Account
Orders
Advanced search
This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of...
This SpringerBrief introduces the basics of wireless powered communication networks (WPCNs). In particular, the background and concept of WPCNs are briefly discussed. Moreover, this brief provides an extensive study of the recent developments in this...
This book introduces Radio Frequency Cell Site Engineering to a broad audience. The author blends theory and practice to bring readers up-to-date in key concepts, underlying principles and practical applications of wireless communications. The presentation is designed...
This SpringerBrief investigates and reviews the development and various applications of mobile crowd sensing (MCS). With the miniaturization of sensors and the popularity of smart mobile devices, MCS becomes a promising solution to efficiently collect...
This SpringerBrief discusses the applications of spare representation in wireless communications, with a particular focus on the most recent developed compressive sensing (CS) enabled approaches. With the help of sparsity property, sub-Nyquist sampling can be achieved...
This book introduces the concept of smart city as the potential solution to the challenges created by urbanization. The Internet of Things (IoT) offers novel features with minimum human intervention in smart cities.This book describes different components of Internet of...
The objective of this book is to provide the reader with a comprehensive survey of the topic compressed sensing in information retrieval and signal detection with privacy preserving functionality without compromising the performance of the embedding in terms of accuracy...
This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure...
This book provides a comprehensive overview of multiple access techniques used in the cellular industry. The usage of multiple access techniques in telecommunications enables many users to share the same spectrum in the frequency domain, time domain, code domain or...
This SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of participated parties, and the false data injection attacks. Moreover, the...
This book provides the basis of the design of rotating AC machines. The first chapter puts the emphasis on the air gap magnetomotive force (MMF) of Rotating AC machines and the second chapter deals with the formulation of the rotating fields that could be generated...
Cognitive radio networks (CRN) will be widely deployed in the near future, and this SpringerBrief covers some important aspects of it, as well as highlighting optimization strategies in Resource Allocation and Spectrum Sensing in CRNs. The cognitive approach in radio...
This book focuses on one of the most important aspects of electrical propulsion systems – the creation of highly reliable safety-critical traction electrical drives. It discusses the methods and models for analysis and optimization of reliability and fault tolerance...
This SpringerBrief begins by introducing the concept of smartphone sensing and summarizing the main tasks of applying smartphone sensing in vehicles. Chapter 2 describes the vehicle dynamics sensing model that exploits the raw data of motion sensors (i.e.,...
The book discusses the modeling of induction and synchronous machines aimed at the synthesis of dedicated control strategies.The first part focuses on induction machines (IMs), and starts with the analysis of the principle of operation, which is based on the induction...
This SpringerBrief provides a comprehensive study of the unique security threats to cognitive radio (CR) networks and a systematic investigation of the state-of-the-art in the corresponding adversary detection problems. In addition, detailed discussions...
This book presents group recommender systems, which focus on the determination of recommendations for groups of users. The authors summarize different technologies and applications of group recommender systems. They include an in-depth discussion of state-of-the-art...
The goal of this SpringerBrief is to collect and systematically present the state-of-the-art in this research field and the underlying game-theoretic and learning tools to the broader audience with general network security and engineering backgrounds....
This book presents and develops several important concepts of speech enhancement in a simple but rigorous way. Many of the ideas are new; not only do they shed light on this old problem but they also offer valuable tips on how to improve on some well-known conventional...
This SpringerBrief investigates cross layer resource allocation in unlicensed LTE (Long Term Evolution) HetNets. Specifically, the authors study and cover the radio access management of unlicensed LTE to allow efficient spectrum utilization and harmonious coexistence...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers