A Glimpse Beyond 5G in Wireless Networks, Matin M.A.
Автор: Haipeng Yao; Chunxiao Jiang; Yi Qian Название: Developing Networks using Artificial Intelligence ISBN: 3030150275 ISBN-13(EAN): 9783030150273 Издательство: Springer Рейтинг: Цена: 21428 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book mainly discusses the most important issues in artificial intelligence-aided future networks, such as applying different ML approaches to investigate solutions to intelligently monitor, control and optimize networking. The authors focus on four scenarios of successfully applying machine learning in network space. It also discusses the main challenge of network traffic intelligent awareness and introduces several machine learning-based traffic awareness algorithms, such as traffic classification, anomaly traffic identification and traffic prediction. The authors introduce some ML approaches like reinforcement learning to deal with network control problem in this book. Traditional works on the control plane largely rely on a manual process in configuring forwarding, which cannot be employed for today's network conditions. To address this issue, several artificial intelligence approaches for self-learning control strategies are introduced. In addition, resource management problems are ubiquitous in the networking field, such as job scheduling, bitrate adaptation in video streaming and virtual machine placement in cloud computing. Compared with the traditional with-box approach, the authors present some ML methods to solve the complexity network resource allocation problems. Finally, semantic comprehension function is introduced to the network to understand the high-level business intent in this book.With Software-Defined Networking (SDN), Network Function Virtualization (NFV), 5th Generation Wireless Systems (5G) development, the global network is undergoing profound restructuring and transformation. However, with the improvement of the flexibility and scalability of the networks, as well as the ever-increasing complexity of networks, makes effective monitoring, overall control, and optimization of the network extremely difficult. Recently, adding intelligence to the control plane through AI&ML become a trend and a direction of network development This book's expected audience includes professors, researchers, scientists, practitioners, engineers, industry managers, and government research workers, who work in the fields of intelligent network. Advanced-level students studying computer science and electrical engineering will also find this book useful as a secondary textbook.
Автор: Miaowen Wen; Xiang Cheng; Liuqing Yang Название: Index Modulation for 5G Wireless Communications ISBN: 3319513540 ISBN-13(EAN): 9783319513546 Издательство: Springer Рейтинг: Цена: 18366 р. Наличие на складе: Поставка под заказ.
Описание: This book presents a thorough examination of index modulation, an emerging 5G modulation technique. First, the basic spatial modulation system for the spatial domain is introduced. Then, the development of a generalized pre-coding aided quadrature spatial modulation system as well as a virtual spatial modulation system are presented.
Описание: This book discusses the smooth integration of optical and RF networks in 5G and beyond (5G+) heterogeneous networks (HetNets), covering both planning and operational aspects.
This book provides a comprehensive understanding of the current state of the art extended by mid- to long-term prospects of cognitive and autonomous network operation. Cognitive and autonomous in this context build two independent dimensions that enable the network to action based on information about its environment, and act independent of any external directions learning from its interactions and improve its responses. The key driver for the book is the need for autonomy in 5G imposed by new requirements due to virtualization of network functions. After a declaration of the need for cognitive autonomy in networks, a comprehensive background of the current position is provided. There follows an outline of the novel approaches, and a substantial description of application of tools for end-to-end cognition, namely configuration, operation, optimization and self-healing. The book ends with an outline describing the challenges of complete autonomy in networks.
Written by industry insiders working at the heart of the technology, this book serves as an essential reference for researchers, scientists and system engineers, plus standardization experts who are laying the foundations for next generation networks.
Автор: Chen Chen, Cheng Xiang Название: Resource Allocation for Ofdma Systems ISBN: 3030193942 ISBN-13(EAN): 9783030193942 Издательство: Springer Рейтинг: Цена: 15305 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: 1. Introduction.- 2. Overview of OFDMA and MIMO Systems.- 3. Remarks on Resource Allocation.- 4. Resource Allocation for OFDMA Systems.- 5. Dealing with Imperfect CSI.- 6. Summary and Outlook.
Описание: An expert treatment of the state-of-the-art in green and soft communications, covering theory, 5G physical layer design, network architecture, energy efficient resource management strategies, and applications of wireless big data and artificial intelligence to wireless network design. Ideal for graduate students, professionals and researchers.
Описание: This book introduces the concepts, applications and development of data science in the telecommunications industry by focusing on advanced machine learning and data mining methodologies in the wireless networks domain.
Описание: The book reports two approaches of implementation of the essential components of a Digital Phase Locked Loop based system for dealing with wireless channels showing Nakagami-m fading.
Автор: Jiangxing Wu Название: Cyberspace Mimic Defense ISBN: 3030298434 ISBN-13(EAN): 9783030298432 Издательство: Springer Рейтинг: Цена: 30611 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which could change "the easy-to-attack and difficult-to-defend game" in cyberspace. The endogenous uncertain effects from the targets of the software/hardware based on this architecture can produce magic "mimic defense fog", and suppress in a normalized mode random disturbances caused by physical or logic elements, as well as effects of non-probability disturbances brought by uncertain security threats.
Although progress has been made in the current security defense theories in cyberspace and various types of security technologies have come into being, the effectiveness of such theories and technologies often depends on the scale of the prior knowledge of the attackers, on the part of the defender and on the acquired real-timing and accuracy regarding the attackers' behavior features and other information. Hence, there lacks an efficient active defense means to deal with uncertain security threats from the unknown. Even if the bottom-line defense technologies such as encrypted verification are adopted, the security of hardware/software products cannot be quantitatively designed, verified or measured.
Due to the "loose coupling" relationship and border defense modes between the defender and the protected target, there exist insurmountable theoretical and technological challenges in the protection of the defender and the target against the utilization of internal vulnerabilities or backdoors, as well as in dealing with attack scenarios based on backdoor-activated collaboration from both inside and outside, no matter how augmented or accumulated protective measures are adopted. Therefore, it is urgent to jump out of the stereotyped thinking based on conventional defense theories and technologies, find new theories and methods to effectively reduce the utilization of vulnerabilities and backdoors of the targets without relying on the priori knowledge and feature information, and to develop new technological means to offset uncertain threats based on unknown vulnerabilities and backdoors from an innovative perspective. This book provides a solution both in theory and engineering implementation to the difficult problem of how to avoid the uncontrollability of product security caused by globalized marketing, COTS and non-trustworthy software/hardware sources.
It has been proved that this revolutionary enabling technology has endowed software/hardware products in IT/ICT/CPS with endogenous security functions and has overturned the attack theories and methods based on hardware/software design defects or resident malicious codes. This book is designed for educators, theoretical and technological researchers in cyber security and autonomous control and for business technicians who are engaged in the research on developing a new generation of software/hardware products by using endogenous security enabling technologies and for other product users. Postgraduates in IT/ICT/CPS/ICS will discover that (as long as the law of "structure determines the nature and architecture determines the security is properly used), the problem of software/hardware design defects or malicious code embedding will become the swelling of Achilles in the process of informationization and will no longer haunt Pandora's box in cyberspace.
Security and opening-up, advanced progressiveness and controllability seem to be contradictory, but there can be theoretically and technologically unified solutions to the problem.
Автор: Adibi Sasan Название: Fourth-Generation Wireless Networks ISBN: 1615206744 ISBN-13(EAN): 9781615206742 Издательство: Eurospan Рейтинг: Цена: 33462 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Presents a comprehensive collection of recent findings in access technologies useful in the architecture of wireless networks. Based on research results from academia and industry, this innovative publication covers cutting-edge findings on topics such as 4G security, mobile technologies, and handover mechanisms.
Описание: This monograph is intended for the designers and would-be designers of secure and efficient wireless communication systems under intentional interference. Along with the widespread of wireless devices, especially reconfigurable software defined radios, jamming has become a serious threat to civilian communications. In this book, going beyond traditional communication system design that mainly focuses on accurate information transmission under benign environments, we aim to enhance the physical layer security of communication systems by integrating modern cryptographic techniques into transceiver design, so as to achieve secure high-speed transmission under hostile interference with high reliability and efficiency. We revisit existing jamming patterns, and introduce new jamming patterns. We analyze the weaknesses of existing anti-jamming techniques. We present innovative and feasible anti-jamming techniques, which can strengthen the inherent security of the 3G, 4G and the upcoming 5G systems with minimal and inexpensive changes to the existing CDMA, frequency hopping and OFDM schemes. We also provide benchmarks for system performance evaluation under various jamming scenarios through capacity analysis. This book includes design principles, in-depth theoretical analysis and practical design examples, and will be of interest to academic researchers as well as professionals in industry.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru