Listing 1 - 10 of 19 | << page >> |
Sort by
|
Choose an application
This book provides an introduction to software-defined radio and cognitive radio, along with methodologies for applying knowledge representation, semantic web, logic reasoning and artificial intelligence to cognitive radio, enabling autonomous adaptation and flexible signaling. Readers from the wireless communications and software-defined radio communities will use this book as a reference to extend software-defined radio to cognitive radio, using the semantic technology described. Readers with a background in semantic web and artificial intelligence will find in this book the application of semantic web and artificial intelligence technologies to wireless communications. For readers in networks and network management, this book presents a new approach to enable interoperability, collaborative optimization and flexible adaptation of network components. Provides a comprehensive ontology covering the core concepts of wireless communications using a formal language; Presents the technical realization of using a formal language to exchange control messages, achieving autonomous adaptation of a communications link; Describes an architecture that enables radios to use a formal language to send inquiries and requests to other nodes, accept, interpret and execute such requests using their local policies and modify their own parameters.
Electronics --- Electrical engineering --- Applied physical engineering --- Computer. Automation --- beeldverwerking --- draadloze computernetwerken --- elektronica --- KI (kunstmatige intelligentie) --- ingenieurswetenschappen --- elektrische circuits --- signaalverwerking --- AI (artificiële intelligentie)
Choose an application
This book provides an introduction to software-defined radio and cognitive radio, along with methodologies for applying knowledge representation, semantic web, logic reasoning and artificial intelligence to cognitive radio, enabling autonomous adaptation and flexible signaling. Readers from the wireless communications and software-defined radio communities will use this book as a reference to extend software-defined radio to cognitive radio, using the semantic technology described. Readers with a background in semantic web and artificial intelligence will find in this book the application of semantic web and artificial intelligence technologies to wireless communications. For readers in networks and network management, this book presents a new approach to enable interoperability, collaborative optimization and flexible adaptation of network components. Provides a comprehensive ontology covering the core concepts of wireless communications using a formal language; Presents the technical realization of using a formal language to exchange control messages, achieving autonomous adaptation of a communications link; Describes an architecture that enables radios to use a formal language to send inquiries and requests to other nodes, accept, interpret and execute such requests using their local policies and modify their own parameters.
Cognitive radio networks. --- Engineering. --- Systems engineering. --- Telecommunication policy. --- Software radio --- Cognitive radio networks --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Electrical Engineering --- Telecommunications --- Wireless communication systems. --- Communication systems, Wireless --- Wireless data communication systems --- Wireless information networks --- Wireless telecommunication systems --- Ad hoc cognitive networks (Wireless communication systems) --- Cognitive networks (Wireless communication systems) --- Electronics. --- Microelectronics. --- Electronic circuits. --- Circuits and Systems. --- Electronics and Microelectronics, Instrumentation. --- Signal, Image and Speech Processing. --- Telecommunication systems --- Ad hoc networks (Computer networks) --- Self-organizing systems --- Electrical engineering --- Physical sciences --- Engineering systems --- System engineering --- Engineering --- Industrial engineering --- System analysis --- Design and construction --- Signal processing. --- Image processing. --- Speech processing systems. --- Computational linguistics --- Electronic systems --- Information theory --- Modulation theory --- Oral communication --- Speech --- Telecommunication --- Singing voice synthesizers --- Pictorial data processing --- Picture processing --- Processing, Image --- Imaging systems --- Optical data processing --- Processing, Signal --- Information measurement --- Signal theory (Telecommunication) --- Microminiature electronic equipment --- Microminiaturization (Electronics) --- Electronics --- Microtechnology --- Semiconductors --- Miniature electronic equipment --- Electron-tube circuits --- Electric circuits --- Electron tubes
Choose an application
This book constitutes the refereed proceedings of the 17th International Conference on Network and System Security, NSS 2023, held in Canterbury, UK, August 14–16, 2023. The 12 full and 9 short papers presented together with 2 invited talks in this book were carefully reviewed and selected from 64 submissions. They focus on Attacks and Malware, Blockchain, Security through Hardware, Machine learning and much more.
Computer networks --- Data protection. --- Mobile and Network Security. --- Security Services. --- Security measures. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Electronic data processing --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security
Choose an application
Cognitive models and software tools have been widely used for both research and commercial purposes. Although they have proved very useful, there are some limitations preventing large-scale modeling and simulation tasks to be carried out efficiently and effectively. In this book, we aim to provide readers with a systematic overview of state-of-the-art cognitive modeling software tools and applications and an introduction to a new software framework for facilitating large-scale modeling and simulation of human-performance tasks. The authors first review cognitive modeling theories and then present an overview of state-of-the-art software tools for cognitive modeling and simulation. Finally, the book focuses on the new software framework and a research prototype called CogTool+, including how to incorporate behavioral data such as eye-tracking data in modeling and simulation tasks. Typical applications of CogTool+ in HCI and cyber security are given to demonstrate its usefulness.
Cognitive psychology --- Programming --- Computer. Automation --- cognitieve psychologie --- software engineering --- computerbeveiliging --- interfaces
Choose an application
"Focuses on the interface between digital forensics and multimedia forensics, bringing two closely related fields of forensic expertise together to identify and understand the current state-of-the-art in digital forensic investigation"--
Choose an application
Choose an application
Cognitive psychology --- Programming --- Computer. Automation --- cognitieve psychologie --- software engineering --- computerbeveiliging --- interfaces
Choose an application
This book constitutes the proceedings of the 9th International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2023, which took place in Canterbury, UK, in August 2023. The 10 full papers and 4 short papers presented in this volume were carefully reviewed and selected from 29 submissions. They were organized in topical sections as follows: information abuse and political discourse; attacks; social structure and community; and security and privacy matters. Papers "Data Reconstruction Attack Against Principal Component Analysis" and "Edge local Differential Privacy for Dynamic Graphs" are published Open Access under the CC BY 4.0 License.
Computer networks --- Cryptography. --- Data encryption (Computer science). --- Data protection. --- Application software. --- Computer networks. --- Mobile and Network Security. --- Cryptology. --- Data and Information Security. --- Computer and Information Systems Applications. --- Computer Communication Networks. --- Security measures. --- Computer network security --- Network security, Computer --- Security of computer networks --- Computer security --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Cryptography --- Cryptanalysis --- Cryptology --- Secret writing --- Steganography --- Signs and symbols --- Symbolism --- Writing --- Ciphers --- Data encryption (Computer science) --- Distributed processing
Choose an application
Choose an application
Programming --- Computer architecture. Operating systems --- Computer. Automation --- veiligheid (technologie) --- cryptografie --- applicatiebeheer --- apps --- informatica --- netwerken (informatica) --- computerbeveiliging --- computernetwerken --- architectuur (informatica) --- mobiele communicatie --- netwerk management
Listing 1 - 10 of 19 | << page >> |
Sort by
|