The Resource Bio-inspired computation in telecommunications, edited by Xin-She Yang, Su Fong Chien, Tiew On Ting
Bio-inspired computation in telecommunications, edited by Xin-She Yang, Su Fong Chien, Tiew On Ting
Resource Information
The item Bio-inspired computation in telecommunications, edited by Xin-She Yang, Su Fong Chien, Tiew On Ting represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Bio-inspired computation in telecommunications, edited by Xin-She Yang, Su Fong Chien, Tiew On Ting represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Summary
- Bio-inspired computation, especially those based on swarm intelligence, has become increasingly popular in the last decade. Bio-Inspired Computation in Telecommunications reviews the latest developments in bio-inspired computation from both theory and application as they relate to telecommunications and image processing, providing a complete resource that analyzes and discusses the latest and future trends in research directions. Written by recognized experts, this is a must-have guide for researchers, telecommunication engineers, computer scientists and PhD students
- Language
- eng
- Extent
- 1 online resource (349 pages)
- Contents
-
- Front Cover; Bio-Inspired Computation in Telecommunications; Copyright ; Contents ; Preface ; List of Contributors ; Chapter 1: Bio-Inspired Computation and Optimization: An Overview; 1.1. Introduction; 1.2. Telecommunications and optimization; 1.3. Key challenges in optimization; 1.3.1. Infinite Monkey Theorem and Heuristicity; 1.3.2. Efficiency of an Algorithm; 1.3.3. How to Choose Algorithms; 1.3.4. Time Constraints; 1.4. Bio-inspired optimization algorithms; 1.4.1. SI-Based Algorithms; 1.4.1.1. Ant and bee algorithms; 1.4.1.2. Bat algorithm; 1.4.1.3. Particle swarm optimization
- 1.4.1.4. Firefly algorithm1.4.1.5. Cuckoo search; 1.4.2. Non-SI-Based Algorithms; 1.4.2.1. Simulated annealing; 1.4.2.2. Genetic algorithms; 1.4.2.3. Differential evolution; 1.4.2.4. Harmony search; 1.4.3. Other Algorithms; 1.5. Artificial neural networks; 1.5.1. Basic Idea; 1.5.2. Neural Networks; 1.5.3. Back Propagation Algorithm; 1.6. Support vector machine; 1.6.1. Linear SVM; 1.6.2. Kernel Tricks and Nonlinear SVM; 1.7. Conclusions; References; Chapter 2: Bio-Inspired Approaches in Telecommunications; 2.1. Introduction; 2.2. Design problems in telecommunications; 2.3. Green communications
- 2.3.1. Energy Consumption in Wireless Communications2.3.2. Metrics for Energy Efficiency; 2.3.3. Radio Resource Management; 2.3.4. Strategic Network Deployment; 2.4. Orthogonal frequency division multiplexing; 2.4.1. OFDM Systems; 2.4.2. Three-Step Procedure for Timing and Frequency Synchronization; 2.5. OFDMA model considering energy efficiency and quality-of-service; 2.5.1. Mathematical Formulation; 2.5.2. Results; 2.6. Conclusions; References; Chapter 3: Firefly Algorithm in Telecommunications; 3.1. Introduction; 3.2. Firefly algorithm; 3.2.1. Algorithm Complexity
- 3.2.2. Variants of Firefly Algorithm3.3. Traffic Characterization; 3.3.1. Network Management Based on Flow Analysis and Traffic Characterization; 3.3.2. Firefly Harmonic Clustering Algorithm; 3.3.3. Results; 3.4. Applications in wireless cooperative networks; 3.4.1. Related Work; 3.4.2. System Model and Problem Statement; 3.4.2.1. Energy and spectral efficiencies; 3.4.2.2. Problem statement; 3.4.3. Dinkelbach Method; 3.4.4. Firefly Algorithm; 3.4.5. Simulations and Numerical Results; 3.5. Concluding remarks; 3.5.1. FA in Traffic Characterization; 3.5.2. FA in Cooperative Networks; References
- Chapter 4: A Survey of Intrusion Detection Systems Using Evolutionary Computation4.1. Introduction; 4.2. Intrusion detection systems; 4.2.1. IDS Components; 4.2.2. Research Areas and Challenges in Intrusion Detection; 4.3. The method: evolutionary computation; 4.4. Evolutionary computation applications on intrusion detection; 4.4.1. Foundations; 4.4.2. Data Collection; 4.4.3. Detection Techniques and Response; 4.4.3.1. Intrusion detection on conventional networks; 4.4.3.2. Intrusion detection on wireless and resource-constrained networks; 4.4.4. IDS Architecture; 4.4.5. IDS Security
- Isbn
- 9780128015384
- Label
- Bio-inspired computation in telecommunications
- Title
- Bio-inspired computation in telecommunications
- Statement of responsibility
- edited by Xin-She Yang, Su Fong Chien, Tiew On Ting
- Language
- eng
- Summary
