Research Advances in Network Technologies
Volume 3
-
GET 10% OFF
- Publisher's listprice GBP 120.00
-
57 330 Ft (54 600 Ft + 5% VAT)
The price is estimated because at the time of ordering we do not know what conversion rates will apply to HUF / product currency when the book arrives. In case HUF is weaker, the price increases slightly, in case HUF is stronger, the price goes lower slightly.
- Discount 10% (cc. 5 733 Ft off)
- Discounted price 51 597 Ft (49 140 Ft + 5% VAT)
51 597 Ft
Availability
Not yet published.
Why don't you give exact delivery time?
Delivery time is estimated on our previous experiences. We give estimations only, because we order from outside Hungary, and the delivery time mainly depends on how quickly the publisher supplies the book. Faster or slower deliveries both happen, but we do our best to supply as quickly as possible.
Product details:
- Edition number 1
- Publisher CRC Press
- Date of Publication 12 May 2026
- ISBN 9781041145172
- Binding Hardback
- No. of pages410 pages
- Size 254x178 mm
- Language English
- Illustrations 163 Illustrations, black & white; 51 Halftones, black & white; 112 Line drawings, black & white; 88 Tables, black & white 700
Categories
Short description:
In the digital age, information is the most vital asset and network technologies are the invisible threads that connect our world. From homes and businesses to smart cities and autonomous vehicles, these technologies enable seamless communication, efficient data processing, and intelligent decision-making across a wide range of applications.
MoreLong description:
In the digital age, information is the most vital asset and network technologies are the invisible threads that connect our world. From homes and businesses to smart cities and autonomous vehicles, these technologies enable seamless communication, efficient data processing, and intelligent decision-making across a wide range of applications. Research Advances in Network Technologies: Volume 3 offers a comprehensive exploration of modern network technologies, tracing their evolution from traditional wired systems to cutting-edge wireless solutions such as Bluetooth, satellite networks, and the Internet of Things (IoT). The book delves into the transformative impact of software-defined networking, cloud and edge computing, and next-generation cellular technologies like LTE, VoLTE, and 5G. Bridging theory and practice, the book presents real-world case studies, emerging research trends, and future directions in the field. It highlights the contributions of academia and industry in shaping the networked world and addresses the challenges and opportunities that lie ahead.
This book:
- Explores highly relevant, real-life applications of network technologies across various domains, supported by detailed case studies that illustrate practical implementations and industry use cases
- Provides in-depth analysis of current research developments and highlights future directions in network technologies, offering valuable insights for researchers and advanced learners
- Presents a balanced mix of theoretical foundations, algorithmic strategies, simulation techniques, and implementation-based research, enabling readers to understand and apply network technologies from multiple perspectives
- Adopts a structured approach that caters to both beginners and advanced readers, covering fundamental theories for newcomers and practical simulation and implementation techniques for experienced professionals and researchers
This book is intended for academics, researchers, developers, engineers, and practitioners engaged in or interested in the research, design, and applications of modern network technologies. It also serves as a valuable reference for professionals working in the domain of computer and cellular networks, and as a resource for graduate and postgraduate students in computer science and engineering, information technology, and electronics and communication engineering.
MoreTable of Contents:
1. A Novel Technique for Security Augmentation of Cryptographic Algorithms, 2. IoT Smart Parking System Using ESP32, 3. Multi-Chain NFTs: A Secure and Sustainable Approach to Interoperability in Blockchain, 4. IoT-Driven Autonomous Sowing Robot for Sustainable and Scalable Crop Production, 5. Aerial Data Protection Using Blockchain for UAV Communication, 6. A Blockchain-Integrated Framework for IoV Systems and Autonomous Driving, 7. Streamlined NDN Routing with Regular Expression: Filtering and Traffic Efficiency, 8. Mule Trace: An AI-Driven Model for Detecting Illicit Bank Accounts and Payment Wallets, 9. Intelligent Road Lane-Lines Detection in Real Time for Advanced Driving Assistance Systems, 10. Dynamic Edge Offloading for Congestion Control in Massive Machine-Type Communications, 11. Intelligent Architecture for Data-Driven Network Traffic Prediction and Adaptive Bandwidth Optimization, 12. ProtectSIGN: Detection and Anonymization of Sensitive Non-Biometric Identifiers in Publicly Accessible Multimedia Documents, 13. Advanced Threat Detection Using Deep Learning, 14. PolyCode Studio: A Scalable and Secure Cloud- Based Compiler, 15. A Comparative Study of Code-Based Asymmetric Encryption Frameworks for Post Quantum Communication, 16. Empowering Kubernetes with Artificial Intelligence and Deep Learning for Scalable Cloud and Edge Computing, 17. Choosing Appropriate Data Structure for E-Commerce Platforms, 18. Intelligent Edge-Computing Framework for Real-Time Environmental Monitoring, 19. A Comparative Analysis of Continuous Integration/Continuous Deployment Optimization Techniques: Enhancing DevOps Pipeline Efficiency through Modern Practices, 20. Simulation-Based Analysis of Interoperability, Integration, and Management in Smart Device Networks, 21. Quadratically Fast Searching in Quantum Computation: An Overview, 22. Intelligent IoT Healthcare Infrastructure Using HIPCARE Algorithm and Artificial Intelligence Innovations, 23. Reliable and Efficient Data Transmission in Body Area Networks with Context-Aware Hybrid Secure Routing, 24. Autonomous Resource Orchestration Using Multi-Agent Proximal Policy Optimization in 6G Edge–Fog Environments, 25. Quantum-Powered Cryptographic Enhancements through Hybrid Approaches in Network Security
More