
Swarm Intelligence
Theory and Applications in Fog Computing, Beyond 5G Networks, and Information Security
- English
- ePUB (mobile friendly)
- Available on iOS & Android
Swarm Intelligence
Theory and Applications in Fog Computing, Beyond 5G Networks, and Information Security
About this book
This book offers a comprehensive overview of the theory and practical applications of swarm intelligence in fog computing, beyond 5G networks, and information security. The introduction section provides a background on swarm intelligence and its applications in real-world scenarios. The subsequent chapters focus on the practical applications of swarm intelligence in fog-edge computing, beyond 5G networks, and information security. The book explores various techniques such as computation offloading, task scheduling, resource allocation, spectrum management, radio resource management, wireless caching, joint resource optimization, energy management, path planning, UAV placement, and intelligent routing. Additionally, the book discusses the applications of swarm intelligence in optimizing parameters for information transmission, data encryption, and secure transmission in edge networks, multi-cloud systems, and 6G networks. The book is suitable for researchers, academics, and professionals interested in swarm intelligence and its applications in fog computing, beyond 5G networks, and information security. The book concludes by summarizing the key takeaways from each chapter and highlighting future research directions in these areas.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Cover Page
- Title Page
- Copyright Page
- Dedication
- Preface
- Table of Contents
- List of Figures
- List of Tables
- 1 Resource Management in Fog Computing:: Overview and Mathematical Foundation
- 2 Swarm Intelligence in IoT and Edge Computing
- 3 Optimal Deployment of Multiple IoT Applications on the Fog Computing: A Metaheuristic-Based Approach
- 4 Machine Learning and Deep Learning with Swarm Algorithms
- 5 Search and Rescue Using UAV SWARM in Disaster Management: A Survey
- 6 Trust Based Access Control in IoT Network
- 7 Safeguarding User Privacy at the Edge of Fog Computing Networks in Decentralized Distributed Computing
- 8 Attack Resilient Authentication Scheme for Fog-centric IoT Device Systems
- 9 Navigating Ethical Challenges: Frameworks for Swarm Intelligence in Fog Computing
- 10 A Robust DIW Approach for UAV Image Transmission Using PSMD Encryption
- References
- Index