Swarm Intelligence : Theory and Applications in Fog Computing, Beyond 5G Networks, and Information Security - V. Dinesh Reddy

Swarm Intelligence

Theory and Applications in Fog Computing, Beyond 5G Networks, and Information Security

By: V. Dinesh Reddy (Editor), Md Muzakkir Hussain (Editor), Priyanka Singh (Editor)

eText | 13 May 2025 | Edition Number 1

At a Glance

eText


$98.99

or 4 interest-free payments of $24.75 with

 or 

Available: 13th May 2025

Preorder. Online access available after release.

Why choose an eTextbook?

Instant Access *

Purchase and read your book immediately

Read Aloud

Listen and follow along as Bookshelf reads to you

Study Tools

Built-in study tools like highlights and more

* eTextbooks are not downloadable to your eReader or an app and can be accessed via web browsers only. You must be connected to the internet and have no technical issues with your device or browser that could prevent the eTextbook from operating.

This book offers a comprehensive overview of the theory and practical applications of swarm intelligence in fog computing, beyond 5G networks, and information security. The introduction section provides a background on swarm intelligence and its applications in real-world scenarios. The subsequent chapters focus on the practical applications of swarm intelligence in fog-edge computing, beyond 5G networks, and information security. The book explores various techniques such as computation offloading, task scheduling, resource allocation, spectrum management, radio resource management, wireless caching, joint resource optimization, energy management, path planning, UAV placement, and intelligent routing. Additionally, the book discusses the applications of swarm intelligence in optimizing parameters for information transmission, data encryption, and secure transmission in edge networks, multi-cloud systems, and 6G networks. The book is suitable for researchers, academics, and professionals interested in swarm intelligence and its applications in fog computing, beyond 5G networks, and information security. The book concludes by summarizing the key takeaways from each chapter and highlighting future research directions in these areas.

on
Desktop
Tablet
Mobile

More in Computer Science

Amazon.com : Get Big Fast - Robert Spector

eBOOK

Gene Expression Analysis : Methods and Protocols - Nalini Raghavachari

eBOOK