Professional Documents
Culture Documents
PUBLISHED TITLES
Edited by
Mahmoud Elkhodr
Western Sydney University, Australia
AU: Please
confirm
Qusay Fadhel Hassan
whether Mansoura University, Egypt
the updated
name of
“Qusay Seyed Shahrestani
Fadhel Western Sydney University, Australia
Hassan” is
appropriate.
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to
publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials
or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material
reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If
any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any
form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming,
and recording, or in any information storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://www.
copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-
8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For organizations that
have been granted a photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for
identification and explanation without intent to infringe.
LOC to come
vii
Chapter 11 A Fuzzy Logic–Based QoS Evaluation Method for Heterogeneous Networks........ 205
Farnaz Farid, Seyed Shahrestani, and Chun Ruan
Chapter 17 Efficient Modulation Schemes for Visible Light Communication Systems.............. 357
Navera Karim Memon and Fahim A. Umrani
Chapter 18 A Data Aware Scheme for Scheduling Big-Data Applications with SAVANNA
Hadoop...................................................................................................................... 379
K. Hemant Kumar Reddy, Himansu Das, and Diptendu Sinha Roy
Chapter 19 Big Data Computing using Cloud-based Technologies: Challenges and Future
Perspectives............................................................................................................... 395
Samiya Khan, Kashish A. Shakil, and Mansaf Alam
Index............................................................................................................................................... 483
xi
AU: Please The final part of this book covers the areas of IoT and Big Data. It consists of five chapters that
advise discuss the latest developments and future perspectives of Big Data and the IoT paradigms. The first
whether the
three chapters discuss topics such as data anonymization, which is presented as one of the pioneer
cross refer-
ence Part III solutions that can minimise privacy risks associated with Big Data. This part also includes a chap-
is correct ter that advocates employing a data location aware application scheme to improve the performance
here. of data transfer among clusters. Part III of this book then ends with two chapters on IoT. The first
chapter presents a survey on the current state of IoT security. The second chapter discusses the latest
research on Beamforming technologies in the IoT.
This book is intended for a broader audience; yet, it is a collection of works that researchers and
graduate students may find useful in exploring the latest trends in networking and communications.
It can also be used as a resource for self-study by advanced students. The book can also be of value
to cross-domain practising researchers, professionals, and business stakeholders who may be inter-
ested in knowing about the future networking landscape.
xiii
xv