This book introduces readers to the fundamentals of the cross-technology coexistence problem in heterogeneous wireless networks. It also highlights a range of mechanisms designed to combat this problem and improve network performance, including protocol design, theoretical analysis, and experimental evaluation.
In turn, the book proposes three mechanisms that can be combined to combat the cross-technology coexistence problem and improve network performance. First, the authors present a fast signal identification method. It provides the basis for the subsequent protocol design and allows...
This book introduces readers to the fundamentals of the cross-technology coexistence problem in heterogeneous wireless networks. It also highlights...
Natural interaction is one of the hottest research issues in human-computer interaction. At present, there is an urgent need for intelligent devices (service robots, virtual humans, etc.) to be able to understand intentions in an interactive dialogue. Focusing on human-computer understanding based on deep learning methods, the book systematically introduces readers to intention recognition, unknown intention detection, and new intention discovery in human-computer dialogue. This book is the first to present interactive dialogue intention analysis in the context of natural interaction. In...
Natural interaction is one of the hottest research issues in human-computer interaction. At present, there is an urgent need for intelligent device...
This SpringerBrief is a computational study of significant concerns and their role in forming long-term relationships between intelligent entities. Significant concerns include attitudes, preferences, affinities, and values that are held to be highly valued and meaningful: The means through which a person may find deeply held identity, purpose, and transformation. Significant concerns always engage the emotions and senses in a way that simply holding an opinion may or may not. For example, experiencing a significant concern may provoke deep feelings of awe and wonder in a way that deciding...
This SpringerBrief is a computational study of significant concerns and their role in forming long-term relationships between intelligent entities....
This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods as well as the current research results on securing voice processing systems.It also introduces three mechanisms to secure the voice processing systems against malicious voice attacks under different scenarios, by utilizing time-domain signal waves, frequency-domain spectrum features, and acoustic physical attributes.
First, the authors uncover the modulated replay attack, which uses an inverse filter to compensate for the spectrum...
This book provides readers with the basic understanding regarding the threats to the voice processing systems, the state-of-the-art defense methods...
This book provides an overview of both experimental and commercial real-time database systems (RTDBs) and a systematic approach to understanding, designing, and implementing them.
To this end, the book is composed of four chapters: Chapter 1 “An Overview of Real-Time Database Systems” delves into the realm of RTDBs and discusses the specific requirements, transaction models, and scheduling algorithms that set RTDBs apart from conventional DBMs. Chapter 2 on “Experimental Real-Time Databases” presents various experimental RTDBs developed in academia with their architectures,...
This book provides an overview of both experimental and commercial real-time database systems (RTDBs) and a systematic approach to understanding, d...
This book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential knowledge required for conducting research in this field, it covers the foundational concepts of this topic as well. This book also offers a detailed insight into UAV networks from the physical layer security point of view.
The authors discuss the appropriate channel models for characterizing various propagation environments that UAV networks are exposed. The state-of-the-art technologies, such as UAV trajectory design,...
This book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential know...
As a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authentication to protect user privacy and security. It gradually turns into an important option for addressing the security concern of IoT environment.
However, due to the limited sensing capability of WiFi signals and wide application scenarios, WiFi signal-based user authentication suffers from practical issues of diversified behaviors and complex scenarios.
Therefore, it is necessary to address the issues and build integrated...
As a privacy-preserving and illumination-robust manner, WiFi signal-based user authentication has become a new direction for ubiquitous user authen...
With the emergence of virtual reality and augmented reality, the era of interactive multimedia streaming looms on the horizon. Network latency emerges as a critical factor in the performance of interactive multimedia streaming applications. As the demand for interactive multimedia streaming continues to surge, comprehending and mitigating the challenges posed by network latency becomes increasingly imperative.
This book begins by introducing the fundamentals of network latency, elucidating its sources from both data plane and control plane, along with its effects on user experience....
With the emergence of virtual reality and augmented reality, the era of interactive multimedia streaming looms on the horizon. Network latency emer...
This book provides a comprehensive review and the latest progress of ultraviolet communications. Optical wireless communications employing electromagnetic waves in optical wavebands as information carriers can achieve higher communication bandwidth compared with radio frequency based wireless communication. However, the good directionality of optical waves degrades its non-line-of-sight transmission ability for avoiding obstacles.
The ultraviolet communication employs the ultraviolet light in "solar blind" waveband (200-280 nm) as information carriers. The name "solar blind"...
This book provides a comprehensive review and the latest progress of ultraviolet communications. Optical wireless communications employing electrom...