Marknadens största urval
Snabb leverans

Böcker utgivna av River Publishers

Filter
Filter
Sortera efterSortera Populära
  • av Fabrice Theoleyr
    1 341

    The Internet of Things is the emerging technology which interconnects smart objects using wireless communications. After having been extensively studied in academic labs, the Internet of Things is now widely applied in the industrial world (domestic automation, smart metering, smart cities).

  • - In Honor and Memory of Late Prof. King-Sun Fu
     
    1 201

    A volume of collected works from world renowned professionals and experts in pattern recognition and machine vision, in honour and memory of the late Prof. King-Sun Fu. This book will help promote further the course, not only of fundamental principles, systems and technologies, but also its vast range of applications to help in solving problems in daily life.

  • av Geir M. Koien
    1 361

    There are now (Q1 2009) more than 4 billion cellular subscribers in the world and this number is constantly growing. With this in mind it should be clear that use of mobile communication has already become both pervasive and ubiquitous. It has become a global commodity really. Entity Authentication and Personal Privacy in Future Cellular Systems aims at explaining and examining access security as it is found in mobile/cellular systems. A thorough investigation of how access security and personal privacy is handled in the 3GPP system is conducted. This includes both the 2G systems GSM/GPRS and the 3G system UMTS. The emerging fourth generation LTE architecture is also examined. The first part of the book deals exclusively with presenting access security as found in the 3GPP system. Particular attention is given to the authentication and key agreement procedures. The 3GPP systems have evolved and the access security architecture in LTE is substantially more advanced and mature than what you would find in GSM/GPRS, but even the LTE security architecture has its limitations. In part two of the book we go on to examine what is missing from the current cellular access security architectures. Some of the shortcomings found in GSM/GPRS and later UMTS have been partially addressed in LTE, but the burden of backwards compatibility has meant that many issues could not easily be resolved. Free from those restrictions, we shall see that one can provide substantially improved subscriber privacy and enhanced entity authentication, while also avoiding the delegated authentication control that all 3GPP systems have.The design of authentication protocols is discussed in depth, and this would also include looking into the role of formal verification in the design of security protocols.

  •  
    1 207

    At a time when the applications of sensors are in high demand and environmental issues are international priorities, this book provides the technical basis for researchers and students to understand the requirements for biomedical computing and environmental sensing. The book deals with key techniques that need to be understood and provides examples of applications.

  • av Kwang-Cheng Chen
    1 217

    Provides an introduction to the fundamental principles of communication. Basic mathematical background for system and signals, analogue communication systems and modern digital communication systems are systematically introduced. Theory is been explained in an easy-to-understand way. Advanced topics in modern digital communications are conceptually explained.

  • av Bradley S. Tice
    961

    The research presented in Aspects of Kolmogorov Complexity addresses the fundamental standard of defining randomness as measured by a Martin-Lof level of randomness as found in random sequential binary strings. A classical study of statistics that addresses both a fundamental standard of statistics as well as an applied measure for statistical communication theory. The research points to compression levels in a random state that are greater than is found in current literature. A historical overview of the field of Kolmogorov Complexity and Algorithmic Information Theory, a subfield of Information Theory, is given as well as examples using a radix 3, radix 4, and radix 5 base numbers for both random and non-random sequential strings. The text also examines monochromatic and chromatic symbols and both theoretical and applied aspects of data compression as they relate to the transmission and storage of information. The appendix contains papers on the subject given at conferences and the references are current.ContentsTechnical topics addressed in Aspects of Kolmogorov Complexity include:* Statistical Communication Theory* Algorithmic Information Theory* Kolmogorov Complexity* Martin-Lof Randomness* Compression, Transmission and Storage of Information

  • av Sofoklis Kyriazakos
    811 - 1 281

    Mobile and wireless communications are moving towards a new era that will be characterized by the seamless collaboration of heterogeneous systems, the need for high speed communications while on the move and for advanced services with quality guarantees. Recent market research studies show that most of the traffic in the future wireless networks will be produced by mobile multimedia services which are expected to proliferate by the year 2010. On the other hand mobile and wireless communications technology is becoming more and more important in developing countries where people demand fast deployment and low cost for broadband wireless internet services.The objective of this volume is to gather research and development on topics shaping the fourth generation (4G) in mobile and wireless communications and reveal the key trends and enabling technologies for 4G. We envisage 4G wireless communication systems as IP based solution providing integrated services (voice, data, multimedia) regardless of time and end-users? location. 4G technologies will manifest the benefits of the wireless and wired technologies convergence, through enabling a wide range of innovative (both indoor and outdoor) applications. 4G applications will feature premium quality, high security and an affordable cost. The vision, though fantastic, is associated with a host of technical and technological challenges.A great deal of the latter are discussed in the articles of this volume, which aims at providing insights on the research issues and solutions that are directly associated with leading edge 4G technologies and services.Taking into account recent developments in the world of wireless communications we have given emphasis to cover all these technologies and aspects that are considered as cornerstones for achieving the goals set for 4G and that will further boost research and development of next-generation mobile communications.

  •  
    1 201

    Broadband communication has become the major focus for industry for offering rich multimedia IP services in next generation networks. This book deals with the state-of-the-art and the underlying principles of key technologies which facilitate broadband telecommunications, illustrating the use of these technologies.

  •  
    1 201

    In 2007 an international symposium discussed the effective convergence between the available and perspected technologies for the civil and military worlds as well as the conceivement of applications that can take the maximum benefit from the dual approach, optimizing the available economic resources. This book summarises the material from this symposium.

  •  
    1 221

    Describes recent advances in networks of diverse technology reflecting the state-of-the-art technology and research achievements in traffic engineering, performance evaluation studies and tools worldwide. Technical topics include traffic modelling and characterisation; queueing and interconnection networks; TCP performance analysis; congestion control; and numerical and software tools.

  •  
    1 221

    Presents recent advances in networks of diverse technology reflecting the state-of-the-art technology and research achievements in performance modelling, analysis and applications worldwide. Technical topics discussed in the book include Multiservice Switching Networks; Wireless Ad Hoc Networks; Wireless Sensor Networks; Wireless Cellular Networks; and Optical Networks.

  • av Sunil Jogi
    641 - 1 367

    Ultra Wideband Demystified: Technologies, Applications, and System Design Considerations is a comprehensive text for emerging high speed short range wireless technology of Ultra Wideband. It provides background concepts and information on evolving standards and their development efforts, radio technology, practical system design/implementation and real life applications. The book also deliberates on the regulatory frameworks, security aspects and power management techniques essential to Ultra Wideband usage in consumer devices like portable handheld mobile devices. Important topics as UWB common radio usage for adapting to different existing/new applications and upper layer protocols like Wireless USB are also discussed.ContentsAbstract :* Introduction to Short Range Wireless;* Introduction to Ultra Wideband;* Evolution of UWB Standards;* Physical Layer;* Medium Access Layer;* Advanced MAC Features;* UWB System Design;* Adaptation to Multiple Applications;* Wireless USB;* Converging Marketplace; ReferencesForeword"e;This book is very timely, unique and fresh in its approach, coming from engineers who have been involved in system design and standard development stages. In particular, the book stands out amongst other literature available because it highlights system designer's viewpoints and because of it covering the whole gamut of technology from practitioner's viewpoints ... I would strongly recommend this book to System Designers, Practicing Engineers, Researchers in Academia and Industry, Product Marketing and Technical strategists for a comprehensive reading on the emerging UWB technologies. I commend Sunil Jogi and Manoj Choudhary for a very timely contribution."e;Bart Vertenten Chief Architect Connectivity, NXP Semiconductors

  • av Lara Srivastava
    641 - 1 361

    It is widely known today that not only are the aged ageing, or the old getting older, but they are also increasing in number the world over. At the same time, proper care and support for our aged is increasingly at risk. Without some form of support, the quantitative extension of life cannot be matched by a qualitative one. This may mean that the opportunity provided by a longer life is squandered, and life itself, of course, is nothing if not opportunity. Societies find that self-sufficiency and independence not only contribute to individual well-being, but are also economically desirable due to the resultant increase in productivity.The challenges of daily living for a growing population of the aged form the basis of the independent living platform, the AGE@HOME platform, which is described in this book. The platform combines both existing and emerging technologies suitable for the home. Its use and application is considered in the wider context of Web 2.0, the internet of things, and other elements of the burgeoning digital world. It is time that a holistic and multi-disciplinary approach to this constantly enlarging area of human existence is taken.This book is written for researchers and designers of wireless tools, analog and digital circuits as well as academics who are active in the various fields of Human Sciences.Foreword"e;This book appears at the right moment when several developments have made age and its consequences an important element of human existence. It makes for informative reading, being based on considerations related to independence for the aged and the application of emerging technologies to enhance this independence......."e;From the foreword by:Houlin ZhaoDeputy Secretary-General of theInternational Telecommunication Union

  •  
    1 221

    Presents state-of-the-art results in services and service architectures, identifies challenges including business models, technology issues, service management, and security, and describes important trends and directions. The book provides readers with a comprehensive reference for the most current developments in the field.

