a vast number of new applications, such as the chapter on location-based services. Another approach is open-source GIS, which is a license-oriented perspective on GIS and has become a lifestyle or philosophy among information technology (IT) people.Chap. 18 Ubiquitous Geographic Information (T.J. Kim, S.-G. Jang)Chap. 19 Legal, Law, Cadastre (M. Seifert)Chap. 20 Spatial Planning (F. Wilke)Chap. 21 Location Based Services (A. Zipf, M. Jöst) Chap. 22 Movement Analysis (J. Gudmundsson, P. Laube, T. Wolle)Chap. 23 Marine GIS (M. Jonas, L. Vetter, W. Schröder, R. Pesch)Chap. 24 GIS in Agriculture (R. Bill, E. Nash, G. Grenzdörffer)Chap. 25 GIS in Defense (G. Joos)Chap. 26 GIS for Transportation (K. Choi, T.J. Kim)Chap. 27 GIS in Geology (K. Asch, S.J. Mathers, H. Kessler)Chap. 28 GIS for Energy and Utilities (W. (Bill) Meehan, J. Wyland)Chap. 29 GIS in Health and Human Services (W. (Bill) Davenhall, C. Kinabrew)Chap. 30 Open Source GIS (R.R. Vatsavai, T.E. Burk, S. Lime, M. Hugentobler, A. Neumann, C. Strobl)Chap. 31 Open Source Tools for Environmental Modeling (A. Jolma, D.P. Ames, N. Horning, H. Mitasova, M. Neteler, A. Racicot, T. Sutton)Glossary of ISO Terms.- Acknowledgements.- About the Authors.- Subject Index
£251.99
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Personal Satellite Services: International Conference, PSATS 2009, Rome, Italy, March 18-19, 2009, Revised Selected Papers
Book SynopsisThis book constitutes the proceedings of the International Conference on Personal Satellite Services (PSATS 2009) in Rome, Italy in March 2009. The 17 papers papers demonstrate recent advances in Internet applications over satellites, satellites technologies, and future satellite location-based systems.Table of ContentsAnalysing the Orbital Movement and Trajectory of LEO (Low Earth Orbit) Satellite Relative to Earth Rotation.- A Cross-Layer PEP for DVB-RCS Networks.- Triple Play over Satellite, Ka-Band Making the Difference.- Time Scheduling Based on Tradeoff between Detection Performance and QoS Requirement.- Study of the Quantum Channel between Earth and Space for Satellite Quantum Communications.- Spectral Analysis of Experimental Ka-Band Propagation Measurements over the Australian LEO Microsatellite ‘FedSat’.- Satellite Broadband Revolution: How Latest Ka-Band Systems Will Change the Rules of the Industry. An Interpretation of the Technological Trajectory.- Performance Enhanced Proxy Solutions for Satellite Networks: State of the Art, Protocol Stack and Possible Interfaces.- PEPsal Performance Analysis on Disruptive Radio Channels.- PEP Deployment and Bandwidth Management Issues.- High Altitude Platforms: Radio Resource Management Policy for MBMS Applications.- Frequency Tracking Performance Using a Hyperbolic Digital-Phase Locked Loop for Ka-Band Communication in Rain Fading Channels.- Design and Implementation of P2P Streaming Systems for Webcast.- Comparisons on Performances in MIMO Systems under Different Propagation Environments.- Combined Congestion Control and Link Selection Strategies for Delay Tolerant Interplanetary Networks.- Broadband Satellite Multimedia (BSM) Security Architecture and Interworking with Performance Enhancing Proxies.- A Satellite-Based Infrastructure Providing Broadband IP Services on Board High Speed Trains.
£40.49
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Introduction to Reliable and Secure Distributed
Book SynopsisIn modern computing a program is usually distributed among several processes. The fundamental challenge when developing reliable and secure distributed programs is to support the cooperation of processes required to execute a common task, even when some of these processes fail. Failures may range from crashes to adversarial attacks by malicious processes.Cachin, Guerraoui, and Rodrigues present an introductory description of fundamental distributed programming abstractions together with algorithms to implement them in distributed systems, where processes are subject to crashes and malicious attacks. The authors follow an incremental approach by first introducing basic abstractions in simple distributed environments, before moving to more sophisticated abstractions and more challenging environments. Each core chapter is devoted to one topic, covering reliable broadcast, shared memory, consensus, and extensions of consensus. For every topic, many exercises and their solutions enhance the understanding This book represents the second edition of "Introduction to Reliable Distributed Programming". Its scope has been extended to include security against malicious actions by non-cooperating processes. This important domain has become widely known under the name "Byzantine fault-tolerance". Table of Contents1. Introduction. - 1.1 Motivation. -1.2 Distributed Programming Abstractions. 1.3 The End-to-End Argument. 1.4 Software Components. - 1.5 Classes of Algorithms. -1.6 Chapter Notes. 2. Basic Abstractions. - 2.1 Distributed Computation. - 2.2 Abstracting Processes. - 2.3 Cryptographic Abstractions. - 2.4 Abstracting Communication. - 2.5 Timing Assumptions. - 2.6 Abstracting Time. - 2.7 Distributed-System Models. - 2.8 Exercises. - 2.9 Solutions. - 2.10 Chapter Notes . - . - 3. Reliable Broadcast. - 3.1 Motivation. - 3.2 Best-Effort Broadcast. - 3.3 Regular Reliable Broadcast. - 3.4 Uniform Reliable Broadcast. - 3.5 Stubborn Broadcast. - 3.6 Logged Best-Effort Broadcast. - 3.7 Logged Uniform Reliable Broadcast. - 3.8 Probabilistic Broadcast. - 3.9 FIFO and Causal Broadcast. - 3.10 Byzantine Consistent Broadcast. - 3.11 Byzantine Reliable Broadcast. - 3.12 Byzantine Broadcast Channels. - 3.13 Exercises. - 3.14 Solutions. - 3.15 Chapter Notes . - . - 4. Shared Memory. - 4.1 Introduction. - 4.2 (1, N) Regular Register. - 4.3 (1, N) Atomic Register. - 4.4 (N, N) Atomic Register. - 4.5 (1, N) Logged Regular Register. - 4.6 (1,N) Byzantine Safe Register. - 4.7 (1, N) Byzantine Regular Register. - 4.8 (1,N) Byzantine Atomic Register. - 4.9 Exercises. - 4.10 Solutions. - 4.11 Chapter Notes . - . - 5. Consensus. - 5.1 Regular Consensus. - 5.2 Uniform Consensus. - 5.3 Uniform Consensus in the Fail-Noisy Model. - 5.4 Logged Consensus. - 5.5 Randomized Consensus. - 5.6 Byzantine Consensus. - 5.7 Byzantine Randomized Consensus. - 5.8 Exercises. - 5.9 Solutions. - 5.10 Chapter Notes . - . - 6. Consensus Variants. - 6.1 Total-Order Broadcast. - 6.2 Byzantine Total-Order Broadcast. - 6.3 Terminating Reliable Broadcast. - 6.4 Fast Consensus. - 6.5 Fast Byzantine Consensus. - 6.6 Non-blocking Atomic Commit. - 6.7 Group Membership. - 6.8 View-Synchronous Communication. - 6.9 Exercises. - 6.10 Solutions. - 6.11 Chapter Notes . - . - 7. Concluding Remarks. - 7.1 Implementation in Appia. - 7.2 Further Implementations. - 7.3 Further Reading
£71.24
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Information Security and Assurance: International Conference, ISA 2011, Brno, Czech Republic, August 15-17, 2011, Proceedings
Book SynopsisThis book constitutes the proceedings of the International Conference on Information Security and Assurance, held in Brno, Czech Republic in August 2011.
£42.74
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Verteilte Systeme: Grundlagen und
Book SynopsisViele industrielle Anwendungen basieren auf verteilten Systemen. Derzeit werden sie durch die Integration von Mobilfunknetzen und mobilen Endgeräten intensiv weiterentwickelt. In dem Band stellen die Autoren die Grundlagen verteilter Systeme anhand eines durchgehenden Beispiels dar, das sich an üblichen Standards orientiert. Der Schwerpunkt liegt auf einer kompakten Darstellung grundlegender Konzepte und Technologien, wobei auch aktuelle Entwicklungen diskutiert werden. Die aktualisierte Neuauflage enthält zusätzliche Übungsaufgaben.Table of ContentsEinleitung.- Systemarchitekturen.- Kommunikation.- Transaktionen.- Sicherheit und Schutz.- Namens- und Verzeichnisdienste.- Komponentenbasierte Entwicklung Verteilter Systeme.- Dienstbasierte Architekturen und Technologien.- Weiterführende Konzepte der Softwareentwicklung.- Mobile Computing.- Zusammenfassung und Ausblick.- Lösungen.- Literaturverzeichnis.- Index.
