Información del autor
Autor Niyato, Dusit |
Documentos disponibles escritos por este autor (3)
Crear una solicitud de compra Refinar búsqueda
TÃtulo : Edge AI : Convergence of Edge Computing and Artificial Intelligence Tipo de documento: documento electrónico Autores: Wang, Xiaofei, ; Han, Yiwen, ; Leung, Victor C. M., ; Niyato, Dusit, ; Yan, Xueqiang, ; Chen, Xu, Mención de edición: 1 ed. Editorial: Singapore [Malasia] : Springer Fecha de publicación: 2020 Número de páginas: XVII, 149 p. 38 ilustraciones, 34 ilustraciones en color. ISBN/ISSN/DL: 978-981-1561863-- Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Inteligencia artificial Red de computadoras IngenierÃa Informática Redes de comunicación informática IngenierÃa Informática y Redes Clasificación: 006.3 Resumen: Como importante facilitador para cambiar la vida de las personas, los avances en aplicaciones y servicios basados ​​en inteligencia artificial (IA) están en aumento, a pesar de verse obstaculizados por problemas de eficiencia y latencia. Al centrarse en el aprendizaje profundo como la técnica más representativa de la IA, este libro proporciona una descripción general completa de cómo se aplican los servicios de IA al borde de la red cerca de las fuentes de datos y demuestra cómo la IA y la computación de borde pueden ser mutuamente beneficiosas. Para ello, presenta y analiza: 1) inteligencia de borde y borde inteligente; y 2) sus métodos de implementación y tecnologÃas habilitadoras, a saber, capacitación e inferencia de IA en el marco de computación de borde personalizado. Al recopilar información esencial que anteriormente se encontraba dispersa en las áreas de comunicación, redes e inteligencia artificial, el libro puede ayudar a los lectores a comprender las conexiones entre tecnologÃas habilitadoras clave, por ejemplo, a) aplicaciones de inteligencia artificial en el borde; b) inferencia de IA en el borde; c) entrenamiento de IA para el borde; d) informática de vanguardia para la IA; y e) usar IA para optimizar la ventaja. Después de identificar estos cinco aspectos, que son esenciales para la fusión de la informática de punta y la IA, analiza los desafÃos actuales y describe las tendencias futuras para lograr una inteligencia más generalizada y detallada con la ayuda de la informática de punta. Nota de contenido: Part I. Introduction and Fundamentals -- Chapter 1. Introduction -- Chapter 2. Fundamentals of Edge Computing -- Chapter 3. Fundamentals of Artificial Intelligence -- Part II. Artificial Intelligence and Edge Computing -- Chapter 4. Artificial Intelligence Applications on Edge -- Chapter 5. Artificial Intelligence Inference in Edge -- Chapter 6. Artificial Intelligence Training at Edge -- Chapter 7. Edge Computing for Artificial Intelligence -- Chapter 8. Artificial Intelligence for Optimizing Edge -- Part III. Challenges and Conclusions -- Chapter 9. Lessons Learned and Open Challenges -- Chapter 10. Conclusions. Tipo de medio : Computadora Summary : As an important enabler for changing people's lives, advances in artiï¬cial intelligence (AI)-based applications and services are on the rise, despite being hindered by efï¬ciency and latency issues. By focusing on deep learning as the most representative technique of AI, this book provides a comprehensive overview of how AI services are being applied to the network edge near the data sources, and demonstrates how AI and edge computing can be mutually beneficial. To do so, it introduces and discusses: 1) edge intelligence and intelligent edge; and 2) their implementation methods and enabling technologies, namely AI training and inference in the customized edge computing framework. Gathering essential information previously scattered across the communication, networking, and AI areas, the book can help readers to understand the connections between key enabling technologies, e.g. a) AI applications in edge; b) AI inference in edge; c) AI training for edge; d) edge computing for AI; and e) using AI to optimize edge. After identifying these five aspects, which are essential for the fusion of edge computing and AI, it discusses current challenges and outlines future trends in achieving more pervasive and fine-grained intelligence with the aid of edge computing. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Edge AI : Convergence of Edge Computing and Artificial Intelligence [documento electrónico] / Wang, Xiaofei, ; Han, Yiwen, ; Leung, Victor C. M., ; Niyato, Dusit, ; Yan, Xueqiang, ; Chen, Xu, . - 1 ed. . - Singapore [Malasia] : Springer, 2020 . - XVII, 149 p. 38 ilustraciones, 34 ilustraciones en color.
ISBN : 978-981-1561863--
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Inteligencia artificial Red de computadoras IngenierÃa Informática Redes de comunicación informática IngenierÃa Informática y Redes Clasificación: 006.3 Resumen: Como importante facilitador para cambiar la vida de las personas, los avances en aplicaciones y servicios basados ​​en inteligencia artificial (IA) están en aumento, a pesar de verse obstaculizados por problemas de eficiencia y latencia. Al centrarse en el aprendizaje profundo como la técnica más representativa de la IA, este libro proporciona una descripción general completa de cómo se aplican los servicios de IA al borde de la red cerca de las fuentes de datos y demuestra cómo la IA y la computación de borde pueden ser mutuamente beneficiosas. Para ello, presenta y analiza: 1) inteligencia de borde y borde inteligente; y 2) sus métodos de implementación y tecnologÃas habilitadoras, a saber, capacitación e inferencia de IA en el marco de computación de borde personalizado. Al recopilar información esencial que anteriormente se encontraba dispersa en las áreas de comunicación, redes e inteligencia artificial, el libro puede ayudar a los lectores a comprender las conexiones entre tecnologÃas habilitadoras clave, por ejemplo, a) aplicaciones de inteligencia artificial en el borde; b) inferencia de IA en el borde; c) entrenamiento de IA para el borde; d) informática de vanguardia para la IA; y e) usar IA para optimizar la ventaja. Después de identificar estos cinco aspectos, que son esenciales para la fusión de la informática de punta y la IA, analiza los desafÃos actuales y describe las tendencias futuras para lograr una inteligencia más generalizada y detallada con la ayuda de la informática de punta. Nota de contenido: Part I. Introduction and Fundamentals -- Chapter 1. Introduction -- Chapter 2. Fundamentals of Edge Computing -- Chapter 3. Fundamentals of Artificial Intelligence -- Part II. Artificial Intelligence and Edge Computing -- Chapter 4. Artificial Intelligence Applications on Edge -- Chapter 5. Artificial Intelligence Inference in Edge -- Chapter 6. Artificial Intelligence Training at Edge -- Chapter 7. Edge Computing for Artificial Intelligence -- Chapter 8. Artificial Intelligence for Optimizing Edge -- Part III. Challenges and Conclusions -- Chapter 9. Lessons Learned and Open Challenges -- Chapter 10. Conclusions. Tipo de medio : Computadora Summary : As an important enabler for changing people's lives, advances in artiï¬cial intelligence (AI)-based applications and services are on the rise, despite being hindered by efï¬ciency and latency issues. By focusing on deep learning as the most representative technique of AI, this book provides a comprehensive overview of how AI services are being applied to the network edge near the data sources, and demonstrates how AI and edge computing can be mutually beneficial. To do so, it introduces and discusses: 1) edge intelligence and intelligent edge; and 2) their implementation methods and enabling technologies, namely AI training and inference in the customized edge computing framework. Gathering essential information previously scattered across the communication, networking, and AI areas, the book can help readers to understand the connections between key enabling technologies, e.g. a) AI applications in edge; b) AI inference in edge; c) AI training for edge; d) edge computing for AI; and e) using AI to optimize edge. After identifying these five aspects, which are essential for the fusion of edge computing and AI, it discusses current challenges and outlines future trends in achieving more pervasive and fine-grained intelligence with the aid of edge computing. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Intelligent Information and Database Systems / Nguyen, Ngoc Thanh ; Chittayasothorn, Suphamit ; Niyato, Dusit ; TrawiÅ„ski, Bogdan
TÃtulo : Intelligent Information and Database Systems : 13th Asian Conference, ACIIDS 2021, Phuket, Thailand, April 7–10, 2021, Proceedings / Tipo de documento: documento electrónico Autores: Nguyen, Ngoc Thanh, ; Chittayasothorn, Suphamit, ; Niyato, Dusit, ; TrawiÅ„ski, Bogdan, Mención de edición: 1 ed. Editorial: [s.l.] : Springer Fecha de publicación: 2021 Número de páginas: XXXI, 867 p. 334 ilustraciones, 248 ilustraciones en color. ISBN/ISSN/DL: 978-3-030-73280-6 Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Inteligencia artificial Aplicaciones informáticas y de sistemas de información MinerÃa de datos y descubrimiento de conocimientos Visión por computador Procesamiento de datos Application software Clasificación: 006.3 Resumen: Este libro constituye las actas arbitradas de la 13.ª Conferencia Asiática sobre Sistemas Inteligentes de Información y Bases de Datos, ACIIDS 2021, celebrada en Phuket, Tailandia, en abril de 2021.* Los 67 artÃculos completos aceptados para su publicación en estas actas fueron cuidadosamente revisados ​​y seleccionados entre 291 presentaciones. . Los artÃculos del primer volumen están organizados en las siguientes secciones temáticas: métodos y aplicaciones de minerÃa de datos; métodos de aprendizaje automático; sistemas de apoyo y control de decisiones; procesamiento natural del lenguaje; métodos inteligentes de ciberseguridad; técnicas de visión por computadora; imágenes y visión computacionales; técnicas y aplicaciones avanzadas de minerÃa de datos; sistemas inteligentes y contextuales; conocimiento, razonamiento y programación de sentido común en inteligencia artificial; modelado y procesamiento de datos para la industria 4.0; innovaciones en sistemas inteligentes. *La conferencia se realizó de manera virtual. Nota de contenido: Data Mining Methods and Applications -- Mining Partially-Ordered Episode Rules in an Event Sequence -- Investigating Crossover Operators in Genetic Algorithms for High-Utility Itemset Mining -- Complexes of low dimensional linear classifiers with L1 margins -- Automatic Identification of Bird Species from Audio -- Session based recommendations using Recurrent neural networks – Long short-term memory -- UVDS: A New Dataset for Tra c Forecasting with Spatial-Temporal Correlation -- A Parallelized Frequent Temporal Pattern Mining Algorithm on a Time Series Database -- An efficient approach for mining high-utility itemsets from multiple abstraction levels -- Mining Class Association Rules on dataset with missing data -- Machine Learning Methods -- Clustering Count Data with Stochastic Expectation Propagation -- Entropy-Based Variational Learning of Finite Generalized Inverted Dirichlet Mixture Model -- Mixture-Based Unsupervised Learning for Positive Correlated Count Data -- Phase Prediction of Multi-principal Element Alloys Using Support Vector Machine and Bayesian optimization -- VEGAS: A variable length-based Genetic Algorithm for ensemble selection in deep ensemble learning -- Demand Forecasting for Textile Products using Statistical Analysis and Machine Learning Algorithms -- Parallelization of Reinforcement Learning Algorithms for Video Games -- Decision Support and Control Systems -- A Gap-based Memetic Differential Evolution (GaMeDE) applied to multi-modal optimisation – using multi-objective optimization concepts -- Simulating Emergency Departments Using Generalized Petri Nets -- What do you know about your network: an empirical study of value network awareness in e-commerce -- A robust approach to employee competences in project management -- Key Aspects of Customer Intelligence in the Era of Massive Data -- How Spatial Data Analysis Can Make Smart Lighting Smarter -- Natural Language Processing -- Convolutional Neural Networks for Web Documents Classification -- Sequential model-based optimization for Natural Language Processing Data Pipeline Selection and Optimization -- Automatic Cyberbullying Detection on Twitter Using Bullying Expression Dictionary -- Development of Morphological Segmentation for the Kyrgyz Language on Complete Set of Endings -- Tweets Topic Classification using Transformer-based Language Models -- A New Approach for Measuring the Influence of Users on Twitter -- Building a Domain Specific Knowledge Graph for Business Networking Analysis -- Cybersecurity Intelligent Methods -- N-tier machine learning-based architecture for DDoS attack detection -- Detection of Distributed Denial of Service Attacks using Automatic Feature Selection with Enhancement for Imbalance Dataset -- AntiPhiMBS: A New Anti-Phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Application Level -- Missing/Incomplete Data Handling in Cybersecurity Applications -- An Experimental Study of Machine Learning for Phishing Detection -- Computer Vision Techniques -- Model for Application of Optical Passive SFM Method in Reconstruction of 3D Space and Objects -- Ground plane estimation for obstacle avoidance during fixed-wing UAV landing -- UAV on-board emergency safe landing spot detection system combining classical and deep learning-based segmentation methods -- Wasserstein Generative Adversarial Networks for Realistic Traffic Sign Image Generation -- An Approach to Automatic Detection of Architectural Fa cades in Spherical Images -- Computational Imaging and Vision -- Real-time Multi-view Face Masks Detector on Edge Device For Supporting Service Robots in the COVID-19 Pandemic -- Eye State Recognizer Using Light-weight Architecture for Drowsiness Warning -- NovemE - Color Space Net for Image Classification -- Application of Improved YOLOv3 Algorithm in Mask Recognition -- Simulation and Experiment in Solving Inverse Kinematic for Human Upper Limb by Using Optimization Algorithm -- Word Segmentation for Gujarati Handwritten Documents -- Advanced Data Mining Techniques and Applications -- A SPEA-based Group Trading Strategy Portfolio Optimization Algorithm -- Develop a Hybrid Human Face Recognition System Based on a Dual Deep Neural Network by Interactive Correction Training -- Forecasting Stock Trend Based on the Constructed Anomaly-Patterns based Decision Tree -- A Transparently-Secure and Robust Internetworking Data Retrieval Framework for Financial-Technology Applications -- Comparison of Machine Learning Methods for Life Trajectory Analysis in Demography -- An Efficient Method for Multi-Request Route Search -- Machine Learning Model for the Classification of Musical Composition Genres -- Intelligent and Contextual Systems -- Emotional Piano Melodies Generation using Long Short-Term Memory -- SE-U-Net: Contextual Segmentation by Loosely Coupled Deep Networks for Medical Imaging Industry -- Contextual Soft Dropout Method in Training of Artificial Neural Networks -- Bone Age Assessment by meansof Intelligent Approaches -- Random Number Generators in Training of Contextual Neural Networks -- The Impact of Aggregation Window Width on Properties of Contextual Neural Networks with Constant Field of Attention -- Towards Layer-wise Optimization of Contextual Neural Networks with Constant Field of Aggregation -- Commonsense Knowledge, Reasoning and Programming in Artificial Intelligence -- Community Detection in Complex Networks: A Survey on Local Approaches -- A Q-Learning based Hyper-Heuristic for Generating Efficient UAV Swarming Behaviours -- Cross-Domain Co-Author Recommendation Based on Knowledge Graph Clustering -- Data Modelling and Processing for Industry 4.0 -- Trident: Change Point Detection for Multivariate Time Series via Dual-level Attention Learning -- Facial Representation Extraction by Mutual Information Maximization and Correlation Minimization -- Localization system for wheeled vehicles operating in underground mine based on inertial data and spatial intersection points of mining excavations -- Innovations in Intelligent Systems -- Evaluating mutation operator and test case effectiveness by means of mutation testing -- Usability Study of Mobile Applications with Cognitive Load Resulting from Environmental Factors. Tipo de medio : Computadora Summary : This book constitutes the refereed proceedings of the 13th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2021, held in Phuket, Thailand, in April 2021.* The 67 full papers accepted for publication in these proceedings were carefully reviewed and selected from 291 submissions. The papers of the first volume are organized in the following topical sections: data mining methods and applications; machine learning methods; decision support and control systems; natural language processing; cybersecurity intelligent methods; computer vision techniques; computational imaging and vision; advanced data mining techniques and applications; intelligent and contextual systems; commonsense knowledge, reasoning and programming in artificial intelligence; data modelling and processing for industry 4.0; innovations in intelligent systems. *The conference was held virtually. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Intelligent Information and Database Systems : 13th Asian Conference, ACIIDS 2021, Phuket, Thailand, April 7–10, 2021, Proceedings / [documento electrónico] / Nguyen, Ngoc Thanh, ; Chittayasothorn, Suphamit, ; Niyato, Dusit, ; TrawiÅ„ski, Bogdan, . - 1 ed. . - [s.l.] : Springer, 2021 . - XXXI, 867 p. 334 ilustraciones, 248 ilustraciones en color.
ISBN : 978-3-030-73280-6
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Inteligencia artificial Aplicaciones informáticas y de sistemas de información MinerÃa de datos y descubrimiento de conocimientos Visión por computador Procesamiento de datos Application software Clasificación: 006.3 Resumen: Este libro constituye las actas arbitradas de la 13.ª Conferencia Asiática sobre Sistemas Inteligentes de Información y Bases de Datos, ACIIDS 2021, celebrada en Phuket, Tailandia, en abril de 2021.* Los 67 artÃculos completos aceptados para su publicación en estas actas fueron cuidadosamente revisados ​​y seleccionados entre 291 presentaciones. . Los artÃculos del primer volumen están organizados en las siguientes secciones temáticas: métodos y aplicaciones de minerÃa de datos; métodos de aprendizaje automático; sistemas de apoyo y control de decisiones; procesamiento natural del lenguaje; métodos inteligentes de ciberseguridad; técnicas de visión por computadora; imágenes y visión computacionales; técnicas y aplicaciones avanzadas de minerÃa de datos; sistemas inteligentes y contextuales; conocimiento, razonamiento y programación de sentido común en inteligencia artificial; modelado y procesamiento de datos para la industria 4.0; innovaciones en sistemas inteligentes. *La conferencia se realizó de manera virtual. Nota de contenido: Data Mining Methods and Applications -- Mining Partially-Ordered Episode Rules in an Event Sequence -- Investigating Crossover Operators in Genetic Algorithms for High-Utility Itemset Mining -- Complexes of low dimensional linear classifiers with L1 margins -- Automatic Identification of Bird Species from Audio -- Session based recommendations using Recurrent neural networks – Long short-term memory -- UVDS: A New Dataset for Tra c Forecasting with Spatial-Temporal Correlation -- A Parallelized Frequent Temporal Pattern Mining Algorithm on a Time Series Database -- An efficient approach for mining high-utility itemsets from multiple abstraction levels -- Mining Class Association Rules on dataset with missing data -- Machine Learning Methods -- Clustering Count Data with Stochastic Expectation Propagation -- Entropy-Based Variational Learning of Finite Generalized Inverted Dirichlet Mixture Model -- Mixture-Based Unsupervised Learning for Positive Correlated Count Data -- Phase Prediction of Multi-principal Element Alloys Using Support Vector Machine and Bayesian optimization -- VEGAS: A variable length-based Genetic Algorithm for ensemble selection in deep ensemble learning -- Demand Forecasting for Textile Products using Statistical Analysis and Machine Learning Algorithms -- Parallelization of Reinforcement Learning Algorithms for Video Games -- Decision Support and Control Systems -- A Gap-based Memetic Differential Evolution (GaMeDE) applied to multi-modal optimisation – using multi-objective optimization concepts -- Simulating Emergency Departments Using Generalized Petri Nets -- What do you know about your network: an empirical study of value network awareness in e-commerce -- A robust approach to employee competences in project management -- Key Aspects of Customer Intelligence in the Era of Massive Data -- How Spatial Data Analysis Can Make Smart Lighting Smarter -- Natural Language Processing -- Convolutional Neural Networks for Web Documents Classification -- Sequential model-based optimization for Natural Language Processing Data Pipeline Selection and Optimization -- Automatic Cyberbullying Detection on Twitter Using Bullying Expression Dictionary -- Development of Morphological Segmentation for the Kyrgyz Language on Complete Set of Endings -- Tweets Topic Classification using Transformer-based Language Models -- A New Approach for Measuring the Influence of Users on Twitter -- Building a Domain Specific Knowledge Graph for Business Networking Analysis -- Cybersecurity Intelligent Methods -- N-tier machine learning-based architecture for DDoS attack detection -- Detection of Distributed Denial of Service Attacks using Automatic Feature Selection with Enhancement for Imbalance Dataset -- AntiPhiMBS: A New Anti-Phishing Model to Mitigate Phishing Attacks in Mobile Banking System at Application Level -- Missing/Incomplete Data Handling in Cybersecurity Applications -- An Experimental