
Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.
Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente
This book aims to provide latest research findings, innovative research results, methods, and development techniques from both theoretical and practical perspectives related to the emerging areas of broadband and wireless computing.
Information networks of today are going through a rapid evolution. Different kinds of networks with different characteristics are emerging and they are integrating in heterogeneous networks. For these reasons, there are many interconnection problems which may occur at different levels of the hardware and software design of communicating entities and communication networks. These kinds of networks need to manage an increasing usage demand, provide support for a significant number of services, guarantee their QoS, and optimize the network resources.
The success of all-IP networking and wireless technology has changed the ways of living the people around the world. The progress of electronic integration and wireless communications is going to pave the way to offer people the access to the wireless networks on the fly, based on which all electronic devices will be able to exchange the information with each other in ubiquitous way whenever necessary.
Assessment of a Small Scale WMN for Different Number of Mesh Routers and Subway Distribution of Mesh Clients Considering Blend and Simplex Crossovers.- Enhancing Real-Time IoT Applications: Latency Reduction Techniques in 5G MIMO Networks.- A Fuzzy-based System for Handover in 5G/B5G Wireless Networks: Effect of Slice Active Time on Handover Decision.- A Modified Energy-Aware PRoPHET DTN Routing Protocol for Low-Energy Networks.- Multi-Link/Multi-AP Coordination based Joint Transmission for Seamless Roaming in IEEE 802.11 bn (Wi-Fi 8).- Electric Power Transportation System on Battery Swapping EV for Emergency Power Supply while Reducing User Overhead.- Design and Evaluation of the Network-Based Fog Computing (NBFC) Model for Linear.- Applications of Sensor Data.- Development of a Framework for Web-based Collaborative VR Tours Using 360VR Images/Videos.- Hacking Using Social Engineering Detection and Prevention Methods.- Securing FSK-based Paging System using Format Preserving Encryption (FPE).- Comparative Analysis of Machine Learning and Deep Learning Models for Email Spam Classification Using TF-IDF and Word Embedding Techniques.- Cybersecurity in UAVs: An Intrusion Detection System Using UAVCAN and Deep Reinforcement Learning.- An Isolation Forest Model for Anomaly Detection in IoT Networks using Directional Graphs.- Federated Virtual Sensors for IoT: Applying Machine Learning Algorithms through Federated Averaging and Distributed Intelligence.- Polymorphic Keys in Multi-Secret Cryptography.


Il sito utilizza cookie ed altri strumenti di tracciamento che raccolgono informazioni dal dispositivo dell’utente. Oltre ai cookie tecnici ed analitici aggregati, strettamente necessari per il funzionamento di questo sito web, previo consenso dell’utente possono essere installati cookie di profilazione e marketing e cookie dei social media. Cliccando su “Accetto tutti i cookie” saranno attivate tutte le categorie di cookie. Per accettare solo deterninate categorie di cookie, cliccare invece su “Impostazioni cookie”. Chiudendo il banner o continuando a navigare saranno installati solo cookie tecnici. Per maggiori dettagli, consultare la Cookie Policy.