Vtome.ru - электронная библиотека

  • Добавил: literator
  • Дата: 28-03-2024, 04:01
  • Комментариев: 0
Название: Metasurfaces for Wireless Communications: Designs and Implementations
Автор: Yifei Yuan, Yuhong Huang, Fa-Long Luo
Издательство: CRC Press
Год: 2024
Страниц: 321
Язык: английский
Формат: pdf (true)
Размер: 48.2 MB

This book provides a comprehensive coverage of reconfigurable intelligent surface (RIS) based wireless communications by covering all the technology stages from working principles, theories and algorithms, system architectures, real-world implementations, and programming platforms through performance measurements and system testing. Metasurfaces for Wireless Communications: Designs and Implementations serves as a must-be read for everything related to the use of RIS in wireless networks. Authored by three experts in the field, the book is organized into five in-depth and well-designed chapters. The first chapter discusses the fundamentals of metasurfaces for wireless communications as well as the related evolution and requirements of RIS in 6G. The second chapter is devoted to the modeling and analyses of RIS for wireless communications by including electromagnetic field modeling and theoretical analyses of both large- and small-scale channel models. In Chapter 3, the authors mainly address properties’ characterizations and system design of metasurface devices. This book serves not only as a comprehensive reference for professional engineers, researchers, manufacturers, network operators, software developers, service providers, and regulatory bodies aiming at the development, standardization, deployment, and applications of B5G and 6G mobile communications, but also as a textbook for graduate students in circuits, signal processing, wireless communications, information theory, microwave technology, and antenna and propagation.
  • Добавил: literator
  • Дата: 27-03-2024, 22:03
  • Комментариев: 0
Название: IP Multicast Routing Protocols: Concepts and Designs
Автор: James Aweya
Издательство: CRC Press
Год: 2024
Страниц: 483
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book discusses the fundamental concepts that are essential to understanding IP multicast communication. The material covers the well‑known IP multicast routing protocols, along with the rationale behind each protocol. The book starts with the basic building blocks of multicast communications and networks, then progresses into the common multicast group management methods used, and finally into the various, well‑known multicast routing protocols used in today’s networks. IP multicast provides significant benefits to network operators by allowing the delivery of information to multiple receivers simultaneously with less network bandwidth consumption than using unicast transmission. Applications that can benefit greatly from multicast communications and multicast‑enabled networks include audio and video conferencing, collaborative computing, online group learning and training, multimedia broadcasting, multi‑participant online gaming, and stock market trading. This book’s goal is to present the main concepts and applications, allowing readers to develop a better understanding of IP multicast communication. IP Multicast Routing Protocols: Concepts and Designs presents material from a practicing engineer’s perspective, linking theory and fundamental concepts to common industry practices and real‑world examples.
  • Добавил: literator
  • Дата: 26-03-2024, 22:43
  • Комментариев: 0
Название: Communication Technologies and Security Challenges in IoT: Present and Future
Автор: Ajay Prasad, Thipendra P. Singh, Samidha Dwivedi Sharma
Издательство: Springer
Серия: Internet of Things
Год: 2024
Страниц: 562
Язык: английский
Формат: pdf (true), epub
Размер: 47.6 MB

This book presents overall communication technologies and protocols used in IoT like in networks: Wi-Fi, Bluetooth, Zigbee, LoRA, GSM/GPRS/EDGE/LTE, etc. in applications: MQTT, CoAP, AMQP, XMPP, etc, focusing on the architecture and threat perseverance of each. The book also presents new/future technological additions like Wi-Fi HaLow (802.11ah), HEW (802.11ax), BLE, NFC, RFID, etc.,) and upcoming changes in communication systems in IoT and its possible security aspects. The book also covers security aspects in communication mechanisms in domain-specific IoT solutions for healthcare, smart cities, smart homes, smart vehicles, etc. The objective of the book is to assist IoT developers to have a good insight into available and upcoming communication technologies so that they can employ the best possible practices while designing and developing IoT solutions.
  • Добавил: literator
  • Дата: 26-03-2024, 03:23
  • Комментариев: 0
Название: Networks Attack Detection on 5G Networks using Data Mining Techniques
Автор: Sagar Dhanraj Pande, Aditya Khamparia
Издательство: CRC Press
Серия: Wireless Communications and Networking Technologies
Год: 2024
Страниц: 216
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Artificial Intelligence (AI) and its applications have risen to prominence as one of the most active study areas in recent years. In recent years, a rising number of AI applications have been applied in a variety of areas. Agriculture, transportation, medicine, and health are all being transformed by AI technology. The Internet of Things (IoT) market is thriving, having a significant impact on a wide variety of industries and applications, including e-health care, smart cities, smart transportation, and industrial engineering. Recent breakthroughs in artificial intelligence and machine learning techniques have reshaped various aspects of artificial vision, considerably improving the state of the art for artificial vision systems across a broad range of high-level tasks. As a result, several innovations and studies are being conducted to improve the performance and productivity of IoT devices across multiple industries using Machine Learning and Artificial Intelligence. Security is a primary consideration when analyzing the next generation communication network due to the rapid advancement of technology. Additionally, data analytics, deep intelligence, Deep Learning, cloud computing, and intelligent solutions are being employed in medical, agricultural, industrial, and health care systems that are based on the Internet of Things. This book will look at cutting-edge Network Attacks and Security solutions that employ intelligent data processing and Machine Learning (ML) methods.
  • Добавил: SCART56
  • Дата: 25-03-2024, 23:54
  • Комментариев: 0

Название: Серия "Цифровое общество" в 5 книгах
Автор(ы): разные
Издательство: Москва
Год: 2019-2020
Страниц: 1000+
Формат: fb2
Размер: 14 Мб
Язык: русский

Информация – инструмент контроля, тот, кто владеет ею, обретает власть. Мы – люди информационного века. Мы привыкли делать покупки на Amazon, общаться через Facebook, задавать поисковые запросы Google и просто убивать время, пользуясь продукцией Apple. Эти четыре компании-гиганта объединяет одно свойство – все они называют себя защитниками человеческой индивидуальности и многообразия мнений, действующими во имя интересов всех людей. Но так ли все хорошо? Или за «бескорыстными» целями техномонополий стоит тирания голодных до наших данных алгоритмов?

  • Добавил: literator
  • Дата: 23-03-2024, 22:19
  • Комментариев: 0
Название: Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach
Автор: Jennifer L. Bayuk
Издательство: Wiley
Год: 2024
Страниц: 335
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

Authoritative resource delivering the professional practice of cybersecurity from the perspective of enterprise governance and risk management. Stepping Through Cybersecurity Risk Management covers the professional practice of cybersecurity from the perspective of enterprise governance and risk management. It describes the state of the art in cybersecurity risk identification, classification, measurement, remediation, monitoring and reporting. It includes industry standard techniques for examining cybersecurity threat actors, cybersecurity attacks in the context of cybersecurity-related events, technology controls, cybersecurity measures and metrics, cybersecurity issue tracking and analysis, and risk and control assessments. The text provides precise definitions for information relevant to cybersecurity management decisions and recommendations for collecting and consolidating that information in the service of enterprise risk management. The objective is to enable the reader to recognize, understand, and apply risk-relevant information to the analysis, evaluation, and mitigation of cybersecurity risk. A well-rounded resource, the text describes both reports and studies that improve cybersecurity decision support.
  • Добавил: literator
  • Дата: 22-03-2024, 21:09
  • Комментариев: 0
Название: AI and IoT Technology and Applications for Smart Healthcare Systems
Автор: Alex Khang
Издательство: CRC Press
Год: 2024
Страниц: 422
Язык: английский
Формат: pdf (true)
Размер: 30.4 MB

In recent years, the application of Artificial Intelligence (AI) and Internet of Things (IoT) technologies in smart healthcare has been increasing. We are approaching a world where connected smart devices tell people when they need to visit a doctor because these devices will be able to detect health problems and discover symptoms of illness that may need medical care. AI-collaborative IoT technologies can help medical professionals with decision-making. These technologies can also help develop a sustainable and smart healthcare system. Internet of Things (IoT)-enabled technologies and devices have several applications in healthcare. A larger role for IoT in healthcare would be beneficial for both patients and professionals. Medical apps for mobile devices and wearable technology that collect health information from patients are two examples of how healthcare IoT is being put to use. The Internet of Things is used in crisis facilities to follow the whereabouts of patients, clinical gear, and staff. IoT refers to the network of devices, sensors, and objects that are connected to the Internet, allowing them to communicate with each other and collect and transmit data. IoT technology provides capabilities such as identification, communication, services, computing, sensing, and data transfer. These functions enable various applications in healthcare and other fields.
  • Добавил: literator
  • Дата: 21-03-2024, 17:36
  • Комментариев: 0
Название: Secure Coordination Control of Networked Robotic Systems: From a Control Theory Perspective
Автор: Xiaolei Li, Jiange Wang, Xiaoyuan Luo, Xinping Guan
Издательство: Springer
Год: 2024
Страниц: 246
Язык: английский
Формат: pdf (true), epub
Размер: 32.3 MB

As a typical cyber-physical system (CPS), networked robotic systems refer to a collection of robotic devices or agents that are interconnected through a network, allowing them to communicate, share information, and coordinate their actions. These systems combine robotics with networked communication technologies to enable robots to work together or with other devices, often remotely, to perform tasks and achieve objectives. As one of the core equipments and actuators, robotic technology has attracted much attention and has made great progress. However, a single robotic system is often unable to handle complex tasks due to limitations in sensors, microprocessors, actuators, and the ability to handle complex situations. With the development of distributed control and microprocessing technology, networked robotic systems have greatly expanded their perceptual, computational, and execution capabilities, with high efficiency, low cost, and strong functionality advantages. In this book, we conduct research on the secure coordination problem of networked robotic systems from a control theory perspective, given the limited communication bandwidth and the increasingly prominent network security threats. This book showcases several continuous-time and event-triggered secure control design and analysis methods for networked robotic systems under different types of cyberattacks.
  • Добавил: literator
  • Дата: 20-03-2024, 04:39
  • Комментариев: 0
Название: Healthcare Services in the Metaverse: Game Theory, AI, IoT, and Blockchain
Автор: Saurav Mallik, Anjan Bandyopadhyay, Ruifeng Hu
Издательство: CRC Press
Год: 2024
Страниц: 241
Язык: английский
Формат: pdf (true)
Размер: 10.4 MB

This book focuses on game theory approaches utilized on various domains viz., IoT, blockchain and their applications to biomedical and healthcare services. The book bridges the gap between radiologists and Artificial Intelligence (AI)-driven automated systems by investigating various techniques such as game theoretic approach, blockchain technology basically utilized for security, and IoT applied on metaverse. Healthcare Services in the Metaverse: Game Theory, AI, IoT, and Blockchain, identifies the potential areas where game theory and block chain techniques can be harnessed in the metaverse. The book discusses the integration of virtual reality (VR) with augmented reality to identify the new emerging techniques in healthcare to metaverse, where doctors and/or patients can see any kind of operation in the VR metaverse. The authors use game theoretical and blockchain approaches to understand healthcare issues, with the aim of utilizing different technologies of metaverse platform for health informatics. This book is written to help healthcare practitioners and individuals across academia and research, as well as for those who work in biomedical, Internet of Things (IoT), Artificial Intelligence (AI), Metaverse, VR, blockchain, and related technologies.
  • Добавил: literator
  • Дата: 19-03-2024, 21:13
  • Комментариев: 0
Название: Blockchain and Digital Twin Enabled IoT Networks: Privacy and Security Perspectives
Автор: Randhir Kumar, Prabhat Kumar, Sobin C.C.
Издательство: CRC Press
Год: 2025
Страниц: 235
Язык: английский
Формат: pdf (true)
Размер: 10.1 MB

This book reviews research works in recent trends in blockchain, AI, and Digital Twin based IoT data analytics approaches for providing the privacy and security solutions for Fog-enabled IoT networks. Due to the large number of deployments of IoT devices, an IoT is the main source of data and a very high volume of sensing data is generated by IoT systems such as smart cities and smart grid applications. To provide a fast and efficient data analytics solution for Fog-enabled IoT systems is a fundamental research issue. For the deployment of the Fog-enabled-IoT system in different applications such as healthcare systems, smart cities and smart grid systems, security, and privacy of big IoT data and IoT networks are key issues. The current centralized IoT architecture is heavily restricted with various challenges such as single points of failure, data privacy, security, robustness, etc. This book emphasizes and facilitates a greater understanding of various security and privacy approaches using the advances in Digital Twin and Blockchain for data analysis using machine/deep learning, federated learning, edge computing and the countermeasures to overcome these vulnerabilities.