£42.74
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Sensor Systems and Software: Third International ICST Conference, S-Cube 2012, Lisbon, Portugal, June 4-5, 2012, Revised Selected Papers
Book SynopsisThis book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Sensor Systems and Software, S-Cube 2012, held in Lisbon, Portugal in June 2012. The 12 revised full papers presented were carefully reviewed and selected from over 18 submissions and four invited talks and cover a wide range of topics including middleware, frameworks, learning from sensor data streams, stock management, e-health, and Web Of Things.Table of ContentsFast conference proceedings.-State-of-the-art report.-Up to date results
£40.49
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Social Informatics: 4th International Conference,
Book SynopsisThis book constitutes the proceedings of the 4th International Conference on Social Informatics, SocInfo 2012, held in Lausanne, Switzerland, in December 2012. The 21 full papers, 18 short papers included in this volume were carefully reviewed and selected from 61 submissions. The papers are organized in topical sections named: social choice mechanisms in the e-society,computational models of social phenomena, social simulation, web mining and its social interpretations, algorithms and protocols inspired by human societies, socio-economic systems and applications, trust, privacy, risk and security in social contexts.Table of ContentsA System for Web Widget Discovery Using Semantic Distance between User Intent and Social Tags.- An Automated Multiscale Map of Conversations: Mothers and Matters.- How Influential Are You: Detecting Influential Bloggers in a Blogging Community.- A Simulation Model Using Transaction Cost Economics to Analyze the Impact of Social Media on Online Shopping.- Predicting Group Evolution in the Social Network.- Interpolating between Random Walks and Shortest Paths: A Path Functional Approach.- Dynamic Targeting in an Online Social Medium.- Connecting with Active People Matters: The Influence of an Online Community on Physical Activity Behavior.- Detecting Overlapping Communities in Location-Based Social Networks.- CrowdLang: A Programming Language for the Systematic Exploration of Human Computation Systems.- Experiments in Cross-Lingual Sentiment Analysis in Discussion Forums.- Quality Assessment of User Comments on Mobile Platforms Considering Channel of Activation and Platform Design.- A Method Based on Congestion Game Theory for Determining Electoral Tendencies.- A Model to Represent Human Social Relationships in Social Network Graphs .- C4PS - Helping Facebookers Manage Their Privacy Settings.- Dynamic “Participative Rules” in Serious Games, New Ways for Evaluation?.- Mobile Phones, Family and Personal Relationships: The Case of Indonesian Micro-entrepreneurs.- An Analysis of Topical Proximity in the Twitter Social Graph.- A Foresight Support System to Manage Knowledge on Information Society Evolution.- How Many Answers Are Enough? Optimal Number of Answers for Q&A Sites.- Analysis and Support of Lifestyle via Emotions Using Social Media.- A Computational Analysis of Joint Decision Making Processes.- Collaboratively Constructing a VDL-Based Icon System for Knowledge Tagging.- A Multi-dimensional and Event-Based Model for Trust Computation in the Social Web.- On Recommending Hashtags in Twitter Networks.- A Framework for the Design and Synthesis of Coordinated Social Systems.- Swayed by Friends or by the Crowd?.- Are Twitter Users Equal in Predicting Elections? A Study of User Groups in Predicting 2012 U.S. Republican Presidential Primaries.-Web Page Recommendation Based on Semantic Web Usage Mining.- Scalable Analysis for Large Social Networks: The Data-Aware Mean-Field Approach.- A Survey of Recommender Systems in Twitter.- Multi-view Content-Based User Recommendation Scheme for Following Users in Twitter.- Spam Fighting in Social Tagging Systems.- The Multidimensional Study of Viral Campaigns as Branching Processes.- Models of Social Groups in Blogosphere Based on Information about Comment Addressees and Sentiments.- Dark Retweets: Investigating Non-conventional Retweeting Patterns.-Studying Paths of Participation in Viral Diffusion Process.- Paradox of Proximity – Trust and Provenance within the Context of Social Networks and Policy.- Namelings: Discover Given Name Relatedness Based on Data from the SocialWeb.- SocialTrends: A Web Application for Monitoring and Visualizing Users in Social Media.- Demonstration of Dynamic Targeting in an Online Social Medium.- Navigating between Chaos and Bureaucracy: Backgrounding Trust in Open-Content Communities.-
£42.74
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Unsupervised Classification: Similarity Measures, Classical and Metaheuristic Approaches, and Applications
Book SynopsisClustering is an important unsupervised classification technique where data points are grouped such that points that are similar in some sense belong to the same cluster. Cluster analysis is a complex problem as a variety of similarity and dissimilarity measures exist in the literature.This is the first book focused on clustering with a particular emphasis on symmetry-based measures of similarity and metaheuristic approaches. The aim is to find a suitable grouping of the input data set so that some criteria are optimized, and using this the authors frame the clustering problem as an optimization one where the objectives to be optimized may represent different characteristics such as compactness, symmetrical compactness, separation between clusters, or connectivity within a cluster. They explain the techniques in detail and outline many detailed applications in data mining, remote sensing and brain imaging, gene expression data analysis, and face detection.The book will be useful to graduate students and researchers in computer science, electrical engineering, system science, and information technology, both as a text and as a reference book. It will also be useful to researchers and practitioners in industry working on pattern recognition, data mining, soft computing, metaheuristics, bioinformatics, remote sensing, and brain imaging.Trade ReviewFrom the reviews:“The book focuses on emerging metaheuristic approaches to unsupervised classification, with an emphasis on a symmetry-based definition of similarity. … I found this book very appealing. I also thought of it as very valuable for my preoccupations towards the real-world application of unsupervised classification to medical imaging. I thus believe that, when reading this book, junior as well as experienced researchers will find many new challenging theoretical and practical ideas.” (Catalin Stoean, zbMATH, Vol. 1276, 2014)“The book views clustering as a (multiobjective) optimization problem and tackles it with metaheuristics algorithms. More interestingly, the authors of this book propose the exploitation of the concepts of point and line symmetry to define new distances to be used in clustering techniques. … researchers in the field will surely appreciate it as a good reference on the use of the symmetry notion in clustering.” (Nicola Di Mauro, Computing Reviews, July, 2013)Table of ContentsChap. 1 Introduction.- Chap. 2 Some Single- and Multiobjective Optimization Techniques.- Chap. 3 SimilarityMeasures.- Chap. 4 Clustering Algorithms.- Chap. 5 Point Symmetry Based Distance Measures and their Applications to Clustering.- Chap. 6 A Validity Index Based on Symmetry: Application to Satellite Image Segmentation.- Chap. 7 Symmetry Based Automatic Clustering.- Chap. 8 Some Line Symmetry Distance Based Clustering Techniques.- Chap. 9 Use of Multiobjective Optimization for Data Clustering.- References.- Index.
£42.74
Springer Fachmedien Wiesbaden Weather Hazard Warning Application in Car-to-X
Book SynopsisAttila Jaeger develops an application which notifies a vehicle’s driver of upcoming road weather dangers. This application maps the information evaluated by in-vehicle sensors in order to draw conclusions on the current weather condition. Comprehensive data basis is gained by sharing information with other vehicles using Car-to-X communication. In order to prove usability of the presented approaches, the developed application and selected concepts are implemented and deployed within the context of large scale Car-to-X field operational trials simTD and DRIVE C2X. Car-to-X communication is considered as the next major step towards a significant increase in road safety and traffic efficiency.Table of ContentsIn-Vehicle Road Weather Hazard Detection.- Calculations with Rectangles.- Mobility Data Verification.- Driver Notification Strategies.- Reference Implementations.- Evaluation Results.
£40.49
Springer Fachmedien Wiesbaden Hypothesis-Driven Simulation Studies: Assistance for the Systematic Design and Conducting of Computer Simulation Experiments
Book SynopsisFabian Lorig develops a procedure model for hypothesis-driven simulation studies which supports the design, conducting, and analysis of simulation experiments. It is aimed at facilitating the execution of simulation studies with regard to the replicability and reproducibility of the results. In comparison to existing models, this approach is based on a formally specified hypothesis. Each step of the simulation study can be adapted to the central hypothesis and performed in such a way that it can optimally contribute to the verification and thus to the confirmation or rejection of the hypothesis.Table of ContentsFoundations and Methods of Simulation.- Assistance and Automation of Simulation.- Requirements Analysis on Hypotheses in Simulation.- Hypothesis-Driven Simulation Studies.- Services for the Assistance of Simulation Studies.- Case Study: Supply Chain Management.
£67.49
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Maschinenliebe: Liebespuppen und Sexroboter aus
Book SynopsisSexroboter sind ein Thema, das die Medien mit Vorliebe behandeln und die Gesellschaft spaltet. Es gibt einige Modelle wie Emma oder Harmony. Viel verbreiteter sind allerdings einfache Liebespuppen mit überzeugender Haut und auswechselbaren Körperöffnungen. Sie finden sich in zahlreichen Bordellen und können problemlos bei Amazon und Co. bestellt werden. Zwischen Liebespuppen und Sexrobotern sind die Grenzen fließend. Sobald Liebespuppen sprechen können oder Sensoren und Aktoren haben, werden sie zu Sexrobotern. Einzelne Varianten weisen mimische Fähigkeiten auf und können den Kopf bewegen. Das Buch erklärt Grundbegriffe, geht auf technische Details ein und diskutiert psychologische, soziologische und philosophische Erkenntnisse und Herausforderungen. Es beleuchtet die Praxis der Sexarbeit und liefert Stellungnahmen von Herstellern und Benutzern.Table of Contents
£47.49
Springer IT Strategy
Book SynopsisCreate an IT strategy for your company with this book.In seven consecutive steps, this book presents the development of an IT strategy for manufacturing companies with the possibility of practical implementation using ready-made worksheets. It looks at all the issues relevant to an IT strategy, from deriving the IT strategy from the corporate strategy to creating the application and sourcing strategy. The role of IT in the company and the role of the CIO are examined in detail, and the demand/supply model is presented in detail as a structural organisation. In this book, the reader learns how to transfer the IT strategy into a roadmap for implementation, how to use a portfolio to control the projects and how to implement and control the goals of the IT strategy with a specially developed IT strategy cockpit.The second edition takes greater account of digitalisationThis second edition focuses on manufacturing companies in order to take into account the industry focus of any IT strategy. It also considers the distinction from digitalisation and digitalisation strategies and contains additional explanations on agile methods, DevOps as well as bi-modal IT structures. As a result, the existing 7-step concept for developing an IT strategy has become more focused and has taken on the current issues of IT and digitalisation, which continue to develop at a rapid pace. In terms of content, the book on creating IT strategies focuses on the following areas:- Fundamentals of IT strategy as well as differentiation from a digitalisation strategy. - Reasons for an IT strategy- As-is analysis of IT- Analysis of the corporate strategy- IT application strategy- Sourcing strategy- IT organisation and IT governance- Practical implementation: budgeting, IT roadmap and IT project portfolio- Monitoring and control of the IT strategy with the IT strategy cockpitThe author primarily addresses CIOs and IT managers of medium-sized to large companies and groups in the manufacturing industry. In addition, the book is suitable for the following target groups:- IT staff, IT controlling and IT management level employees. - IT management consultants- CFOs, CEOs, managing directors and board members of manufacturing companies
£44.99
Springer IT Strategy: Making IT Fit for the Digital
Book SynopsisCreate an IT strategy for your company with this book.In seven consecutive steps, this book presents the development of an IT strategy for manufacturing companies with the possibility of practical implementation using ready-made worksheets. It looks at all the issues relevant to an IT strategy, from deriving the IT strategy from the corporate strategy to creating the application and sourcing strategy. The role of IT in the company and the role of the CIO are examined in detail, and the demand/supply model is presented in detail as a structural organisation. In this book, the reader learns how to transfer the IT strategy into a roadmap for implementation, how to use a portfolio to control the projects and how to implement and control the goals of the IT strategy with a specially developed IT strategy cockpit. The second edition takes greater account of digitalisationThis second edition focuses on manufacturing companies in order to take into account the industry focus of any IT strategy. It also considers the distinction from digitalisation and digitalisation strategies and contains additional explanations on agile methods, DevOps as well as bi-modal IT structures. As a result, the existing 7-step concept for developing an IT strategy has become more focused and has taken on the current issues of IT and digitalisation, which continue to develop at a rapid pace.In terms of content, the book on creating IT strategies focuses on the following areas:- Fundamentals of IT strategy as well as differentiation from a digitalisation strategy.- Reasons for an IT strategy- As-is analysis of IT- Analysis of the corporate strategy- IT application strategy- Sourcing strategy- IT organisation and IT governance- Practical implementation: budgeting, IT roadmap and IT project portfolio- Monitoring and control of the IT strategy with the IT strategy cockpit The author primarily addresses CIOs and IT managers of medium-sized to large companies and groups in the manufacturing industry. In addition, the book is suitable for the following target groups:- IT staff, IT controlling and IT management level employees.- IT management consultants- CFOs, CEOs, managing directors and board members of manufacturing companiesTable of Contents
£42.74
Springer Fachmedien Wiesbaden Business Development: Processes, Methods and
Book SynopsisThis reference book provides a compact overview of the increasingly important topic of Business Development. The author not only describes the role of the Business Development Manager with its tasks, but also shows how Business Development can be organizationally integrated into a company. In addition, a prototypical Business Development Process is specifically presented and explained using a case study.The second, revised and expanded edition of the reference book shows that crises can also be an opportunity, explains specific Key Performance Indicators (KPIs) for Business Development and describes new digital business models. In addition, the book was supplemented by a practical interview and quotes from business and science.The reference book helps everyone who is responsible for introducing or optimizing Business Development in the company or who wants to work in this area in the future.Table of ContentsBusiness Development: role, role profile, business unit, process - Portfolio structure, management and life cycle - Resources - Target market - Market cultivation strategy - Case study - Six steps to Business Development
£37.99
Springer Fachmedien Wiesbaden Composable Enterprise: agil, flexibel, innovativ:
Book SynopsisDer Nutzen der Digitalisierung liegt nicht im Einsatz neuer Technologien für bestehende Prozesse, sondern in organisatorischen Änderungen und neuen Geschäftsmodellen. Das Buch stellt das Composable Enterprise als Leitbild für eine erfolgreiche digitale Transformation und damit verbundene Kostenreduktionen und Umsatzsteigerungen heraus. Was bedeutet das? Ein Composable Enterprise ist dezentral prozessorientiert organisiert. Dadurch kann das Unternehmen schnell auf neue Situationen reagieren, Prozesse und Geschäftsmodelle entwickeln oder verändern. Die Informationssysteme basieren auf Plattformarchitekturen. Ein Paradigmenwechsel zu monolithischen Anwendungen.Branchenkonzepte für Industrie, Consulting und Hochschulen zeigen, wie Organisation und Anwendungsarchitekturen im Composable Enterprise ineinandergreifen.Der Leser erhält Inspiration, Fundament und einen Kompass für die digitale Transformation eines Unternehmens zum Composable Enterprise.Table of ContentsEinführung - Erfolgstreiber digitaler Geschäftsmodelle - Digitale Branchenkonzepte -Geschäftsprozesse als zentraler Fokus der Digitalisierung - Vom Prozessmodell zum Anwendungssystem - Process Mining - Operational Performance Support - Robotic Process Automation (RPA) - Einfluss der IT-Infrastruktur auf die Prozessautomation - Innovationsnetzwerk zur Digitalisierung
£36.09
Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Transactions on Computational Collective Intelligence XXXVII
Book SynopsisThese transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as performance optimization in IoT, big data, reliability, privacy, security, service selection, QoS and machine learning. This 37th issue contains 9 selected papers which present new findings and innovative methodologies as well as discuss issues and challenges in the field of collective intelligence from big data and networking paradigms while addressing security, privacy, reliability and optimality to achieve QoS to the benefit of final users. Table of ContentsThe decline of the Buchholz tiebreaker system: a preferable alternative.- Constructing Varied and Attractive Shortlists from Databases: A Group Decision Approach Algorithms for measuring indirect control in corporate networks and effects of divestment.- Algorithms for measuring indirect control in corporate networks and effects of divestment.- Lies, Damned Lies, and Crafty Questionnaire Design.- Solidarity Measures.- Transportation problem with fuzzy unit costs. Z-fuzzy numbers approach.- The new ecological paradigm, functional stupidity and university sustainability – a polish case study.- A Model of a Parallel Design Environment for the Development of Decision-making IoT.
£49.49
BPB Publications Multi-Cloud Automation with Ansible: Automate,
Book Synopsis
£26.59
Springer Verlag, Singapore When 5G Meets Industry 4.0
Book SynopsisSince the 1980s, mobile communication has undergone major transitions from 1G to 4G, at a rate of roughly one generation per decade. And the next upgrade is set to come soon, with 5G heralding a new era of large-bandwidth Internet, and a multi-connection, low-latency Internet of Everything.5G technology will be the standard for next-generation mobile Internet, and it will not only enhance the individual user’s experience, but also provide technical support for artificial-intelligence-based applications, such as smart manufacturing, smart healthcare, smart government, smart cities and driverless cars. As a result, 5G is regarded as the “infrastructure” of the industrial Internet and artificial intelligence and both China and the United States are striving to become the 5G leader and spearhead this new generation of international mobile communication standards. Though trade tensions between China and the United States continue to escalate, with products ranging from soybeans to mobile phones and automobiles being affected, 5G technology may be the true cause of trade wars between the world’s top two economies.In short, 5G will change not only society, but also international trade patterns. This book describes various 5G scenarios, changes and values; explains the standards, technologies and development directions behind 5G; and explores new models, new formats and new trends in 5G-based artificial intelligence.Table of ContentsChapter 1 The Development of 5G 1.1 Why is 5G important 1.2 The difference between 5G and 4G 1.3 What changes can 5G bring Chapter 2 The Advanced Technology of 5G 2.1 The premise of 5G is standard 2.2 The core of 5G is network deployment 2.3 The three new technologies of 5G 2.4 The flexibility of 5G Chapter 3 The Development of Industry 4.0 3.1 Traditional industrialization has lost competitiveness 3.2 The core of Industry 4.0 is algorithm-based intelligent manufacturing 3.3 The vision of Industry 4.0 is to break the impossible trinity of manufacturing 3.4 The key to Industry 4.0 is ICT technology Chapter 4 5G Provides Support for Industry 4.0 Communication System 4.1 Significance of 5G igh Bandwidth Network Speed (eMBB) for Industry 4.0 4.2 Significance of 5G to support large-scale networking (mMTC) for Industry 4.0 4.3 Significance of 5G Low Latency (uRLLC) for Industry 4.0 4.4 5G Local Area Network (Local 5G) Implementation Path Chapter 5 The Fusion Scenario between Industry 4.0 and 5G 5.1 Production process can be perceptible 5.2 Device status can be monitored 5.3 Product quality can be improved 5.4 Resource allocation can be predicated 5.5 Manufacturing can be cooperated Postscript: Industry 5G - A New Era of Intelligence
£49.49
Springer Verlag, Singapore Urban Informatics
Book SynopsisThis open access book is the first to systematically introduce the principles of urban informatics and its application to every aspect of the city that involves its functioning, control, management, and future planning. It introduces new models and tools being developed to understand and implement these technologies that enable cities to function more efficiently – to become ‘smart’ and ‘sustainable’. The smart city has quickly emerged as computers have become ever smaller to the point where they can be embedded into the very fabric of the city, as well as being central to new ways in which the population can communicate and act. When cities are wired in this way, they have the potential to become sentient and responsive, generating massive streams of ‘big’ data in real time as well as providing immense opportunities for extracting new forms of urban data through crowdsourcing. This book offers a comprehensive review of the methods that form the core of urban informatics from various kinds of urban remote sensing to new approaches to machine learning and statistical modelling. It provides a detailed technical introduction to the wide array of tools information scientists need to develop the key urban analytics that are fundamental to learning about the smart city, and it outlines ways in which these tools can be used to inform design and policy so that cities can become more efficient with a greater concern for environment and equity.Table of ContentsUrban Science and Systems.- Urban Sensing.- Urban Big Data Infrastructure.- Urban Computing.- Urban Problems and Possible Solutions.- Perspectives for the Future.
