feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • F.-Ebert-Stiftung  (154)
  • HPol Brandenburg  (38)
  • Kinemathek  (11)
Type of Medium
Language
Region
Library
Access
  • 1
    UID:
    almahu_9949568766902882
    Format: 1 online resource (310 pages)
    Edition: 1st ed.
    ISBN: 9789819936687
    Series Statement: Springer Tracts in Electrical and Electronics Engineering Series
    Note: Intro -- Preface -- Contents -- Editors and Contributors -- 1 Evolution of Next-Generation Communication Technology -- Introduction -- Existing Cellular Network and Its Challenges -- First Generation -- Second Generation -- Third Generation -- Fourth Generation -- Fifth Generation -- Conventional Cellular Systems-Limitations -- Vision and Mission-5G -- Architecture-5G -- C-Ran -- SBA-Based Core Network -- Next-Generation Network-Applications -- Example of Next-Generation Network Applications -- Conclusion and Future Scope -- References -- 2 Third Industrial Revolution: 5G Wireless Systems, Internet of Things, and Beyond -- Introduction -- IoT and Its Devices -- A 5G and IoT -- 5G and Ubiquitous Computing -- The Internet of Things -- A 5G Network -- History and Present Researches on IoT as Well as 5G -- Requirements of IoT and Shortcomings of Wireless 4G Network -- Needs for IoT that is 5G Enabled -- The Vision of 5G IOT: Industrial and Research Context -- Unification of Technologies -- Enabling Technology Drivers in 5G IoT -- Challenges and Trends of Future of the Research -- Conclusion and Future Scope -- Appendix 1: Wireless Technology Features -- Appendix 2: Information Speed Increment -- Appendix 3: 5G Network Architecture -- Appendix 4: 5G Tower Signals -- References -- 3 Network Architectures and Protocols for Efficient Exploitation of Spectrum Resources in 5G -- Introduction -- Enabler Technologies -- Architecture of 5G -- Multiple-Input Multiple-Output Technology in 5G -- Antenna Array for MIMO in 5G -- Device-to-Device Communication in 5G -- Interference Management for 5G -- Multi-tier 5G Architecture -- Spectrum Sharing with Cognitive Radio in 5G -- Ultra-dense Networks in Multi-radio Access Technology Association in 5G -- UDN Moving Cells with 5G+ Network -- Cloud Technologies for 5G -- Methodology. , The Methodology of the Proposed Scheme -- Spectrum Band -- 5G Base Station -- Energy Module -- Energy Controller -- Challenges and Future Research Directions -- Conclusion -- References -- 4 Wireless Backhaul Optimization Algorithm in 5G Communication -- Introduction -- Network Scenarios and System Assumptions -- Analysis of Delay Jitter Indicators -- Delay Analysis -- Delay Jitter Analysis -- Optimization Model Establishments -- Basic Backhaul Model -- Improved Model 1 -- Improved Model 2 -- Improved Model Solutions -- Improved Model 1 Solution -- Improved Model 2 Solution -- Simulation Analysis -- Conclusions -- References -- 5 Security Attacks and Vulnerability Analysis in Mobile Wireless Networking -- Introduction -- Types of Wireless Mobile Network -- Wireless PAN -- Wireless LAN -- Manet -- Wireless MAN -- Wireless WAN -- Mobile Network -- Gan -- Aerospace Network -- Challenges and Issues in Wireless Mobile Network -- Information Management -- Endless Communication -- Delay Tolerance -- Heterogeneity -- Contextual Awareness -- Buffer Management -- Power Features -- Privacy and Security -- Security Goals of Wireless Mobile Network -- Classification of Security Attacks -- Most Prevalent Attacks in Wireless Systems -- Denial of Service (DoS) Attack -- Flooding Attack -- Jamming -- Intervention -- Sleep Deprivation Attack -- Blackhole Attack -- Rushing Attack -- Sybil Attack -- Sinkhole Attack -- Gray Hole Attack -- Byzantine Attack -- Jellyfish Attack -- Wormhole Attack -- Eavesdropping -- Disclosure of Information Attack -- Man-In-The-Middle Attack -- Replay Attack -- ACK Attack -- Spoofing Attack -- Link Spoofing Attack -- Spear-Phishing Attack -- Repudiation Attack -- Infected Code Injection -- Colluding Mis-Relay Attack -- Selective-Forwarding Attack -- Database Hack Attack -- Conclusion -- References. , 6 Utilities of 5G Communication Technologies for Promoting Advancement in Agriculture 4.0: Recent Trends, Research Issues and Review of Literature -- Introduction -- Challenges Faced by Existing Network Technologies -- Motivation of the Work -- Existing Problems and Contribution -- Scope of 5G-Enabled Networks in AgriIoT -- Energy Consumption Management Methods in 5G Networks -- Application Areas of 5G in Smart Farming -- Data Aggregation -- Predictive Analytics -- Drone Operations -- Animal Tracking and Real-Time Monitoring -- Autonomous Agriculture Vehicles -- Weather Stations -- 5G Enabled Components in Agriculture -- Drones and Unmanned Aerial Vehicles (UAVs) -- Virtual Consultation and Predictive Maintenance -- Augmented