Artificial Intelligence-Based Design of Reinforced Concrete Structures


Book Description

Artificial Intelligence-Based Design of Reinforced Concrete Structures: Artificial Neural Networks for Engineering Applications is an essential reference resource for readers who want to learn how to perform artificial intelligence-based structural design. The book describes, in detail, the main concepts of ANNs and their application and use in civil and architectural engineering. It shows how neural networks can be established and implemented depending on the nature of a broad range of diverse engineering problems. The design examples include both civil and architectural engineering solutions, for both structural engineering and concrete structures. Those who have not had the opportunity to study or implement neural networks before will find this book very easy to follow. It covers the basic network theory and how to formulate and apply neural networks to real-world problems. Plenty of examples based on real engineering problems and solutions are included to help readers better understand important concepts. - Helps civil engineers understand the fundamentals of AI and ANNs and how to apply them in simple reinforced concrete design cases - Contains practical case study examples on the application of AI technology in structural engineer - Teaches readers how to apply ANNs as solutions for a broad range of engineering problems - Includes AI-based software [MATLAB], which will enable readers to verify AI-based examples




5G


Book Description

With 5G, telecommunications networks have entered a new phase. 5G mobile networks use unique concepts and technologies to deliver current and future applications across a wide spectrum, from high bit-rate smartphones to high-availability car-to-x and mass IoT applications. This book on 5G technology starts with the evolution of mobile networks to 5G. It then addresses basic concepts and technologies such as NGN, IMS, virtualization with NFV and MEC, SDN, and Service Function Chaining. The 5G environment is comprehensively presented, starting with use cases and usage scenarios and moving on to concrete requirements, as well as the standardization at ITU and especially 3GPP, including regulation. In this context, the 5G system design, the 5G access networks with their high-performance transmission technology, and the core network with the innovative concepts of Service Based Architecture and Network Slicing play a significant role. A 5G system is presented here in an integrated view, rounded off by an overview of all relevant IT security aspects. The overall view is concluded by looking at the environmental influences of electromagnetic radiation and the energy and raw material resources requirements. Furthermore, the future development of 5G up to 6G is outlined. The book's main objective is to provide people interested in 5G technology and application scenarios with a well-founded knowledge for an introduction to 5G and encourage further discussion of this topic. The target audience is generally technically interested persons, mostly employees of public and private network operators. This book should be of particular interest, especially within the IT departments of potential 5G user companies, and of course, among computer science and electrical engineering students.




A Complete Guide to Wireless Sensor Networks


Book Description

This book provides comprehensive coverage of the major aspects in designing, implementing, and deploying wireless sensor networks by discussing present research on WSNs and their applications in various disciplines. It familiarizes readers with the current state of WSNs and how such networks can be improved to achieve effectiveness and efficiency. It starts with a detailed introduction of wireless sensor networks and their applications and proceeds with layered architecture of WSNs. It also addresses prominent issues such as mobility, heterogeneity, fault-tolerance, intermittent connectivity, and cross layer optimization along with a number of existing solutions to stimulate future research.




Future Intent-Based Networking


Book Description

So-called Intent-Based Networking (IBN) is founded on well-known SDN (Software-Defined Networking) and represents one of the most important emerging network infrastructure opportunities. The IBN is the beginning of a new era in the history of networking, where the network itself translates business intentions into appropriate network configurations for all devices. This minimizes manual effort, provides an additional layer of network monitoring, and provides the ability to perform network analytics and take full advantage of machine learning. The centralized, software-defined solution provides process automation and proactive problem solving as well as centralized management of the network infrastructure. With software-based network management, many operations can be performed automatically using intelligent control algorithms (artificial intelligence and machine learning). As a result, network operation costs, application response times and energy consumption are reduced, network reliability and performance are improved, network security and flexibility are enhanced. This will be a benefit for existing networks as well as evolved LTE-based mobile networks, emerging Internet of Things (IoT), Cloud systems, and soon for the future 5G/6G networks. The future networks will reach a whole new level of self-awareness, self-configuration, self-optimization, self-recovery and self-protection. This volume consists of 28 chapters, based on recent research on IBN.The volume is a collection of the most important research for the future intent-based networking deployment provided by different groups of researchers from Ukraine, Germany, Slovak Republic, Switzerland, South Korea, China, Czech Republic, Poland, Brazil, Belarus and Israel. The authors of the chapters from this collection present in depth extended research results in their scientific fields.The presented contents are highly interesting while still being rather practically oriented and straightforward to understand. Herewith we would like to wish all our readers a lot of inspiration by studying of the volume!




