Ternary means based on three. This book deals with reliability investigations ofnetworks whose components subject to failures can be in three states up, down and middle (mid), contrary to traditionally considered netw...
ISBN:
(数字)9783319064406
ISBN:
(纸本)9783319064390;9783319064406
Ternary means based on three. This book deals with reliability investigations ofnetworks whose components subject to failures can be in three states up, down and middle (mid), contrary to traditionally considered networkshaving only binary (up/down) components. Extending binary case to ternary allows to consider more realistic and flexible models for communication, flow and supply networks
Discrete Event Systems: Diagnosis and Diagnosability addresses the problem of fault diagnosis of Discrete Event Systems (DESs). This book provides the basic techniques and approaches necessary for the design of an eff...
ISBN:
(数字)9781461400318
ISBN:
(纸本)9781461400301
Discrete Event Systems: Diagnosis and Diagnosability addresses the problem of fault diagnosis of Discrete Event Systems (DESs). This book provides the basic techniques and approaches necessary for the design of an efficient fault diagnosis system for a wide range of modern engineering applications. This book classifies the different techniques and approaches according to several criteria such as: modeling tools (Automata, Petri nets, Templates) that is used to construct the model; the information (qualitative based on events occurrences and/or states outputs, quantitative based on signal processing, data analysis) that is needed to analyze and achieve the diagnosis; the decision structure (centralized, decentralized) that is required to achieve the diagnosis; as well as the complexity (polynomial, exponential) of the algorithm that is used to determine the set of faults that the proposed approach is able to diagnose as well as the delay time required for this diagnosis. The goal of this classification is to select the efficient method to achieve the fault diagnosis according to the application constraints. This book will include illustrated examples of the presented methods and techniques as well as a discussion on the application of these methods on several real-world problems.
This Springer Brief focuses on cognitive resource management in heterogeneous cellular networks (Het Net) with small cell deployment for the LTE-Advanced system. It introduces the Het Net features, presents practical ...
ISBN:
(数字)9783319062846
ISBN:
(纸本)9783319062839
This Springer Brief focuses on cognitive resource management in heterogeneous cellular networks (Het Net) with small cell deployment for the LTE-Advanced system. It introduces the Het Net features, presents practical approaches using cognitive radio technology in accommodating small cell data relay and optimizing resource allocation and examines the effectiveness of resource management among small cells given limited coordination bandwidth and wireless channel uncertainty. The authors introduce different network characteristics of small cell, investigate the mesh of small cell access points in parallel with macrocells in network control and resource management and address resource management in the backhaul with coordination constraints and wireless channel uncertainty. The final section of this brief summarizes and provides future research directions for this topic, including a proposed framework that has been evaluated through realistic simulations. Cognitive Resource Management for Heterogeneous Cellular Networks is designed for researchers and professionals working in wireless communications and networks. Advanced-level students studying electrical and computerengineering should also find the content helpful.
This book explores a proactive and domain-driven method to classification tasks. This novel proactive approach to data mining not only induces a model for predicting or explaining a phenomenon, but also utilizes speci...
ISBN:
(数字)9781493905393
ISBN:
(纸本)9781493905386;9781493905393
This book explores a proactive and domain-driven method to classification tasks. This novel proactive approach to data mining not only induces a model for predicting or explaining a phenomenon, but also utilizes specific problem/domain knowledge to suggest specific actions to achieve optimal changes in the value of the target attribute. In particular, the authors suggest a specific implementation of the domain-driven proactive approach for classification trees. The book centers on the core idea of moving observations from one branch of the tree to another. It introduces a novel splitting criterion for decision trees, termed maximal-utility, which maximizes the potential for enhancing profitability in the output tree. Two real-world case studies, one of a leading wireless operator and the other of a major security company, are also included and demonstrate how applying the proactive approach to classification tasks can solve business problems. Proactive Data Mining with Decision Trees is intended for researchers, practitioners and advanced-level students.
Online social networks collect information from users' social contacts and their daily interactions (co-tagging of photos, co-rating of products etc.) to provide them with recommendations of new products or friend...
ISBN:
(数字)9781493902859
ISBN:
(纸本)9781493902859;9781493902866
Online social networks collect information from users' social contacts and their daily interactions (co-tagging of photos, co-rating of products etc.) to provide them with recommendations of new products or friends. Lately, technological progressions in mobile devices (i.e. smart phones) enabled the incorporation of geo-location data in the traditional web-based online social networks, bringing the new era of Social and Mobile Web. The goal of this book is to bring together important research in a new family of recommender systems aimed at serving Location-based Social Networks (LBSNs). The chapters introduce a wide variety of recent approaches, from the most basic to the state-of-the-art, for providing recommendations in LBSNs. The book is organized into three parts. Part 1 provides introductory material on recommender systems, online social networks and LBSNs. Part 2 presents a wide variety of recommendation algorithms, ranging from basic to cutting edge, as well as a comparison of the characteristics of these recommender systems. Part 3 provides a step-by-step case study on the technical aspects of deploying and evaluating a real-world LBSN, which provides location, activity and friend recommendations. The material covered in the book is intended for graduate students, teachers, researchers, and practitioners in the areas of web data mining, information retrieval, and machine learning.