£40.49
Springer Verlag, Singapore Multimedia Sensor Networks
Book SynopsisSensor networks are an essential component of the Internet of Things (IoT), and Multimedia Sensor Networks (MSNs) are the most important emerging area in sensor networks. However, multimedia sensing is characterized by diversified modes, large volumes of data, considerable heterogeneity, and complex computing, as a result of which the theory and methods for traditional sensor networks can’t be applied to MSNs. Based on the authors’ years of systematic research on related theory and methods, this book provides a comprehensive review of MSNs. The coverage ranges from networked sensing and fusion-based transmission, to route discovery and in-network computing. The book presents the most important scientific discoveries and fundamental theories on MSNs, while also exploring practical approaches and typical applications. Given its scope, it is especially suitable for students, researchers and practitioners interested in understanding scientific problems involved in characterizing multimedia sensing features, revealing the transmission mechanisms of MSNs, and constructing efficient in-network multimedia computing paradigms. In this book, readers will learn essential methods for achieving the optimal deployment of, efficient and reliable transmission, and timely information processing in MSNs.Table of Contents
£116.99
Springer Verlag, Singapore Security in Computing and Communications: 8th
Book SynopsisThis book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.Table of ContentsPandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools.- A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems.- Evading Static and Dynamic Android Malware Detection Mechanisms.- Multilevel Secure Container Deployment Framework in Edge Computing.- Deep Hierarchical APP Recommendation with Dynamic Behaviors.- New Security Architecture of Access Control in 5G MEC.- A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments.- A Survey of Security Attacks on Silicon Based Weak PUF Architectures.- On the Feasibility of DoS Attack on Smart Door Lock IoT Network.- Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning.- Benchmarking Machine Learning Bioinspired Algorithms for Behaviour-Based Network Intrusion Detection.- Thermal Management in Large Data Centres: Security Threats and Mitigation.- Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm.- Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption over Outsourced Encrypted Data.- Performance Study of Multi-Target Tracking Using Kalman Filter and Hungarian Algorithm.- SaaS - Microservices-Based Scalable Smart Contract Architecture.- GIDS: Anomaly Detection Using Generative Adversarial Networks.- Audio Steganography Using Multi LSB and IGS Techniques.- A Forensic Analysis on the Availability of MQTT Network Traffic.- The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications.- Analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment.
£40.49
Springer Verlag, Singapore Emerging Research in Computing, Information,
Book SynopsisThis book presents the proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2020. The conference provides an interdisciplinary forum for researchers, professional engineers and scientists, educators and technologists to discuss, debate and promote research and technology in the upcoming areas of computing, information, communication and their applications. The book discusses these emerging research areas, providing a valuable resource for researchers and practicing engineers alike. Table of ContentsDesign of a Secure Blockchain Based Privacy Preserving Electronic Voting System.- A Nature Inspired Algorithm for Enhancement of Fused MRI and CT Brain Images.- Recent Advances and Future Directions of Assistive Technologies for Alzheimer’s Patients.- Research on Security awareness to protect data through Ontology and Cloud Computing.- Driver Activity Monitoring using MobileNets.- Prediction of Crop Production using Analysis Algorithms.- A Deep Learning Approach for Speedbumpand Pothole Detection using sensordata.- Decision Tree based Crop Yield Prediction using Agro-Climatic parameters.- Regression based Data pre-processing technique for predicting missing values.- An Improved Stacked Sparse Auto-encoder Method for Network Intrusion Detection.
£151.99
Springer Verlag, Singapore Emerging Research in Computing, Information,
Book SynopsisThis book presents the proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2020. The conference provides an interdisciplinary forum for researchers, professional engineers and scientists, educators and technologists to discuss, debate and promote research and technology in the upcoming areas of computing, information, communication and their applications. The book discusses these emerging research areas, providing a valuable resource for researchers and practicing engineers alike. Table of ContentsImage Captioning for the Visually Impaired.-IoT-based Water Quality Analysis and Purification System.- Enhancement of Low Light Images Using CNN.- Identical Twin Face Recognition Using Gabor Filter, SVM Classifier and Surf Algorithm.- Modelling and prediction of cardiac dysrhythmia.- Lung Cancer Detection and Prediction using Customized Selective Segmentation Technique with SVM Classifier.- Design and Implementation of Storage Benchmark Kit.- Adaptive calibration for camera and stitching of images.- Data mining techniques in the agricultural sector.- Design Of A Simplified ANNModelFor Real Power Prediction Problem.- Design and implementation of power efficient and fast full adders using hybrid logics.
£143.99
Springer Verlag, Singapore Computational Thinking: A Perspective on Computer
Book SynopsisThis textbook is intended as a textbook for one-semester, introductory computer science courses aimed at undergraduate students from all disciplines. Self-contained and with no prerequisites, it focuses on elementary knowledge and thinking models. The content has been tested in university classrooms for over six years, and has been used in summer schools to train university and high-school teachers on teaching introductory computer science courses using computational thinking. This book introduces computer science from a computational thinking perspective. In computer science the way of thinking is characterized by three external and eight internal features, including automatic execution, bit-accuracy and abstraction. The book is divided into chapters on logic thinking, algorithmic thinking, systems thinking, and network thinking. It also covers societal impact and responsible computing material – from ICT industry to digital economy, from the wonder of exponentiation to wonder of cyberspace, and from code of conduct to best practices for independent work. The book’s structure encourages active, hands-on learning using the pedagogic tool Bloom's taxonomy to create computational solutions to over 200 problems of varying difficulty. Students solve problems using a combination of thought experiment, programming, and written methods. Only 300 lines of code in total are required to solve most programming problems in this book.Trade Review“The book companion website includes the course’s lecture and project slides as well as Go source code. … Xu and Zhang validate the view that it is indeed more concerned with … CS instruction itself and provides an effective framework for teaching the subject from introductory to advanced courses. Thus they agree with other notable CT researchers and practitioners, such as Denning and Tedre [1], and their textbook is a most valuable contribution to CS education.” (Harry J. Foxwell, Computing Reviews, October 12, 2022)“The book has a companion website from which readers can pull down over 200 MB of zip files with lecture notes, lab notes … and project notes. This is a puzzling book in some respects. On the one hand it covers basic concepts and terminology for the beginning student, yet on the other hand plunges into sophisticated topics without drawing a breadth. Likewise, it claims that programing experience is not a prerequisite … .” (Anthony J. Duben, Computing Reviews, August 30, 2022)“The most preeminent characteristic of this book is its ‘thinking’-perspective, which the reader may or may not like, and which perhaps leads to a suboptimal arrangements of topics. … the material presented is impressive, and at least the fundamentals are covered in great detail.” (Dieter Riebesehl, zbMATH 1490.68001, 2022)Table of Contents1 Overview of Computer Science.-2 Processes of Digital Symbol Manipulation.- 3 Logic Thinking.- 4 Algorithmic Thinking.- 5 Systems Thinking.- 6 Network Thinking.- 7 Projects.- 8 Appendices.
£41.24
Springer Verlag, Singapore Innovative Computing: Proceedings of the 4th
Book SynopsisThis book comprises select proceedings of the 4th International Conference on Innovative Computing (IC 2021) focusing on cutting-edge research carried out in the areas of information technology, science, and engineering. Some of the themes covered in this book are cloud communications and networking, high performance computing, architecture for secure and interactive IoT, satellite communication, wearable network and system, infrastructure management, etc. The essays are written by leading international experts, making it a valuable resource for researchers and practicing engineers alike.Table of ContentsDetection of Region-of-Interest Based on Noise Filtering in High-Speed ImagesDetection of Error Images Based on Matching Edges with Strong ComponentsVisual Tracking Detection and Movement Identification by Using Eye-tracker for Esports PlayerConstruction and Research of E-sportsSpeech Emotion Recognition ModelDetect safety net on the construction site based on YOLO-v4Epidemic Data Visualization Analysis of the Covid-19 Development in ChinaUsing Natural Language Processing Technology to Predict Patient Reintubation with Traditional Chinese Nursing RecordsEmotion Recognition in Conversation Using Capsule Networks and Gated Recurrent UnitsEffects of an Augmented Reality-based Educational Game on Student’s Learning Performance and Motivation in Nature CourseICCN
£179.99
Springer Verlag, Singapore Localization in Underwater Sensor Networks
Book SynopsisOcean covers 70.8% of the Earth’s surface, and it plays an important role in supporting all life on Earth. Nonetheless, more than 80% of the ocean’s volume remains unmapped, unobserved and unexplored. In this regard, Underwater Sensor Networks (USNs), which offer ubiquitous computation, efficient communication and reliable control, are emerging as a promising solution to understand and explore the ocean. In order to support the application of USNs, accurate position information from sensor nodes is required to correctly analyze and interpret the data sampled. However, the openness and weak communication characteristics of USNs make underwater localization much more challenging in comparison to terrestrial sensor networks.In this book, we focus on the localization problem in USNs, taking into account the unique characteristics of the underwater environment. This problem is of considerable importance, since fundamental guidance on the design and analysis of USN localization is very limited at present. To this end, we first introduce the network architecture of USNs and briefly review previous approaches to the localization of USNs. Then, the asynchronous clock, node mobility, stratification effect, privacy preserving and attack detection are considered respectively and corresponding localization schemes are developed. Lastly, the book’s rich implications provide guidance on the design of future USN localization schemes.The results in this book reveal from a system perspective that underwater localization accuracy is closely related to the communication protocol and optimization estimator. Researchers, scientists and engineers in the field of USNs can benefit greatly from this book, which provides a wealth of information, useful methods and practical algorithms to help understand and explore the ocean.Table of Contents 1. Introduction1.1 Network Architecture of Underwater Sensor Networks1.2 Prior Arts in Localization1.3 Underwater Weak Communication Characteristics 2. Asynchronous Localization of Underwater Sensor Networks with Mobility Prediction2.1 Introduction2.2 System Modeling and Problem Formulation2.3 Design of Asynchronous Localization Approach2.4 Performance Analysis2.4.1 Convergence2.4.2 Cramer-Rao Lower Bound2.5 Simulation2.5.1 Simulation of Active Sensor Node2.5.2 Simulation of Passive Sensor Node2.6 SummaryReferences 3. Asynchronous Localization of Underwater Sensor Networks with Consensus-Based Unscented Kalman Filtering3.1 Introduction3.2 System Modeling and Problem Formulation3.3 Design of Consensus-Based UKF Localization Approach3.4 Performance Analysis3.4.1 Observability Analysis3.4.2 Convergence Conditions3.4.3 Cramer-Rao Lower Bound3.4.4 Computational Complexity Analysis3.5 Simulation3.6 SummaryReference 4. Reinforcement Learning Based Asynchronous Localization of Underwater Sensor Networks4.1 Introduction4.2 System Modeling and Problem Formulation4.3 Design of Reinforcement Learning Based Asynchronous Localization Approach4.4 Performance Analysis4.4.1 Convergence Conditions4.4.2 Cramer-Rao Lower Bound4.4.3 Computational Complexity Analysis4.5 Simulation4.5.1 Advantage of the RL-Based Localization Strategy4.5.3 Simulation of Active Sensor Node4.5.4 Simulation of Passive Sensor Node4.6 SummaryReference 5. Privacy Preserving Asynchronous Localization of Underwater Sensor Networks5.1 Introduction5.2 System Modeling and Problem Formulation5.3 Design of Privacy Preserving Based Localization Approach5.3.1 Design of Active Sensor Node Localization Strategy5.3.2 Design of Ordinary Sensor Node Localization Strategy5.4 Performance Analysis5.4.1 Equivalence Analysis 5.4.1.1 Equivalence Analysis of Active Sensor Node 5.4.1.2 Equivalence Analysis of Ordinary Sensor Node5.4.2 Level of Privacy Preservation5.4.3 Communication Complexity Analysis5.5 Simulation5.5.1 Simulation of Active Sensor Node5.5.2 Simulation of Ordinary Sensor Node5.6 SummaryReference 6. Privacy-Preserving Asynchronous Localization of Underwater Sensor Network with Attack Detection and Ray Compensation6.1 Introduction6.2 System Modeling and Problem Formulation6.3 Design of Privacy-Preserving Localization Approach6.4 Performance Analysis6.4.1 Equivalence Analysis6.4.2 Influencing Factors of Localization Errors6.4.3 Privacy-Preserving Property6.4.4 Tradeoff Between Privacy and Transmission Cost6.5 Simulation6.6 SummaryReference 7. Deep Reinforcement Learning Based Privacy-Preserving Localization of Underwater Sensor Networks7.1 Introduction7.2 System Modeling and Problem Formulation7.3 Design of Privacy-Preserving Localization Protocol7.4 Design of DRL-based Localization Approach7.4.1 Localization when All Data is Unlabeled7.4.2 Localization when Labelled Data Occupies the Majority7.4.3 Localization when Unlabeled Data Occupies the Majority7.5 Performance Analysis7.5.1 Equivalence of the Localization Protocols7.5.2 Privacy Preservation Analysis7.5.3 Global Optimum Analysis7.5.4 Computation Complexity Analysis7.6 Simulation7.6.1 Advantage of the DRL-Based Localization Strategy7.6.2 Simulation of Unsupervised DRL-Based Estimator7.6.3 Simulation of Supervised DRL-Based Estimator7.6.4 Simulation of Semisupervised DRL-Based Estimator7.7 SummaryReference8. Conclusion and future perspective
£107.99
Springer Verlag, Singapore Causes and Symptoms of Socio-Cultural
Book SynopsisThis book explores cultural polarization resultant decline in social cohesion in society and how information and communication technologies exacerbate the cultural polarization through phenomenon such as “echo chambers” of information that damage the quality of online discourse. This book examines the nature of the information that is shared. Further this book identifies how the quality of online discourse and polarization induced through it leads to offline harm and negative outcomes in our society. This book discusses how wide-ranging information exchange on digital media can lead to two scenarios, namely, the formation of the public sphere or the formation of echo chambers. While the public sphere, which promotes greater diversity, is a well-researched domain, substantially less research has been conducted on echo chambers in relation to sociocultural activities, products or services. This book states that polarization induced by the formation and evolution of echo chambers in sociocultural realm such as around epidemic outbreaks, vaccination, healthcare, education, and climate change is an emerging avenue of research due to its enormous impact in the shaping of our society. Therefore, this book argues that understanding the characteristics of sociocultural products related controversies is critical and valuable in developing interventions to reduce unhealthy societal and organizational polarisations. The development of systematic knowledge is required to understand and address such a large scale and complex societal challenge so as to facilitate a deeper understanding and offer solutions to the growing issue of polarization in sociocultural context driven primarily through echo chambers. This book examines how technology enabled social media usage increases, and the complex structural outcomes such as echo chambers are likely to have an increasingly important role in shaping public opinion. This book appeals to readers with interest in developing a deeper and broader understanding of issues and initiatives related to the polarization of opinions on cultural products. These include readers and scholars from various disciplines, along with engaged organizational leaders, activists, policy makers, and common citizens. Table of ContentsChapter 1. Introduction to the Role of Information and Communication Technologies in Polarization (Israr Qureshi, Babita Bhatt, Samrat Gupta and Amit Anand Tiwari).- Part I: Techniques and Methods.- Chapter 2. A Schelling-opinion model based on integration of opinion formation with residential segregation (Victoria Arcón, Juan Pablo Pinasco and Inés Caridi).- Chapter 3. The dynamics of Online opinion formation: Polarization around vaccine development for COVID-19 (Gaurav Jain, Avinash Bapu Sreenivas, Samrat Gupta and Amit Anand Tiwari).- Chapter 4. Investigating Dynamics of Polarization of Youtube True and Fake News Channels (Manideepto Das, Priya Singh and Adrija Majumdar).- Part II: Social Aspects of Polarization.- Chapter 5. The Polarization about Bushfires in Australia (Zhiwen Zhang and Babita Bhatt).- Chapter 6. (De) polarizing ICT Debates of Reservations and Affirmative Action Policy: A Plea for Reparations in India and the U.S. (K.C. Nat Turner, Nagaraju Gundemeda and Sabiha Sultana).- Part III: Cultural Aspects of Polarization.- Chapter 7. Impact of ICT on Literary Censorship: A Study of Selected Controversial Texts in Contemporary India (Fujeena Abdul Kader and Upender Gundala).- Chapter 8. Investigating Social Media Induced Polarization on National Education Policy 2020 (Bhavna Sharma and Kirti Vasuja).- Chapter 9. Media Bias and Bollywood: An untold story (Gaurav Jain, Snehanshu Suman, Samrat Gupta and Amit Anand Tiwari).- Part IV: Consequences and Outcomes of Polarization: Trends and Future Research Directions.- Chapter 10. Polarization in Information Ethics: The Debates between Privacy and Common Goods in the Chinese Social Credit System (Zhiwen Zhang and Babita Bhatt).- Chapter 11. A Comprehensive Review on Countering Rumours in the Age of Online Social Media Platforms (Amir Ebrahimi Fard and Trivik Verma).- Chapter 12. Future Research Directions in Polarization (Israr Qureshi, Babita Bhat, Samrat Gupta and Amit Anand Tiwari).- Index.
£123.49
Springer Verlag, Singapore Pervasive Computing and Social Networking:
Book SynopsisThe book features original papers from International Conference on Pervasive Computing and Social Networking (ICPCSN 2021), organized by NSIT, Salem, India during 19 – 20 march 2021. It covers research works on conceptual, constructive, empirical, theoretical and practical implementations of pervasive computing and social networking methods for developing more novel ideas and innovations in the growing field of information and communication technologies.
£161.99
Springer Verlag, Singapore Proceedings of International Conference on Deep
Book SynopsisThis book gathers selected papers presented at the International Conference on Deep Learning, Computing and Intelligence (ICDCI 2021), organized by Department of Information Technology, SRM Institute of Science and Technology, Chennai, India, during January 7–8, 2021. The conference is sponsored by Scheme for Promotion of Academic and Research Collaboration (SPARC) in association with University of California, UC Davis and SRM Institute of Science and Technology. The book presents original research in the field of deep learning algorithms and medical imaging systems, focusing to address issues and developments in recent approaches, algorithms, mechanisms, and developments in medical imaging.Table of ContentsClassification of Blast Cells in Leukemia Using Digital Image Processing and Machine Learning.- Secured Cloud Storage System using Auto Passkey Generation.- A Novel Multi-Objective Memetic Algorithm for Mining Classifiers.- An Intelligent Road Transportation System.- Securing Data from Active Attacks in IoT: An Extensive Study.
£179.99
Springer Verlag, Singapore Proceedings of Data Analytics and Management:
Book SynopsisThis book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2021), held at Jan Wyzykowski University, Poland, during June 2021. The book covers the topics in data analytics, data management, big data, computational intelligence, and communication networks. The book presents innovative work by leading academics, researchers, and experts from industry which is useful for young researchers and students.Table of ContentsCNN Based Feature Extraction for Visual Speech Recognition in Malayalam.- Effective Rate of Minority Class Over-Sampling for Maximizing the Imbalanced Dataset.- Spectral Efficiency Analysis of Massive MIMO.- Dental Cavity Detection using YOLO.- Development of Data Set for Automatic News Telecast System for Deaf Using ISL Videos.- A Comprehensive Survey on Content Based Image Retrieval using Machine Learning.- Machine Learning Techniques for Keystroke Dynamics.- Artificial Neural Network Approach for Multimodal Biometric Authentication System.- Malware Classification and Defence Against Adversarial Attacks.- Test Suite minimization based upon CMIMX and ABC.- Comparative Analysis on Machine Learning Methodologies for the Effective Usage of Medical WSNs.- Convolutional Neural Networks for Malaria Image Classification.- Plant Leaf Disease Identification and Prescription Suggestion Using Deep Learning.- Efficient Spectrum Allocation in Wireless Networks Using Channel Aggregation Fragmentation with Reservation Channels.- Toxic Comment Classification using Bi-Directional GRUs & CNN.- Climate Dependent Crop Management through Data Modeling.- Translate2Classify: Machine Translation for E-Commerce Product Categorization in comparison to Machine Learning & Deep Learning Classification.- Multimodal Biometric Authentication by Slap Swarm based Score Level Fusion.- Hybrid Metaheuristic Algorithm based Clustering with Multi-hop Routing Protocol for Wireless Sensor Networks.
£197.99
Springer Verlag, Singapore Proceedings of Data Analytics and Management:
Book SynopsisThis book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2021), held at Jan Wyzykowski University, Poland, during June 2021. The book covers the topics in data analytics, data management, big data, computational intelligence, and communication networks. The book presents innovative work by leading academics, researchers, and experts from industry which is useful for young researchers and students.Table of ContentsPsychological stress and mental health among seafarers.- Real Time Face-Mask Detection and Analysis System.- Gait Recognition Biometric System.- Fighting Media Hyper-partisanship with Modern Language Representation Models.- ANN Based Handwritten Digit Recognition and Equation Solver.- Hyperspectral Imaging in Document Forgery.- Optimized Usability Features of Academic Websites using Chicken Swarm and Cat Swarm Optimization Algorithm.- Study and Development of Self Sanitizing Smart Elevator.- Predict COVID-19 with Chest X-ray.- Image Segmentation Techniques: A Survey.- Quantum Inspired Support Vector Machines for Human Activity Recognition in Industry 4.0.- Hybrid System based on Genetic Algorithm and Neuro-Fuzzy Approach for Neurodegenerative Disease Forecasting.- Decentralized Library Management system using Blockchain technology.- Content based Image Retrieval using Deep Learning.- A Deep Learning-Based Feature Extraction Model for Classification Brain Tumor.- Image Classification in Python using Keras.- Predictive Analytics on E-commerce Annual Sales.- A Survey on Deep Learning Methods in Image Analytics.- Journey of Letters to Vectors through Neural Networks.- Accident Risk Prediction and Location Tracking of a Vehicle using Real-Time Data Acquisition from Vehicle Sensors.- Data Augmentation and Fine Tuning the radiography images to detect COVID-19 patients with pre-trained network of Transfer Learning.- Index Optimization using Wavelet Tree and Compression.
£161.99
Springer Verlag, Singapore Proceedings of the 11th International Conference
Book SynopsisThis conference proceeding is a collection of the papers accepted by the CENet2021 – the 11th International Conference on Computer Engineering and Networks held on October 21-25, 2021 in Hechi, China. The topics focus but are not limited to Internet of Things and Smart Systems, Artificial Intelligence and Applications, Communication System Detection, Analysis and Application, and Medical Engineering and Information Systems. Each part can be used as an excellent reference by industry practitioners, university faculties, research fellows and undergraduates as well as graduate students who need to build a knowledge base of the most current advances and state-of-practice in the topics covered by this conference proceedings. This will enable them to produce, maintain, and manage systems with high levels of trustworthiness and complexity.
£449.99
Springer Verlag, Singapore Security and Privacy in Social Networks and Big Data: 7th International Symposium, SocialSec 2021, Fuzhou, China, November 19–21, 2021, Proceedings
Book SynopsisThis book constitutes revised and selected papers from the 7th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2021, held in Fuzhou, China, in November 2021.The 16 full papers presented in this volume were carefully reviewed and selected from a total of 41 submissions. Such themes as privacy protection, security of AI, mobile social networks, Big Data system, applied cryptography, and others are covered in the volume.The papers are organized in the following topical sections: Applied Cryptography for Big Data; Big Data System Security; Forensics in Social Networks and Big Data; Privacy Protection in Social Networks; Security and Privacy in Big Database; Security of AI; Trust and Reputations in Social Networks.Table of ContentsApplied Cryptography for Big Data.- Big Data System Security.- Forensics in Social Networks and Big Data.- Privacy Protection in Social Networks.- Security and Privacy in Big Database.- Security of AI.- Trust and Reputations in Social Networks.
£49.49
Springer Verlag, Singapore Frontier Computing: Proceedings of FC 2021
Book SynopsisThis book gathers the proceedings of the 11th International Conference on Frontier Computing, held in Seoul, on July 13–17, 2021, and provides comprehensive coverage of the latest advances and trends in information technology, science, and engineering. It addresses a number of broad themes, including communication networks, business intelligence and knowledge management, Web intelligence, and related fields that inspire the development of information technology. The respective contributions cover a wide range of topics: database and data mining, networking and communications, Web and Internet of things, embedded systems, soft computing, social network analysis, security and privacy, optical communication, and ubiquitous/pervasive computing. Many of the papers outline promising future research directions, and the book benefits students, researchers, and professionals alike. Further, it offers a useful reference guide for newcomers to the field.Table of Contents Cloud, Ubiquitous, Pervasive, and High Performance Computing Dependable, Reliable and Autonomic Computing Wearable Computing, Mobile Web, and Smart Environment Algorithm, Model, and Framework Programming Languages Communication and Networking Database and Data Mining Big Data and Internet of Things Anticipatory Computing Web and Internet Computing Natural Language Processing Operating Systems Image Processing, Pattern Recognition, Multimedia Technology Embedded system and software Geographical Information Systems/ Global Navigation Satellite Systems (GIS/GNSS) Intelligent Information & Database Systems Security and Privacy Social Web, Network, and Computing Social, Ethical & Other Issues of Networked World Software Design Patterns & Engineering Information/Business Management, and IT policy Mobile and Ubiquitous Computing Modeling and Simulation Multimedia systems and services Integrating Technology in Real-World Environment Promising topics in all aspects of information technology, science, and engineering
£269.99
Springer Verlag, Singapore Web and Big Data. APWeb-WAIM 2021 International Workshops: KGMA 2021, SemiBDMA 2021, DeepLUDA 2021, Guangzhou, China, August 23–25, 2021, Revised Selected Papers
Book SynopsisThis book constitutes revised selected papers from the workshops of the 5th Asia-Pacific Web and Web-Age Information Management International Joint Conference on Web and Big Data, APWeb-WAIM 2021: The Fourth International Workshop on Knowledge Graph Management and Applications, KGMA 2021, The Third International Workshop on Semi-structured Big Data Management and Application, SemiBDMA 2021, and The Second International Workshop on Deep Learning in Large-scale Unstructured Data Analytics, DeepLUDA 2021, held in Guangzhou, China, in August 2021. Due to the COVID-19 pandemic the conference was held online. The 11 papers were thoroughly reviewed and selected from the 28 submissions and present recent research on the theory, design, and implementation of data management systems.Table of ContentsThe Fourth International Workshop on Knowledge Graph Management and Applications.- The Third International Workshop on Semi-structured Big Data Management and Applications.- The Second International Workshop on Deep Learning in Large-scale Unstructured Data Analytics.
£49.49
Springer Verlag, Singapore Network Behavior Analysis: Measurement, Models,
Book SynopsisThis book provides a comprehensive overview of network behavior analysis that mines Internet traffic data in order to extract, model, and make sense of behavioral patterns in Internet “objects” such as end hosts, smartphones, Internet of things, and applications. The objective of this book is to fill the book publication gap in network behavior analysis, which has recently become an increasingly important component of comprehensive network security solutions for data center networks, backbone networks, enterprise networks, and edge networks.The book presents fundamental principles and best practices for measuring, extracting, modeling and analyzing network behavior for end hosts and applications on the basis of Internet traffic data. In addition, it explains the concept and key elements (e.g., what, who, where, when, and why) of communication patterns and network behavior of end hosts and network applications, drawing on data mining, machine learning, information theory, probabilistic graphical and structural modeling to do so. The book also discusses the benefits of network behavior analysis for applications in cybersecurity monitoring, Internet traffic profiling, anomaly traffic detection, and emerging application detections.The book will be of particular interest to researchers and practitioners in the fields of Internet measurement, traffic analysis, and cybersecurity, since it provides a spectrum of innovative techniques for summarizing behavior models, structural models, and graphic models of Internet traffic, and explains how to leverage the results for a broad range of real-world applications in network management, security operations, and cyber-intelligent analysis. After finishing this book, readers will 1) have learned the principles and practices of measuring, modeling, and analyzing network behavior on the basis of massive Internet traffic data; 2) be able to make sense of network behavior for a spectrum of applications ranging from cybersecurity and network monitoring to emerging application detection; and 3) understand how to explore network behavior analysis to complement traditional perimeter-based firewall and intrusion detection systems in order to detect unusual traffic patterns or zero-day security threats using data mining and machine learning techniques. To ideally benefit from this book, readers should have a basic grasp of TCP/IP protocols, data packets, network flows, and Internet applications.Table of ContentsChapter 1: Introduction.- Chapter 2: Background of Network Behavior Modeling and Analysis.- Chapter 3: Behavior Modeling of Network Traffic.- Chapter 4: Structural Modeling of Network Traffic.- Chapter 5: Graphic Modeling of Network Traffic.- Chapter 6: Real-Time Network Behavior Analysis.- Chapter 7: Applications.- Chapter 8: Research Frontiers of Network Behavior Analysis.
£107.99
Springer Verlag, Singapore Recent Trends in Communication and Intelligent
Book SynopsisThis book presents best selected research papers presented at the Third International Conference on Recent Trends in Communication and Intelligent Systems (ICRTCIS 2021), organized by Arya College of Engineering and IT, Jaipur, on 22-23 October 2021. It discusses the latest technologies in communication and intelligent systems, covering various areas of communication engineering, such as signal processing, VLSI design, embedded systems, wireless communications, and electronics and communications in general. Featuring work by leading researchers and technocrats, the book serves as a valuable reference resource for young researchers and academics as well as practitioners in industry.Table of ContentsChapter 1. Deep Learning-Based Adaptive Deep Belief Neural Networks For Neonatal Apnea Level Classification Using Pre-Term Birth Health Record.- Chapter 2. Hybrid Feature Extraction Technique for Tamil Automatic Speech Recognition System in Noisy Environment.- Chapter 3. Implementation and Image Transformation for Ground Penetration Image Radar System.- Chapter 4. Effect of Geospatial Weather Features on COVID-19 Spread in India using Machine Learning.- Chapter 5. Adiabatic Logic Code Converters Design at Different Sub Micron Technologies.- Chapter 6. A Cross connected Switch Capacitor Multi Level Inverter: A Proposed Topology and its Analysis.- Chapter 7. A Comparative study on Sentiment Analysis of Uber and Ola Customer Reviews based on Machine Learning Approaches.- Chapter 8. A Cost-Effective IoT Assisted Framework For Automatic Irrigation.- Chapter 9. Constrained Optimization based Routing for Multipath and Multihop Propagation in WSN.- Chapter 10. Performance comparison of fuzzy logic and evolutionary algorithm optimized controller for a multi-area power system.- Chapter 11. Leveraging CNNs for real-time pothole detection.- Chapter 12. IoT Devices for Detecting and Machine Learning for Predicting COVID-19 Outbreak.- Chapter 13. Text Detection from Scene and Born Images: How Good is Tesseract?.- Chapter 14. Load Frequency Control Of Hybrid Power System Integrated With Solar-Thermal And Geothermal System.- Chapter 15. An Improved Stock Market Index Prediction System based on LSTM.
£179.99
Springer Verlag, Singapore Distributed Computing and Optimization
Book SynopsisThis book introduces research presented at the International Conference on Distributed Computing and Optimization Techniques (ICDCOT–2021), a two-day conference, where researchers, engineers, and academicians from all over the world came together to share their experiences and findings on all aspects of distributed computing and its applications in diverse areas. The book includes papers on distributed computing, intelligent system, optimization method, mathematical modeling, fuzzy logic, neural networks, grid computing, load balancing, communication. It will be a valuable resource for students, academics, and practitioners in the industry working on distributed computing.Table of Contents1. 1T-1D Single-Ended SRAM Cell Design for Low Power Applications using CMOS technology.- 2. A Local Descriptor and Histogram of Oriented Gradients for Makeup Invariant Face Recognition under Uncontrolled Environment.- 3. A Preventive Framework for Mine Representatives Utilizing Remote Sensor Networks with Optimized Routing.- 4. A Quantitative Study of Image Fusion using Hybrid Approach.- 5. A Review on Smart Road Traffic Management System using LoRa WAN.- 6. A Road Side Unit Based Proxy Signature Scheme for Fast Verification of Messages in Vehicular Ad-Hoc Network.- 7. A Secure Data Transmission using AODV and Hash Function for MANET.- 8. A Study on Different Types of Convolutions in Deep Learning in the Area of Lane Detection.- 9. A Study on the Impact of DC Appliances and Direct DC Power System in India.- 10. A Survey on Vehicle Detection and Classification for Electronic Toll Collection Applications
£116.99
Springer Verlag, Singapore Emerging Research in Computing, Information,
Book SynopsisThis book presents the proceedings of the International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2022. The conference provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate, and promote research and technology in the upcoming areas of computing, information, communication, and their applications. The book discusses these emerging research areas, providing a valuable resource for researchers and practicing engineers alike.Table of ContentsTeaching Learning-Based Optimization with Learning Enthusiasm Mechanism for Optimal Control of PV Inverters in Utility Grids for Techno-Economic Goals.- Machine Learning Framework for Prediction of Parkinson’s Disease in Cloud Environment.- A Comparative Analysis to Measure Scholastic Success of Students Using Data Science Methods.- Gesture-Controlled Speech Assist Device for the Verbally Disabled.- Highly Classified with Two Factor Authentication Encrypted Secured Mail.- Efficacious Intrusion Detection on Cloud Using Improved BES and HYBRID SKINET-EKNN.
£237.49
Springer Verlag, Singapore Machine Learning, Image Processing, Network
Book SynopsisThis book constitutes the refereed proceedings of the Third International Conference on Machine Learning, Image Processing, Network Security and Data Sciences, MIND 2021. The papers are organized according to the following topical sections: data science and big data; image processing and computer vision; machine learning and computational intelligence; network and cybersecurity. This book aims to develop an understanding of image processing, networks, and data modeling by using various machine learning algorithms for a wide range of real-world applications. In addition to providing basic principles of data processing, this book teaches standard models and algorithms for data and image analysis. Table of ContentsA Methodological review of Time Series Forecasting with Deep Learning Model : A Case study on Electricity Load and Price Prediction.- A Robust Secure Access Entrance Method Based on Multi Model Biometric Credentials Iris and Finger Print.- Prostate Cancer Grading using Multistage DeepNeural Networks.
£170.99
Springer Verlag, Singapore Wireless Sensor Networks: 16th China Conference, CWSN 2022, Guangzhou, China, November 10–13, 2022, Proceedings
Book SynopsisThis book constitutes the refereed proceedings of the 16th China Conference on Wireless Sensor Networks, CWSN 2022, which took place in Guangzhou, China, in November 2022. The 17 full papers presented in this volume were carefully reviewed and selected from 204 submissions, including 87 English papers and 117 Chinese papers. The conference provided an academic exchange of research and a development forum for IoT researchers, developers, enterprises, and users. Exchanging results and experience of research and applications in IoT, and discussing the key challenges and research hotspots, is the main goal of the forum. As a high-level forum for the design, implementation, and application of IoT, the conference promoted the exchange and application of the oriesand technologies of IoT-related topics.Table of ContentsMmLiquid: Liquid Identification using mmWave.- PASD: A Prioritized Action Sampling-Based Dueling DQN for Cloud-Edge Collaborative Computation Offloading in Industrial IoT.- Automatic construction of large-scale IoT datasets with multi-strategy fusion.- Research on Argo data anomaly detection based on improved DBSCAN algorithm.- Fog Federation Pricing and Resource Purchase based on the Stackelberg Model in Fog Computing.- Bandwidth Scheduling Scheme with AoI Guarantee for Heterogeneous Mobile Edge Caching.- An Explainable Machine Learning Framework for Lower Limb Exoskeleton Robot System.- A Community Detection Algorithm Fusing Node Similarity and Label Propagation .- A Community Detection Algorithm Fusing Node Similarity and Label Propagation.- A Graph Neural Network Based Model for IoT Binary Components Similarity Detection .- Multi-scale Temporal Feature Fusion for Time-limited Order Prediction .- Dynamics Modeling of Knowledge Dissemination Process in Online Social Networks.- The Impact of Time Delay and User’s Behavior on the Dissemination Process of Rumor in Mobile Social Networks.- Minimizing the Embedding Cost of Service Function Chains with Adjustable Order .- MDLpark: Available parking prediction for smart parking through mobile deep learning .- Image Attribute Modification Based on Text Guidance.- Industrial IoT Network Security Situation Prediction Based on Improved SSA-BiLSTM.
£53.99
Springer Verlag, Singapore Advances in Computing and Network Communications:
Book SynopsisThis book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Computing and Network Communications (CoCoNet'20), October 14–17, 2020, Chennai, India. The papers presented were carefully reviewed and selected from several initial submissions. The papers are organized in topical sections on Signal, Image and Speech Processing, Wireless and Mobile Communication, Internet of Things, Cloud and Edge Computing, Distributed Systems, Machine Intelligence, Data Analytics, Cybersecurity, Artificial Intelligence and Cognitive Computing and Circuits and Systems. The book is directed to the researchers and scientists engaged in various fields of computing and network communication domains.Table of ContentsPart 1: Machine Learning, Visual Computing and Signal Processing.- Chapter 1. Computational Reconstructions of Extracellular Action Potentials and Local Field Potentials of a Rat Cerebellum using Point Neurons.- Chapter 2. Iris Recognition using Integer Wavelet Transform and Log Energy Entropy.- Chapter 3. Deep Learning Based Approach for Skin Burn Detection with Multi-level Classification.- Chapter 4. Semantic Retrieval of Microbiome Information Based on Deep Learning.- Chapter 5. Early Detection of Covid-19 on CT Scans Using Deep Learning Techniques.- Chapter 6. Towards Protein Tertiary Structure Prediction using LSTM/BLSTM.- Chapter 7. An Android Based Smart Home Automation System in Native Language.- Chapter 8. Live Acoustic Monitoring of Forests to Detect Illegal Logging and Animal Activity.- Chapter 9. CATS: Cluster-Aided Two-Step Approach for Anomaly Detection in Smart Manufacturing.- Chapter 10. Prediction of Energy Consumption using Statistical and Machine Learning Methods and Analysing the Significance of Climate and Holidays in the Demand Prediction.- Chapter 11. Ranking of Educational Institutions based on user priorities using AHP-PROMETHEE Approach.- Chapter 12. Using AUDIT Scores to Identify Synbiotic Supplement Effect in High Risk Alcoholics.- Chapter 13. Accurate Identification of Cardiac Arrhythmia using Machine Learning Approaches.- Chapter 14. Learning based Macro Nutrient Detection Through Plant Leaf.- Chapter 15. Characteristics of Karawitan Musicians' Brain: sLORETA Investigation.
£161.99
Springer Wireless Sensor Networks
Book Synopsis.- Cloud Computing and Edge Computing..- GL-CrackNet : A lightweight network for cracksegmentation in vehicular systems..- Multi-UAV Distributed Incremental Learning for Frequency-Hopping Prediction..- Task Offloading Scheduling and Privacy Protection Optimization in Vehicular Edge Computing based on Double Deep Q-Network..- Crowdsourcing task recommendation method based on heterogeneous graph feature anomaly detection..- Topology Inference of IoT Edge Network Based on Network Flow Behavior Analysis..- SmartTask: Efficient Dispatching for Low-Latency Tasks on Dynamic Edge Networks..- BM2 SS: Blockchain-aided Multi-Authority and Multi-Keyword Searchable Scheme for IoT..- Fog-Enabled Network Intrusion Detection Based on Variational Autoencoder for Internet of Vehicles..- Enabling Sub-Second QoS-Aware Scheduling for Dynamic Serverless Workloads..- EdgeMeter: Towards Efficient and Accurate Latency Prediction of Neural Network Model Inference on Edge Devices..- Enhancing IoT Compliance Checking with Distributed Process Mining: A Scalable Framework for Log Data Streams..- Internet of Things Security and Privacy Protection..- EMLogger: Inferring Computer Activities via EM Side-channel of Disks..- A Lightweight Authentication Protocol for LAFED..- Generalizable and Robust Log Anomaly Detection Based on Transformer..- Internet of Things Service and Application Technology..- Research on The Method of Face Recognition Based on Attention Mechanism..- Lightweight and Efficient Top-down Human Pose Estimation Algorithm Research..- Research on Transformer Tracking with Temporal Context and Bounding Box Refinement Module..- VibECG: Non-Contact Electrocardiogram Monitoring Based on mmWave Sensing..- Human Activity Recognition based on Fine-grained Capture Spatiotemporal Features of Body RFID Skeleton..- ChewSense: Real-time Detection of Chewing Counts and Food Types with Reverse Signals from Headphones..- Simulated annealing-based routing optimization algorithm for LEO satellite-assisted UAV networks..- SimilarBP: Leveraging Similar Samples for Few-Shot PPG-Based Blood Pressure Measurement.
£56.99
Springer Nature Switzerland AG Chinese Lexical Semantics
Book Synopsis
£61.74
Springer Proceedings of Innovative Computing 2024 Vol. 3
Book SynopsisThis book comprises select proceedings of the 7th International Conference on Innovative Computing which was held in Taichung City, Taiwan, Jan 23-26, 2024 (IC 2024) focusing on cutting-edge research carried out in the areas of information technology, science, and engineering.
£125.99
Springer Energy Efficient Full Duplex Wireless
Book SynopsisIn an effort to overcome the spectral efficiency loss and high latency by half-duplex (HD), full-duplex (FD) has attracted extensive attention in industry and academia. With signal transmitted and received simultaneously over the same frequency, FD can approximately double the SE over HD. More than that, by enabling the capability of simultaneous transmission-and-reception for communication nodes, full duplex (FD) is a key enabler for many 5G techniques, including but not limited to integrated sensing and communication, low-latency relaying, concurrent bi-directional uplink and downlink transmission, ect. Nevertheless, in FD communications, both transmit and receive radio frequency (RF) chains are activated for exchanging data, and additional power is triggered by self-interference cancellation. As FD requires much higher power consumption than that of half duplex (HD), it is against the green evolution requirement proposed by the future communication systems.To address the critical high-power challenge in applying FD communications, this book will introduce the fundamentals and algorithm designs for energy-efficient FD design. This book will first discuss the principle of energy-efficient communications, which aims to make a good balance between communication performance and system energy consumption. Then, this book will discuss different self-interference cancellation schemes, including passive suppression, analogue cancellation and digital cancellation for FD communications, from the prospective of energy efficiency. Subsequently, this book will present some edge-cutting energy efficiency-oriented FD solutions, including adaptive transmission power adaptation, wireless power transfer FD relaying, bi-directional FD distributed antenna systems, from the perspective of algorithm design and performance analysis.
£134.99
Springer Verlag, Singapore WiFi 7
Book SynopsisThis Wi-Fi 7 technology book serves as an essential and comprehensive professional reference for the academics and industry professionals, covering the entire Wi-Fi series across various generations. It offers a primary focus on the latest advancements in industrial Wi-Fi 7 principles andspecifications. Additionally, the book provides valuable insights into innovative strategies for Wi-Fi 7 product developmentstrategies, testing methodologies, and diverse applicationsacross industrial and home environments. It serves as a practical resource for those planning to adopt Wi-Fi 7 technology in the design and development processes. By reading this book, you will not only gain insights into the state-of-the-art of Wi-Fi 7 technology, but also develop a deep understanding of the origins, the process of developing Wi-Fi 7 products, various applications and solutions where Wi-Fi 7 can be utilized, and the current state of the industry in relation to Wi-Fi 7 technology compared to the other wireless technologies.Each section of this book follows a systematic approach, beginning with an introduction to the technology concept and offering numerous concrete examples for illustration purpose. Abundant diagrams and pictures have been included in the book's design to facilitate clear and quick comprehension of the topics for readers.
£43.99