  •  
    1 237

    Reviews some specific topics in the field of future internet and technologies that are closely related to the issue of finding effective solutions for the management of resources and performance. Technical topics discussed include future internet technologies; internet of things; multimedia networks; wireless access networks; positioning and localization in communications; and resource management.

  • av Muhammad Imadur Rahman, Sekhar Suvra Das & Ramjee Prasad
    807 - 1 281

  • av Parikshit N. Mahalle
    641 - 1 361

    The Internet of Things is a wide-reaching network of devices, and these devices can intercommunicate and collaborate with each other to produce variety of services at any time, any place, and in any way. Maintaining access control, authentication and managing the identity of devices while they interact with other devices, services and people is an important challenge for identity management. The identity management presents significant challenges in the current Internet communication. These challenges are exacerbated in the internet of things by the unbound number of devices and expected limitations in constrained resources. Current identity management solutions are mainly concerned with identities that are used by end users, and services to identify themselves in the networked world. However, these identity management solutions are designed by considering that significant resources are available and applicability of these identity management solutions to the resource constrained internet of things needs a thorough analysis. Technical topics discussed in the book include:* Internet of Things;* Identity Management;* Identity models in Internet of Things;* Identity management and trust in the Internet of Things context;* Authentication and access control;Identitymanagement for Internet of Things contributes to the area of identity management for ubiquitous devices in the Internet of Things. It initially presents the motivational factors together with the identity management problems in the context of Internet of Things and proposes an identity management framework. Following this, it refers to the major challenges for Identitymanagement and presents different identity management models. This book also presents relationship between identity and trust, different approaches for trust management, authentication and access control.

  • - Exhibits of Application
     
    1 437

    Presents eight up-to-date examples of typical laboratory, industrial and biomedical applications of advanced measuring and information systems, including virtual instrumentation. Chapters include not only system design solutions but also relevant theoretical parts, achieved results and possible future design and development.

  •  
    1 291

    The Disputationes Workshop series is an international initiative aimed at disseminating stem cell related cutting edge knowledge among scientists, healthcare workers, students and policy makers. This book emerges as a result of the scientific contributions presented and discussed during the fifth Disputationes Workshop held in Aalborg (Denmark) in April 2014.

  •  
    1 241

    Presents recent advances reflecting the state-of-the-art research achievements in novel cryptographic algorithm design, intrusion detection, privacy preserving techniques and reliable routing protocols. Technical topics discussed include vulnerabilities and intrusion detection; cryptographic algorithms and evaluation; and reliable routing protocols.

  •  
    1 241

    Presents recent advances in communication and networking technologies reflecting the state-of-the-art research achievements in novel communication technology and network optimization. Technical topics discussed in the book include Data Center Networks, Mobile Ad Hoc Networks, Multimedia Networks, Internet of Things, Wireless Spectrum, Network Optimization.

  • av Aasha Nandhini Sukumaran, Hemalatha Rajendran & Radha Sankararajan
    1 241

    Provides a clear insight into the basics of compressed sensing; a thorough exploration of applying CS to audio, image and computer vision; different dimensions of applying CS in Cognitive radio networks; CS in wireless sensor network for spatial compression and projection; and efficient methods to sample and reconstruct the images in resource constrained WMSN environment.

  • - A Synergic Approach Resorting to Classifications and Clustering
    av R.K. Kamat, K.S. Oza & V.S. Kumbhar
    501 - 1 087

    Showcases an effective methodology for classification and clustering of web sites from a usability point of view. While the clustering and classification is accomplished by using an open source tool, WEKA, the basic dataset for the selected websites has been arrived at by using a free tool site-analyser. As a case study, several commercial websites are analysed.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.