Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book aims to provide latest research findings, innovative research results, methods, and development techniques from both theoretical and practical perspectives related to the emerging areas of broadband and wireless computing. Information networks of today are going through a rapid evolution. Different kinds of networks with different characteristics are emerging and they are integrating in heterogeneous networks. For these reasons, there are many interconnection problems which may occur at different levels of the hardware and software design of communicating entities and…mehr
This book aims to provide latest research findings, innovative research results, methods, and development techniques from both theoretical and practical perspectives related to the emerging areas of broadband and wireless computing.
Information networks of today are going through a rapid evolution. Different kinds of networks with different characteristics are emerging and they are integrating in heterogeneous networks. For these reasons, there are many interconnection problems which may occur at different levels of the hardware and software design of communicating entities and communication networks. These kinds of networks need to manage an increasing usage demand, provide support for a significant number of services, guarantee their QoS, and optimize the network resources.
The success of all-IP networking and wireless technology has changed the ways of living the people around the world. The progress of electronic integration and wireless communications is going to pave the way to offer people the access to the wireless networks on the fly, based on which all electronic devices will be able to exchange the information with each other in ubiquitous way whenever necessary.
Assessment of a Small Scale WMN for Different Number of Mesh Routers and Subway Distribution of Mesh Clients Considering Blend and Simplex Crossovers.- Enhancing Real-Time IoT Applications: Latency Reduction Techniques in 5G MIMO Networks.- A Fuzzy-based System for Handover in 5G/B5G Wireless Networks: Effect of Slice Active Time on Handover Decision.- A Modified Energy-Aware PRoPHET DTN Routing Protocol for Low-Energy Networks.- Multi-Link/Multi-AP Coordination based Joint Transmission for Seamless Roaming in IEEE 802.11 bn (Wi-Fi 8).- Electric Power Transportation System on Battery Swapping EV for Emergency Power Supply while Reducing User Overhead.- Design and Evaluation of the Network-Based Fog Computing (NBFC) Model for Linear.- Applications of Sensor Data.- Development of a Framework for Web-based Collaborative VR Tours Using 360VR Images/Videos.- Hacking Using Social Engineering Detection and Prevention Methods.- Securing FSK-based Paging System using Format Preserving Encryption (FPE).- Comparative Analysis of Machine Learning and Deep Learning Models for Email Spam Classification Using TF-IDF and Word Embedding Techniques.- Cybersecurity in UAVs: An Intrusion Detection System Using UAVCAN and Deep Reinforcement Learning.- An Isolation Forest Model for Anomaly Detection in IoT Networks using Directional Graphs.- Federated Virtual Sensors for IoT: Applying Machine Learning Algorithms through Federated Averaging and Distributed Intelligence.- Polymorphic Keys in Multi-Secret Cryptography.
Assessment of a Small Scale WMN for Different Number of Mesh Routers and Subway Distribution of Mesh Clients Considering Blend and Simplex Crossovers.- Enhancing Real-Time IoT Applications: Latency Reduction Techniques in 5G MIMO Networks.- A Fuzzy-based System for Handover in 5G/B5G Wireless Networks: Effect of Slice Active Time on Handover Decision.- A Modified Energy-Aware PRoPHET DTN Routing Protocol for Low-Energy Networks.- Multi-Link/Multi-AP Coordination based Joint Transmission for Seamless Roaming in IEEE 802.11 bn (Wi-Fi 8).- Electric Power Transportation System on Battery Swapping EV for Emergency Power Supply while Reducing User Overhead.- Design and Evaluation of the Network-Based Fog Computing (NBFC) Model for Linear.- Applications of Sensor Data.- Development of a Framework for Web-based Collaborative VR Tours Using 360VR Images/Videos.- Hacking Using Social Engineering Detection and Prevention Methods.- Securing FSK-based Paging System using Format Preserving Encryption (FPE).- Comparative Analysis of Machine Learning and Deep Learning Models for Email Spam Classification Using TF-IDF and Word Embedding Techniques.- Cybersecurity in UAVs: An Intrusion Detection System Using UAVCAN and Deep Reinforcement Learning.- An Isolation Forest Model for Anomaly Detection in IoT Networks using Directional Graphs.- Federated Virtual Sensors for IoT: Applying Machine Learning Algorithms through Federated Averaging and Distributed Intelligence.- Polymorphic Keys in Multi-Secret Cryptography.
Assessment of a Small Scale WMN for Different Number of Mesh Routers and Subway Distribution of Mesh Clients Considering Blend and Simplex Crossovers.- Enhancing Real-Time IoT Applications: Latency Reduction Techniques in 5G MIMO Networks.- A Fuzzy-based System for Handover in 5G/B5G Wireless Networks: Effect of Slice Active Time on Handover Decision.- A Modified Energy-Aware PRoPHET DTN Routing Protocol for Low-Energy Networks.- Multi-Link/Multi-AP Coordination based Joint Transmission for Seamless Roaming in IEEE 802.11 bn (Wi-Fi 8).- Electric Power Transportation System on Battery Swapping EV for Emergency Power Supply while Reducing User Overhead.- Design and Evaluation of the Network-Based Fog Computing (NBFC) Model for Linear.- Applications of Sensor Data.- Development of a Framework for Web-based Collaborative VR Tours Using 360VR Images/Videos.- Hacking Using Social Engineering Detection and Prevention Methods.- Securing FSK-based Paging System using Format Preserving Encryption (FPE).- Comparative Analysis of Machine Learning and Deep Learning Models for Email Spam Classification Using TF-IDF and Word Embedding Techniques.- Cybersecurity in UAVs: An Intrusion Detection System Using UAVCAN and Deep Reinforcement Learning.- An Isolation Forest Model for Anomaly Detection in IoT Networks using Directional Graphs.- Federated Virtual Sensors for IoT: Applying Machine Learning Algorithms through Federated Averaging and Distributed Intelligence.- Polymorphic Keys in Multi-Secret Cryptography.
Assessment of a Small Scale WMN for Different Number of Mesh Routers and Subway Distribution of Mesh Clients Considering Blend and Simplex Crossovers.- Enhancing Real-Time IoT Applications: Latency Reduction Techniques in 5G MIMO Networks.- A Fuzzy-based System for Handover in 5G/B5G Wireless Networks: Effect of Slice Active Time on Handover Decision.- A Modified Energy-Aware PRoPHET DTN Routing Protocol for Low-Energy Networks.- Multi-Link/Multi-AP Coordination based Joint Transmission for Seamless Roaming in IEEE 802.11 bn (Wi-Fi 8).- Electric Power Transportation System on Battery Swapping EV for Emergency Power Supply while Reducing User Overhead.- Design and Evaluation of the Network-Based Fog Computing (NBFC) Model for Linear.- Applications of Sensor Data.- Development of a Framework for Web-based Collaborative VR Tours Using 360VR Images/Videos.- Hacking Using Social Engineering Detection and Prevention Methods.- Securing FSK-based Paging System using Format Preserving Encryption (FPE).- Comparative Analysis of Machine Learning and Deep Learning Models for Email Spam Classification Using TF-IDF and Word Embedding Techniques.- Cybersecurity in UAVs: An Intrusion Detection System Using UAVCAN and Deep Reinforcement Learning.- An Isolation Forest Model for Anomaly Detection in IoT Networks using Directional Graphs.- Federated Virtual Sensors for IoT: Applying Machine Learning Algorithms through Federated Averaging and Distributed Intelligence.- Polymorphic Keys in Multi-Secret Cryptography.
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/5800/1497