bullet Advances in Networks, Security and Communications: Reviews, Vol. 2

   (Open Access Book)

        

  Title: Advances in Networks, Security and Communications: Reviews, Vol. 2, Book Series

  Editor: Sergey Y. Yurish

  Publisher: International Frequency Sensor Association (IFSA) Publishing

  Formats: paperback (print book) and printable pdf Acrobat (e-book) 352 pages

  Price: 110.00 EUR (shipping cost by a standard mail without a tracking code is included)

  Delivery time for print book: 7-17 days dependent on country of destination. Please contact us for priority (5-9 days), ground (3-8 days) and express (3-5 days) delivery options by e-mail

  Pubdate: 30 November 2019

  ISBN: 978-84-09-14510-2

  e-ISBN: 978-84-09-14509-6

 

  Creative Commons License

 

 

Open Access book in pdf format (free download, 10.2 Mb):

 

 Advances in Networks, Security and Communications: Reviews, Vol. 2

 


 

Buy print book:

 

 Book Description

 

 

The Industry 4.0 (the subset of the fourth industrial revolution) includes industrial internet of things (IIOT), which in turn, refers to interconnected sensors, instruments, and other devices networked together with computers' industrial applications. According to the global market forecasts, the IIoT market (including networking technologies) to grow from US $ 68.8 billion in 2019 to US $ 98.2 billion by 2024, at a Compound Annual Growth Rate (CAGR) of 7.4% during the forecast period. The improved reach and data rates of networking technologies is proving to be a key enabler in adoption of IIoT.

 

Several smart internet-connected devices are currently available in the market. However, a common protocol and communication standard is required for these devices to be able to communicate with each other, share data, or form an intelligent network. The IIoT market has exponential growth potential; however, maintaining data security and privacy is a key challenge.

 

The 'Advances in Networks, Security and Communications: Reviews' open access Book Series brings together the most important breakthroughs in each of these fields and presents them in a coherent fashion.

 

Written by 31 contributors from academy and industry from 12 countries (Austria, Bulgaria, China, Croatia, Germany, India, Iran, Singapore, South Korea, Taiwan, UK and USA) the book contains 14 chapters divided into three main parts: Networks (six chapters), Communications (seven chapters) and Security (one chapter). With this unique combination of information in each volume, the 'Advances in Networks, Security and Communications: Reviews' Book Series will be of value for scientists and engineers in industry and universities. Similar to the first volume, the second volume is published in two formats: electronic (pdf) and print (paperback).

 

Like the first volume of this book Series, the second volume also has been organized by topics of high interest. In order to offer a fast and easy reading of the state of the art of each topic, every chapter in this book is independent and self-contained. The fourteen chapters have the similar structure: first - an introduction to specific topic under study; second - particular field description including sensing applications. Each of chapters is ending by the complete list of carefully selected references of books, journals, conference proceedings and web sites.

 

 

 

Contents:

 

Contents
Contributors
Preface


Networks


1. Wireless Cellular Networks: Emerging Technologies for Interference Management Abbreviations

1.1. Introduction
1.1.1. Why Space-Time Diversity ?
1.1.2. An Introductory Example and Discussion
1.2. System Model and Definitions
1.2.1. Three-user Multi-hop Interference Channel with and Without Relay
1.3. Multiuser MIMO Relay-aided Broadcast Channel
1.4. Cooperative Space-time Relay Transmission
1.5. Chordal Distance Scheduling Algorithm and Degree of Freedom Analysis
1.6. Performance Comparison
1.7. Summary and Discussion
Acknowledgements
References



2. Efficient Spectrum Sensing for Cognitive Radio Based Sensor Networks via Joint Optimization in Smart Grid


2.1. Introduction
2.2. Problem Formulation
2.3. System Model
2.3.1. Channel Search
2.3.2. Signal and Interference Model
2.3.3. Energy Detector
2.4. Optimization Approach 1: Minimizing Mean Detection Time
2.4.1. Properties of Biconvex Functions
2.4.2. Biconvexity of the Formulated Problem
2.4.3. Feasible Algorithms for the Optimal Points
2.5. Optimization Approach 2: Aggregate Opportunistic Throughput
2.5.1. Average Aggregate Opportunistic Data Rate
2.5.2. Maximizing Average Aggregate Opportunistic Throughput
2.5.3. Biconvexity Under Constraints
2.5.4. Algorithm of Solving Biconvex Problem
2.6. Finding Optimal Points: Numerical Results
2.7. Feasible Applications for Smart Grid
2.8. Conclusions
Acknowledgements
References
 


3. Capacity of Multi-hop Wireless Networks with Full-duplex Radios


3.1. Introduction
3.2. Capacity in Full Multi-hop Simultaneous Transmission Mode
3.3. Dual Node Cell
3.3.1. Dual Node Cell Structure and Traffic Patterns
3.3.2. Capacity Gains in Dual Node Cell
3.4. Capacity in Multi-hop Networks
3.4.1. Multi-hop Transmission Modes
3.4.2. Capacity Analysis
3.5. Simulation Results
3.6. Conclusions
3.7. Open Dcell Research Issues
Acknowledgements
References
 


4. 5G Radio Access Network Slicing


4.1. Introduction
4.2. 5G Architecture and Concepts
4.2.1. Core Network
4.2.2. Radio Access Network
4.2.3. Network Slicing
4.2.3.1. Key Enabling Technologies
4.3. 5G RAN Slicing Problematics
4.3.1. Desired RAN Slice Characteristics
4.3.2. Mathematical Modeling
4.4. Conclusion
Acknowledgement
References
 


5. Mathematical Aspects of Neural Networks: Stability of Equilibrium Points


5.1. Introduction
5.2. Hopfield Neural Networks
5.3. Impulsive Neural Networks
5.4. Global Exponential Stability of Equilibrium Points of Additive Hopfield-Type Impulsive Neural Networks
5.4.1. Continuous-Time Case
5.4.2. Discrete-Time Case
5.5. Conclusion
References
 


6. Dynamically Updatable Mechanisms  for OpenFlow-compliant Low-power Packet Processing


6.1. Introduction
6.2. Dynamically Updatable Segmented Aging Bloom Filter
6.2.1. OpenFlow Switch with BF
6.2.2. Standard BF
6.2.3. Design of SA-BF
6.2.3.1. Structure and Operation of Segmented Aging BF
6.2.3.2. Update Operation of the SA-BF
6.2.3.3. Query and Insertion Operation of the SA-BF
6.2.4. Analysis of the SA-BF and Performance Indices
6.2.5. Simulation Results
6.3. Multiple-rule Updatable SRAM-based TCAM Design
6.3.1. Introduce to SRAM-based TCAM and Updating Requirement of OpenFlow
6.3.1.1. Typical SRAM-Based TCAM Architecture
6.3.1.2. Updating Requirements in OpenFlow
6.3.2. Design of BU-TCAM
6.3.2.1. Overall Architecture Design
6.3.2.2. Binary Tree-based Prefix Encoder
6.3.2.3. Bundle Updating in BPE
6.3.3. Performance Evaluation
6.3.3.1. Synthesis Results: Single-rule Update
6.3.3.2. Bundle Update Analysis with Network Rules
6.4. Conclusions and Future Work
Acknowledgements
References

 


Communications

 


7. Perfect Sequences and Perfect Arrays  for Wireless Communications


7.1. Introduction
7.2. Definitions of Perfect Sequences/Arrays
7.2.1. Perfect Sequences
7.2.2. Perfect Arrays
7.3. Perfect Binary Arrays
7.4. Perfect Ternary Sequences and Perfect Ternary Arrays
7.4.1. Perfect Ternary Sequences
7.4.1.1. Ipatov PTSs
7.4.1.2. PTSs Based on Eq. (7.3)
7.4.2. Perfect Ternary Arrays
7.5. Perfect Quaternary Arrays
7.6. Perfect Polyphase Sequences and Perfect Polyphase Arrays
7.6.1. Perfect Polyphase Sequences
7.6.2. Perfect Polyphase Arrays
7.7. Perfect 8-QAM+ Sequences and Perfect 8-QAM+ Arrays
7.7.1. Perfect 8-QAM+ Sequences
7.7.2. Perfect 8-QAM+ Arrays
7.8. Perfect 16-QAM Sequences and Perfect 16-QAM Arrays
7.8.1. Perfect 16-QAM Sequences
7.8.2. Perfect 16-QAM Arrays
7.9. Perfect Gaussian Integer Sequences
7.9.1. Constructions Based on Degrees
7.9.2. Constructions Based on Pre-given GIs
References
 


8. Data-aided and Carrier-blind Algorithm  for Joint Estimation of Symbol Timing  and Symbol Rate in Digital Satellite Receivers


8.1. Introduction
8.2. Signal Model
8.3. Modified Cramer-Rao Lower Bound
8.3.1. Derivation of the Log-likelihood Function
8.3.2. Computation of the MCRLB
8.4. Low-complex Estimator
8.5. Numerical Results
8.6. Conclusions
Acknowledgements
References
Appendix



9. Localization in GPS Denied Environment


9.1. Introduction
9.2. Estimation of Virtual Reference Device
9.3. Simulation and Experimental Results for VRD Based Localization
9.4. Theory and Formulation for VRD TOA Localization Algorithm
9.4.1. Environment, Channel Response and Multipath Model
9.4.2. Two-step Weighted Least Squares Localization
9.4.3. Proposed Grid-based Data Association
9.5. Simulation Result for VRD Based TOA Localization
9.6. Conclusion
References
 


10. General Strategy for Multi-wideband Agility in Wideband-to-narrowband Frequency Reconfigurable Antennas (FRAs)


10.1. Introduction
10.2. Base Antenna
10.2.1. Design
10.2.2. Parametric Study
10.3. Independent Three UWB Operations
10.3.1. First UWB Operation (U-state #1)
10.3.2. Second UWB Operation (U-state #2)
10.3.3. Third UWB Operation (U-state #3)
10.4. P-i-n Diode
10.4.1. Parasitic Parameters Effect
10.4.2. Wideband Parasitic Parameters Compensation
10.4.2.1. U-state #1
10.4.2.2. U-state #2
10.4.2.3. U-state #3
10.5. Dualband Operations with Independent Control of Each Band
10.5.1. First Band Control
10.5.2. Second band Control
10.5.3. Dualband Parasitic Parameters Compensation
10.6. FR-ASSA Fabrication
10.7. Measurement Results
10.7.1. Reflection Coefficient
10.7.2. Gain
10.7.3. Radiation Patterns
10.8. Conclusion
References
 


11. On the Merits of a Distributed FiWi Control Framework


11.1. Introduction
11.2. Brief Overview of TDM-PON
11.3. Brief Overview of FiWi
11.4. Proposed Distributed DBA Scheme
11.4.1. Reporting
11.4.2. Upstream Bandwidth Calculation
11.4.3. Downstream Bandwidth Calculation
11.5. Upstream Simulation and Results
11.5.1. Network Model
11.5.2. Results
11.6. Downstream Simulation and Results
11.6.1. Network Model
11.6.2. Results
11.7. Conclusion
References
 


12. Direction-of-arrival Estimation for Unknown Source Based on Time Reversal and Coprime Array


12.1. Introduction
12.1.1.DOF Design and Method of Increasing Effective Aperture of Array for DOA Estimation
12.1.2. High Resolution and Accuracy Algorithms for DOA Estimation
12.2. System and Algorithm
12.2.1. DOA Estimation Algorithm
12.2.1.1. Conventional Capon DOA Estimation Algorithm
12.2.1.2. TR-Capon-DOA Estimation Algorithm
10.2.2. Coprime Array
12.2.3. DOA Estimation Performance Based on RMSE and CRLB
12.3. Numerical Experiments and Analysis
12.3.1. Multipath DOA Estimation with ULA
12.3.2. Multipath DOA Estimation with CA and OCA
12.3.3. Performance Analysis based on RMSE and CRLB
12.4. Conclusion
References
 


13. High Gain Circularly Polarized Multi-Layer Rectangular DRA


13.1. Dielectric Resonator Antennas
13.2. High Gain Dielectric Resonator Antenna
13.3. Circularly Polarized DRAs
13.4. Multi-layer Dielectric Resonate Antenna
13.5. Excitable Rectangular DRA Modes
13.6. Single Higher Order Mode Operation
13.7. Multi Higher Order Mode Operation
13.8. Layered Higher Order Mode Circularly Polarized Rectangular DRA
13.8.1. 3D Printing of Dielectric Components
13.8.2. Experimental Results
13.9. Conclusions
References
 

 

Security

 


14. Ethics and Communication within a Cyber Security Strategy


14.1. Introduction
14.2. Cyber Security Strategy and Ethics
14.2.1. Cyber Security Strategy
14.2.2. Ethics
14.3. Communication
14.3.1. Communication Issues
14.3.2. Communication Culture
14.4. Best Practices and Tools
14.4.1. Training
14.4.2. Internal Communication as a Permanent Task
14.4.3. CSPs and Their Role
14.5. Cloud Computing and Communication Platforms
14.5.1. Cloud Computing
14.5.2. Communication Platforms
14.6. Example
14.7. Conclusions
Acknowledgments
References

 

Index

 

 

Buy this print book:

 

 

See other books published by IFSA Publishing

Sensors Web Portal's logo

 

 

 

 

 

 

 

   


1999 - 2021 Copyright , International Frequency Sensor Association (IFSA). All Rights Reserved.


 

Home - Bookstore - Sensors & Transducers journal - IFSA Privacy Policy