Swarm Intelligence : Theory and Applications in Fog Computing, Beyond 5G Networks, and Information Security / edited by V. Dinesh Reddy, Md Muzakkir Hussain, Priyanka Singh
Contributor(s): Resource type: Ressourcentyp: Buch (Online)Book (Online)Language: English Publisher: Boca Raton : CRC Press, Taylor & Francis Group, 2025Edition: 1st editionDescription: 1 Online-Ressource (258 pages) : illustrationsISBN:- 9781032693217
- 1032693215
- 9781040368138
- 1040368131
- 9781040368176
- 1040368174
- 9781032676975
- 006.3/824 23/eng/20250312
- Q337.3
Contents:
Summary: This book offers a comprehensive overview of the theory and practical applications of swarm intelligence in fog computing, beyond 5G networks, and information security. The introduction section provides a background on swarm intelligence and its applications in real-world scenarios. The subsequent chapters focus on the practical applications of swarm intelligence in fog-edge computing, beyond 5G networks, and information security. The book explores various techniques such as computation offloading, task scheduling, resource allocation, spectrum management, radio resource management, wireless caching, joint resource optimization, energy management, path planning, UAV placement, and intelligent routing. Additionally, the book discusses the applications of swarm intelligence in optimizing parameters for information transmission, data encryption, and secure transmission in edge networks, multi-cloud systems, and 6G networks. The book is suitable for researchers, academics, and professionals interested in swarm intelligence and its applications in fog computing, beyond 5G networks, and information security. The book concludes by summarizing the key takeaways from each chapter and highlighting future research directions in these areasPPN: PPN: 1940043743Package identifier: Produktsigel: ZDB-4-NLEBK | BSZ-4-NLEBK-KAUB
Preface. Resource Management in Fog Computing: Overview and Mathematical Foundation. Swarm Intelligence in IoT and Edge Computing. Optimal Deployment of Multiple IoT Applications on the Fog Computing: A Metaheuristic-Based Approach. Machine Learning and Deep Learning with Swarm Algorithms. Search and Rescue Using UAV SWARM in Disaster Management: A Survey. Trust Based Access Control in IoT Network. Safeguarding User Privacy at the Edge of Fog Computing Networks in Decentralized Distributed Computing. Attack Resilient Authentication Scheme for Fog-centric IoT Device Systems. Navigating Ethical Challenges. A Robust DIW Approach for UAV Image Transmission Using PSMD Encryption. References. Index.
No physical items for this record
Anmerkungen zur Barrierefreiheit: "EBSCO evaluates our products based on the Web Content Accessibility Guidelines (WCAG) and the related Section 508 and EN 301 549 regulations in the US and EU. Most EBSCO products are substantially conformant with WCAG 2.2 level AA." Source: https://connect.ebsco.com/s/article/EBSCO-VPATs?language=en_US. Last accessed April 22, 2025.