and Virtual Reality -- Agriculture Robots -- Cloud-Based Data Analytics -- Recent Development Scenarios in 5G-Based Agriculture -- Conclusion and Future Work -- References -- 7 Security Attacks and Countermeasures in 5G Enabled Internet of Things -- Introduction -- Overview of 5G -- Overview of IoT -- 5G Enabled IoT -- 5G Enabled IoT Architecture -- L1 Physical Device Layer -- L2 Communication Layer -- L3 Fog Computing Layer -- L4 Data Storage Layer -- L5 Management Service Layer -- L6 Application Layer -- L7 Process and Collaboration Layer -- L8 Security Layer -- Technologies in 5G Enabled IoT -- Threat Analysis in 5G IoT -- Eavesdropping -- Contaminating -- Spoofing -- Jamming -- Physical Layer Security -- Trust Mechanism in WSN -- Crowdsourcing Analysis -- Attacks at the Architecture Level -- Current Research for 5G and IoT -- Future Research Directions and Challenges -- Characteristics Synthesis -- Signal Revoking -- Location Awareness -- Technical Challenges -- Wireless Software Defined Network -- Security Assurance and Privacy Analysis -- Standardization Issues -- Conclusion -- References. , 8 Energy Efficiency and Scalability of 5G Networks for IoT in Mobile Wireless Sensor Networks -- Introduction -- Energy Efficiency in Mobile Wireless Sensor Networks -- Basic Concept of 5G Technology -- Evolution of 5G -- Frequency Band of 5G System -- 5G Innovative Technologies -- IoT Services Based on 5G -- IoT Industry Supported by 5G Technology -- Industry 4.0 -- Palpable Internet -- Security of IoT in 5G System -- Conclusion -- References -- 9 Security Services for Wireless 5G Internet of Things (IoT) Systems -- Introduction -- Inspiration and Ideas for 5G Based on IoT -- Structure of IoT in Cooperation with 5G -- Sensor Layer -- Network Layer -- Communication Layer -- Architecture Layer -- Application Layer -- Current Resolutions for Communication for IoT in 5G -- Bluetooth Low Energy (BLE) -- SigFox -- IEEE 802.15.4 -- LoRa -- Wi-Fi -- ZigBee -- NarrowBand IoT -- Challenges and Security Vulnerabilities -- Confidentiality and Safety -- Energy Efficacy -- Future Research Directions -- Structure of Network Based on Big Data -- 5G New Radio (NR): A New Wave-Form Design Consideration -- Energy Efficacy -- Interchange Between Communication, Gathering, and Computing -- Design of Synchronized Multi-Band, and High-Power Effective Amplifier -- Conclusion -- References -- 10 Securing the IoT-Based Wireless Sensor Networks in 5G and Beyond -- Introduction -- Literature Survey -- IoT-Based Wireless Networks -- Different Types of Attacks -- Perception Layer -- Abstraction Layer -- Network Layer -- Computing Layer -- Operation Layer -- Application Layer -- Importance of 5G -- Background -- Mathematical Explanation for Euclidean Distance -- Proposed Work -- Assumptions -- Creating Trial Data Sets -- Transmitting the Messages -- Analysis of the Proposal -- Security -- Conclusion -- References. , 11 5G and Internet of Things-Integration Trends, Opportunities, and Future Research Avenues -- Introduction -- Overview of 5G -- Evolution of 5G -- Characteristics and Requirements of 5G Ecosystem -- 5G Architecture -- An Insight into IoT -- Characteristics of IoT -- Layered Architecture of IoT -- Requirements for 5G Integrated IoT Architecture -- Edge Layer of 5G IoT -- Network Layer of 5G IoT -- Application Layer of 5G IoT -- Blockchain-Based 5G IoT -- 5G IoT with Artificial Intelligence -- Opportunities of 5G Integrated IoT -- Technological Advancement -- Smart Cities -- Business -- Aerial and Satellite Research -- Mitigating Pandemic Situation -- Industrial Usage with Other Technologies -- Video Surveillance -- Challenges of 5G Integrated IoT -- General Challenges -- Heterogeneity of 5G and IoT Data -- Blockchain Integrating 5G IoT Issues -- 5G mm-Wave Issues -- Threat Protection of 5G IoT -- Conclusion -- References -- 12 Post-Quantum Cryptographic Schemes for Security Enhancement in 5G and B5G (Beyond 5G) Cellular Networks -- Introduction -- Emerging Cellular Networks -- 5G Overview -- Evolution of 6G/B5G Overview -- State-Of-The-Art -- Taxonomy of 6G/B5G Wireless Systems -- Security Services in 6G/B5G Wireless Networks -- Data Security Techniques for 5G Heterogeneous Networks -- Visual Secret Sharing -- Steganography -- Cryptographic Algorithms -- Key Management -- Overview and Fundamentals of Quantum Computing -- Architecture of Classical Computing Versus Quantum Computing -- Mathematical Representation for Quantum Computing -- The Impact of Quantum Computing on Modern Cryptography -- Quantum Algorithms Affecting Cryptosystems -- Post-Quantum Cryptography -- Mathematical View -- Post-Quantum Analysis -- Conclusion -- References -- 13 Enhanced Energy Efficiency and Scalability in Cellular Networks for Massive IoT -- Introduction. , Literature Review.
    Additional Edition: Print version: Bhushan, Bharat 5G and Beyond Singapore : Springer,c2023 ISBN 9789819936670
    Language: English
    Keywords: Electronic books. ; Electronic books.
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
  • 3
    Online Resource
    Online Resource
    New York ; Oxford :Berghahn Books,
    UID:
    almahu_BV048320911
    Format: 1 Online-Ressource (xii, 310 Seiten) : , Illustrationen.
    ISBN: 978-1-80073-313-8
    Series Statement: Higher education in central perspective volume 5
    Content: "Through a series of empirically and theoretically informed reflections, Opening Up the University offers insights into the process of setting up and running programs that cater to displaced students. Including contributions from educators, administrators, practitioners, and students, this expansive collected volume aims to inspire and question those who are considering creating their own interventions, speaking to policy makers and university administrators on specific points relating to the access and success of refugees in higher education, and suggests concrete avenues for further action within existing academic structures"--
    Note: Includes bibliographical references and index
    Additional Edition: Erscheint auch als Druck-Ausgabe, Hardcover ISBN 978-1-80073-311-4
    Language: English
    Subjects: General works
    RVK:
    Keywords: Flüchtling ; Student ; Hochschulbildung ; Aufsatzsammlung
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Book
    Book
    Harmondsworth :Penguin Books,
    UID:
    almafu_BV002988258
    Format: 549 S.
    Series Statement: Penguin modern economics readings.
    Language: English
    Subjects: Economics
    RVK:
    Keywords: Wachstumstheorie ; Aufsatzsammlung ; Aufsatzsammlung ; Aufsatzsammlung
    Author information: Sen, Amartya 1933-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    New York ; Oxford : Berghahn Books
    UID:
    b3kat_BV048320911
    Format: 1 Online-Ressource (xii, 310 Seiten) , Illustrationen
    ISBN: 9781800733138
    Series Statement: Higher education in central perspective volume 5
    Content: "Through a series of empirically and theoretically informed reflections, Opening Up the University offers insights into the process of setting up and running programs that cater to displaced students. Including contributions from educators, administrators, practitioners, and students, this expansive collected volume aims to inspire and question those who are considering creating their own interventions, speaking to policy makers and university administrators on specific points relating to the access and success of refugees in higher education, and suggests concrete avenues for further action within existing academic structures"--
    Note: Includes bibliographical references and index
    Additional Edition: Erscheint auch als Druck-Ausgabe, Hardcover ISBN 978-1-80073-311-4
    Language: English
    Subjects: General works
    RVK:
    Keywords: Flüchtling ; Student ; Hochschulbildung ; Aufsatzsammlung
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Book
    Book
    Hamburg : Rotbuch-Verlag
    UID:
    b3kat_BV013164564
    Format: 158 Seiten
    ISBN: 3434530622
    Series Statement: Rotbuch-Rationen
    Uniform Title: The standard of living
    Note: Literaturangaben
    Language: German
    Subjects: Economics , Philosophy
    RVK:
    RVK:
    Keywords: Lebensstandard ; Wohlfahrtstheorie ; Lebenshaltungskosten ; Lebensqualität ; Aufsatzsammlung
    Author information: Sen, Amartya 1933-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9949517373702882
    Format: 1 online resource (177 pages)
    ISBN: 9781000791266
    Content: Dynamic Resource Allocation in Embedded, High-Performance and Cloud Computing covers dynamic resource allocation heuristics for manycore systems, aiming to provide appropriate guarantees on performance and energy efficiency.
    Additional Edition: Print version: Indrusiak, Leando Soares Dynamic Resource Allocation in Embedded, High-Performance and Cloud Computing Milton : River Publishers,c2016 ISBN 9788793519084
    Language: English
    Keywords: Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almafu_BV000483812
    Format: XI, 296 S.
    ISBN: 0-19-828505-1
    Language: English
    Subjects: Economics
    RVK:
    Keywords: Armut ; Arbeitsmarkt ; Bibliographie enthalten
    Author information: Collier, Paul 1949-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    b3kat_BV048636433
    Format: 1 Online-Ressource (vii, 205 Seiten) , Diagramme
    ISBN: 9781800737730
    Additional Edition: Erscheint auch als Druck-Ausgabe, Hardcover ISBN 978-1-80073-801-0
    Language: English
    Keywords: Islamischer Staat ; Islam ; Fundamentalismus ; Terrorismus ; Radikalismus ; Rechtsradikalismus ; COVID-19 ; Pandemie
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    Author information: Gunaratna, Rohan 1961-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    London :IntechOpen,
    UID:
    almahu_9949728667002882
    Format: 1 online resource (396 pages)
    Edition: 1st ed.
    ISBN: 9781803556260
    Additional Edition: Print version: Kumar, Vijay Macrophages London : IntechOpen,c2022
    Language: English
    Keywords: Electronic books. ; Electronic books.
    URL: Volltext  (kostenfrei)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages