0
Your cart

Your cart is empty

Browse All departments
  • All departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (7)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 12 of 12 matches in All departments

Smart Grid Communication Infrastructures - Big Data, Cloud Computing, and Security (Hardcover): Feng Ye, Yi Qian, Rose Qingyang... Smart Grid Communication Infrastructures - Big Data, Cloud Computing, and Security (Hardcover)
Feng Ye, Yi Qian, Rose Qingyang Hu
R2,318 R2,199 Discovery Miles 21 990 Save R119 (5%) Ships in 10 - 15 working days

A comprehensive resource that covers all the key areas of smart grid communication infrastructures Smart grid is a transformational upgrade to the traditional power grid that adds communication capabilities, intelligence and modern control. Smart Grid Communication Infrastructures is a comprehensive guide that addresses communication infrastructures, related applications and other issues related to the smart grid. The text shows how smart grid departs from the traditional power grid technology. Fundamentally, smart grid has advanced communication infrastructures to achieve two-way information exchange between service providers and customers. Grid operations in smart grid have proven to be more efficient and more secure because of the communication infrastructures and modern control. Smart Grid Communication Infrastructures examines and summarizes the recent advances in smart grid communications, big data analytics and network security. The authors - noted experts in the field - review the technologies, applications and issues in smart grid communication infrastructure. This important resource: Offers a comprehensive review of all areas of smart grid communication infrastructures Includes an ICT framework for smart grid Contains a review of self-sustaining wireless neighborhood that are network designed Presents design and analysis of a wireless monitoring network for transmission lines in smart grid Written for graduate students, professors, researchers, scientists, practitioners and engineers, Smart Grid Communication Infrastructures is the comprehensive resource that explores all aspects of the topic.

Data Privacy Games (Hardcover, 1st ed. 2018): Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren Data Privacy Games (Hardcover, 1st ed. 2018)
Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
R2,749 R2,267 Discovery Miles 22 670 Save R482 (18%) Ships in 10 - 15 working days

With the growing popularity of "big data", the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue. In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium. The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems. The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collector's strategies, the authors propose a contract model and a multi-armed bandit model respectively. The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study users' strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria.

Data Privacy Games (Paperback, Softcover reprint of the original 1st ed. 2018): Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren Data Privacy Games (Paperback, Softcover reprint of the original 1st ed. 2018)
Lei Xu, Chunxiao Jiang, Yi Qian, Yong Ren
R1,931 Discovery Miles 19 310 Ships in 7 - 11 working days

With the growing popularity of "big data", the potential value of personal data has attracted more and more attention. Applications built on personal data can create tremendous social and economic benefits. Meanwhile, they bring serious threats to individual privacy. The extensive collection, analysis and transaction of personal data make it difficult for an individual to keep the privacy safe. People now show more concerns about privacy than ever before. How to make a balance between the exploitation of personal information and the protection of individual privacy has become an urgent issue. In this book, the authors use methodologies from economics, especially game theory, to investigate solutions to the balance issue. They investigate the strategies of stakeholders involved in the use of personal data, and try to find the equilibrium. The book proposes a user-role based methodology to investigate the privacy issues in data mining, identifying four different types of users, i.e. four user roles, involved in data mining applications. For each user role, the authors discuss its privacy concerns and the strategies that it can adopt to solve the privacy problems. The book also proposes a simple game model to analyze the interactions among data provider, data collector and data miner. By solving the equilibria of the proposed game, readers can get useful guidance on how to deal with the trade-off between privacy and data utility. Moreover, to elaborate the analysis on data collector's strategies, the authors propose a contract model and a multi-armed bandit model respectively. The authors discuss how the owners of data (e.g. an individual or a data miner) deal with the trade-off between privacy and utility in data mining. Specifically, they study users' strategies in collaborative filtering based recommendation system and distributed classification system. They built game models to formulate the interactions among data owners, and propose learning algorithms to find the equilibria.

Terrestrial-Satellite Communication Networks - Transceivers Design and Resource Allocation (Hardcover, 1st ed. 2018): Linling... Terrestrial-Satellite Communication Networks - Transceivers Design and Resource Allocation (Hardcover, 1st ed. 2018)
Linling Kuang, Chunxiao Jiang, Yi Qian, Jianhua Lu
R2,999 R2,600 Discovery Miles 26 000 Save R399 (13%) Ships in 10 - 15 working days

This book targets major issues in terrestrial-satellite communication networks and presents the solutions. While the terrestrial networks can achieve high-speed data service at low cost, satellite based access is one way to complement terrestrial based networks to ensure ubiquitous, 100% geographic coverage. The coexistence and cooperation between terrestrial and satellite networks are of great potential in future communication networks, and satellite radio access networks has already been considered in the fifth-generation (5G) networks to be supported for phase 2. Therefore, it is important to study the architectures of terrestrial-satellite networks, as well as the possible techniques and challenges. The authors introduce the technique of beamforming in satellite communication systems, which is an efficient transmitting method for multiple access, and they discuss the main challenges as well as prospective applications. The authors introduce possible methods for interference cancelation reception in terrestrial-satellite communication networks when reusing the frequency band between the two networks. Due to the limitation of spectrum resources, spectrum sharing will become one of the important issues in terrestrial-satellite communication networks. The problems of spectrum coexistence between GEO and Terrestrial Systems and between GEO and NEGO systems are also discussed. Finally, taking both the two system into consideration, the resource allocation problem will be more complex due to the coupling between resources and the interference. Based on this, the authors propose several resource allocation schemes in different scenarios of terrestrial-satellite communication networks, which can optimize the capacity performance of the system. The expected audience for this book includes (but not limited to) graduate students, professors, researchers, scientists, practitioners, engineers, industry managers, and government researchers working in the field of satellite communications and networks. The expected audience for this book includes (but not limited to) graduate students, professors, researchers, scientists, practitioners, engineers, industry managers, and government researchers working in the field of satellite communications and networks.

Concise Guide To Medicinal Application In Pediatrics: Translation Of Xiao Er Yao Zheng Zhi Jue (Hardcover): Yi Qian Concise Guide To Medicinal Application In Pediatrics: Translation Of Xiao Er Yao Zheng Zhi Jue (Hardcover)
Yi Qian; Translated by Mingshan Yang
R2,098 Discovery Miles 20 980 Ships in 10 - 15 working days

This is a full-text English translation of the TCM classic on pediatrics written by QIAN Yi (1032-1113 CE). It covers syndrome identification and treatment of diseases in infants and young children. The book consists of three parts: Part I is about diagnosis of children's diseases and their recommended treatments. There are 81 articles covering a wide range of clinical patterns. Part II reports 23 case studies and provides an invaluable record of the clinical practices at that time. Part III contains over one hundred medicinal formulas for use in various treatment plans.

Terrestrial-Satellite Communication Networks - Transceivers Design and Resource Allocation (Paperback, Softcover reprint of the... Terrestrial-Satellite Communication Networks - Transceivers Design and Resource Allocation (Paperback, Softcover reprint of the original 1st ed. 2018)
Linling Kuang, Chunxiao Jiang, Yi Qian, Jianhua Lu
R2,741 Discovery Miles 27 410 Ships in 7 - 11 working days

This book targets major issues in terrestrial-satellite communication networks and presents the solutions. While the terrestrial networks can achieve high-speed data service at low cost, satellite based access is one way to complement terrestrial based networks to ensure ubiquitous, 100% geographic coverage. The coexistence and cooperation between terrestrial and satellite networks are of great potential in future communication networks, and satellite radio access networks has already been considered in the fifth-generation (5G) networks to be supported for phase 2. Therefore, it is important to study the architectures of terrestrial-satellite networks, as well as the possible techniques and challenges. The authors introduce the technique of beamforming in satellite communication systems, which is an efficient transmitting method for multiple access, and they discuss the main challenges as well as prospective applications. The authors introduce possible methods for interference cancelation reception in terrestrial-satellite communication networks when reusing the frequency band between the two networks. Due to the limitation of spectrum resources, spectrum sharing will become one of the important issues in terrestrial-satellite communication networks. The problems of spectrum coexistence between GEO and Terrestrial Systems and between GEO and NEGO systems are also discussed. Finally, taking both the two system into consideration, the resource allocation problem will be more complex due to the coupling between resources and the interference. Based on this, the authors propose several resource allocation schemes in different scenarios of terrestrial-satellite communication networks, which can optimize the capacity performance of the system. The expected audience for this book includes (but not limited to) graduate students, professors, researchers, scientists, practitioners, engineers, industry managers, and government researchers working in the field of satellite communications and networks. The expected audience for this book includes (but not limited to) graduate students, professors, researchers, scientists, practitioners, engineers, industry managers, and government researchers working in the field of satellite communications and networks.

Developing Networks using Artificial Intelligence (Paperback): Haipeng Yao, Chunxiao Jiang, Yi Qian Developing Networks using Artificial Intelligence (Paperback)
Haipeng Yao, Chunxiao Jiang, Yi Qian
R2,558 Discovery Miles 25 580 Out of stock
Security in Wireless Communication Networks (Hardcover): Feng Ye, Yi Qian, Hsiao--Hwa Chen Security in Wireless Communication Networks (Hardcover)
Feng Ye, Yi Qian, Hsiao--Hwa Chen
R1,996 Discovery Miles 19 960 Out of stock

Wireless security is a very important topic and attracting more and more attention from industry, research, and academia. There is a need for a comprehensive book to investigate and to summarize the recent advances in wireless communication network security. This book will serve the purpose to thoroughly investigate security issues in emerging wireless access communication networks. This book addresses the security for wireless communication networks. Unlike wired communication networks that have some degree of physical security, physical security in wireless communication networks is impossible to achieve on wireless links (because of the broadcast nature) and therefore security attacks on information flow are the most widespread. Modification of information is possible because of the nature of the channel and the mobility of nodes. The radio channel is harsh and subject to interference, fading, multipath, and high error rates. As a result, packet losses are common even without security threats. An opponent can make use of these natural impairments to modify information and also render the information unavailable. This book will address all these issues. Special attention will be paid to wireless specific issues, e.g., trade-offs between security and power consumption, adaptively changing security protocols in response to the radio channel, etc. The book can be used as a supporting textbook for students on Wireless Security courses, offering the fundamentals of tele-communication and mathematics and cryptographic techniques. This allows the reader to select one specific wireless network of interest after going through the basics of mathematics and cryptographic techniques.

Beating the IRS Tax Squeeze - From $78,000 to $32,000 to $12,000 to $0 (Paperback): Yi Qian Beating the IRS Tax Squeeze - From $78,000 to $32,000 to $12,000 to $0 (Paperback)
Yi Qian
R578 Discovery Miles 5 780 Out of stock

For anyone who has had to endure an IRS audit-or hopes they never will-"Beating the IRS Tax Squeeze" is the story of one woman's journey through an IRS tax audit that lasted five years. Qian Yi began to chronicle her interactions with the Internal Revenue Service soon after her third office audit on December 5, 2002, shortly after she had returned from Shanghai with her husband. By that point, the audit on their 2000 tax return had been going on for twenty months, with eight intimidating IRS CP notices and three office audits-the tax assessment on her and her husband's joint 2000 tax return having escalated from approximately $9,000 to a whopping $78,000. All the while, from the very beginning, Qian arduously negotiated with the IRS and hoped for a quick resolution, but it was everything "but" quick. Never could Qian have foreseen that their 2000 tax return audit could drag on for five years and that while it was still pending for a resolution, all their tax returns for years 2001, 2002, 2003, 2004, and even 2005 would all come under IRS's unrelenting and unremitting scrutiny. In this smart, worldly, and candid book, Qian adheres to the facts of her dealings with the IRS as she recounts her many telephone calls, multiple correspondence audits, and five office audits. Her uplifting tale of survival proves that perseverance is the key-only if you believe you are right-to success with IRS audits and, perhaps, in all aspects of life.

Information Assurance - Dependability and Security in Networked Systems (Hardcover): Yi Qian, David Tipper, Prashant... Information Assurance - Dependability and Security in Networked Systems (Hardcover)
Yi Qian, David Tipper, Prashant Krishnamurthy, James Joshi
R1,621 Discovery Miles 16 210 Out of stock

In today's fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and confidentiality of our electronic information. It is therefore absolutely imperative to take measures to protect and defend information systems by ensuring their security and non-repudiation. Information Assurance skillfully addresses this issue by detailing the sufficient capacity networked systems need to operate while under attack, and itemizing failsafe design features such as alarms, restoration protocols, and management configurations to detect problems and automatically diagnose and respond. Moreover, this volume is unique in providing comprehensive coverage of both state-of-the-art survivability and security techniques, and the manner in which these two components interact to build robust Information Assurance (IA).
KEY FEATURES
* The first and (so far) only book to combine coverage of both security AND survivability in a networked information technology setting
* Leading industry and academic researchers provide state-of-the-art survivability and security techniques and explain how these components interact in providing information assurance
* Additional focus on security and survivability issues in wireless networks

Developing Networks using Artificial Intelligence (Hardcover, 1st ed. 2019): Haipeng Yao, Chunxiao Jiang, Yi Qian Developing Networks using Artificial Intelligence (Hardcover, 1st ed. 2019)
Haipeng Yao, Chunxiao Jiang, Yi Qian
R2,685 Discovery Miles 26 850 Out of stock

This book mainly discusses the most important issues in artificial intelligence-aided future networks, such as applying different ML approaches to investigate solutions to intelligently monitor, control and optimize networking. The authors focus on four scenarios of successfully applying machine learning in network space. It also discusses the main challenge of network traffic intelligent awareness and introduces several machine learning-based traffic awareness algorithms, such as traffic classification, anomaly traffic identification and traffic prediction. The authors introduce some ML approaches like reinforcement learning to deal with network control problem in this book. Traditional works on the control plane largely rely on a manual process in configuring forwarding, which cannot be employed for today's network conditions. To address this issue, several artificial intelligence approaches for self-learning control strategies are introduced. In addition, resource management problems are ubiquitous in the networking field, such as job scheduling, bitrate adaptation in video streaming and virtual machine placement in cloud computing. Compared with the traditional with-box approach, the authors present some ML methods to solve the complexity network resource allocation problems. Finally, semantic comprehension function is introduced to the network to understand the high-level business intent in this book. With Software-Defined Networking (SDN), Network Function Virtualization (NFV), 5th Generation Wireless Systems (5G) development, the global network is undergoing profound restructuring and transformation. However, with the improvement of the flexibility and scalability of the networks, as well as the ever-increasing complexity of networks, makes effective monitoring, overall control, and optimization of the network extremely difficult. Recently, adding intelligence to the control plane through AI&ML become a trend and a direction of network development This book's expected audience includes professors, researchers, scientists, practitioners, engineers, industry managers, and government research workers, who work in the fields of intelligent network. Advanced-level students studying computer science and electrical engineering will also find this book useful as a secondary textbook.

Resource Management for Heterogeneous Networks in LTE Systems (Paperback, 2014): Rose Qingyang Hu, Yi Qian Resource Management for Heterogeneous Networks in LTE Systems (Paperback, 2014)
Rose Qingyang Hu, Yi Qian
R1,235 Discovery Miles 12 350 Out of stock

This SpringerBrief provides an in-depth look at the key issues that affect the performance of heterogeneous networks and presents schemes that can effectively tackle these issues. In particular, this book discusses unbalanced traffic load among the macro and micro Base Stations (BSs) caused by the transmit power disparity, and a load-balancing based mobile association scheme to balance the traffic load among the macro and micro BSs. This book also introduces a fractional frequency reuse (FFR) scheme with proper power control to help reduce interference at the UEs which are most vulnerable to such intra-cell interference. The last section investigates radio resource allocation issues for heterogeneous networks with cooperative relays, and proposes a resource allocation framework that could achieve proportional fairness among the UEs. Numerical results are provided to demonstrate the effectiveness of the proposed solutions in tackling the problem and improving network performance. Resource Management for Heterogeneous Networks in LTE-A Systems is designed for researchers and professionals working in networking and resource management. The content is also valuable for advanced-level students in computer science and electrical engineering.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Crayola Erasable Twistable Pencil…
R100 Discovery Miles 1 000
Loot
Nadine Gordimer Paperback  (2)
R336 R283 Discovery Miles 2 830
Holmes & Watson
Will Ferrell, John C. Reilly, … DVD R150 R98 Discovery Miles 980
Rogues' Gallery - An Irreverent History…
Matthew Blackman, Nick Dall Paperback  (1)
R290 R209 Discovery Miles 2 090
Kingsons Valentine Series Shoulder Bag…
 (2)
R551 Discovery Miles 5 510
King Kong Leather Shopper Bag (Pecan)
R1,899 R1,495 Discovery Miles 14 950
Loot
Nadine Gordimer Paperback  (2)
R336 R283 Discovery Miles 2 830
Alcosan Alcohol Hand Sanitiser (100ml)
 (7)
R65 R50 Discovery Miles 500
World Class Customer Service For South…
Basil O'Hagan Paperback R209 Discovery Miles 2 090
Handover Foam Brush (2")
R28 Discovery Miles 280

 

Partners