Learning Python Networking


Book Description

Achieve improved network programmability and automation by leveraging powerful network programming concepts, algorithms, and tools Key FeaturesDeal with remote network servers using SSH, FTP, SNMP and LDAP protocols.Design multi threaded and event-driven architectures for asynchronous servers programming.Leverage your Python programming skills to build powerful network applicationsBook Description Network programming has always been a demanding task. With full-featured and well-documented libraries all the way up the stack, Python makes network programming the enjoyable experience it should be. Starting with a walk through of today's major networking protocols, through this book, you'll learn how to employ Python for network programming, how to request and retrieve web resources, and how to extract data in major formats over the web. You will utilize Python for emailing using different protocols, and you'll interact with remote systems and IP and DNS networking. You will cover the connection of networking devices and configuration using Python 3.7, along with cloud-based network management tasks using Python. As the book progresses, socket programming will be covered, followed by how to design servers, and the pros and cons of multithreaded and event-driven architectures. You'll develop practical clientside applications, including web API clients, email clients, SSH, and FTP. These applications will also be implemented through existing web application frameworks. What you will learnExecute Python modules on networking toolsAutomate tasks regarding the analysis and extraction of information from a networkGet to grips with asynchronous programming modules available in PythonGet to grips with IP address manipulation modules using Python programmingUnderstand the main frameworks available in Python that are focused on web applicationManipulate IP addresses and perform CIDR calculationsWho this book is for If you're a Python developer or a system administrator with Python experience and you're looking to take your first steps in network programming, then this book is for you. If you're a network engineer or a network professional aiming to be more productive and efficient in networking programmability and automation then this book would serve as a useful resource. Basic knowledge of Python is assumed.




Mosby's Oncology Nursing Advisor - E-Book


Book Description

**Selected for Doody's Core Titles® 2024 with "Essential Purchase" designation in Oncology** Find oncology information fast with this concise, all-in-one clinical reference! Mosby's Oncology Nursing Advisor, 3rd Edition uses a streamlined format to provide quick access to the most essential information on oncology nursing care. Evidence-based guidelines include topics such as the major cancers, principles of cancer management, and principles of symptom management, as well as oncologic emergencies, palliative care, and nursing practice considerations. This edition includes new information on cancer treatments, genetic risk, chemotherapy guidelines, and more. Written by a team of oncology nursing experts led by Susan Maloney-Newton, this book is ideal for use in any oncology nursing setting. - Detailed descriptions of more than 50 major cancer types provide essential information on incidence, etiology and risk factors, signs and symptoms, diagnostic workup, histology, staging, treatment, prognosis, and prevention. - Coverage of cancer management principles outlines a wide range of treatment and pharmacologic modalities, including surgery, chemotherapy, radiation therapy, hormonal therapy, immunotherapy, and complementary and alternative therapies. - Symptom management guidelines offer in-depth coverage of pathophysiology, signs and symptoms, assessment tools, lab and diagnostic tests, differential diagnoses, interventions, patient education, follow up care, and resources for more than 30 common symptoms associated with cancer and cancer treatments. - Essential information on oncologic emergencies and emergent issues prepares readers to respond quickly to structural, urologic, metabolic, and hematologic emergencies. - Section on palliative care and end-of-life issues offers helpful guidelines for dealing with topics related to survivorship, palliative care, the final hours of the cancer patient, and loss, grief, and bereavement. - NEW! Updated content reflects the latest evidence-based information, including cancer biology, cancer treatment modalities, the latest chemotherapy guidelines, and a stronger emphasis on oral agents. - NEW! New content addresses the concept of "previvorship," the concept of coping with a documented genetically linked high cancer risk. - NEW! Enhanced content on health disparities, diversity and inclusion, and transgender considerations equips oncology nurses with essential information to promote health equity. - NEW! Key recommendations of the 2020-2030 Future of Nursing Report are integrated into the Nursing Practice Considerations section. - NEW! Content on the impact of the COVID pandemic includes delayed diagnosis and treatment and the impact of COVID sequelae on the health of patients with cancer. - NEW! Added content on palliative care is included in an expanded Pain chapter. - NEW! Full-color design and additional illustrations make it easier to use the book and to understand concepts. - NEW! Pulmonary Symptoms chapter now includes cough, dyspnea, and pleural effusion content.




The Wiley 5G REF


Book Description

THE WILEY 5G REF Explore cutting-edge subjects in 5G privacy and security In The Wiley 5G REF: Security, a team of distinguished researchers delivers an insightful collection of articles selected from the online-only The Wiley 5G Reference. The editors introduce the security landscape of 5G, including the significant security and privacy risks associated with 5G networks. They also discuss different security solutions for various segments of the 5G network, like the radio, edge, access, and core networks. The book explores the security threats associated with key network softwarization technologies, like SDN, NFV, NS, and MEC, as well as those that come with new 5G and IoT services. There is also a detailed discussion on the privacy of 5G networks. The included articles are written by leading international experts in security and privacy for telecommunication networks. They offer learning opportunities for everyone from graduate-level students to seasoned engineering professionals. The book also offers: A thorough introduction to the 5G mobile network security landscape and the major risks associated with it Comprehensive explorations of SDMN security, the complex challenges associated with 5G security, and physical-layer security for 5G and future networks Practical discussions of security for Handover and D2D communication in 5G HetNets, authentication and access control for 5G, and G5-Core network security In-depth examinations of MEC and cloud security, as well as VNF placement and sharing in NFV-based cellular networks Perfect for researchers and practitioners in the fields of 5G security and privacy, The Wiley 5G REF: Security is an indispensable resource for anyone seeking a solid educational foundation in the latest 5G developments.




A Comprehensive Guide to Music Therapy, 2nd Edition


Book Description

Music therapy as an intervention in medical, educational and many other environments has a rich and diverse history of methods, approaches and models. Consolidating the many components of music therapy, this completely updated edition of A Comprehensive Guide to Music Therapy covers everything students, teachers and practitioners of music therapy need to know. Building upon the work of Tony Wigram and developments within the field of music therapy over the last 15 years, this second edition looks at the theoretical foundation of music therapy, selected models and interventions, how it can be applied in clinical practice, and the recent progress made in research and evidence-based practice. Giving a complete picture of the multifaceted world of music therapy, it is a must-have for music therapy students, teachers and practitioners.




LISP Network Deployment and Troubleshooting


Book Description

Implement flexible, efficient LISP-based overlays for cloud, data center, and enterprise The LISP overlay network helps organizations provide seamless connectivity to devices and workloads wherever they move, enabling open and highly scalable networks with unprecedented flexibility and agility. LISP Network Deployment and Troubleshooting is the definitive resource for all network engineers who want to understand, configure, and troubleshoot LISP on Cisco IOS-XE, IOS-XR and NX-OS platforms. It brings together comprehensive coverage of how LISP works, how it integrates with leading Cisco platforms, how to configure it for maximum efficiency, and how to address key issues such as scalability and convergence. Focusing on design and deployment in real production environments, three leading Cisco LISP engineers present authoritative coverage of deploying LISP, verifying its operation, and optimizing its performance in widely diverse environments. Drawing on their unsurpassed experience supporting LISP deployments, they share detailed configuration examples, templates, and best practices designed to help you succeed with LISP no matter how you intend to use it. This book is the Cisco authoritative guide to LISP protocol and is intended for network architects, engineers, and consultants responsible for implementing and troubleshooting LISP network infrastructures. It includes extensive configuration examples with troubleshooting tips for network engineers who want to improve optimization, performance, reliability, and scalability. This book covers all applications of LISP across various environments including DC, Enterprise, and SP. Review the problems LISP solves, its current use cases, and powerful emerging applications Gain in-depth knowledge of LISP’s core architecture and components, including xTRs, PxTRs, MR/MS, ALT, and control plane message exchange Understand LISP software architecture on Cisco platforms Master LISP IPv4 unicast routing, LISP IPv6 routing, and the fundamentals of LISP multicast routing Implement LISP mobility in traditional data center fabrics, and LISP IP mobility in modern data center fabrics Plan for and deliver LISP network virtualization and support multitenancy Explore LISP in the Enterprise multihome Internet/WAN edge solutions Systematically secure LISP environments Troubleshoot LISP performance, reliability, and scalability




Security and Privacy Vision in 6G


Book Description

SECURITY AND PRIVACY VISION IN 6G Prepare for the future of mobile communication with this comprehensive study 6G is the next frontier in mobile communication, with development of 6G standards slated to begin as early as 2026. As telecommunications networks become faster and more intelligent, security and privacy concerns are critical. In an increasingly connected world, there is an urgent need for user data to be safeguarded and system security enhanced against a new generation of threats. Security and Privacy Vision in 6G provides a comprehensive survey of these threats and the emerging techniques for safeguarding against them. It includes mechanisms for prediction, detection, mitigation, and prevention, such that threats to privacy and security can be forestalled at any stage. Fully engaged with proposed 6G architectures, it is an essential resource for mobile communications professionals looking for a head start on the technology of the future. Security and Privacy Vision in 6G readers will also find: Detailed coverage of topics including edge intelligence and cloudification, industrial automation, collaborative robots, and more Treatment balancing the practical and the theoretical An editorial team with decades of international network technology experience in both industry and academia Security and Privacy Vision in 6G is a vital reference for network security professionals and for postgraduate and advanced undergraduate students in mobile communications and network security-related fields.