Fog Delay


Book Description

James Donato is a demolitions expert with an explosive temper. When he gets angry, something blows up. A misunderstanding at a bank leads to what he calls his latest “job.” He has it all planned. A quick job in the bank, then jump on a plane to Los Angeles at nearby San Francisco International Airport to leave a cold trail. Everything goes fine until Donato encounters the one thing he can’t control: the weather. Victoria Kilpatrick is the head of security at SFO. After 9/11, airport security has become more complicated. Security lines are long and every threat is taken seriously. When fog, a long-time nemesis at SFO shuts down the airport, tempers rise and the terminals fill up. James Donato is one of those who has been delayed, and he knows only one way to relieve his anger - explosively. The fog, and by extension, San Francisco International Airport has foiled his perfect bank job, and Donato decides the airport must pay. The FBI, ATF and local police are called in to form a task force to capture Donato before he can make good on his threat. A San Francisco Fire Department Captain, Mark Saxon, is assigned to the task force as a resource in case Donato is somehow successful in detonating a bomb at the airport and an emergency medical and fire response is necessary. The task force is divided over whether the attack will occur out on the field and attack the airport’s infrastructure, or occur in the terminals where injury and panic will cause chaos. Using skills he learned during an undistinguished military career, Donato plans a commando-like raid on the airport. Kilpatrick and Saxon fight the FBI and ATF over how to use resources to protect the airport. As Donato’s deadline grows closer, there is no agreement on how Donato could carry out his plan. But Donato has already launched it as the task force starts to close in on him. The race is on to prevent an on-time arrival of destruction at San Francisco International Airport.




Fog and Fogonomics


Book Description

THE ONE-STOP RESOURCE FOR ANY INDIVIDUAL OR ORGANIZATION CONSIDERING FOG COMPUTING Fog and Fogonomics is a comprehensive and technology-centric resource that highlights the system model, architectures, building blocks, and IEEE standards for fog computing platforms and solutions. The "fog" is defined as the multiple interconnected layers of computing along the continuum from cloud to endpoints such as user devices and things including racks or microcells in server closets, residential gateways, factory control systems, and more. The authors noted experts on the topic review business models and metrics that allow for the economic assessment of fog-based information communication technology (ICT) resources, especially mobile resources. The book contains a wide range of templates and formulas for calculating quality-of-service values. Comprehensive in scope, it covers topics including fog computing technologies and reference architecture, fog-related standards and markets, fog-enabled applications and services, fog economics (fogonomics), and strategy. This important resource: Offers a comprehensive text on fog computing Discusses pricing, service level agreements, service delivery, and consumption of fog computing Examines how fog has the potential to change the information and communication technology industry in the next decade Describes how fog enables new business models, strategies, and competitive differentiation, as with ecosystems of connected and smart digital products and services Includes case studies featuring integration of fog computing, communication, and networking systems Written for product and systems engineers and designers, as well as for faculty and students, Fog and Fogonomics is an essential book that explores the technological and economic issues associated with fog computing.




Resource Management for On-Demand Mission-Critical Internet of Things Applications


Book Description

RESOURCE MANAGEMENT FOR ON-DEMAND MISSION-CRITICAL INTERNET OF THINGS APPLICATIONS Discover an insightful and up-to-date treatment of resource management in Internet of Things technology In Resource Management for On-Demand Mission-Critical Internet of Things ­Applications, an expert team of engineers delivers an insightful analytical perspective on modeling and decision support for mission-critical Internet of Things applications. The authors dissect the complex IoT ecosystem and provide a cross-layer perspective on the design and operation of IoT, especially in the context of smart and connected communities. The book offers an economic perspective on resource management in IoT systems with a particular emphasis on three main areas: spectrum management via reservation, allocation of cloud/fog resources to IoT applications, and resource provisioning to smart city service requests. It leverages theories from dynamic mechanism design, optimal control theory, and spatial point processes, providing an overview of integrated decision-making frameworks. Finally, the authors discuss future directions and relevant problems on the economics of resource management from new perspectives, like security and resilience. Readers will also enjoy the inclusion of: A thorough introduction and overview of IoT applications in smart cities, mission critical IoT services and requirements, and key metrics and research challenges A comprehensive exploration of the allocation of spectrum resources to mission critical IoT applications, including the massive surge of IoT and spectrum scarcity problem Practical discussions of the provisioning of cloud/fog computing resources to IoT applications, including allocation policy In-depth examinations of resource provisioning to spatio-temporal service requests in smart cities Perfect for engineers working on Internet of Things and cyber-physical systems, Resource Management for On-Demand Mission-Critical Internet of Things Applications is also an indispensable reference for graduate students, researchers, and professors with an interest in IoT resource management.




Digital Agriculture


Book Description




Ad Hoc Networks


Book Description

This book constitutes the refereed proceedings of the 11th International Conference on Ad Hoc Networks, ADHOCNETS 2019, held in Queenstown, New Zealand, in November 2019. The 28 full papers were selected from 64 submissions and cover a variety of network paradigms including mobile ad hoc networks, sensor networks, vehicular networks, underwater networks, airborne networks, underground networks, personal area networks, device-to-device (D2D) communications in 5G cellular networks, and home networks. The papers present a wide range of applications in civilian, commercial, and military areas.




Secure Edge Computing


Book Description

The internet is making our daily life as digital as possible and this new era is called the Internet of Everything (IoE). Edge computing is an emerging data analytics concept that addresses the challenges associated with IoE. More specifically, edge computing facilitates data analysis at the edge of the network instead of interacting with cloud-based servers. Therefore, more and more devices need to be added in remote locations without any substantial monitoring strategy. This increased connectivity and the devices used for edge computing will create more room for cyber criminals to exploit the system’s vulnerabilities. Ensuring cyber security at the edge should not be an afterthought or a huge challenge. The devices used for edge computing are not designed with traditional IT hardware protocols. There are diverse-use cases in the context of edge computing and Internet of Things (IoT) in remote locations. However, the cyber security configuration and software updates are often overlooked when they are most needed to fight cyber crime and ensure data privacy. Therefore, the threat landscape in the context of edge computing becomes wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of the network. In this context, this book addresses the cyber security challenges associated with edge computing, which provides a bigger picture of the concepts, techniques, applications, and open research directions in this area. In addition, the book serves as a single source of reference for acquiring the knowledge on the technology, process and people involved in next generation computing and security. It will be a valuable aid for researchers, higher level students and professionals working in the area.




Intelligent Techniques for Cyber-Physical Systems


Book Description

Intelligent Techniques for Cyber-Physical Systems covers challenges, opportunities, and open research directions for cyber-physical systems (CPS). It focuses on the design and development of machine learning and metaheuristics-enabled methods as well as blockchain for various challenges like security, resource management, computation offloading, trust management, and others in edge, fog, and cloud computing, Internet of Things (IoT), Internet of Everything (IoE), and smart cities. It also includes the design and analysis of deep learning-based models, sensing technologies, metaheuristics, and blockchain for complex real-life systems for CPS. Offers perspectives on the research directions in CPS; Provides state-of-the-art reviews on intelligent techniques, machine learning, deep learning, and reinforcement learning-based models for cloud-enabled IoT environment; Discusses intelligent techniques for complex real-life problems in different CPS scenarios; Reviews advancements in blockchain technology and smart cities; Explores machine learning-based intelligent models for combinatorial optimization problems. The book is aimed at researchers and graduate students in computer science, engineering, and electrical and electronics engineering.




Enabling Technologies and Architectures for Next-Generation Networking Capabilities


Book Description

With the rise of mobile and wireless technologies, more sustainable networks are necessary to support communication. These next-generation networks can now be utilized to extend the growing era of the Internet of Things. Enabling Technologies and Architectures for Next-Generation Networking Capabilities is an essential reference source that explores the latest research and trends in large-scale 5G technologies deployment, software-defined networking, and other emerging network technologies. Featuring research on topics such as data management, heterogeneous networks, and spectrum sensing, this book is ideally designed for computer engineers, technology developers, network administrators and researchers, professionals, and graduate-level students seeking coverage on current and future network technologies.




Advances in Delay-Tolerant Networks (DTNs)


Book Description

Advances in Delay-Tolerant Networks: Architecture and Enhanced Performance, Second Edition provides an important overview of delay-tolerant networks (DTNs) for researchers in electronics, computer engineering, telecommunications and networking for those in academia and R&D in industrial sectors. Part I reviews the technology involved and the prospects for improving performance, including different types of DTN and their applications, such as satellite and deep-space communications and vehicular communications. Part II focuses on how the technology can be further improved, addressing topics, such as data bundling, opportunistic routing, reliable data streaming, and the potential for rapid selection and dissemination of urgent messages. Opportunistic, delay-tolerant networks address the problem of intermittent connectivity in a network where there are long delays between sending and receiving messages, or there are periods of disconnection. - Reviews the different types of DTN and shows how they can be applied in satellite and deep-space communications, vehicular communications (including unmanned aerial), and during large-scale disasters - Considers security concerns for DTN and potential for rapid selection and dissemination of urgent messages - Reviews the breadth of areas in which DTN is already providing solutions - Covers the prospects for DTN's wider adoption and development of standards




Variable Neighborhood Search


Book Description

This volume constitutes the proceedings of the 8th International Conference on Variable Neighborhood Search, ICVNS 2021, held in Abu Dhabi, United Arab Emirates, in March 2021. The 14 full papers presented in this volume were carefully reviewed and selected from 27 submissions. The papers describe recent advances in methods and applications of variable neighborhood search. Chapter “Reduced Variable Neighbourhood Search for the Generation of Controlled Circular Data” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.