This book covers the theory, design and applications of computer networks, distributed computing and information systems. Networks of today are going through a rapid evolution, and there are many emerging areas of information networking and their applications. Heterogeneous networking supported by recent technological advances in low-power wireless communications along with silicon integration of various functionalities such as sensing, communications, intelligence and actuations is emerging as a critically important disruptive computer class based on a new platform, networking structure and interface that enable novel, low-cost and high-volume applications. Several of such applications have been difficult to realize because of many interconnections problems. To fulfill their large range of applications, different kinds of networks need to collaborate, and wired and next generation wireless systems should be integrated in order to develop high-performance computing solutions to problems arising from the complexities of these networks.
The aim of the book “Advanced Information Networking and Applications” is to provide the latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and applications.
Inhoudsopgave
A Fuzzy-Based System for Determining Driver Stress in VANETs Considering Driving Experience and History.- Performance Evaluation of WMNs by WMN-PSOHC Hybrid Simulation System Considering Different Instances: A Comparison Study for RDVM and LDIWM Replacement Methods.- Millimeter-Wave Dual-Band Slotted Antenna for 5G Applications.- The Multi-access Edge Computing (MEC)-based Bit Rate Adaptive Multicast SVC.- Distributed Log Search based on Time Series Access and Service Relations.- Viterbi Algorithm & HMM Implementation to Multicriteria Data-Driven Decision Support Model for Optimization of Medical Service Quality Selection.- Prevention of Dr Do S Amplification Attacks by Penalizing the Attackers in SDN Environment.