- Bio-inspired computation, especially those based on swarm intelligence, has become increasingly popular in the last decade. Bio-Inspired Computation in Telecommunications reviews the latest developments in bio-inspired computation from both theory and application as they relate to telecommunications and image processing, providing a complete resource that analyzes and discusses the latest and future trends in research directions. Written by recognized experts, this is a must-have guide for researchers, telecommunication engineers, computer scientists and PhD students
- Cataloging source
- E7B
- Dewey number
- 621.382
- Illustrations
- illustrations
- Index
- index present
- LC call number
- HE7631
- LC item number
- .B56 2015eb
- Literary form
- non fiction
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
-
- Yang, Xin-She
- Chien, Su Fong
- Ting, Tiew On
- http://library.link/vocab/subjectName
-
- Telecommunication
- Natural computation
- TECHNOLOGY & ENGINEERING / Mechanical
- Natural computation
- Telecommunication
- Label
- Bio-inspired computation in telecommunications, edited by Xin-She Yang, Su Fong Chien, Tiew On Ting
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Front Cover; Bio-Inspired Computation in Telecommunications; Copyright ; Contents ; Preface ; List of Contributors ; Chapter 1: Bio-Inspired Computation and Optimization: An Overview; 1.1. Introduction; 1.2. Telecommunications and optimization; 1.3. Key challenges in optimization; 1.3.1. Infinite Monkey Theorem and Heuristicity; 1.3.2. Efficiency of an Algorithm; 1.3.3. How to Choose Algorithms; 1.3.4. Time Constraints; 1.4. Bio-inspired optimization algorithms; 1.4.1. SI-Based Algorithms; 1.4.1.1. Ant and bee algorithms; 1.4.1.2. Bat algorithm; 1.4.1.3. Particle swarm optimization
- 1.4.1.4. Firefly algorithm1.4.1.5. Cuckoo search; 1.4.2. Non-SI-Based Algorithms; 1.4.2.1. Simulated annealing; 1.4.2.2. Genetic algorithms; 1.4.2.3. Differential evolution; 1.4.2.4. Harmony search; 1.4.3. Other Algorithms; 1.5. Artificial neural networks; 1.5.1. Basic Idea; 1.5.2. Neural Networks; 1.5.3. Back Propagation Algorithm; 1.6. Support vector machine; 1.6.1. Linear SVM; 1.6.2. Kernel Tricks and Nonlinear SVM; 1.7. Conclusions; References; Chapter 2: Bio-Inspired Approaches in Telecommunications; 2.1. Introduction; 2.2. Design problems in telecommunications; 2.3. Green communications
- 2.3.1. Energy Consumption in Wireless Communications2.3.2. Metrics for Energy Efficiency; 2.3.3. Radio Resource Management; 2.3.4. Strategic Network Deployment; 2.4. Orthogonal frequency division multiplexing; 2.4.1. OFDM Systems; 2.4.2. Three-Step Procedure for Timing and Frequency Synchronization; 2.5. OFDMA model considering energy efficiency and quality-of-service; 2.5.1. Mathematical Formulation; 2.5.2. Results; 2.6. Conclusions; References; Chapter 3: Firefly Algorithm in Telecommunications; 3.1. Introduction; 3.2. Firefly algorithm; 3.2.1. Algorithm Complexity
- 3.2.2. Variants of Firefly Algorithm3.3. Traffic Characterization; 3.3.1. Network Management Based on Flow Analysis and Traffic Characterization; 3.3.2. Firefly Harmonic Clustering Algorithm; 3.3.3. Results; 3.4. Applications in wireless cooperative networks; 3.4.1. Related Work; 3.4.2. System Model and Problem Statement; 3.4.2.1. Energy and spectral efficiencies; 3.4.2.2. Problem statement; 3.4.3. Dinkelbach Method; 3.4.4. Firefly Algorithm; 3.4.5. Simulations and Numerical Results; 3.5. Concluding remarks; 3.5.1. FA in Traffic Characterization; 3.5.2. FA in Cooperative Networks; References
- Chapter 4: A Survey of Intrusion Detection Systems Using Evolutionary Computation4.1. Introduction; 4.2. Intrusion detection systems; 4.2.1. IDS Components; 4.2.2. Research Areas and Challenges in Intrusion Detection; 4.3. The method: evolutionary computation; 4.4. Evolutionary computation applications on intrusion detection; 4.4.1. Foundations; 4.4.2. Data Collection; 4.4.3. Detection Techniques and Response; 4.4.3.1. Intrusion detection on conventional networks; 4.4.3.2. Intrusion detection on wireless and resource-constrained networks; 4.4.4. IDS Architecture; 4.4.5. IDS Security
- Control code
- 905866095
- Dimensions
- unknown
- Extent
- 1 online resource (349 pages)
- Form of item
- online
- Isbn
- 9780128015384
- Lccn
- 2014960051
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
-
- C20140005011
- 9780128015384
- Other physical details
- illustrations
- http://library.link/vocab/ext/overdrive/overdriveId
- 9780128017432
- Specific material designation
