This book presents group recommender systems, which focus on the determination of recommendations for groups of users. The authors summarize different technologies and applications of group recommender systems. They i...
ISBN:
(数字)9783319750675
ISBN:
(纸本)9783319750668
This book presents group recommender systems, which focus on the determination of recommendations for groups of users. The authors summarize different technologies and applications of group recommender systems. They include an in-depth discussion of state-of-the-art algorithms, an overview of industrial applications, an inclusion of the aspects of decision biases in groups, and corresponding de-biasing approaches. The book includes a discussion of basic group recommendation methods, aspects of human decision making in groups, and related applications. A discussion of open research issues is included to inspire new related research. The book serves as a reference for researchers and practitioners working on group recommendation related topics.
This SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of participated parties, and t...
ISBN:
(数字)9783319936772
ISBN:
(纸本)9783319936765
This SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of participated parties, and the false data injection attacks. Moreover, the authors demonstrate in detail the various proposed techniques to secure the smart grid’s different communication networks and preserve the privacy of the *** many years, power grid has generated electricity from central generators and distributed it in one direction from the generation stations to end-users; also, information is one directional so that the grid’s control center doesn’t get enough information about customers’ requirements and consequently can’t prevent electricity losses. So, the electricity grid is merged with information and communication technology to form smart grid. The main target of this incorporation is to connect different parties of power grid to exchange information about grid conditions and customers’ requirements, and consequently, improve the reliability and efficiency of electricity generation and *** upgrade of the power grid exposes it to the cyber security threats that the communication networks suffer from, such as malicious attacks to forge the electricity consumption readings or price, extract personal information for residential consumers, such as daily habits and life style, or attack some grid’s resources and equipment availability using denial-of-service attacks. Also, novel threats are introduced in smart grid due to the power grid nature, such as false data injection attack, in which the adversary compromises several measurement units and injects false information about the grid conditions that mislead the grid’s control center to make wrong decisions for the grid and consequently impact on its stability and efficiency.
This SpringerBrief presents radio resource allocation schemes for buffer-aided communications systems over fading channels under statistical delay constraints in terms of upper-bounded average delay or delay-outage pr...
ISBN:
(数字)9783319576930
ISBN:
(纸本)9783319576923
This SpringerBrief presents radio resource allocation schemes for buffer-aided communications systems over fading channels under statistical delay constraints in terms of upper-bounded average delay or delay-outage probability. This Brief starts by considering a source-destination communications link with data arriving at the source transmission buffer. The first scenario, the joint optimal data admission control and power allocation problem for throughput maximization is considered, where the source is assumed to have a maximum power and an average delay constraints. The second scenario, optimal power allocation problems for energy harvesting (EH) communications systems under average delay or delay-outage constraints are explored, where the EH source harvests random amounts of energy from renewable energy sources, and stores the harvested energy in a battery during data transmission. Online resource allocation algorithms are developed when the statistical knowledge of the random channel fading, data arrivals, EH processes governing the system dynamics is unknown a-priori. This Brief continues with a source-relay-destination communications link with buffers available at both source and relay, as part of a multi-hop network. Optimal resource allocation schemes for this 3-node relaying system to maximize its effective capacity under a delay-outage constraint are proposed, with special emphasis on relay roles: Half-duplex (HD) or full-duplex (FD) relay operation. With HD relay, the adaptive link selection relaying problem jointly with both fixed and adaptive power allocation schemes is investigated. Within each transmission frame, either the source-relay link or the relay-destination link is selected to be active depending on the channel conditions. With FD relay under the presence of non-zero residual self-interference (SI). This Brief also presents source and relay power allocation schemes for both cases of available knowledge of the channel state information at tran
This book presents a novel non-intrusive infrastructure monitoring technique based on the detection and tracking of scattering centers in spaceborne SAR images. The methodology essentially consists of refocusing each ...
ISBN:
(数字)9789811032172
ISBN:
(纸本)9789811032165
This book presents a novel non-intrusive infrastructure monitoring technique based on the detection and tracking of scattering centers in spaceborne SAR images. The methodology essentially consists of refocusing each available SAR image on an imposed 3D point cloud associated to the envisaged infrastructure element and identifying the reliable scatterers to be monitored by means of four dimensional (4D) tomography. The methodology described in this book provides a new perspective on infrastructure monitoring with spaceborne SAR images, is based on a standalone processing chain, and brings innovative technical aspects relative to conventional approaches. The book is intended primarily for professionals and researchers working in the area of critical infrastructure monitoring by radar remote sensing.
This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of se...
ISBN:
(数字)9789811032356
ISBN:
(纸本)9789811032349
This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens readers horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT after reading this book.
This SpringerBrief offers two concrete design examples for traffic offloading. The first is an optimal resource allocation for small-cell based traffic offloading that aims at minimizing mobile users data cost. The se...
ISBN:
(数字)9783319510378
ISBN:
(纸本)9783319510361
This SpringerBrief offers two concrete design examples for traffic offloading. The first is an optimal resource allocation for small-cell based traffic offloading that aims at minimizing mobile users data cost. The second is an optimal resource allocation for device-to-device assisted traffic offloading that also minimizes the total energy consumption and cellular link usage (while providing an overview of the challenging issues). Both examples illustrate the importance of proper resource allocation to the success of traffic offloading, show the consequent performance advantages of executing optimal resource allocation, and present the methodologies to achieve the corresponding optimal offloading solution for traffic offloading in heterogeneous cellular networks. The authors also include an overview of heterogeneous cellular networks and explain different traffic offloading paradigms ranging from uplink traffic offloading through small cells to downlink traffic offloading via mobile device-to-device cooperation. This brief is an excellent resource for postgraduate students studying advanced-level topics in wireless communications and networking. Researchers, engineers and professionals working in related fields will also find this brief a valuable resource tool.
This brief focuses on stochastic energy optimization for distributed energy resources in smart grids. Along with a review of drivers and recent developments towards distributed energy resources, this brief presents re...
ISBN:
(数字)9783319595290
ISBN:
(纸本)9783319595283
This brief focuses on stochastic energy optimization for distributed energy resources in smart grids. Along with a review of drivers and recent developments towards distributed energy resources, this brief presents research challenges of integrating millions of distributed energy resources into the grid. The brief then proposes a novel three-level hierarchical architecture for effectively integrating distributed energy resources into smart grids. Under the proposed hierarchical architecture, distributed energy resource management algorithms at the three levels (i.e., smart home, smart neighborhood, and smart microgrid) are developed in this brief based on stochastic optimization that can handle the involved uncertainties in the system.
This book focuses on EM propagation characteristics within multilayered plasma-dielectric-metallic media. The method used for analysis is impedance transformation method. Plasma covered radar absorbing material is app...
详细信息
ISBN:
(数字)9789811022692
ISBN:
(纸本)9789811022685
This book focuses on EM propagation characteristics within multilayered plasma-dielectric-metallic media. The method used for analysis is impedance transformation method. Plasma covered radar absorbing material is approximated as a multi-layered dielectric medium. The plasma is considered to be bounded homogeneous/inhomogeneous medium. The reflection coefficient and hence return loss is analytically derived. The role of plasma parameters, such as electron density, collision frequency, plasma thickness, and plasma density profile in the absorption behavior of multi-layered plasma-RAM structure is described. This book provides a clearer picture of EM propagation within plasma. The reader will get an insight of plasma parameters that play significant role in deciding the absorption characteristics of plasma covered surfaces.
暂无评论