This book focuses on cellular Vehicle-to-Everything (C-V2X), currently the most promising wireless communication technology for Vehicle-to-Vehicle (V2V), Vehicle-to-Infrastructure (V2I), Vehicle-to-Pedestrian (V2P), Vehicle-to-Network (V2N) and Vehicle-to-Cloud (V2C) communications. Because of its low latency and high reliability, C-V2X has become an essential enabling technology for Intelligent Transportation Systems (ITSs) and autonomous driving.This book begins by introducing readers to the research background and status quo of global development. Then, after analyzing the performance...
This book focuses on cellular Vehicle-to-Everything (C-V2X), currently the most promising wireless communication technology for Vehicle-to-Vehicle (V2...
This book introduces the concept of machine-type communication (MTC) for maritime Internet of Things. The first part of the book portrays a maritime MTC system from an architectural perspective and describes an MTC framework and the fundamental components, laying out a foundation that leads to an ultimate solution to the maritime IoT requirements and challenges. The second part ties together all discussed in the first part and demonstrates how to apply it to a practical system through a realistic design example based on an international maritime mobile spectrum. The book serves as a...
This book introduces the concept of machine-type communication (MTC) for maritime Internet of Things. The first part of the book portrays a maritime M...
This book provides a comprehensive review and in-depth study on efficient beamforming design and rigorous performance analysis in mmWave networks, covering beam alignment, beamforming training and beamforming-aided caching. Due to significant beam alignment latency between the transmitter and the receiver in existing mmWave systems, this book proposes a machine learning based beam alignment algorithm for mmWave networks to determine the optimal beam pair with a low latency. Then, to analyze and enhance the performance of beamforming training (BFT) protocol in 802.11ad mmWave networks, an...
This book provides a comprehensive review and in-depth study on efficient beamforming design and rigorous performance analysis in mmWave networks, cov...
Ocean covers 70.8% of the Earth’s surface, and it plays an important role in supporting all life on Earth. Nonetheless, more than 80% of the ocean’s volume remains unmapped, unobserved and unexplored. In this regard, Underwater Sensor Networks (USNs), which offer ubiquitous computation, efficient communication and reliable control, are emerging as a promising solution to understand and explore the ocean. In order to support the application of USNs, accurate position information from sensor nodes is required to correctly analyze and interpret the data sampled. However, the openness and...
Ocean covers 70.8% of the Earth’s surface, and it plays an important role in supporting all life on Earth. Nonetheless, more than 80% of the oceanâ€...
This book covers connectivity and edge computing solutions for representative Internet of Things (IoT) use cases, including industrial IoT, rural IoT, Internet of Vehicles (IoV), and mobile virtual reality (VR). Based on their unique characteristics and requirements, customized solutions are designed with targets such as supporting massive connections or seamless mobility and achieving low latency or high energy efficiency. Meanwhile, the book highlights the role of artificial intelligence (AI) in future IoT networks and showcases AI-based connectivity and edge computing solutions.The...
This book covers connectivity and edge computing solutions for representative Internet of Things (IoT) use cases, including industrial IoT, rural IoT,...
This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality over encrypted data. The book majorly covers: 1) the design and implementation of encrypted search algorithms, data structures, and systems that facilitate various forms of search over always-encrypted databases; 2) different threat models, assumptions, and the related security guarantees, when using searchable encryption in the real-world settings; and 3) latest efforts in building full-fledged encrypted database systems that draw insights from...
This book comprehensively reviews searchable encryption, which represents a series of research developments that directly enable search functionality ...
To provide ubiquitous and various services, 6G networks tend to be more comprehensive and multidimensional by integrating current terrestrial networks with space-/air-based information networks and marine information networks; then, heterogeneous network resources, as well as different types of users and data, will be also integrated. Driven by the exponentially growing demands of multimedia data traffic and computation-heavy applications, 6G heterogenous networks are expected to achieve a high QoS with ultra-reliability and low latency. In response, resource allocation has been considered an...
To provide ubiquitous and various services, 6G networks tend to be more comprehensive and multidimensional by integrating current terrestrial networks...
This book focuses on improving the performance (convergence rate, communication efficiency, computational efficiency, etc.) of algorithms in the context of distributed optimization in networked systems and their successful application to real-world applications (smart grids and online learning). Readers may be particularly interested in the sections on consensus protocols, optimization skills, accelerated mechanisms, event-triggered strategies, variance-reduction communication techniques, etc., in connection with distributed optimization in various networked systems. This book offers a...
This book focuses on improving the performance (convergence rate, communication efficiency, computational efficiency, etc.) of algorithms in the conte...
This book provides a timely and comprehensive study of developing efficient network slicing frameworks in both 5G wireless and core networks. It also presents protocol stack layer perspectives, which includes virtual network topology design, end-to-end delay modeling, dynamic resource slicing, and link-layer and transport-layer protocol customization.This book provides basic principles, concepts and technologies for communication, computing and networking. Optimization and queueing analysis techniques are applied to solving different problems for network slicing illustrated in this book as...
This book provides a timely and comprehensive study of developing efficient network slicing frameworks in both 5G wireless and core networks. It also ...
Recently machine learning schemes have attained significant attention as key enablers for next-generation wireless systems. Currently, wireless systems are mostly using machine learning schemes that are based on centralizing the training and inference processes by migrating the end-devices data to a third party centralized location. However, these schemes lead to end-devices privacy leakage. To address these issues, one can use a distributed machine learning at network edge. In this context, federated learning (FL) is one of most important distributed learning algorithm, allowing devices to...
Recently machine learning schemes have attained significant attention as key enablers for next-generation wireless systems. Currently, wireless system...