Study of Machine Learning for Phishing Detection -- Computer Vision Techniques -- Model for Application of Optical Passive SFM Method in Reconstruction of 3D Space and Objects -- Ground plane estimation for obstacle avoidance during fixed-wing UAV landing -- UAV on-board emergency safe landing spot detection system combining classical and deep learning-based segmentation methods -- Wasserstein Generative Adversarial Networks for Realistic Traffic Sign Image Generation -- An Approach to Automatic Detection of Architectural Fa cades in Spherical Images -- Computational Imaging and Vision -- Real-time Multi-view Face Masks Detector on Edge Device For Supporting Service Robots in the COVID-19 Pandemic -- Eye State Recognizer Using Light-weight Architecture for Drowsiness Warning -- NovemE - Color Space Net for Image Classification -- Application of Improved YOLOv3 Algorithm in Mask Recognition -- Simulation and Experiment in Solving Inverse Kinematic for Human Upper Limb by Using Optimization Algorithm -- Word Segmentation for Gujarati Handwritten Documents -- Advanced Data Mining Techniques and Applications -- A SPEA-based Group Trading Strategy Portfolio Optimization Algorithm -- Develop a Hybrid Human Face Recognition System Based on a Dual Deep Neural Network by Interactive Correction Training -- Forecasting Stock Trend Based on the Constructed Anomaly-Patterns based Decision Tree -- A Transparently-Secure and Robust Internetworking Data Retrieval Framework for Financial-Technology Applications -- Comparison of Machine Learning Methods for Life Trajectory Analysis in Demography -- An Efficient Method for Multi-Request Route Search -- Machine Learning Model for the Classification of Musical Composition Genres -- Intelligent and Contextual Systems -- Emotional Piano Melodies Generation using Long Short-Term Memory -- SE-U-Net: Contextual Segmentation by Loosely Coupled Deep Networks for Medical Imaging Industry -- Contextual Soft Dropout Method in Training of Artificial Neural Networks -- Bone Age Assessment by meansof Intelligent Approaches -- Random Number Generators in Training of Contextual Neural Networks -- The Impact of Aggregation Window Width on Properties of Contextual Neural Networks with Constant Field of Attention -- Towards Layer-wise Optimization of Contextual Neural Networks with Constant Field of Aggregation -- Commonsense Knowledge, Reasoning and Programming in Artificial Intelligence -- Community Detection in Complex Networks: A Survey on Local Approaches -- A Q-Learning based Hyper-Heuristic for Generating Efficient UAV Swarming Behaviours -- Cross-Domain Co-Author Recommendation Based on Knowledge Graph Clustering -- Data Modelling and Processing for Industry 4.0 -- Trident: Change Point Detection for Multivariate Time Series via Dual-level Attention Learning -- Facial Representation Extraction by Mutual Information Maximization and Correlation Minimization -- Localization system for wheeled vehicles operating in underground mine based on inertial data and spatial intersection points of mining excavations -- Innovations in Intelligent Systems -- Evaluating mutation operator and test case effectiveness by means of mutation testing -- Usability Study of Mobile Applications with Cognitive Load Resulting from Environmental Factors. Tipo de medio : Computadora Summary : This book constitutes the refereed proceedings of the 13th Asian Conference on Intelligent Information and Database Systems, ACIIDS 2021, held in Phuket, Thailand, in April 2021.* The 67 full papers accepted for publication in these proceedings were carefully reviewed and selected from 291 submissions. The papers of the first volume are organized in the following topical sections: data mining methods and applications; machine learning methods; decision support and control systems; natural language processing; cybersecurity intelligent methods; computer vision techniques; computational imaging and vision; advanced data mining techniques and applications; intelligent and contextual systems; commonsense knowledge, reasoning and programming in artificial intelligence; data modelling and processing for industry 4.0; innovations in intelligent systems. *The conference was held virtually. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...]
TÃtulo : Resource Allocation in Backscatter-Assisted Communication Networks Tipo de documento: documento electrónico Autores: Gao, Xiaozheng, ; Yang, Kai, ; Niyato, Dusit, ; Gong, Shimin, Mención de edición: 1 ed. Editorial: Singapore [Malasia] : Springer Fecha de publicación: 2021 Número de páginas: XII, 100 p. 45 ilustraciones, 37 ilustraciones en color. ISBN/ISSN/DL: 978-981-1651274-- Nota general: Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos. Idioma : Inglés (eng) Palabras clave: Telecomunicación Sistemas de comunicación inalámbrica. Sistemas de comunicación móviles. IngenierÃa en Comunicaciones Redes Comunicación inalámbrica y móvil Clasificación: 621.382 Telecomunicaciones Resumen: Este libro investiga la asignación de recursos en redes de comunicación asistidas por retrodispersión. Con el desarrollo de las comunicaciones por retrodispersión, la integración de la tecnologÃa de comunicación por retrodispersión en las redes de comunicación tradicionales puede mejorar significativamente el rendimiento de la red. Para mejorar completamente el rendimiento de las redes de comunicación asistidas por retrodispersión, la asignación de recursos es de especial importancia. Vale la pena mencionar que la asignación de recursos en las redes de comunicación asistidas por retrodispersión es más desafiante que en las redes de comunicación tradicionales, y es necesario considerar cuidadosamente la compensación del rendimiento entre las comunicaciones de retrodispersión y las comunicaciones tradicionales. En este libro, considerando que la teorÃa de juegos es una herramienta atractiva para desarrollar y analizar redes distribuidas, flexibles y autónomas, desarrollamos esquemas de programación de tiempo basados ​​en subastas, esquemas de asignación de tiempo basados ​​en contratos y puntos de acceso y servicios evolutivos basados ​​en juegos. esquema de selección para las redes cognitivas alimentadas por radiofrecuencia asistidas por retrodispersión, donde se consideran algunas propiedades importantes como la racionalidad individual. También empleamos el enfoque de optimización y desarrollamos un esquema de selección de modo de retransmisión y de intercambio de recursos para redes de retransmisión hÃbridas asistidas por retrodispersión para mejorar el rendimiento. Creemos que los esquemas de asignación de recursos desarrollados en este libro pueden proporcionar una guÃa útil para el diseño de redes de comunicación asistidas por retrodispersión y el futuro Internet de las cosas. Los estudiantes de posgrado, investigadores e ingenieros en el campo de las redes de comunicación pueden beneficiarse del libro. Nota de contenido: 1. Introduction -- 2. Auction-Based Time Scheduling -- 3. Contract-Based Time Scheduling and Pricing -- 4. Evolutionary Game-Based Access Point and Service Selection -- 5. Cooperative Game-Based Relay Selection and Resource Sharing -- 6. Summary. Tipo de medio : Computadora Summary : This book investigates the resource allocation in backscatter-assisted communication networks. With the development of backscatter communications, integrating backscatter communication technology into traditional communication networks can improve the network performance significantly. To fully improve the performance of backscatter-assisted communication networks, resource allocation is of special importance. It is worth to mention that the resource allocation in backscatter-assisted communication networks is more challenging than that in traditional communication networks, and the tradeoff of the performance between backscatter communications and traditional communications needs to be carefully considered. In this book, considering that game theory is an attractive tool for developing and analyzing distributed, flexible, and autonomous networks, we develop the auction-based time scheduling schemes, contract-based time assignment scheme, and evolutionary game-based access point and service selection scheme for the backscatter-assisted radio-frequency-powered cognitive networks, where some important properties such as individual rationality are considered. We also employ the optimization approach and develop a relay mode selection and resource sharing scheme for backscatter-assisted hybrid relay networks to improve the throughput. We believe that the developed resource allocation schemes in this book can provide useful guidance for the design of backscatter-assisted communication networks and future Internet of Things. Graduate students, researchers, and engineers in the field of communication networks can benefit from the book. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...] Resource Allocation in Backscatter-Assisted Communication Networks [documento electrónico] / Gao, Xiaozheng, ; Yang, Kai, ; Niyato, Dusit, ; Gong, Shimin, . - 1 ed. . - Singapore [Malasia] : Springer, 2021 . - XII, 100 p. 45 ilustraciones, 37 ilustraciones en color.