This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from ...
ISBN:
(数字)9783319025568
ISBN:
(纸本)9783319025551
This book describes the fundamentals of cryptographic primitives based on quasi-cyclic low-density parity-check (QC-LDPC) codes, with a special focus on the use of these codes in public-key cryptosystems derived from the McEliece and Niederreiter schemes. In the first part of the book, the main characteristics of QC-LDPC codes are reviewed, and several techniques for their design are presented, while tools for assessing the error correction performance of these codes are also described. Some families of QC-LDPC codes that are best suited for use in cryptography are also presented. The second part of the book focuses on the McEliece and Niederreiter cryptosystems, both in their original forms and in some subsequent variants. The applicability of QC-LDPC codes in these frameworks is investigated by means of theoretical analyses and numerical tools, in order to assess their benefits and drawbacks in terms of system efficiency and security. Several examples of QC-LDPC code-based public key cryptosystems are presented, and their advantages over classical solutions are highlighted. The possibility of also using QC-LDPC codes in symmetric encryption schemes and digital signature algorithms is also briefly examined.
This book provides an overview and an insight in cooperative objects and defines the classification of topics into the different areas. A significant number of researchers and industrial partners were contacted in ord...
ISBN:
(数字)9783642454011
ISBN:
(纸本)9783642454004;9783642454011
This book provides an overview and an insight in cooperative objects and defines the classification of topics into the different areas. A significant number of researchers and industrial partners were contacted in order to prepare the roadmap. The book presents of the main results provided by the corresponding European project "CONET".
Thisbook focuses on speech processing in the presence of low-bit rate coding and varying background environments. The methods presented in the book exploit the speech events which are robust in noisy environments. Acc...
ISBN:
(数字)9783319031163
ISBN:
(纸本)9783319031156;9783319031163
Thisbook focuses on speech processing in the presence of low-bit rate coding and varying background environments. The methods presented in the book exploit the speech events which are robust in noisy environments. Accurate estimation of these crucial events will be useful for carrying out various speech tasks such as speech recognition, speaker recognition and speech rate modification in mobile environments. The authors provide insights into designing and developing robust methods to process the speech in mobile environments. Covering temporal and spectral enhancement methods to minimize the effect of noise andexamining methods and models on speech and speaker recognition applications in mobile environments.
This SpringerBrief presents recent advances in the cognitive MAC designs for opportunistic spectrum access (OSA) networks. It covers the basic MAC functionalities and MAC enhancements of IEEE 802.11. Later chapters di...
ISBN:
(数字)9783319126494
ISBN:
(纸本)9783319126487;9783319126494
This SpringerBrief presents recent advances in the cognitive MAC designs for opportunistic spectrum access (OSA) networks. It covers the basic MAC functionalities and MAC enhancements of IEEE 802.11. Later chapters discuss the existing MAC protocols for OSA and classify them based on characteristic features. The authors provide new research in adaptive carrier sensing-based MAC designs tailored for OSA, which optimize spectrum utilization and ensure a peaceful coexistence of licensed and unlicensed systems. Analytically devised via optimization and game-theoretic approaches, theseadaptive MAC designs are shown to effectively reduce collisions between both primary and secondary network users. Researchers and professionals working in wireless communications and networkswill find this content valuable. This brief is also a useful study guide for advanced-level students in computer science and electricalengineering.
**This book covers the design, construction, and implementation of algebraic-geometric codes from Hermitian curves. Matlab simulations of algebraic-geometric codes and Reed-Solomon codes compare their bit error rate u...
ISBN:
(数字)9783319082936
ISBN:
(纸本)9783319082929;9783319082936
**This book covers the design, construction, and implementation of algebraic-geometric codes from Hermitian curves. Matlab simulations of algebraic-geometric codes and Reed-Solomon codes compare their bit error rate using different modulation schemes over additive white Gaussian noise channel model. Simulation results of Algebraic-geometric codes bit error rate performance using quadrature amplitude modulation (16QAM and 64QAM) are presented for the first time and shown to outperform Reed-Solomon codes at various code rates and channel models. The book proposes algebraic-geometric block turbo codes. It also presents simulation results that show an improved bit error rate performance at the cost of high system complexity due to using algebraic-geometric codes and Chase-Pyndiahs algorithm simultaneously. The book proposes algebraic-geometric irregular block turbo codes (AG-IBTC) to reduce system complexity. Simulation results for AG-IBTCs are presented for the first time.
暂无评论