Network hardware Books

292 products


  • Moderne Rechnernetze – Übungsbuch: Aufgaben und

    Springer Fachmedien Wiesbaden Moderne Rechnernetze – Übungsbuch: Aufgaben und

    Out of stock

    Book SynopsisDieses Übungsbuch ergänzt das Lehrbuch "Luntovskyy/Gütter, Moderne Rechnernetze: Protokolle, Standards und Apps in kombinierten drahtgebundenen, mobilen und drahtlosen Netzwerken" um praktische Übungen und dazugehörige Musterlösungen.Die Übungen und Musterlösungen werden den Teilen I, II, III im Lehrbuch zugeordnet und folgen damit dem modularen Aufbau des o.g. Lehrbuchs.Lehrbuch und Übungsbuch eignen sich als vorlesungsbegleitende Literatur zum Modul Computernetzwerke im ET- und IT-Fachstudium für Studierende und Dozenten an technischen Hochschulen.Table of Contents

    Out of stock

    £21.84

  • Composable Enterprise: agil, flexibel, innovativ:

    Springer Fachmedien Wiesbaden Composable Enterprise: agil, flexibel, innovativ:

    1 in stock

    Book SynopsisDer Nutzen der Digitalisierung liegt nicht im Einsatz neuer Technologien für bestehende Prozesse, sondern in organisatorischen Änderungen und neuen Geschäftsmodellen. Das Buch stellt das Composable Enterprise als Leitbild für eine erfolgreiche digitale Transformation und damit verbundene Kostenreduktionen und Umsatzsteigerungen heraus. Was bedeutet das? Ein Composable Enterprise ist dezentral prozessorientiert organisiert. Dadurch kann das Unternehmen schnell auf neue Situationen reagieren, Prozesse und Geschäftsmodelle entwickeln oder verändern. Die Informationssysteme basieren auf Plattformarchitekturen. Ein Paradigmenwechsel zu monolithischen Anwendungen.Branchenkonzepte für Industrie, Consulting und Hochschulen zeigen, wie Organisation und Anwendungsarchitekturen im Composable Enterprise ineinandergreifen.Der Leser erhält Inspiration, Fundament und einen Kompass für die digitale Transformation eines Unternehmens zum Composable Enterprise.Table of ContentsEinführung - Erfolgstreiber digitaler Geschäftsmodelle - Digitale Branchenkonzepte -Geschäftsprozesse als zentraler Fokus der Digitalisierung - Vom Prozessmodell zum Anwendungssystem - Process Mining - Operational Performance Support - Robotic Process Automation (RPA) - Einfluss der IT-Infrastruktur auf die Prozessautomation - Innovationsnetzwerk zur Digitalisierung

    1 in stock

    £36.09

  • Springer Vieweg Computernetze kompakt

    Out of stock

    Book SynopsisEinleitung.- Grundlagen der Informationstechnik.- Grundlagen der Computervernetzung.- Protokolle und Protokollschichten.- Bitübertragungsschicht.- Sicherungsschicht.- Vermittlungsschicht.- Transportschicht.- Anwendungsschicht.- Netzwerkvirtualisierung.- Kommandozeilenwerkzeuge.

    Out of stock

    £16.14

  • Transactions on Computational Collective Intelligence XXXVII

    Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Transactions on Computational Collective Intelligence XXXVII

    1 in stock

    Book SynopsisThese transactions publish research in computer-based methods of computational collective intelligence (CCI) and their applications in a wide range of fields such as performance optimization in IoT, big data, reliability, privacy, security, service selection, QoS and machine learning. This 37th issue contains 9 selected papers which present new findings and innovative methodologies as well as discuss issues and challenges in the field of collective intelligence from big data and networking paradigms while addressing security, privacy, reliability and optimality to achieve QoS to the benefit of final users. Table of ContentsThe decline of the Buchholz tiebreaker system: a preferable alternative.- Constructing Varied and Attractive Shortlists from Databases: A Group Decision Approach Algorithms for measuring indirect control in corporate networks and effects of divestment.- Algorithms for measuring indirect control in corporate networks and effects of divestment.- Lies, Damned Lies, and Crafty Questionnaire Design.- Solidarity Measures.- Transportation problem with fuzzy unit costs. Z-fuzzy numbers approach.- The new ecological paradigm, functional stupidity and university sustainability – a polish case study.- A Model of a Parallel Design Environment for the Development of Decision-making IoT.

    1 in stock

    £49.49

  • Multi-Cloud Automation with Ansible: Automate,

    BPB Publications Multi-Cloud Automation with Ansible: Automate,

    1 in stock

    Book Synopsis

    1 in stock

    £26.59

  • Passive Network Synthesis: Advances With Inerter

    World Scientific Publishing Co Pte Ltd Passive Network Synthesis: Advances With Inerter

    Out of stock

    Book SynopsisAfter the invention of a new mechanical element called 'inerter' in 2002, research interest in passive network synthesis has been revived and this field has again become active and essential.The unique compendium highlights the synthesis of passive electrical or mechanical networks, which is motivated by the vibration control based on a new type of mechanical elements named inerter. It introduces important fundamental concepts of passive network synthesis, and presents recent results on this topic.These new results concern mainly the economical realizations of low-degree functions as RLC networks (damper-spring-inerter networks), the synthesis of n-port resistive networks, and the synthesis of low-complexity mechanical networks. They can be directly applied to the optimization and design of various inerter-based mechanical control systems, such as suspension systems, vibration absorbers, building vibration systems, etc.This useful reference text provides important methodologies and results for researchers in the fields of circuit theory, vibration system control, passive systems, control theory, and electrical engineering.

    Out of stock

    £85.50

  • When 5G Meets Industry 4.0

    Springer Verlag, Singapore When 5G Meets Industry 4.0

    1 in stock

    Book SynopsisSince the 1980s, mobile communication has undergone major transitions from 1G to 4G, at a rate of roughly one generation per decade. And the next upgrade is set to come soon, with 5G heralding a new era of large-bandwidth Internet, and a multi-connection, low-latency Internet of Everything.5G technology will be the standard for next-generation mobile Internet, and it will not only enhance the individual user’s experience, but also provide technical support for artificial-intelligence-based applications, such as smart manufacturing, smart healthcare, smart government, smart cities and driverless cars. As a result, 5G is regarded as the “infrastructure” of the industrial Internet and artificial intelligence and both China and the United States are striving to become the 5G leader and spearhead this new generation of international mobile communication standards. Though trade tensions between China and the United States continue to escalate, with products ranging from soybeans to mobile phones and automobiles being affected, 5G technology may be the true cause of trade wars between the world’s top two economies.In short, 5G will change not only society, but also international trade patterns. This book describes various 5G scenarios, changes and values; explains the standards, technologies and development directions behind 5G; and explores new models, new formats and new trends in 5G-based artificial intelligence.Table of ContentsChapter 1 The Development of 5G 1.1 Why is 5G important 1.2 The difference between 5G and 4G 1.3 What changes can 5G bring Chapter 2 The Advanced Technology of 5G 2.1 The premise of 5G is standard 2.2 The core of 5G is network deployment 2.3 The three new technologies of 5G 2.4 The flexibility of 5G Chapter 3 The Development of Industry 4.0 3.1 Traditional industrialization has lost competitiveness 3.2 The core of Industry 4.0 is algorithm-based intelligent manufacturing 3.3 The vision of Industry 4.0 is to break the impossible trinity of manufacturing 3.4 The key to Industry 4.0 is ICT technology Chapter 4 5G Provides Support for Industry 4.0 Communication System 4.1 Significance of 5G igh Bandwidth Network Speed (eMBB) for Industry 4.0 4.2 Significance of 5G to support large-scale networking (mMTC) for Industry 4.0 4.3 Significance of 5G Low Latency (uRLLC) for Industry 4.0 4.4 5G Local Area Network (Local 5G) Implementation Path Chapter 5 The Fusion Scenario between Industry 4.0 and 5G 5.1 Production process can be perceptible 5.2 Device status can be monitored 5.3 Product quality can be improved 5.4 Resource allocation can be predicated 5.5 Manufacturing can be cooperated Postscript: Industry 5G - A New Era of Intelligence

    1 in stock

    £49.49

  • Urban Informatics

    Springer Verlag, Singapore Urban Informatics

    1 in stock

    Book SynopsisThis open access book is the first to systematically introduce the principles of urban informatics and its application to every aspect of the city that involves its functioning, control, management, and future planning. It introduces new models and tools being developed to understand and implement these technologies that enable cities to function more efficiently – to become ‘smart’ and ‘sustainable’. The smart city has quickly emerged as computers have become ever smaller to the point where they can be embedded into the very fabric of the city, as well as being central to new ways in which the population can communicate and act. When cities are wired in this way, they have the potential to become sentient and responsive, generating massive streams of ‘big’ data in real time as well as providing immense opportunities for extracting new forms of urban data through crowdsourcing. This book offers a comprehensive review of the methods that form the core of urban informatics from various kinds of urban remote sensing to new approaches to machine learning and statistical modelling. It provides a detailed technical introduction to the wide array of tools information scientists need to develop the key urban analytics that are fundamental to learning about the smart city, and it outlines ways in which these tools can be used to inform design and policy so that cities can become more efficient with a greater concern for environment and equity.Table of ContentsUrban Science and Systems.- Urban Sensing.- Urban Big Data Infrastructure.- Urban Computing.- Urban Problems and Possible Solutions.- Perspectives for the Future.