- remote
- System control number
- (OCoLC)905866095
- Label
- Bio-inspired computation in telecommunications, edited by Xin-She Yang, Su Fong Chien, Tiew On Ting
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Front Cover; Bio-Inspired Computation in Telecommunications; Copyright ; Contents ; Preface ; List of Contributors ; Chapter 1: Bio-Inspired Computation and Optimization: An Overview; 1.1. Introduction; 1.2. Telecommunications and optimization; 1.3. Key challenges in optimization; 1.3.1. Infinite Monkey Theorem and Heuristicity; 1.3.2. Efficiency of an Algorithm; 1.3.3. How to Choose Algorithms; 1.3.4. Time Constraints; 1.4. Bio-inspired optimization algorithms; 1.4.1. SI-Based Algorithms; 1.4.1.1. Ant and bee algorithms; 1.4.1.2. Bat algorithm; 1.4.1.3. Particle swarm optimization
- 1.4.1.4. Firefly algorithm1.4.1.5. Cuckoo search; 1.4.2. Non-SI-Based Algorithms; 1.4.2.1. Simulated annealing; 1.4.2.2. Genetic algorithms; 1.4.2.3. Differential evolution; 1.4.2.4. Harmony search; 1.4.3. Other Algorithms; 1.5. Artificial neural networks; 1.5.1. Basic Idea; 1.5.2. Neural Networks; 1.5.3. Back Propagation Algorithm; 1.6. Support vector machine; 1.6.1. Linear SVM; 1.6.2. Kernel Tricks and Nonlinear SVM; 1.7. Conclusions; References; Chapter 2: Bio-Inspired Approaches in Telecommunications; 2.1. Introduction; 2.2. Design problems in telecommunications; 2.3. Green communications
- 2.3.1. Energy Consumption in Wireless Communications2.3.2. Metrics for Energy Efficiency; 2.3.3. Radio Resource Management; 2.3.4. Strategic Network Deployment; 2.4. Orthogonal frequency division multiplexing; 2.4.1. OFDM Systems; 2.4.2. Three-Step Procedure for Timing and Frequency Synchronization; 2.5. OFDMA model considering energy efficiency and quality-of-service; 2.5.1. Mathematical Formulation; 2.5.2. Results; 2.6. Conclusions; References; Chapter 3: Firefly Algorithm in Telecommunications; 3.1. Introduction; 3.2. Firefly algorithm; 3.2.1. Algorithm Complexity
- 3.2.2. Variants of Firefly Algorithm3.3. Traffic Characterization; 3.3.1. Network Management Based on Flow Analysis and Traffic Characterization; 3.3.2. Firefly Harmonic Clustering Algorithm; 3.3.3. Results; 3.4. Applications in wireless cooperative networks; 3.4.1. Related Work; 3.4.2. System Model and Problem Statement; 3.4.2.1. Energy and spectral efficiencies; 3.4.2.2. Problem statement; 3.4.3. Dinkelbach Method; 3.4.4. Firefly Algorithm; 3.4.5. Simulations and Numerical Results; 3.5. Concluding remarks; 3.5.1. FA in Traffic Characterization; 3.5.2. FA in Cooperative Networks; References
- Chapter 4: A Survey of Intrusion Detection Systems Using Evolutionary Computation4.1. Introduction; 4.2. Intrusion detection systems; 4.2.1. IDS Components; 4.2.2. Research Areas and Challenges in Intrusion Detection; 4.3. The method: evolutionary computation; 4.4. Evolutionary computation applications on intrusion detection; 4.4.1. Foundations; 4.4.2. Data Collection; 4.4.3. Detection Techniques and Response; 4.4.3.1. Intrusion detection on conventional networks; 4.4.3.2. Intrusion detection on wireless and resource-constrained networks; 4.4.4. IDS Architecture; 4.4.5. IDS Security
- Control code
- 905866095
- Dimensions
- unknown
- Extent
- 1 online resource (349 pages)
- Form of item
- online
- Isbn
- 9780128015384
- Lccn
- 2014960051
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
-
- C20140005011
- 9780128015384
- Other physical details
- illustrations
- http://library.link/vocab/ext/overdrive/overdriveId
- 9780128017432
- Specific material designation
- remote
- System control number
- (OCoLC)905866095
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Bio-inspired-computation-in-telecommunications/gTGMxrJuH7I/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Bio-inspired-computation-in-telecommunications/gTGMxrJuH7I/">Bio-inspired computation in telecommunications, edited by Xin-She Yang, Su Fong Chien, Tiew On Ting</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Bio-inspired computation in telecommunications, edited by Xin-She Yang, Su Fong Chien, Tiew On Ting
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Bio-inspired-computation-in-telecommunications/gTGMxrJuH7I/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Bio-inspired-computation-in-telecommunications/gTGMxrJuH7I/">Bio-inspired computation in telecommunications, edited by Xin-She Yang, Su Fong Chien, Tiew On Ting</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>