eBooks-it.org Logo
eBooks-IT.org Inner Image

Springer eBooks Page 41

Download free Springer eBooks Page 41

The Art of Wireless Sensor Networks

Volume 2 Advanced Topics and Applications
The Art of Wireless Sensor Networks Image
During the last one and a half decades, wireless sensor networks have witnessed significant growth and tremendous development in both academia and industry. A large number of researchers, including computer scientists and engineers, have been interested in solving challenging problems that span all the layers of the protocol stack of sensor networking systems. Several venues, such as journals, conferences, and workshops, have been launched to cover innovative research and practice in this promising and rapidly advancing field. Because of these trends, I thought it would be beneficial to provide our sensor networks community with a comprehensive reference on as much of the findings as possible on a variety of topics in wireless sensor networks. As thi...

The Art of Wireless Sensor Networks

Volume 1 Fundamentals
The Art of Wireless Sensor Networks Image
During the last one and a half decades, wireless sensor networks have witnessed significant growth and tremendous development in both academia and industry.The Art of Wireless Sensor Networks: Volume 1: Fundamentals focuses on the fundamentals concepts in the design, analysis, and implementation of wireless sensor networks. It covers the various layers of the lifecycle of this type of network from the physical layer up to the application layer. Its rationale is that the first volume covers contemporary design issues, tools, and protocols for radio-based two-dimensional terrestrial sensor networks.All the book chapters in this volume include up-to-date research work spanning various classic facets of the physical properties and functional behavior of ...

Fuzzy Cognitive Maps for Applied Sciences and Engineering

From Fundamentals to Extensions and Learning Algorithms
Fuzzy Cognitive Maps for Applied Sciences and Engineering Image
Fuzzy Cognitive Maps (FCM) constitute cognitive models in the form of fuzzy directed graphs consisting of two basic elements: the nodes, which basically correspond to concepts bearing different states of activation depending on the knowledge they represent, and the edges denoting the causal effects that each source node exercises on the receiving concept expressed through weights. Weights take values in the interval [-1,1], which denotes the positive, negative or neutral causal relationship between two concepts. An FCM can be typically obtained through linguistic terms, inherent to fuzzy systems, but with a structure similar to the neural networks, which facilitates data processing, and has capabilities for training and adaptation.During the last 10 ...

Handbook of Strategic e-Business Management

Handbook of Strategic e-Business Management Image
This research handbook provides a comprehensive, integrative, and authoritative resource on the main strategic management issues for companies within the e-business context. It covers an extensive set of topics, dealing with the major issues which articulate the e-business framework from a business perspective. The handbook is divided into the following e-business related parts: background; evolved strategic framework for the management of companies; key business processes, areas and activities; and, finally, emerging issues, trends and opportunities, with special attention to diverse Social Web-related implications.The articles are varied, timely and present high-quality research; many of these unique contributions will be especially valued and infl...

Modern Cryptography Primer

Theoretical Foundations and Practical Applications
Modern Cryptography Primer Image
Cryptography has experienced rapid development, with major advances recently in both secret and public key ciphers, cryptographic hash functions, cryptographic algorithms and multiparty protocols, including their software engineering correctness verification, and various methods of cryptanalysis. This textbook introduces the reader to these areas, offering an understanding of the essential, most important, and most interesting ideas, based on the authors' teaching and research experience.After introducing the basic mathematical and computational complexity concepts, and some historical context, including the story of Enigma, the authors explain symmetric and asymmetric cryptography, electronic signatures and hash functions, PGP systems, public key in...



2007 - 2017 © eBooks-IT.org