    1 in stock

    £40.49

  • Multimedia Sensor Networks

    Springer Verlag, Singapore Multimedia Sensor Networks

    3 in stock

    Book SynopsisSensor networks are an essential component of the Internet of Things (IoT), and Multimedia Sensor Networks (MSNs) are the most important emerging area in sensor networks. However, multimedia sensing is characterized by diversified modes, large volumes of data, considerable heterogeneity, and complex computing, as a result of which the theory and methods for traditional sensor networks can’t be applied to MSNs. Based on the authors’ years of systematic research on related theory and methods, this book provides a comprehensive review of MSNs. The coverage ranges from networked sensing and fusion-based transmission, to route discovery and in-network computing. The book presents the most important scientific discoveries and fundamental theories on MSNs, while also exploring practical approaches and typical applications. Given its scope, it is especially suitable for students, researchers and practitioners interested in understanding scientific problems involved in characterizing multimedia sensing features, revealing the transmission mechanisms of MSNs, and constructing efficient in-network multimedia computing paradigms. In this book, readers will learn essential methods for achieving the optimal deployment of, efficient and reliable transmission, and timely information processing in MSNs.Table of Contents

    3 in stock

    £116.99

  • Frontier Computing: Proceedings of FC 2020

    Springer Verlag, Singapore Frontier Computing: Proceedings of FC 2020

    Out of stock

    Book SynopsisThis book gathers the proceedings of the 10th International Conference on Frontier Computing, held in Singapore, on July 10–13, 2020, and provides comprehensive coverage of the latest advances and trends in information technology, science, and engineering. It addresses a number of broad themes, including communication networks, business intelligence and knowledge management, web intelligence, and related fields that inspire the development of information technology. The respective contributions cover a wide range of topics: database and data mining, networking and communications, web and Internet of things, embedded systems, soft computing, social network analysis, security and privacy, optical communication, and ubiquitous/pervasive computing. Many of the papers outline promising future research directions, and the book benefits students, researchers, and professionals alike. Further, it offers a useful reference guide for newcomers to the field.Table of Contents Cloud, Ubiquitous, Pervasive, and High Performance Computing Dependable, Reliable and Autonomic Computing Wearable Computing, Mobile Web, and Smart Environment Algorithm, Model, and Framework Programming Languages Communication and Networking Database and Data Mining Big Data and Internet of Things Anticipatory Computing Web and Internet Computing Natural Language Processing Operating Systems Image Processing, Pattern Recognition, Multimedia Technology Embedded system and software Geographical Information Systems/ Global Navigation Satellite Systems (GIS/GNSS) Intelligent Information & Database Systems Security and Privacy Social Web, Network, and Computing Social, Ethical & Other Issues of Networked World Software Design Patterns & Engineering Information/Business Management, and IT policy Mobile and Ubiquitous Computing Modeling and Simulation Multimedia systems and services Integrating Technology in Real-World Environment Promising topics in all aspects of information technology, science, and engineering ​

    Out of stock

    £224.99

  • Security in Computing and Communications: 8th

    Springer Verlag, Singapore Security in Computing and Communications: 8th

    3 in stock

    Book SynopsisThis book constitutes revised selected papers of the 8th International Symposium on Security in Computing and Communications, SSCC 2020, held in Chennai, India, in October 2020. Due to the COVID-19 pandemic the conference was held online. The 13 revised full papers and 8 revised short papers presented were carefully reviewed and selected from 42 submissions. The papers cover wide research fields including cryptography, database and storage security, human and societal aspects of security and privacy.Table of ContentsPandora: A Cyber Range Environment for the Safe Testing and Deployment of Autonomous Cyber Attack Tools.- A Communication-Induced Checkpointing Algorithm for Consistent-Transaction in Distributed Database Systems.- Evading Static and Dynamic Android Malware Detection Mechanisms.- Multilevel Secure Container Deployment Framework in Edge Computing.- Deep Hierarchical APP Recommendation with Dynamic Behaviors.- New Security Architecture of Access Control in 5G MEC.- A Fast Authentication Scheme for Cross-Network-Slicing Based on Multiple Operators in 5G Environments.- A Survey of Security Attacks on Silicon Based Weak PUF Architectures.- On the Feasibility of DoS Attack on Smart Door Lock IoT Network.- Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning.- Benchmarking Machine Learning Bioinspired Algorithms for Behaviour-Based Network Intrusion Detection.- Thermal Management in Large Data Centres: Security Threats and Mitigation.- Anomaly Detection in CAN-BUS Using Pattern Matching Algorithm.- Conjunctive Keyword Forward Secure Ranked Dynamic Searchable Encryption over Outsourced Encrypted Data.- Performance Study of Multi-Target Tracking Using Kalman Filter and Hungarian Algorithm.- SaaS - Microservices-Based Scalable Smart Contract Architecture.- GIDS: Anomaly Detection Using Generative Adversarial Networks.- Audio Steganography Using Multi LSB and IGS Techniques.- A Forensic Analysis on the Availability of MQTT Network Traffic.- The Concerns of Personal Data Privacy, on Calling and Messaging, Networking Applications.- Analysis of Orthogonal Time Frequency Space Transceiver in Baseband Environment.

    3 in stock

    £40.49

  • Emerging Research in Computing, Information,

    Springer Verlag, Singapore Emerging Research in Computing, Information,

    5 in stock

    Book SynopsisThis book presents the proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2020. The conference provides an interdisciplinary forum for researchers, professional engineers and scientists, educators and technologists to discuss, debate and promote research and technology in the upcoming areas of computing, information, communication and their applications. The book discusses these emerging research areas, providing a valuable resource for researchers and practicing engineers alike. Table of ContentsDesign of a Secure Blockchain Based Privacy Preserving Electronic Voting System.- A Nature Inspired Algorithm for Enhancement of Fused MRI and CT Brain Images.- Recent Advances and Future Directions of Assistive Technologies for Alzheimer’s Patients.- Research on Security awareness to protect data through Ontology and Cloud Computing.- Driver Activity Monitoring using MobileNets.- Prediction of Crop Production using Analysis Algorithms.- A Deep Learning Approach for Speedbumpand Pothole Detection using sensordata.- Decision Tree based Crop Yield Prediction using Agro-Climatic parameters.- Regression based Data pre-processing technique for predicting missing values.- An Improved Stacked Sparse Auto-encoder Method for Network Intrusion Detection.

    5 in stock

    £151.99

  • Emerging Research in Computing, Information,

    Springer Verlag, Singapore Emerging Research in Computing, Information,

    1 in stock

    Book SynopsisThis book presents the proceedings of International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2020. The conference provides an interdisciplinary forum for researchers, professional engineers and scientists, educators and technologists to discuss, debate and promote research and technology in the upcoming areas of computing, information, communication and their applications. The book discusses these emerging research areas, providing a valuable resource for researchers and practicing engineers alike. Table of ContentsImage Captioning for the Visually Impaired.-IoT-based Water Quality Analysis and Purification System.- Enhancement of Low Light Images Using CNN.- Identical Twin Face Recognition Using Gabor Filter, SVM Classifier and Surf Algorithm.- Modelling and prediction of cardiac dysrhythmia.- Lung Cancer Detection and Prediction using Customized Selective Segmentation Technique with SVM Classifier.- Design and Implementation of Storage Benchmark Kit.- Adaptive calibration for camera and stitching of images.- Data mining techniques in the agricultural sector.- Design Of A Simplified ANNModelFor Real Power Prediction Problem.- Design and implementation of power efficient and fast full adders using hybrid logics.

    1 in stock

    £143.99

  • Computational Thinking: A Perspective on Computer

    Springer Verlag, Singapore Computational Thinking: A Perspective on Computer

    1 in stock

    Book SynopsisThis textbook is intended as a textbook for one-semester, introductory computer science courses aimed at undergraduate students from all disciplines. Self-contained and with no prerequisites, it focuses on elementary knowledge and thinking models. The content has been tested in university classrooms for over six years, and has been used in summer schools to train university and high-school teachers on teaching introductory computer science courses using computational thinking. This book introduces computer science from a computational thinking perspective. In computer science the way of thinking is characterized by three external and eight internal features, including automatic execution, bit-accuracy and abstraction. The book is divided into chapters on logic thinking, algorithmic thinking, systems thinking, and network thinking. It also covers societal impact and responsible computing material – from ICT industry to digital economy, from the wonder of exponentiation to wonder of cyberspace, and from code of conduct to best practices for independent work. The book’s structure encourages active, hands-on learning using the pedagogic tool Bloom's taxonomy to create computational solutions to over 200 problems of varying difficulty. Students solve problems using a combination of thought experiment, programming, and written methods. Only 300 lines of code in total are required to solve most programming problems in this book.Trade Review“The book companion website includes the course’s lecture and project slides as well as Go source code. … Xu and Zhang validate the view that it is indeed more concerned with … CS instruction itself and provides an effective framework for teaching the subject from introductory to advanced courses. Thus they agree with other notable CT researchers and practitioners, such as Denning and Tedre [1], and their textbook is a most valuable contribution to CS education.” (Harry J. Foxwell, Computing Reviews, October 12, 2022)“The book has a companion website from which readers can pull down over 200 MB of zip files with lecture notes, lab notes … and project notes. This is a puzzling book in some respects. On the one hand it covers basic concepts and terminology for the beginning student, yet on the other hand plunges into sophisticated topics without drawing a breadth. Likewise, it claims that programing experience is not a prerequisite … .” (Anthony J. Duben, Computing Reviews, August 30, 2022)“The most preeminent characteristic of this book is its ‘thinking’-perspective, which the reader may or may not like, and which perhaps leads to a suboptimal arrangements of topics. … the material presented is impressive, and at least the fundamentals are covered in great detail.” (Dieter Riebesehl, zbMATH 1490.68001, 2022)Table of Contents1 Overview of Computer Science.-2 Processes of Digital Symbol Manipulation.- 3 Logic Thinking.- 4 Algorithmic Thinking.- 5 Systems Thinking.- 6 Network Thinking.- 7 Projects.- 8 Appendices.

    1 in stock

    £41.24

  • Innovative Computing: Proceedings of the 4th

    Springer Verlag, Singapore Innovative Computing: Proceedings of the 4th

    5 in stock

    Book SynopsisThis book comprises select proceedings of the 4th International Conference on Innovative Computing (IC 2021) focusing on cutting-edge research carried out in the areas of information technology, science, and engineering. Some of the themes covered in this book are cloud communications and networking, high performance computing, architecture for secure and interactive IoT, satellite communication, wearable network and system, infrastructure management, etc. The essays are written by leading international experts, making it a valuable resource for researchers and practicing engineers alike.Table of ContentsDetection of Region-of-Interest Based on Noise Filtering in High-Speed ImagesDetection of Error Images Based on Matching Edges with Strong ComponentsVisual Tracking Detection and Movement Identification by Using Eye-tracker for Esports PlayerConstruction and Research of E-sportsSpeech Emotion Recognition ModelDetect safety net on the construction site based on YOLO-v4Epidemic Data Visualization Analysis of the Covid-19 Development in ChinaUsing Natural Language Processing Technology to Predict Patient Reintubation with Traditional Chinese Nursing RecordsEmotion Recognition in Conversation Using Capsule Networks and Gated Recurrent UnitsEffects of an Augmented Reality-based Educational Game on Student’s Learning Performance and Motivation in Nature CourseICCN

    5 in stock

    £179.99

  • Localization in Underwater Sensor Networks

    Springer Verlag, Singapore Localization in Underwater Sensor Networks

    3 in stock

    Book SynopsisOcean covers 70.8% of the Earth’s surface, and it plays an important role in supporting all life on Earth. Nonetheless, more than 80% of the ocean’s volume remains unmapped, unobserved and unexplored. In this regard, Underwater Sensor Networks (USNs), which offer ubiquitous computation, efficient communication and reliable control, are emerging as a promising solution to understand and explore the ocean. In order to support the application of USNs, accurate position information from sensor nodes is required to correctly analyze and interpret the data sampled. However, the openness and weak communication characteristics of USNs make underwater localization much more challenging in comparison to terrestrial sensor networks.In this book, we focus on the localization problem in USNs, taking into account the unique characteristics of the underwater environment. This problem is of considerable importance, since fundamental guidance on the design and analysis of USN localization is very limited at present. To this end, we first introduce the network architecture of USNs and briefly review previous approaches to the localization of USNs. Then, the asynchronous clock, node mobility, stratification effect, privacy preserving and attack detection are considered respectively and corresponding localization schemes are developed. Lastly, the book’s rich implications provide guidance on the design of future USN localization schemes.The results in this book reveal from a system perspective that underwater localization accuracy is closely related to the communication protocol and optimization estimator. Researchers, scientists and engineers in the field of USNs can benefit greatly from this book, which provides a wealth of information, useful methods and practical algorithms to help understand and explore the ocean.Table of Contents 1. Introduction1.1 Network Architecture of Underwater Sensor Networks1.2 Prior Arts in Localization1.3 Underwater Weak Communication Characteristics 2. Asynchronous Localization of Underwater Sensor Networks with Mobility Prediction2.1 Introduction2.2 System Modeling and Problem Formulation2.3 Design of Asynchronous Localization Approach2.4 Performance Analysis2.4.1 Convergence2.4.2 Cramer-Rao Lower Bound2.5 Simulation2.5.1 Simulation of Active Sensor Node2.5.2 Simulation of Passive Sensor Node2.6 SummaryReferences 3. Asynchronous Localization of Underwater Sensor Networks with Consensus-Based Unscented Kalman Filtering3.1 Introduction3.2 System Modeling and Problem Formulation3.3 Design of Consensus-Based UKF Localization Approach3.4 Performance Analysis3.4.1 Observability Analysis3.4.2 Convergence Conditions3.4.3 Cramer-Rao Lower Bound3.4.4 Computational Complexity Analysis3.5 Simulation3.6 SummaryReference 4. Reinforcement Learning Based Asynchronous Localization of Underwater Sensor Networks4.1 Introduction4.2 System Modeling and Problem Formulation4.3 Design of Reinforcement Learning Based Asynchronous Localization Approach4.4 Performance Analysis4.4.1 Convergence Conditions4.4.2 Cramer-Rao Lower Bound4.4.3 Computational Complexity Analysis4.5 Simulation4.5.1 Advantage of the RL-Based Localization Strategy4.5.3 Simulation of Active Sensor Node4.5.4 Simulation of Passive Sensor Node4.6 SummaryReference 5. Privacy Preserving Asynchronous Localization of Underwater Sensor Networks5.1 Introduction5.2 System Modeling and Problem Formulation5.3 Design of Privacy Preserving Based Localization Approach5.3.1 Design of Active Sensor Node Localization Strategy5.3.2 Design of Ordinary Sensor Node Localization Strategy5.4 Performance Analysis5.4.1 Equivalence Analysis 5.4.1.1 Equivalence Analysis of Active Sensor Node 5.4.1.2 Equivalence Analysis of Ordinary Sensor Node5.4.2 Level of Privacy Preservation5.4.3 Communication Complexity Analysis5.5 Simulation5.5.1 Simulation of Active Sensor Node5.5.2 Simulation of Ordinary Sensor Node5.6 SummaryReference 6. Privacy-Preserving Asynchronous Localization of Underwater Sensor Network with Attack Detection and Ray Compensation6.1 Introduction6.2 System Modeling and Problem Formulation6.3 Design of Privacy-Preserving Localization Approach6.4 Performance Analysis6.4.1 Equivalence Analysis6.4.2 Influencing Factors of Localization Errors6.4.3 Privacy-Preserving Property6.4.4 Tradeoff Between Privacy and Transmission Cost6.5 Simulation6.6 SummaryReference 7. Deep Reinforcement Learning Based Privacy-Preserving Localization of Underwater Sensor Networks7.1 Introduction7.2 System Modeling and Problem Formulation7.3 Design of Privacy-Preserving Localization Protocol7.4 Design of DRL-based Localization Approach7.4.1 Localization when All Data is Unlabeled7.4.2 Localization when Labelled Data Occupies the Majority7.4.3 Localization when Unlabeled Data Occupies the Majority7.5 Performance Analysis7.5.1 Equivalence of the Localization Protocols7.5.2 Privacy Preservation Analysis7.5.3 Global Optimum Analysis7.5.4 Computation Complexity Analysis7.6 Simulation7.6.1 Advantage of the DRL-Based Localization Strategy7.6.2 Simulation of Unsupervised DRL-Based Estimator7.6.3 Simulation of Supervised DRL-Based Estimator7.6.4 Simulation of Semisupervised DRL-Based Estimator7.7 SummaryReference8. Conclusion and future perspective

    3 in stock

    £107.99

  • Causes and Symptoms of Socio-Cultural

    Springer Verlag, Singapore Causes and Symptoms of Socio-Cultural

    3 in stock

    Book SynopsisThis book explores cultural polarization resultant decline in social cohesion in society and how information and communication technologies exacerbate the cultural polarization through phenomenon such as “echo chambers” of information that damage the quality of online discourse. This book examines the nature of the information that is shared. Further this book identifies how the quality of online discourse and polarization induced through it leads to offline harm and negative outcomes in our society. This book discusses how wide-ranging information exchange on digital media can lead to two scenarios, namely, the formation of the public sphere or the formation of echo chambers. While the public sphere, which promotes greater diversity, is a well-researched domain, substantially less research has been conducted on echo chambers in relation to sociocultural activities, products or services. This book states that polarization induced by the formation and evolution of echo chambers in sociocultural realm such as around epidemic outbreaks, vaccination, healthcare, education, and climate change is an emerging avenue of research due to its enormous impact in the shaping of our society. Therefore, this book argues that understanding the characteristics of sociocultural products related controversies is critical and valuable in developing interventions to reduce unhealthy societal and organizational polarisations. The development of systematic knowledge is required to understand and address such a large scale and complex societal challenge so as to facilitate a deeper understanding and offer solutions to the growing issue of polarization in sociocultural context driven primarily through echo chambers. This book examines how technology enabled social media usage increases, and the complex structural outcomes such as echo chambers are likely to have an increasingly important role in shaping public opinion. This book appeals to readers with interest in developing a deeper and broader understanding of issues and initiatives related to the polarization of opinions on cultural products. These include readers and scholars from various disciplines, along with engaged organizational leaders, activists, policy makers, and common citizens. Table of ContentsChapter 1. Introduction to the Role of Information and Communication Technologies in Polarization (Israr Qureshi, Babita Bhatt, Samrat Gupta and Amit Anand Tiwari).- Part I: Techniques and Methods.- Chapter 2. A Schelling-opinion model based on integration of opinion formation with residential segregation (Victoria Arcón, Juan Pablo Pinasco and Inés Caridi).- Chapter 3. The dynamics of Online opinion formation: Polarization around vaccine development for COVID-19 (Gaurav Jain, Avinash Bapu Sreenivas, Samrat Gupta and Amit Anand Tiwari).- Chapter 4. Investigating Dynamics of Polarization of Youtube True and Fake News Channels (Manideepto Das, Priya Singh and Adrija Majumdar).- Part II: Social Aspects of Polarization.- Chapter 5. The Polarization about Bushfires in Australia (Zhiwen Zhang and Babita Bhatt).- Chapter 6. (De) polarizing ICT Debates of Reservations and Affirmative Action Policy: A Plea for Reparations in India and the U.S. (K.C. Nat Turner, Nagaraju Gundemeda and Sabiha Sultana).- Part III: Cultural Aspects of Polarization.- Chapter 7. Impact of ICT on Literary Censorship: A Study of Selected Controversial Texts in Contemporary India (Fujeena Abdul Kader and Upender Gundala).- Chapter 8. Investigating Social Media Induced Polarization on National Education Policy 2020 (Bhavna Sharma and Kirti Vasuja).- Chapter 9. Media Bias and Bollywood: An untold story (Gaurav Jain, Snehanshu Suman, Samrat Gupta and Amit Anand Tiwari).- Part IV: Consequences and Outcomes of Polarization: Trends and Future Research Directions.- Chapter 10. Polarization in Information Ethics: The Debates between Privacy and Common Goods in the Chinese Social Credit System (Zhiwen Zhang and Babita Bhatt).- Chapter 11. A Comprehensive Review on Countering Rumours in the Age of Online Social Media Platforms (Amir Ebrahimi Fard and Trivik Verma).- Chapter 12. Future Research Directions in Polarization (Israr Qureshi, Babita Bhat, Samrat Gupta and Amit Anand Tiwari).- Index.

    3 in stock

    £123.49

  • Pervasive Computing and Social Networking:

    Springer Verlag, Singapore Pervasive Computing and Social Networking:

    3 in stock

    Book SynopsisThe book features original papers from International Conference on Pervasive Computing and Social Networking (ICPCSN 2021), organized by NSIT, Salem, India during 19 – 20 march 2021. It covers research works on conceptual, constructive, empirical, theoretical and practical implementations of pervasive computing and social networking methods for developing more novel ideas and innovations in the growing field of information and communication technologies.

    3 in stock

    £161.99

  • Proceedings of International Conference on Deep

    Springer Verlag, Singapore Proceedings of International Conference on Deep

    1 in stock

    Book SynopsisThis book gathers selected papers presented at the International Conference on Deep Learning, Computing and Intelligence (ICDCI 2021), organized by Department of Information Technology, SRM Institute of Science and Technology, Chennai, India, during January 7–8, 2021. The conference is sponsored by Scheme for Promotion of Academic and Research Collaboration (SPARC) in association with University of California, UC Davis and SRM Institute of Science and Technology. The book presents original research in the field of deep learning algorithms and medical imaging systems, focusing to address issues and developments in recent approaches, algorithms, mechanisms, and developments in medical imaging.Table of ContentsClassification of Blast Cells in Leukemia Using Digital Image Processing and Machine Learning.- Secured Cloud Storage System using Auto Passkey Generation.- A Novel Multi-Objective Memetic Algorithm for Mining Classifiers.- An Intelligent Road Transportation System.- Securing Data from Active Attacks in IoT: An Extensive Study.

    1 in stock

    £179.99

  • Proceedings of Data Analytics and Management:

    Springer Verlag, Singapore Proceedings of Data Analytics and Management:

    1 in stock

    Book SynopsisThis book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2021), held at Jan Wyzykowski University, Poland, during June 2021. The book covers the topics in data analytics, data management, big data, computational intelligence, and communication networks. The book presents innovative work by leading academics, researchers, and experts from industry which is useful for young researchers and students.Table of ContentsCNN Based Feature Extraction for Visual Speech Recognition in Malayalam.- Effective Rate of Minority Class Over-Sampling for Maximizing the Imbalanced Dataset.- Spectral Efficiency Analysis of Massive MIMO.- Dental Cavity Detection using YOLO.- Development of Data Set for Automatic News Telecast System for Deaf Using ISL Videos.- A Comprehensive Survey on Content Based Image Retrieval using Machine Learning.- Machine Learning Techniques for Keystroke Dynamics.- Artificial Neural Network Approach for Multimodal Biometric Authentication System.- Malware Classification and Defence Against Adversarial Attacks.- Test Suite minimization based upon CMIMX and ABC.- Comparative Analysis on Machine Learning Methodologies for the Effective Usage of Medical WSNs.- Convolutional Neural Networks for Malaria Image Classification.- Plant Leaf Disease Identification and Prescription Suggestion Using Deep Learning.- Efficient Spectrum Allocation in Wireless Networks Using Channel Aggregation Fragmentation with Reservation Channels.- Toxic Comment Classification using Bi-Directional GRUs & CNN.- Climate Dependent Crop Management through Data Modeling.- Translate2Classify: Machine Translation for E-Commerce Product Categorization in comparison to Machine Learning & Deep Learning Classification.- Multimodal Biometric Authentication by Slap Swarm based Score Level Fusion.- Hybrid Metaheuristic Algorithm based Clustering with Multi-hop Routing Protocol for Wireless Sensor Networks.

    1 in stock

    £197.99

  • Proceedings of Data Analytics and Management:

    Springer Verlag, Singapore Proceedings of Data Analytics and Management:

    5 in stock

    Book SynopsisThis book includes original unpublished contributions presented at the International Conference on Data Analytics and Management (ICDAM 2021), held at Jan Wyzykowski University, Poland, during June 2021. The book covers the topics in data analytics, data management, big data, computational intelligence, and communication networks. The book presents innovative work by leading academics, researchers, and experts from industry which is useful for young researchers and students.Table of ContentsPsychological stress and mental health among seafarers.- Real Time Face-Mask Detection and Analysis System.- Gait Recognition Biometric System.- Fighting Media Hyper-partisanship with Modern Language Representation Models.- ANN Based Handwritten Digit Recognition and Equation Solver.- Hyperspectral Imaging in Document Forgery.- Optimized Usability Features of Academic Websites using Chicken Swarm and Cat Swarm Optimization Algorithm.- Study and Development of Self Sanitizing Smart Elevator.- Predict COVID-19 with Chest X-ray.- Image Segmentation Techniques: A Survey.- Quantum Inspired Support Vector Machines for Human Activity Recognition in Industry 4.0.- Hybrid System based on Genetic Algorithm and Neuro-Fuzzy Approach for Neurodegenerative Disease Forecasting.- Decentralized Library Management system using Blockchain technology.- Content based Image Retrieval using Deep Learning.- A Deep Learning-Based Feature Extraction Model for Classification Brain Tumor.- Image Classification in Python using Keras.- Predictive Analytics on E-commerce Annual Sales.- A Survey on Deep Learning Methods in Image Analytics.- Journey of Letters to Vectors through Neural Networks.- Accident Risk Prediction and Location Tracking of a Vehicle using Real-Time Data Acquisition from Vehicle Sensors.- Data Augmentation and Fine Tuning the radiography images to detect COVID-19 patients with pre-trained network of Transfer Learning.- Index Optimization using Wavelet Tree and Compression.

    5 in stock

    £161.99

  • Proceedings of the 11th International Conference

    Springer Verlag, Singapore Proceedings of the 11th International Conference

    3 in stock

    Book SynopsisThis conference proceeding is a collection of the papers accepted by the CENet2021 – the 11th International Conference on Computer Engineering and Networks held on October 21-25, 2021 in Hechi, China. The topics focus but are not limited to Internet of Things and Smart Systems, Artificial Intelligence and Applications, Communication System Detection, Analysis and Application, and Medical Engineering and Information Systems. Each part can be used as an excellent reference by industry practitioners, university faculties, research fellows and undergraduates as well as graduate students who need to build a knowledge base of the most current advances and state-of-practice in the topics covered by this conference proceedings. This will enable them to produce, maintain, and manage systems with high levels of trustworthiness and complexity.

    3 in stock

    £449.99

  • Security and Privacy in Social Networks and Big Data: 7th International Symposium, SocialSec 2021, Fuzhou, China, November 19–21, 2021, Proceedings

    Springer Verlag, Singapore Security and Privacy in Social Networks and Big Data: 7th International Symposium, SocialSec 2021, Fuzhou, China, November 19–21, 2021, Proceedings

    1 in stock

    Book SynopsisThis book constitutes revised and selected papers from the 7th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2021, held in Fuzhou, China, in November 2021.The 16 full papers presented in this volume were carefully reviewed and selected from a total of 41 submissions. Such themes as privacy protection, security of AI, mobile social networks, Big Data system, applied cryptography, and others are covered in the volume.The papers are organized in the following topical sections: ​Applied Cryptography for Big Data; Big Data System Security; Forensics in Social Networks and Big Data; Privacy Protection in Social Networks; Security and Privacy in Big Database; Security of AI; Trust and Reputations in Social Networks.Table of ContentsApplied Cryptography for Big Data.- Big Data System Security.- Forensics in Social Networks and Big Data.- Privacy Protection in Social Networks.- Security and Privacy in Big Database.- Security of AI.- Trust and Reputations in Social Networks.

    1 in stock

    £49.49

  • Frontier Computing: Proceedings of FC 2021

    Springer Verlag, Singapore Frontier Computing: Proceedings of FC 2021

    3 in stock

    Book SynopsisThis book gathers the proceedings of the 11th International Conference on Frontier Computing, held in Seoul, on July 13–17, 2021, and provides comprehensive coverage of the latest advances and trends in information technology, science, and engineering. It addresses a number of broad themes, including communication networks, business intelligence and knowledge management, Web intelligence, and related fields that inspire the development of information technology. The respective contributions cover a wide range of topics: database and data mining, networking and communications, Web and Internet of things, embedded systems, soft computing, social network analysis, security and privacy, optical communication, and ubiquitous/pervasive computing. Many of the papers outline promising future research directions, and the book benefits students, researchers, and professionals alike. Further, it offers a useful reference guide for newcomers to the field.Table of Contents Cloud, Ubiquitous, Pervasive, and High Performance Computing Dependable, Reliable and Autonomic Computing Wearable Computing, Mobile Web, and Smart Environment Algorithm, Model, and Framework Programming Languages Communication and Networking Database and Data Mining Big Data and Internet of Things Anticipatory Computing Web and Internet Computing Natural Language Processing Operating Systems Image Processing, Pattern Recognition, Multimedia Technology Embedded system and software Geographical Information Systems/ Global Navigation Satellite Systems (GIS/GNSS) Intelligent Information & Database Systems Security and Privacy Social Web, Network, and Computing Social, Ethical & Other Issues of Networked World Software Design Patterns & Engineering Information/Business Management, and IT policy Mobile and Ubiquitous Computing Modeling and Simulation Multimedia systems and services Integrating Technology in Real-World Environment Promising topics in all aspects of information technology, science, and engineering ​​

    3 in stock

    £269.99

  • Web and Big Data. APWeb-WAIM 2021 International Workshops: KGMA 2021, SemiBDMA 2021, DeepLUDA 2021, Guangzhou, China, August 23–25, 2021, Revised Selected Papers

    Springer Verlag, Singapore Web and Big Data. APWeb-WAIM 2021 International Workshops: KGMA 2021, SemiBDMA 2021, DeepLUDA 2021, Guangzhou, China, August 23–25, 2021, Revised Selected Papers

    1 in stock

    Book Synopsis​This book constitutes revised selected papers from the workshops of the 5th Asia-Pacific Web and Web-Age Information Management International Joint Conference on Web and Big Data, APWeb-WAIM 2021: The Fourth International Workshop on Knowledge Graph Management and Applications, KGMA 2021, The Third International Workshop on Semi-structured Big Data Management and Application, SemiBDMA 2021, and The Second International Workshop on Deep Learning in Large-scale Unstructured Data Analytics, DeepLUDA 2021, held in Guangzhou, China, in August 2021. Due to the COVID-19 pandemic the conference was held online. The 11 papers were thoroughly reviewed and selected from the 28 submissions and present recent research on the theory, design, and implementation of data management systems.Table of ContentsThe Fourth International Workshop on Knowledge Graph Management and Applications.- The Third International Workshop on Semi-structured Big Data Management and Applications.- The Second International Workshop on Deep Learning in Large-scale Unstructured Data Analytics.

    1 in stock

    £49.49

  • Network Behavior Analysis: Measurement, Models,

    Springer Verlag, Singapore Network Behavior Analysis: Measurement, Models,

    1 in stock

    Book SynopsisThis book provides a comprehensive overview of network behavior analysis that mines Internet traffic data in order to extract, model, and make sense of behavioral patterns in Internet “objects” such as end hosts, smartphones, Internet of things, and applications. The objective of this book is to fill the book publication gap in network behavior analysis, which has recently become an increasingly important component of comprehensive network security solutions for data center networks, backbone networks, enterprise networks, and edge networks.The book presents fundamental principles and best practices for measuring, extracting, modeling and analyzing network behavior for end hosts and applications on the basis of Internet traffic data. In addition, it explains the concept and key elements (e.g., what, who, where, when, and why) of communication patterns and network behavior of end hosts and network applications, drawing on data mining, machine learning, information theory, probabilistic graphical and structural modeling to do so. The book also discusses the benefits of network behavior analysis for applications in cybersecurity monitoring, Internet traffic profiling, anomaly traffic detection, and emerging application detections.The book will be of particular interest to researchers and practitioners in the fields of Internet measurement, traffic analysis, and cybersecurity, since it provides a spectrum of innovative techniques for summarizing behavior models, structural models, and graphic models of Internet traffic, and explains how to leverage the results for a broad range of real-world applications in network management, security operations, and cyber-intelligent analysis. After finishing this book, readers will 1) have learned the principles and practices of measuring, modeling, and analyzing network behavior on the basis of massive Internet traffic data; 2) be able to make sense of network behavior for a spectrum of applications ranging from cybersecurity and network monitoring to emerging application detection; and 3) understand how to explore network behavior analysis to complement traditional perimeter-based firewall and intrusion detection systems in order to detect unusual traffic patterns or zero-day security threats using data mining and machine learning techniques. To ideally benefit from this book, readers should have a basic grasp of TCP/IP protocols, data packets, network flows, and Internet applications.Table of ContentsChapter 1: Introduction.- Chapter 2: Background of Network Behavior Modeling and Analysis.- Chapter 3: Behavior Modeling of Network Traffic.- Chapter 4: Structural Modeling of Network Traffic.- Chapter 5: Graphic Modeling of Network Traffic.- Chapter 6: Real-Time Network Behavior Analysis.- Chapter 7: Applications.- Chapter 8: Research Frontiers of Network Behavior Analysis.

    1 in stock

    £107.99

  • Recent Trends in Communication and Intelligent

    Springer Verlag, Singapore Recent Trends in Communication and Intelligent

    5 in stock

    Book SynopsisThis book presents best selected research papers presented at the Third International Conference on Recent Trends in Communication and Intelligent Systems (ICRTCIS 2021), organized by Arya College of Engineering and IT, Jaipur, on 22-23 October 2021. It discusses the latest technologies in communication and intelligent systems, covering various areas of communication engineering, such as signal processing, VLSI design, embedded systems, wireless communications, and electronics and communications in general. Featuring work by leading researchers and technocrats, the book serves as a valuable reference resource for young researchers and academics as well as practitioners in industry.Table of ContentsChapter 1. Deep Learning-Based Adaptive Deep Belief Neural Networks For Neonatal Apnea Level Classification Using Pre-Term Birth Health Record.- Chapter 2. Hybrid Feature Extraction Technique for Tamil Automatic Speech Recognition System in Noisy Environment.- Chapter 3. Implementation and Image Transformation for Ground Penetration Image Radar System.- Chapter 4. Effect of Geospatial Weather Features on COVID-19 Spread in India using Machine Learning.- Chapter 5. Adiabatic Logic Code Converters Design at Different Sub Micron Technologies.- Chapter 6. A Cross connected Switch Capacitor Multi Level Inverter: A Proposed Topology and its Analysis.- Chapter 7. A Comparative study on Sentiment Analysis of Uber and Ola Customer Reviews based on Machine Learning Approaches.- Chapter 8. A Cost-Effective IoT Assisted Framework For Automatic Irrigation.- Chapter 9. Constrained Optimization based Routing for Multipath and Multihop Propagation in WSN.- Chapter 10. Performance comparison of fuzzy logic and evolutionary algorithm optimized controller for a multi-area power system.- Chapter 11. Leveraging CNNs for real-time pothole detection.- Chapter 12. IoT Devices for Detecting and Machine Learning for Predicting COVID-19 Outbreak.- Chapter 13. Text Detection from Scene and Born Images: How Good is Tesseract?.- Chapter 14. Load Frequency Control Of Hybrid Power System Integrated With Solar-Thermal And Geothermal System.- Chapter 15. An Improved Stock Market Index Prediction System based on LSTM.

    5 in stock

    £179.99

  • Distributed Computing and Optimization

    Springer Verlag, Singapore Distributed Computing and Optimization

    1 in stock

    Book SynopsisThis book introduces research presented at the International Conference on Distributed Computing and Optimization Techniques (ICDCOT–2021), a two-day conference, where researchers, engineers, and academicians from all over the world came together to share their experiences and findings on all aspects of distributed computing and its applications in diverse areas. The book includes papers on distributed computing, intelligent system, optimization method, mathematical modeling, fuzzy logic, neural networks, grid computing, load balancing, communication. It will be a valuable resource for students, academics, and practitioners in the industry working on distributed computing.Table of Contents1. 1T-1D Single-Ended SRAM Cell Design for Low Power Applications using CMOS technology.- 2. A Local Descriptor and Histogram of Oriented Gradients for Makeup Invariant Face Recognition under Uncontrolled Environment.- 3. A Preventive Framework for Mine Representatives Utilizing Remote Sensor Networks with Optimized Routing.- 4. A Quantitative Study of Image Fusion using Hybrid Approach.- 5. A Review on Smart Road Traffic Management System using LoRa WAN.- 6. A Road Side Unit Based Proxy Signature Scheme for Fast Verification of Messages in Vehicular Ad-Hoc Network.- 7. A Secure Data Transmission using AODV and Hash Function for MANET.- 8. A Study on Different Types of Convolutions in Deep Learning in the Area of Lane Detection.- 9. A Study on the Impact of DC Appliances and Direct DC Power System in India.- 10. A Survey on Vehicle Detection and Classification for Electronic Toll Collection Applications

    1 in stock

    £116.99

  • Emerging Research in Computing, Information,

    Springer Verlag, Singapore Emerging Research in Computing, Information,

    1 in stock

    Book SynopsisThis book presents the proceedings of the International Conference on Emerging Research in Computing, Information, Communication and Applications, ERCICA 2022. The conference provides an interdisciplinary forum for researchers, professional engineers and scientists, educators, and technologists to discuss, debate, and promote research and technology in the upcoming areas of computing, information, communication, and their applications. The book discusses these emerging research areas, providing a valuable resource for researchers and practicing engineers alike.Table of ContentsTeaching Learning-Based Optimization with Learning Enthusiasm Mechanism for Optimal Control of PV Inverters in Utility Grids for Techno-Economic Goals.- Machine Learning Framework for Prediction of Parkinson’s Disease in Cloud Environment.- A Comparative Analysis to Measure Scholastic Success of Students Using Data Science Methods.- Gesture-Controlled Speech Assist Device for the Verbally Disabled.- Highly Classified with Two Factor Authentication Encrypted Secured Mail.- Efficacious Intrusion Detection on Cloud Using Improved BES and HYBRID SKINET-EKNN.

    1 in stock

    £237.49

  • Machine Learning, Image Processing, Network

    Springer Verlag, Singapore Machine Learning, Image Processing, Network

    3 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the Third International Conference on Machine Learning, Image Processing, Network Security and Data Sciences, MIND 2021. The papers are organized according to the following topical sections: data science and big data; image processing and computer vision; machine learning and computational intelligence; network and cybersecurity. This book aims to develop an understanding of image processing, networks, and data modeling by using various machine learning algorithms for a wide range of real-world applications. In addition to providing basic principles of data processing, this book teaches standard models and algorithms for data and image analysis. Table of ContentsA Methodological review of Time Series Forecasting with Deep Learning Model : A Case study on Electricity Load and Price Prediction.- A Robust Secure Access Entrance Method Based on Multi Model Biometric Credentials Iris and Finger Print.- Prostate Cancer Grading using Multistage DeepNeural Networks.

    3 in stock

    £170.99

  • Wireless Sensor Networks: 16th China Conference, CWSN 2022, Guangzhou, China, November 10–13, 2022, Proceedings

    Springer Verlag, Singapore Wireless Sensor Networks: 16th China Conference, CWSN 2022, Guangzhou, China, November 10–13, 2022, Proceedings

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 16th China Conference on Wireless Sensor Networks, CWSN 2022, which took place in Guangzhou, China, in November 2022. The 17 full papers presented in this volume were carefully reviewed and selected from 204 submissions, including 87 English papers and 117 Chinese papers. The conference provided an academic exchange of research and a development forum for IoT researchers, developers, enterprises, and users. Exchanging results and experience of research and applications in IoT, and discussing the key challenges and research hotspots, is the main goal of the forum. As a high-level forum for the design, implementation, and application of IoT, the conference promoted the exchange and application of the oriesand technologies of IoT-related topics.Table of ContentsMmLiquid: Liquid Identification using mmWave.- PASD: A Prioritized Action Sampling-Based Dueling DQN for Cloud-Edge Collaborative Computation Offloading in Industrial IoT.- Automatic construction of large-scale IoT datasets with multi-strategy fusion.- Research on Argo data anomaly detection based on improved DBSCAN algorithm.- Fog Federation Pricing and Resource Purchase based on the Stackelberg Model in Fog Computing.- Bandwidth Scheduling Scheme with AoI Guarantee for Heterogeneous Mobile Edge Caching.- An Explainable Machine Learning Framework for Lower Limb Exoskeleton Robot System.- A Community Detection Algorithm Fusing Node Similarity and Label Propagation .- A Community Detection Algorithm Fusing Node Similarity and Label Propagation.- A Graph Neural Network Based Model for IoT Binary Components Similarity Detection .- Multi-scale Temporal Feature Fusion for Time-limited Order Prediction .- Dynamics Modeling of Knowledge Dissemination Process in Online Social Networks.- The Impact of Time Delay and User’s Behavior on the Dissemination Process of Rumor in Mobile Social Networks.- Minimizing the Embedding Cost of Service Function Chains with Adjustable Order .- MDLpark: Available parking prediction for smart parking through mobile deep learning .- Image Attribute Modification Based on Text Guidance.- Industrial IoT Network Security Situation Prediction Based on Improved SSA-BiLSTM.

    1 in stock

    £53.99

  • Advances in Computing and Network Communications:

    Springer Verlag, Singapore Advances in Computing and Network Communications:

    3 in stock

    Book SynopsisThis book constitutes the thoroughly refereed post-conference proceedings of the 4th International Conference on Computing and Network Communications (CoCoNet'20), October 14–17, 2020, Chennai, India. The papers presented were carefully reviewed and selected from several initial submissions. The papers are organized in topical sections on Signal, Image and Speech Processing, Wireless and Mobile Communication, Internet of Things, Cloud and Edge Computing, Distributed Systems, Machine Intelligence, Data Analytics, Cybersecurity, Artificial Intelligence and Cognitive Computing and Circuits and Systems. The book is directed to the researchers and scientists engaged in various fields of computing and network communication domains.Table of ContentsPart 1: Machine Learning, Visual Computing and Signal Processing.- Chapter 1. Computational Reconstructions of Extracellular Action Potentials and Local Field Potentials of a Rat Cerebellum using Point Neurons.- Chapter 2. Iris Recognition using Integer Wavelet Transform and Log Energy Entropy.- Chapter 3. Deep Learning Based Approach for Skin Burn Detection with Multi-level Classification.- Chapter 4. Semantic Retrieval of Microbiome Information Based on Deep Learning.- Chapter 5. Early Detection of Covid-19 on CT Scans Using Deep Learning Techniques.- Chapter 6. Towards Protein Tertiary Structure Prediction using LSTM/BLSTM.- Chapter 7. An Android Based Smart Home Automation System in Native Language.- Chapter 8. Live Acoustic Monitoring of Forests to Detect Illegal Logging and Animal Activity.- Chapter 9. CATS: Cluster-Aided Two-Step Approach for Anomaly Detection in Smart Manufacturing.- Chapter 10. Prediction of Energy Consumption using Statistical and Machine Learning Methods and Analysing the Significance of Climate and Holidays in the Demand Prediction.- Chapter 11. Ranking of Educational Institutions based on user priorities using AHP-PROMETHEE Approach.- Chapter 12. Using AUDIT Scores to Identify Synbiotic Supplement Effect in High Risk Alcoholics.- Chapter 13. Accurate Identification of Cardiac Arrhythmia using Machine Learning Approaches.- Chapter 14. Learning based Macro Nutrient Detection Through Plant Leaf.- Chapter 15. Characteristics of Karawitan Musicians' Brain: sLORETA Investigation.

    3 in stock

    £161.99

  • Wireless Sensor Networks

    Springer Wireless Sensor Networks

    15 in stock

    Book Synopsis.- Cloud Computing and Edge Computing..- GL-CrackNet : A lightweight network for cracksegmentation in vehicular systems..- Multi-UAV Distributed Incremental Learning for Frequency-Hopping Prediction..- Task Offloading Scheduling and Privacy Protection Optimization in Vehicular Edge Computing based on Double Deep Q-Network..- Crowdsourcing task recommendation method based on heterogeneous graph feature anomaly detection..- Topology Inference of IoT Edge Network Based on Network Flow Behavior Analysis..- SmartTask: Efficient Dispatching for Low-Latency Tasks on Dynamic Edge Networks..- BM2 SS: Blockchain-aided Multi-Authority and Multi-Keyword Searchable Scheme for IoT..- Fog-Enabled Network Intrusion Detection Based on Variational Autoencoder for Internet of Vehicles..- Enabling Sub-Second QoS-Aware Scheduling for Dynamic Serverless Workloads..- EdgeMeter: Towards Efficient and Accurate Latency Prediction of Neural Network Model Inference on Edge Devices..- Enhancing IoT Compliance Checking with Distributed Process Mining: A Scalable Framework for Log Data Streams..-  Internet of Things Security and Privacy Protection..- EMLogger: Inferring Computer Activities via EM Side-channel of Disks..- A Lightweight Authentication Protocol for LAFED..- Generalizable and Robust Log Anomaly Detection Based on Transformer..- Internet of Things Service and Application Technology..- Research on The Method of Face Recognition Based on Attention Mechanism..- Lightweight and Efficient Top-down Human Pose Estimation Algorithm Research..- Research on Transformer Tracking with Temporal Context and Bounding Box Refinement Module..- VibECG: Non-Contact Electrocardiogram Monitoring Based on mmWave Sensing..- Human Activity Recognition based on Fine-grained Capture Spatiotemporal Features of Body RFID Skeleton..- ChewSense: Real-time Detection of Chewing Counts and Food Types with Reverse Signals from Headphones..- Simulated annealing-based routing optimization algorithm for LEO satellite-assisted UAV networks..- SimilarBP: Leveraging Similar Samples for Few-Shot PPG-Based Blood Pressure Measurement.

    15 in stock

    £56.99

  • Chinese Lexical Semantics

    Springer Nature Switzerland AG Chinese Lexical Semantics

    15 in stock

    Book Synopsis

    15 in stock

    £61.74

  • Algorithms and Architectures for Parallel

    Springer Verlag, Singapore Algorithms and Architectures for Parallel

    Out of stock

    Book SynopsisThe 7-volume set LNCS 14487-14493 constitutes the proceedings of the 23rd International Conference on Algorithms and Architectures for Parallel Processing, ICA3PP 2023, which took place in Tianjin, China, during October, 2023. The 145 full papers included in this book were carefully reviewed and selected from 439 submissions.

    Out of stock

    £61.74

  • Proceedings of Innovative Computing 2024 Vol. 3

    Springer Proceedings of Innovative Computing 2024 Vol. 3

    1 in stock

    Book SynopsisThis book comprises select proceedings of the 7th International Conference on Innovative Computing which was held in Taichung City, Taiwan, Jan 23-26, 2024 (IC 2024) focusing on cutting-edge research carried out in the areas of information technology, science, and engineering.

    1 in stock

    £125.99

  • Energy Efficient Full Duplex Wireless

    Springer Energy Efficient Full Duplex Wireless

    1 in stock

    Book SynopsisIn an effort to overcome the spectral efficiency loss and high latency by half-duplex (HD), full-duplex (FD) has attracted extensive attention in industry and academia. With signal transmitted and received simultaneously over the same frequency, FD can approximately double the SE over HD. More than that, by enabling the capability of simultaneous transmission-and-reception for communication nodes, full duplex (FD) is a key enabler for many 5G techniques, including but not limited to integrated sensing and communication, low-latency relaying, concurrent bi-directional uplink and downlink transmission, ect. Nevertheless, in FD communications, both transmit and receive radio frequency (RF) chains are activated for exchanging data, and additional power is triggered by self-interference cancellation. As FD requires much higher power consumption than that of half duplex (HD), it is against the green evolution requirement proposed by the future communication systems.To address the critical high-power challenge in applying FD communications, this book will introduce the fundamentals and algorithm designs for energy-efficient FD design. This book will first discuss the principle of energy-efficient communications, which aims to make a good balance between communication performance and system energy consumption. Then, this book will discuss different self-interference cancellation schemes, including passive suppression, analogue cancellation and digital cancellation for FD communications, from the prospective of energy efficiency. Subsequently, this book will present some edge-cutting energy efficiency-oriented FD solutions, including adaptive transmission power adaptation, wireless power transfer FD relaying, bi-directional FD distributed antenna systems, from the perspective of algorithm design and performance analysis.

    1 in stock

    £134.99

  • WiFi 7

    Springer Verlag, Singapore WiFi 7

    1 in stock

    Book SynopsisThis Wi-Fi 7 technology book serves as an essential and comprehensive professional reference for the academics and industry professionals, covering the entire Wi-Fi series across various generations. It offers a primary focus on the latest advancements in industrial Wi-Fi 7 principles andspecifications. Additionally, the book provides valuable insights into innovative strategies for Wi-Fi 7 product developmentstrategies, testing methodologies, and diverse applicationsacross industrial and home environments. It serves as a practical resource for those planning to adopt Wi-Fi 7 technology in the design and development processes. By reading this book, you will not only gain insights into the state-of-the-art of Wi-Fi 7 technology, but also develop a deep understanding of the origins, the process of developing Wi-Fi 7 products, various applications and solutions where Wi-Fi 7 can be utilized, and the current state of the industry in relation to Wi-Fi 7 technology compared to the other wireless technologies.Each section of this book follows a systematic approach, beginning with an introduction to the technology concept and offering numerous concrete examples for illustration purpose. Abundant diagrams and pictures have been included in the book's design to facilitate clear and quick comprehension of the topics for readers.

    1 in stock

    £43.99

  • Low Power Architectures for IoT Applications

    Springer Verlag, Singapore Low Power Architectures for IoT Applications

    Out of stock

    Book SynopsisThis book provides comprehensive coverage of different aspects of low-power circuit synthesis for IoT applications at various levels of the design hierarchy, starting from the layout level to the system level. For a seamless understanding of the subject, the basics of MOS circuits have been introduced at the transistor, gate and circuit level, followed by various low-power design methodologies, such as supply voltage scaling, switched capacitance minimization techniques, and leakage power minimization approaches. The contents of this book are useful to students, researchers, as well as practicing engineers. Low-power architectures refer to the latest development in computer microchips which are created by integrating hundreds of thousands of transistors on one chip for different IoT applications. Emerging research in this area has the potential to uncover further applications for IoT in addition to system advancements.Table of ContentsEnergy Efficient and Temperature Aware Scheduling Strategies on Mixed Criticality Tasks for IoT based Systems.- Dynamic Power Management using Dynamic Voltage and Frequency Scaling and Leakage Current Optimization Techniques.- Performance-Based FPGA Implementation of Different Adders.- Computer Mediated Communication in Second Language Education for Different Iot Application.- Efficient FPGS Based Implementation of Image Segmentation Algorithms for IoT Applications.- Energy Harvesting, Challenges and Power Management for IoT.- Application of IoT in agriculture and challenges in implementation & development of soil moisture sensor node.

    Out of stock

    £123.49

  • Cross-Technology Coexistence Design for Wireless

    Springer Verlag, Singapore Cross-Technology Coexistence Design for Wireless

    1 in stock

    Book SynopsisThis book introduces readers to the fundamentals of the cross-technology coexistence problem in heterogeneous wireless networks. It also highlights a range of mechanisms designed to combat this problem and improve network performance, including protocol design, theoretical analysis, and experimental evaluation.In turn, the book proposes three mechanisms that can be combined to combat the cross-technology coexistence problem and improve network performance. First, the authors present a fast signal identification method. It provides the basis for the subsequent protocol design and allows heterogeneous devices to adopt proper transmission strategies. Second, the authors present two cross-technology interference management mechanisms in both the time domain and the frequency domain, which can mitigate interference and increase transmission opportunities for heterogeneous devices, thus improving network performance. Third, they present a cross-technology communication mechanism based on symbol-level energy modulation, which allows heterogeneous devices to transmit information directly without a gateway, improving transmission efficiency and paving the way for new applications in IoT scenarios. Lastly, they outline several potential research directions to further improve the efficiency of cross-technology coexistence. This book is intended for researchers, computer scientists, and engineers who are interested in the research areas of wireless networking, wireless communication, mobile computing, and Internet of Things. Advanced-level students studying these topics will benefit from the book as well.Table of Contents1. Introduction 1.1 Overview 1.2 Background 1.2.1 The Channel Specifications 1.2.2 The PHY Layer Specifications 1.2.3 The MAC Layer Specifications 1.3 Cross-technology coexistence problem 1.4 Book structure 2. Heterogeneous Signal Identification 2.1 Introduction 2.2 Motivation 2.3 System design 2.3.1 Dataset Construction 2.3.2 Signal identification through FFT features 2.3.3 Signal identification through deep learning 2.4 Experimental evaluation 2.5 Summary 3. Cross-Technology Communication through Symbol-Level Energy Modulation 3.1 Introduction 3.2 Motivation 3.3 System design 3.3.1 Overview 3.3.1 CTC design at the transmitter side 3.3.2 CTC design at the receiver side 3.4 Theoretical analysis 3.5 Experimental evaluation 3.6 Summary 4. Cross-Technology Interference Management in Frequency domain 4.1 Introduction 4.2 Motivation 4.3 System design 4.3.1 Overview 4.3.2 Standard WiFi transmission process 4.3.3 Payload encoding at WiFi transmitter 4.3.4 Process at WiFi transmitter 4.4 Experimental evaluation 4.5 Summary 5. Cross-Technology Interference Management in Time Domain 5.1 Introduction 5.2 Motivation 5.3 System design 5.3.1 Overview 5.3.2 E-CCA design 5.4 Performance Evaluation 5.5 Summary 6. Conclusion and Future Work 6.1 Conclusions 6.2 Future research directions

    1 in stock

    £37.99

  • Intelligent Information and Database Systems:

    Springer Verlag, Singapore Intelligent Information and Database Systems:

    1 in stock

    Book SynopsisThis two-volume set LNAI 13995 and LNAI 13996 constitutes the refereed proceedings of the 15th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2023, held in Phuket, Thailand, during July 24–26, 2023.The 65 full papers presented in these proceedings were carefully reviewed and selected from 224 submissions. The papers of the 2 volume-set are organized in the following topical sections: Case-Based Reasoning and Machine Comprehension; Computer Vision; Data Mining and Machine Learning; Knowledge Integration and Analysis; Speech and Text Processing; and Resource Management and Optimization.Table of Contents​Case-Based Reasoning and Machine Comprehension.- On the improvement of the reasoning cycle in case-based reasoning.- Exploring incompleteness in Case-Based Reasoning: a strategy for overcoming challenge.- Leveraging both Successes and Failures in Case-Based Reasoning for Optimal Solutions.- Transfer Learning for Abnormal Behaviors Identification in Examination Room from Surveillance Videos: A Case Study in Vietnam.- A Novel Question-Context Interaction Method for Machine Reading Comprehension.- Granular Computing to Forecast Alzheimer’s Disease Distinctive Individual Development.- Computer Vision.- AdVLO: Region selection via Attention-driven for Visual LiDAR Odometry.- Intelligent Retrieval System on Legal Information.- VSNet: Vehicle State Classification for Drone Image with Mosaic Augmentation and Soft-label Assignment.- Creating High-Resolution Adversarial Images against Convolutional Neural Networks with the Noise Blowing-Up Method.- Faster Imputation Using Singular Value Decomposition for Sparse Data.- Combination of deep learning and ambiguity rejection for improving image-based disease diagnosis.- Data Mining and Machine Learning.- Towards Developing an Automated Chatbot for Predicting Legal Case Outcomes: A Deep Learning Approach.- Fuzzy-Based Factor Evaluation System for Momentum Overweight Trading Strategy.- Enhancing Abnormal-Behavior-based Stock Trend Prediction Algorithm with Cost-sensitive Learning Using Genetic Algorithms.- Leveraging Natural Language Processing in Persuasive Marketing.- Direction of the Difference between Bayesian Model Averaging and the Best-Fit Model on Scarce-Data Low-Correlation Churn Prediction.- Tree-based Unified Temporal Erasable-itemset Mining.- Design Recovery of Data Model Hidden in JSON File.- Accurate lightweight calibration methods for mobile low-cost particulate matter sensors.- Generating music for video games with real-time adaptation to gameplay pace.- Detecting Sensitive Data with GANs and Fully Convolutional Networks.- An Unsupervised Deep Learning Framework for Anomaly Detection.- Extracting top-k high utility patterns from multi-level transaction databases.- Lightweight and Efficient Privacy-Preserving Multimodal Representation Inference via Fully Homomorphic Encryption.- Neural Machine Translation with Diversity-enabled Translation Memory.- GIFT4Rec: An effective side Information Fusion Technique apply to Graph neural network for cold-start recommendation.- A Decision Support System for Improving Lung Cancer Prediction based on ANN.- Emotion detection from text in social networks.- Finite Libby-Novick Beta Mixture Model: An MML-Based Approach.- Artificial Intelligences on Automated Context-Brain Recognition with Mobile Detection Devices.- A Novel Meta-Heuristic Search Based on Mutual Information for Filter-Based Feature Selection.- Discovering prevalent co-location patterns without collecting co-location instances.- Integrating Geospatial Tools for Air Pollution Prediction: A Synthetic City Generator Framework for Efficient Modeling and Visualization.- Design of an Automated CNN Composition Scheme with Lightweight Depth-Correlated Convolution for Space-Limited Applications.

    1 in stock

    £61.74

  • Intelligent Information and Database Systems:

    Springer Verlag, Singapore Intelligent Information and Database Systems:

    1 in stock

    Book SynopsisThis two-volume set LNAI 13995 and LNAI 13996 constitutes the refereed proceedings of the 15th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2023, held in Phuket, Thailand, during July 24–26, 2023. The 65 full papers presented in these proceedings were carefully reviewed and selected from 224 submissions. The papers of the 2 volume-set are organized in the following topical sections: Case-Based Reasoning and Machine Comprehension; Computer Vision; Data Mining and Machine Learning; Knowledge Integration and Analysis; Speech and Text Processing; and Resource Management and Optimization.Table of ContentsKnowledge Integration and Analysis.- A New Data Transformation and Resampling Approach for Prediction of Yield Strength of High-Entropy Alloys.- A Semi-Formal Approach to Describing Semantics of Data Modeling Patterns.- Obfuscating LLVM IR with the Application of Lambda Calculus.- Structural and Compact Latent Representation Learning on Sparse Reward Environments.- A Survey of Explainable Artificial Intelligence Approaches for Sentiment Analysis.- Social collective model of non-internet social networks.- A Data-driven Scheduling Strategy for Mobile Air Quality Monitoring Devices.- Hybrid approaches to sentiment analysis of social media data.- Integrating Ontology-based Knowledge to Improve BiomedicalMulti-Document Summarization Model.- An Improvement of Diachronic Embedding for Temporal Knowledge Graph Completion.- DCA-based weighted bagging: A new ensemble learning approach.- Deep-learning- and GCN-based Aspect-level Sentiment Analysis Methods on Balanced and Unbalanced Datasets.- Applying the Malmquist productivity index model to assess the performance of the coffee enterprise in DakLak Vietnam.- A Cluster-Constrained Graph Convolutional Network for Protein– Protein Association networks.- Fuzzy logic framework for ontology concepts alignment.- Can Ensemble Calibrated Learning enhance Link Prediction? A Study on Commonsense Knowledge.- Multi-criteria Approaches to Explaining Black Box Machine Learning Models.- Improving Loss Function for Polyp Detection Problem.- Flow Plugin Network for Conditional Generation.- Speech and Text Processing.- Investigating the Impact of Parkinson’s Disease on Brain Computations An Online Study of Healthy Controls and PD Patients.- Speech Enhancement using Dynamical Variational AutoEncoder.- Vietnamese Multidocument Summarization using Subgraph Selection-based Approach with Graph-informed Self-attention mechanism.- NegT5: A Cross-Task Text-to-Text Framework for Negation in Question Answering.- An Empirical Study on Punctuation Restoration for English, Mandarin, and Code-switching Speech.- Novel Topic Models for Parallel Topics Extraction from Multilingual Text.- Adapting Code-Switching Language Models with Statistical-Based Text Augmentation.- Improving Hotel Customer Sentiment Prediction by Fusing Review Titles and Contents.- Resource management and optimization.- In support of push-based streaming for the computing continuum.- Effective method of implementing constrained optimization problems using data instances.- Scheduling Deep Learning Training in GPU Cluster Using the Model-similarity-based Policy.

    1 in stock

    £56.99

  • Cryptology and Network Security: 22nd

    Springer Verlag, Singapore Cryptology and Network Security: 22nd

    3 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 22nd International Conference on Cryptology and Network Security, CANS 2023, which was held in October/November 2023 in Augusta, GA, USA.The 25 papers presented were thoroughly revised and selected from the 54 submissions. They are organized in the following topical sections: Schemes I; Basic Primitives; Security; MPC with Cards; Blockchain; MPC and Secret Sharing; Schemes II.Table of ContentsSchemes I.- Forward Security under Leakage Resilience, Revisited.- Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from LWE.- Signatures with Delegation.- Basic Primitives.- How to Enumerate LWE Keys as Narrow as in Kyber/Dilithium.- Towards Minimizing Non-linearity in Type-II Generalized Feistel Networks.- Hardness of Learning AES with Gradient-based Methods.- Security.- Privacy-Preserving Digital Vaccine Passport .- Exploiting Android Browser.- Are Current CCPA Compliant Banners Conveying User’s Desired Opt-Out Decisions? An Empirical Study of Cookie Consent Banners.- MPC with Cards.- Upper Bounds on the Number of Shuffl for Two-Helping-Card Multi-Input AND Protocols.- Free-XOR in Card-based Garbled Circuits.- Hidden Stream Ciphers and TMTO Attacks on TLS 1.3, DTLS 1.3, QUIC, and Signal.- Differetial cryptanalysis with SAT, SMT, MILP, and CP: a detailed comparison for bit-oriented primitives.- Key Filtering in Cube Attacks from the Implementation Aspect.- New Techniques for Modeling SBoxes: An MILP Approach.- Blockchain.- LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness.- Improving Privacy of Anonymous Proof-of-Stake Protocols.- Compact Stateful Deterministic Wallet from Isogeny-based Signature featuring Uniquely Rerandomizable Public Keys.- CTA: Confidetial Transactions Protocol with State Accumulator.- MPC and Secret Sharing.- A Plug-n-Play Framework for Scaling Private Set Intersection to Billion-sized Sets.- Lower Bounds on the Share Size of Leakage Resilient Cheating Detectable Secret Sharing.- Schemes II.- Lattice-based Key-Value Commitment scheme with key-binding and key-hiding.- A Practical Forward-Secure DualRing.- Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption.- A Minor Note on Obtaining Simpler iO Constructions via Depleted Obfuscators.

    3 in stock

    £66.49

  • Knowledge Management and Acquisition for

    Springer Verlag, Singapore Knowledge Management and Acquisition for

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the 19th Principle and Practice of Data and Knowledge Acquisition Workshop, PKAW 2023, held in conjunction with the 20th Pacific Rim International Conference on Artificial Intelligence (PRICAI 2023), in November 2023, in Jakarta, Indonesia. The 9 full papers and 2 short papers included in this volume were carefully reviewed and selected from 28 initial submissions. They are organized in the topical section such as machine learning, natural language processing, and intelligent systems.Table of ContentsPredicting Peak Demand Days for Asthma-Related Emergency Hospitalisations: A Machine Learning Approach.- Discovering Maximal High Utility Co-location Patterns from Spatial Data.- Exploring the Potential of Image Overlay in Self-Supervised Learning: A Study on SimSiam Networks and Strategies for Preventing Model Collapse.- BoCB: Performance Benchmarking by Analysing Impacts of Cloud Platforms on Consortium Blockchain.- Automated Cattle Behavior Classification Using Wearable Sensors and Machine Learning Approach.- LexiFusedNet: A Unified Approach for Imbalanced Short-text Classification using Lexicon-based Feature Extraction, Transfer Learning and One Class Classifiers.- Information Gerrymandering in Elections.- An Assessment of the Influence of Interaction and Recommendation Approaches on the Formation of Information Filter Bubbles.- Blockchain as a Collaborative Technology - Case Studies in the Real Estate Sector in Vietnam.- Indonesian Forest Fire Data Clustering using Spatiotemporal Data Using Grid Density-Based Clustering Algorithm.

    1 in stock

    £42.74

  • Parallel and Distributed Computing, Applications

    Springer Verlag, Singapore Parallel and Distributed Computing, Applications

    1 in stock

    Book SynopsisThis book constitutes the refereed proceedings of the International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT) which was held in Jeju, Korea in August, 2023. The papers of this volume are organized in topical sections on wired and wireless communication systems, high dimensional data representation and processing, networks and information security, computing techniques for efficient networks design, electronic circuits for communication systems.Table of ContentsTrack 1. Networking and Architectures.- Track 2. Software Systems and Technologies.- Track 3. Algorithms and Applications.- Track 4. Security and Privacy

    1 in stock

    £116.99

  • Reconfigurable Intelligent Surface-Enabled

    Springer Verlag, Singapore Reconfigurable Intelligent Surface-Enabled

    Out of stock

    Book SynopsisAs the main trend and key enabling technology for next-generation wireless networks (i.e., 6G), integrated sensing and communication (ISAC) can effectively improve spectrum efficiency, hardware efficiency, and information processing efficiency. However, it faces several deficiencies, including limited coverage due to high-frequency signals and limited communication-sensing performance due to uncontrollable wireless environments. Reconfigurable intelligent surface (RIS) provides novel dimensions to address these deficiencies by intelligently manipulating the wireless propagation environment in an energy- and hardware-efficient manner. RIS-enabled ISAC is expected to comprehensively promote the multi-dimensional performance of 6G, such as communication capacity, sensing accuracy, and coverage. Nevertheless, to fully realize its potential, one needs to figure out the impacts of RIS on joint communication and sensing performance and tackle new technical challenges in beamforming design and signal processing. The goal of this book, therefore, is to deliver a thorough understanding of RIS-enabled ISAC from three perspectives: performance analysis, beamforming design, and signal processing. Specifically, the authors provide a brief introduction to RIS-enabled ISAC, including basic concepts, motivations, potential application scenarios, and an overview of the state-of-the-art research on RIS-enabled ISAC. The theoretical performance analytical frameworks of RIS-enabled ISAC and their corresponding results are also discussed. Based on this, several critical issues are identified and elaborated on, including signal processing technologies such as angle and Delay-Doppler information acquisition, and air interface technologies such as beamforming designs. Finally, the book concludes with future trends and open issues for further research.The book would be beneficial for researchers, graduate students, and industry professionals who wish to gain a comprehensive understanding of the latest developments and challenges in RIS-enabled ISAC. By providing insights into the potential of RIS-enabled ISAC and the technical challenges that need to be addressed, the book can aid in the development of practical solutions for next-generation wireless networks and contribute to the advancement of the field of wireless communications.Table of ContentsChapter 1 A Brief Introduction of RIS-Enabled ISAC.- Chapter 2 Theoretical Performance Analysis of RIS-Enabled ISAC.- Chapter 3 Angle Information Acquisition in RIS-Enabled ISAC.- Chapter 4 Delay-Doppler Information Aquisition in RIS-Enabled ISAC.- Chapter 5 Sensing-assisted Beamforming in RIS-Enabled ISAC.- Chapter 6 Beamforming for Simultaneous Communication and Sensing Enhancement.- Chapter 7 Future Trends and Open Issues of RIS-Enabled ISAC.

    Out of stock

    £123.49

  • Pattern Recognition and Computer Vision: 6th

    Springer Verlag, Singapore Pattern Recognition and Computer Vision: 6th

    Out of stock

    Book SynopsisThe 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2023, held in Xiamen, China, during October 13–15, 2023. The 532 full papers presented in these volumes were selected from 1420 submissions. The papers have been organized in the following topical sections: Action Recognition, Multi-Modal Information Processing, 3D Vision and Reconstruction, Character Recognition, Fundamental Theory of Computer Vision, Machine Learning, Vision Problems in Robotics, Autonomous Driving, Pattern Classification and Cluster Analysis, Performance Evaluation and Benchmarks, Remote Sensing Image Interpretation, Biometric Recognition, Face Recognition and Pose Recognition, Structural Pattern Recognition, Computational Photography, Sensing and Display Technology, Video Analysis and Understanding, Vision Applications and Systems, Document Analysis and Recognition, Feature Extraction and Feature Selection, Multimedia Analysis and Reasoning, Optimization and Learning methods, Neural Network and Deep Learning, Low-Level Vision and Image Processing, Object Detection, Tracking and Identification, Medical Image Processing and Analysis. Table of ContentsSpoof-guided Image Decomposition for Face Anti-spoofing.- TransFCN: A Novel One-Stage High-Resolution Fingerprint Representation Method.- A Video Face Recognition Leveraging Temporal Information based on Vision Transformer.- Where to Focus: Central Attention-based Face Forgery Detection.- Minimum Assumption Reconstruction Attacks: Rise of Security and Privacy Threats against Face Recognition.- Emotion Recognition via 3D Skeleton based Gait Analysis using Multi-thread Attention Graph Convolutional Networks.- Cross-area Finger Vein Recognition via Hierarchical Sparse Representation.- Non-Local Temporal Modeling for Practical Skeleton-based Gait Recognition.- PalmKeyNet: Palm Template Protection Based on Multi-modal Shared KeyFull Quaternion Matrix-based Multiscale Principal Component Analysis Network for Facial Expression Recognition.- Joint Relation Modeling and Feature Learning for Class-Incremental Facial Expression Recognition.- RepGCN: A Novel Graph Convolution-Based Model for Gait Recognition with Accompanying Behaviors.- KDFAS: Multi-Stage Knowledge Distillation Vision Transformer for Face Anti-Spoofing.- Long Short-Term Perception Network for Dynamic Facial Expression Recognition.- Pyr-HGCN: Pyramid Hybrid Graph Convolutional Network for Gait Emotion Recognition.- A Dual-Path Approach for Gaze Following in Fisheye Meeting Scenes.- Mobile-LRPose: Low-Resolution Representation Learning for Human Pose Estimation in mobile devices Attention and Relative Distance Alignment for Low-Resolution Facial Expression Recognition.- Exploring Frequency Attention Learning and Contrastive Learning for Face Forgery Detection.- An Automatic Depression Detection Method with Cross-Modal Fusion Network and Multi-Head Attention Mechanism.- AU-oriented Expression Decomposition Learning for Facial Expression Recognition.- Accurate Facial Landmark Detector via Multi-scale Transformer.- ASM: Adaptive Sample Mining for In-The-Wild Facial Expression Recognition.- Deep Face Recognition with cosine boundary softmax loss.- A Mix Fusion Spatial-Temporal Network for Facial Expression Recognition.- CTHPose: An Efficient and Effective CNN-Transformer Hybrid Network for Human Pose Estimation.- DuAT: Dual-Aggregation Transformer Network for Medical Image Segmentation.- MS UX-Net: A Multi-scale Depth-wise Convolution Network for Medical Image Segmentation.- AnoCSR–A Convolutional Sparse Reconstructive Noise-Robust Framework for Industrial Anomaly Detection.- Brain tumor image segmentation based on global-local dual-branch feature fusion.- PRFNet: Progressive Region Focusing Network for Polyp Segmentation.- Pyramid Shape-aware Semi-supervised Learning for Thyroid Nodules Segmentation in Ultrasound Images.- AgileNet: A Rapid and Efficient Breast Lesion Segmentation Method for Medical Image Analysis.- CFNet: A Coarse-to-Fine Framework for Coronary Artery Segmentation.- Edge-Prior Contrastive Transformer for Optic Cup and Optic Disc Segmentation.- BGBF-Net: Boundary-Guided Buffer Feedback Network for Liver Tumor Segmentation.- MixU-Net: Hybrid CNN-MLP Networks for Urinary Collecting System Segmentation.- Self-Supervised Cascade Training for Monocular Endoscopic Dense Depth Recovery.- Pseudo-label Clustering-driven Dual-level Contrast Learning based Source-free Domain Adaptation for Fundus Image Segmentation.- Patch Shuffle and Pixel Contrast: Dual Consistency Learning for Semi-supervised Lung Tumor Segmentation.- Multi-Source Information Fusion for Depression Detection

    Out of stock

    £66.49

  • Pattern Recognition and Computer Vision: 6th

    Springer Verlag, Singapore Pattern Recognition and Computer Vision: 6th

    1 in stock

    Book SynopsisThe 13-volume set LNCS 14425-14437 constitutes the refereed proceedings of the 6th Chinese Conference on Pattern Recognition and Computer Vision, PRCV 2023, held in Xiamen, China, during October 13–15, 2023. The 532 full papers presented in these volumes were selected from 1420 submissions. The papers have been organized in the following topical sections: Action Recognition, Multi-Modal Information Processing, 3D Vision and Reconstruction, Character Recognition, Fundamental Theory of Computer Vision, Machine Learning, Vision Problems in Robotics, Autonomous Driving, Pattern Classification and Cluster Analysis, Performance Evaluation and Benchmarks, Remote Sensing Image Interpretation, Biometric Recognition, Face Recognition and Pose Recognition, Structural Pattern Recognition, Computational Photography, Sensing and Display Technology, Video Analysis and Understanding, Vision Applications and Systems, Document Analysis and Recognition, Feature Extraction and Feature Selection, Multimedia Analysis and Reasoning, Optimization and Learning methods, Neural Network and Deep Learning, Low-Level Vision and Image Processing, Object Detection, Tracking and Identification, Medical Image Processing and Analysis. Table of ContentsRSID: A remote sensing image dehazing network.- ContextNet: Learning Context Information for Texture-less Light Field Depth Estimation.- An Efficient Way for Active None-line-of-sight: End-to-end Learned Compressed NLOS Imaging.- DFAR-Net: Dual-Input Three-Branch Attention Fusion Reconstruction Network for Polarized Non-Line-of-Sight Imaging.- EVCPP:Example-driven Virtual Camera Pose Prediction for cloud performing arts scenes.- RBSR: Efficient and Flexible Recurrent Network for Burst Super-Resolution.- WDU-Net: Wavelet-Guided Deep Unfolding Network for Image Compressed Sensing Reconstruction.- Memory-Augmented Spatial-Temporal Consistency Network for Video Anomaly Detection.- Frequency and Spatial Domain Filter Network for Visual Object Tracking.- Enhancing Feature Representation for Anomaly Detection via Local-and-Global Temporal Relations and a Multi-Stage Memory.- DFAformer: A Dual Filtering Auxiliary Transformer for Efficient Online Action Detection in Streaming Videos.- Relation-guided Multi-stage Feature Aggregation Network for Video Object Detection.- Multimodal Local Feature Enhancement Network for Video Summarization.- Asymmetric Attention Fusion for Unsupervised Video Object Segmentatio.- Flow-Guided Diffusion Autoencoder for Unsupervised Video Anomaly detection.- Prototypical Transformer for Weakly Supervised Action Segmentation.- Unimodal-Multimodal Collaborative Enhancement for Audio-Visual Event Localization.- Dual-memory feature aggregation for video object detection.- Going Beyond Closed Sets: A Multimodal Perspective for Video Emotion Analysis.- Temporal-Semantic Context Fusion for Robust Weakly Supervised Video Anomaly Detection.- A Survey: the Sensor-based Method for Sign Language Recognition.- Utilizing Video Word Boundaries and Feature-based Knowledge Distillation Improving Sentence-level Lip Reading.- Denoised Temporal Relation Network for Temporal Action Segmentation.- 3D Lightweight Spatial-Spectral Attention Network for Hyperspectral Image Classification.- Deepfake Detection via Fine-Grained Classification and Global-Local Information Fusion.- Unsupervised Image-to-Image Translation with Style Consistency.- SemanticCrop: Boosting Contrastive Learning via Semantic-cropped Views.- Transformer-based multi-object tracking in unmanned aerial vehicles.- HEI-GAN: A Human-Environment Interaction based GAN for Multimodal Human Trajectory Prediction.- CenterMatch: A Center Matching Method for Semi-supervised Facial Expression Recognition.- Cross-Dataset Distillation with Multi-Tokens for Image Quality Assessment.- Quality-Aware CLIP for Blind Image Quality Assessment.- Multi-Agent Perception via Co-Attentive Communication Mechanism.- DBRNet:Dual-Branch Real-Time Segmentation NetWork For Metal Defect Detection.- MaskDiffuse: Text-guided Face Mask Removal based on Diffusion Models.- Image Generation Based Intra-class Variance Smoothing for Fine-grained Visual Classification.- Cross-Domain Soft Adaptive Teacher for Syn2Real Object Detection.- Dynamic Graph-Driven Heat Diffusion: Enhancing Industrial Semantic Segmentation.- EKGRL: Entity-based Knowledge Graph Representation Learning for Fact-based Visual Question Answering.- Disentangled Attribute Features Vision Transformer for Pedestrian Attribute Recognition.- A high-resolution network based on feature redundancy reduction and attention mechanism.

    1 in stock

    £66.49

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account