This timely book provides broad coverage of vehicular ad-hoc network (VANET) issues, such as security, and network selection. Machine learning based methods are applied to solve these issues. This book also includes four rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues. This book will also help readers understand how to use machine learning to address the security and communication challenges in VANETs. Vehicular ad-hoc networks (VANETs) support vehicle-to-vehicle communications and vehicle-to-infrastructure communications to improve the transmission security, help build unmanned-driving, and support booming applications of onboard units (OBUs). The high mobility of OBUs and the large-scale dynamic network with fixed roadside units (RSUs) make the VANET vulnerable to jamming. The anti-jamming communication of VANETs can be significantly improved by using unmanned aerial vehicles (UAVs) to relay the OBU message. UAVs help relay the OBU message to improve the signal-to-interference-plus-noise-ratio of the OBU signals, and thus reduce the bit-error-rate of the OBU message, especially if the serving RSUs are blocked by jammers and/or interference, which is also demonstrated in this book.This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues.
This SpringerBrief discusses the most recent research in the field of multimedia QoE evaluation, with a focus on how to evaluate subjective multimedia QoE problems from objective techniques. Specifically, this SpringerBrief starts from a comprehensive overview of multimedia QoE definition, its influencing factors, traditional modeling and prediction methods. Subsequently, the authors introduce the procedure of multimedia service data collection, preprocessing and feature extractions. Then, describe several proposed multimedia QoE modeling and prediction techniques in details. Finally, the authors illustrate how to implement and demonstrate multimedia QoE evaluation in the big data platform. This SpringerBrief provides readers with a clear picture on how to make full use of multimedia service data to realize multimedia QoE evaluation.
With the exponential growth of the Internet technologies, multimedia services become immensely popular. Users can enjoy multimedia services from operators or content providers by TV, computers and mobile devices. User experience is important for network operators and multimedia content providers. Traditional QoS (quality of service) can not entirely and accurately describe user experience. It is natural to research the quality of multimedia service from the users' perspective, defined as multimedia quality of experience (QoE). However, multimedia QoE evaluation is difficult, because user experience is abstract and subjective, hard to quantify and measure. Moreover, the explosion of multimedia service and emergence of big data, all call for a new and better understanding of multimedia QoE.
This SpringerBrief targets advanced-level students, professors and researchers studying and working in the fields of multimedia communications and information processing. Professionals, industry managers, and government research employees working in these same fields will also benefit from this SpringerBrief.
The objective of this SpringerBrief is to present security architectures and incentive mechanisms to realize system availability for D2D communications. D2D communications enable devices to communicate directly, improving resource utilization, enhancing user's throughput, extending battery lifetime, etc. However, due to the open nature of D2D communications, there are two substantial technical challenges when applied to large-scale applications, that is, security and availability which is demonstrated in this book.
This SpringerBrief proposes a secure data sharing protocol, which merges the advantages of public key cryptography and symmetric encryption, to achieve data security in D2D communications. Furthermore, a joint framework involving both the physical and application layer security technologies is proposed for multimedia service over D2D communications thus the scalable security service can be achieved without changing the current communication framework. Additionally, as the system availability largely depends on the cooperation degree of the users, a graph-theory based cooperative content dissemination scheme is proposed to achieve maximal Quality of Experience (QoE) with fairness and efficiency.
This SpringerBrief will be a valuable resource for advanced-level students and researchers who want to learn more about cellular networks.
This book presents the latest researches on hypersonic steady glide dynamics and guidance, including the concept of steady glide reentry trajectory and the stability of its regular perturbation solutions, trajectory damping control technique for hypersonic glide reentry, singular perturbation guidance of hypersonic glide reentry, trajectory optimization based on steady glide, linear pseudospectral generalized nominal effort miss distance guidance, analytical entry guidance and trajectory-shaping guidance with final speed and load factor constraints. They can be used to solve many new difficult problems in entry guidance. And many practical engineering cases are provided for the readers for better understanding. Researchers and students in the fields of flight vehicle design or flight dynamics, guidance and control could use the book as valuable reference.
This book covers the up-to-date advancement of respiratory monitoring in ventilation support as well as detecting the physiological responses to therapeutic interventions to avoid complications. Mechanical ventilation nowadays remains the cornerstone in life saving in critically ill patients with and without respiratory failure. However, conclusive evidences show that mechanical ventilation can also cause lung damage, specifically, in terms of ventilator-induced lung injury.
Respiratory monitoring encloses a series of physiological and pathophysiological measurements, from basic gas exchange and ventilator wave forms to more sophisticated diaphragm function and lung volume assessments. The progress of respiratory monitoring has always been accompanied by advances in technology. However, how to properly conduct the procedures and correctly interpret the data requires clear definition.
The book introduces respiratory monitoring techniques and data analysis, including gas exchange, respiratory mechanics, thoracic imaging, lung volume measurement, and extra-vascular lung water measurement in the initial part. How to interpret the acquired and derived parameters and to illustrate their clinical applications is presented thoroughly. In the following part, the applications of respiratory monitoring in specific diseases and conditions is introduced, including acute respiratory distress syndrome, obstructive pulmonary diseases, patient-ventilator asynchrony, non-invasive ventilation, brain injury with increased intracranial pressure, ventilator-induced diaphragm dysfunction, and weaning from mechanical ventilation.
This book is intended primarily for ICU physicians and other practitioners including respiratory therapists, ICU nurses and trainees who come into contact with patients under mechanical ventilation. This book also provides guidance for clinical researchers who take part in respiratory and mechanical ventilation researches.