ISBN : 978-981-1651274--
Libro disponible en la plataforma SpringerLink. Descarga y lectura en formatos PDF, HTML y ePub. Descarga completa o por capítulos.
Idioma : Inglés (eng)
Palabras clave: Telecomunicación Sistemas de comunicación inalámbrica. Sistemas de comunicación móviles. IngenierÃa en Comunicaciones Redes Comunicación inalámbrica y móvil Clasificación: 621.382 Telecomunicaciones Resumen: Este libro investiga la asignación de recursos en redes de comunicación asistidas por retrodispersión. Con el desarrollo de las comunicaciones por retrodispersión, la integración de la tecnologÃa de comunicación por retrodispersión en las redes de comunicación tradicionales puede mejorar significativamente el rendimiento de la red. Para mejorar completamente el rendimiento de las redes de comunicación asistidas por retrodispersión, la asignación de recursos es de especial importancia. Vale la pena mencionar que la asignación de recursos en las redes de comunicación asistidas por retrodispersión es más desafiante que en las redes de comunicación tradicionales, y es necesario considerar cuidadosamente la compensación del rendimiento entre las comunicaciones de retrodispersión y las comunicaciones tradicionales. En este libro, considerando que la teorÃa de juegos es una herramienta atractiva para desarrollar y analizar redes distribuidas, flexibles y autónomas, desarrollamos esquemas de programación de tiempo basados ​​en subastas, esquemas de asignación de tiempo basados ​​en contratos y puntos de acceso y servicios evolutivos basados ​​en juegos. esquema de selección para las redes cognitivas alimentadas por radiofrecuencia asistidas por retrodispersión, donde se consideran algunas propiedades importantes como la racionalidad individual. También empleamos el enfoque de optimización y desarrollamos un esquema de selección de modo de retransmisión y de intercambio de recursos para redes de retransmisión hÃbridas asistidas por retrodispersión para mejorar el rendimiento. Creemos que los esquemas de asignación de recursos desarrollados en este libro pueden proporcionar una guÃa útil para el diseño de redes de comunicación asistidas por retrodispersión y el futuro Internet de las cosas. Los estudiantes de posgrado, investigadores e ingenieros en el campo de las redes de comunicación pueden beneficiarse del libro. Nota de contenido: 1. Introduction -- 2. Auction-Based Time Scheduling -- 3. Contract-Based Time Scheduling and Pricing -- 4. Evolutionary Game-Based Access Point and Service Selection -- 5. Cooperative Game-Based Relay Selection and Resource Sharing -- 6. Summary. Tipo de medio : Computadora Summary : This book investigates the resource allocation in backscatter-assisted communication networks. With the development of backscatter communications, integrating backscatter communication technology into traditional communication networks can improve the network performance significantly. To fully improve the performance of backscatter-assisted communication networks, resource allocation is of special importance. It is worth to mention that the resource allocation in backscatter-assisted communication networks is more challenging than that in traditional communication networks, and the tradeoff of the performance between backscatter communications and traditional communications needs to be carefully considered. In this book, considering that game theory is an attractive tool for developing and analyzing distributed, flexible, and autonomous networks, we develop the auction-based time scheduling schemes, contract-based time assignment scheme, and evolutionary game-based access point and service selection scheme for the backscatter-assisted radio-frequency-powered cognitive networks, where some important properties such as individual rationality are considered. We also employ the optimization approach and develop a relay mode selection and resource sharing scheme for backscatter-assisted hybrid relay networks to improve the throughput. We believe that the developed resource allocation schemes in this book can provide useful guidance for the design of backscatter-assisted communication networks and future Internet of Things. Graduate students, researchers, and engineers in the field of communication networks can benefit from the book. Enlace de acceso : https://link-springer-com.biblioproxy.umanizales.edu.co/referencework/10.1007/97 [...]