購物比價找書網找車網
FindBook
排序:
 
 有 1 項符合

phoha

的圖書
SENSOR NETWORK OPERATIONS
$ 1800
SENSOR NETWORK OPERATIONS
作者:PHOHA 
出版社:JOHN WILEY & SONS,INC.
出版日期:2006-01-01
三民網路書店 三民網路書店 - 專業工程學  - 來源網頁  
圖書介紹看圖書介紹
圖書介紹 - 資料來源:三民網路書店   評分:
圖書名稱:SENSOR NETWORK OPERATIONS
  • 圖書簡介

    This excellent title introduces the concept of mission-oriented sensor networks as distributed dynamic systems of interacting sensing devices that are networked to jointly execute complex real-time missions under uncertainity. It provides the latest, yet unpublished results on the main technical and application challenges of mission-oriented sensor networks.

    The authors of each chapter are research leaders from multiple disciplines who are presenting their latest innovations on the issues. Together, the editors have compiled a comprehensive treatment of the subject that flows smoothly from chapter to chapter. This interdisciplinary approach significantly enhances the science and technology knowledge base and influences the military and civilian applications of this field.
    Author Information:
    Dr. Shashi Phoha is the Guest Editor of IEEE Transactions in Mobile Computing, Special Issue on Mission-Oriented Sensor Networks. She is the Head of the Information Sciences and Technology Division of ARL and Professor of Electrical and Computer Engineering at Pennsylvania State University. She has led major research programs of multimillion dollars for military sensor networks in industry as well as in academia. In addition to more than a hundred journal articles, she authored or co-authored several books in related areas.
    Dr. Thomas La Porta is the Editor of the IEEE Transactions on Mobile Computing. He received his B.S.E.E. and M.S.E.E. degrees from The Cooper Union, New York, NY and his Ph.D. degree in Electrical Engineering from Columbia University, New York, NY. He joined the Computer Science and Engineering Department at Penn State in 2002 as a Full Professor. He is Director of the Networking Research Center at Penn State.
    Prior to joining Penn State, Dr. LaPorta was with Bell Laboratories since 1986. He was the Director of the Mobile Networking Research Department Bell Laboratories, Lucent Technologies, where he led various projects in wireless and mobile networking. He is an IEEE Fellow, Bell Labs Fellow, received the Bell Labs Distinguished Technical Staff Award, and an Eta Kappa Nu Outstanding Young Electrical Engineer Award. He has published over 50 technical papers and holds over 20 patents.
    Christopher Griffin holds a Masters degree in Mathematics from Penn State and is currently pursuing his Ph.D. there. Mr. Griffin has worked as a research engineer at the Penn State Applied Research Laboratory for the last six years on several DARPA and or Army Research Laboratory sponsored programs, including: the Emergent Surveillance Plexus (ESP) program as a lead engineer; the DARPA sponsored Semantic Information Fusion program under the SensIT initiative, where he co-developed a distributed target tracking system and managed the development of a target classification algorithm using Level 1 sensor fusion techniques; as a co-principal software architect for the DARPA Joint Force Component Controller (JFACC) initiative, an adaptive C2 program aimed at improving Air Force response times; and he was the principal software architect for the Boeing/ARFL Insertion of Embedding Infosphere Technology (IEIST) program. His areas of research expertise are distributed tracking systems, mission oriented control, and system modeling.

  • 作者簡介

    Dr. Shashi Phoha was the Guest Editor of IEEE Transactions on Mobile Computing, Special Issue on Mission-Oriented Sensor Networks. She is a Professor of Electrical and Computer Engineering at The Pennsylvania State University and the head of the Information Sciences and Technology Division of its Applied Research Laboratory. In 2004, she was appointed as the Director of the Information Technology Laboratory of the National Institute of Standards and Technology. She has held senior positions in industry, academia, and government research labs and led major research programs in surveillance sensor networks and Sensor IT for military sensor networks.
    Dr. Thomas La Porta is the Editor of the IEEE Transactions on Mobile Computing. He received his BSEE and MSEE degrees from The Cooper Union, New York, and his PhD degree in electrical engineering from Columbia University, New York. He joined the Computer Science and Engineering Department at Penn State in 2002 as a full professor. He is Director of the Networking Research Center at Penn State.
    Christopher Griffin holds a master's degree in mathematics from Penn State and is currently finishing his PhD there. Mr. Griffin has worked as a research engineer at the Information Science and Technology Division of Penn State Applied Research Laboratory for the last six years on several DARPA and/or Army Research Laboratory–sponsored programs.

  • 名人/編輯推薦

    "…a fundamental contribution to WSN literature. I am sure it will occupy a conspicuous spot in the reader's library." (Computing Reviews.com, August 17, 2007)
    "...a very good monograph [that]...will probably never be removed from your bookshelf once you do." (Computing Reviews.com, November 15, 2006)

  • 目次

    PREFACE.
    CONTRIBUTORS.
    I SENSOR NETWORK OPERATIONS OVERVIEW.
    1 Overview of Mission-Oriented Sensor Networks.
    1.1 Introduction.
    1.2 Trends in Sensor Development.
    1.3 Mission-Oriented Sensor Networks: Dynamic Systems Perspective.
    References.
    II SENSOR NETWORK DESIGN AND OPERATIONS.
    2 Sensor Deployment, Self-Organization, and Localization.
    2.1 Introduction.
    2.2 SCARE: A Scalable Self-Configuration and Adaptive Reconfiguration Scheme for Dense Sensor Networks.
    2.3 Robust Sensor Positioning in Wireless Ad Hoc Sensor Networks.
    2.4 Trigonometric k Clustering (TKC) for Censored Distance Estimation.
    2.5 Sensing Coverage and Breach Paths in Surveillance Wireless Sensor Networks.
    References.
    3 Purposeful Mobility and Navigation.
    3.1 Introduction.
    3.2 Controlled Mobility for Efficient Data Gathering in Sensor Networks with Passively Mobile Nodes.
    3.3 Purposeful Mobility in Tactical Sensor Networks.
    3.4 Formation and Alignment of Distributed Sensing Agents with Double-Integrator Dynamics and Actuator Saturation.
    3.5 Modeling and Enhancing the Data Capacity of Wireless Sensor Networks.
    References.
    4 Lower Layer Issues—MAC, Scheduling, and Transmission.
    4.1 Introduction.
    4.2 SS-TDMA: A Self-Stabilizing Medium Access Control (MAC) for Sensor Networks.
    4.3 Comprehensive Performance Study of IEEE 802.15.4.
    4.4 Providing Energy Efficiency for Wireless Sensor Networks Through Link Adaptation Techniques.
    References.
    5 Network Routing.
    5.1 Introduction.
    5.2 Load-Balanced Query Protocols for Wireless Sensor Networks.
    5.3 Energy-Efficient and MAC-Aware Routing for Data Aggregation in Sensor Networks.
    5.4 LESS: Low-Energy Security Solution for Large-scale Sensor Networks Based on Tree-Ripple-Zone Routing Scheme.
    References.
    6 Power Management.
    6.1 Introduction.
    6.2 Adaptive Sensing and Reporting in Energy-Constrained Sensor Networks.
    6.3 Sensor Placement and Lifetime of Wireless Sensor Networks: Theory and Performance Analysis.
    6.4 Algorithms for Maximizing Lifetime of Battery-Powered Wireless Sensor Nodes.
    6.5 Battery Lifetime Estimation and Optimization for Underwater Sensor Networks.
    References.
    7 Distributed Sensing and Data Gathering.
    7.1 Introduction.
    7.2 Secure Differential Data Aggregation for Wireless Sensor Networks.
    7.3 Energy-Conserving Data Gathering Strategy Based on Trade-off Between Coverage and Data Reporting Latency in Wireless Sensor Networks.
    7.4 Quality-Driven Information Processing and Aggregation in Distributed Sensor Networks.
    7.5 Progressive Approach to Distributed Multiple-Target Detection in Sensor Networks.

    References.
    8 Network Security.
    8.1 Introduction.
    8.2 Energy Cost of Embedded Security for Wireless Sensor Networks.
    8.3 Increasing Authentication and Communication Confidentiality in Wireless Sensor Networks.
    8.4 Efficient Pairwise Authentication Protocols for Sensor and Ad Hoc Networks.
    8.5 Fast and Scalable Key Establishment in Sensor Networks.
    8.6 Weil Pairing-Based Round, Efficient, and Fault-Tolerant Group Key Agreement Protocol for Sensor Networks.
    References.
    III SENSOR NETWORK APPLICATIONS.
    9 Pursuer–Evader Tracking in Sensor Networks.
    9.1 Introduction.
    9.2 The Problem.
    9.3 Evader-Centric Program.
    9.4 Pursuer-Centric Program.
    9.5 Hybrid Pursuer–Evader Program.
    9.6 Efficient Version of Hybrid Program.
    9.7 Implementation and Simulation Results.
    9.8 Discussion and Related Work.
    References.
    10 Embedded Soft Sensing for Anomaly Detection in Mobile Robotic Networks.
    10.1 Introduction.
    10.2 Mobile Robot Simulation Setup.
    10.3 Software Anomalies in Mobile Robotic Networks.
    10.4 Soft Sensor.
    10.5 Software Anomaly Detection Architecture.
    10.6 Anomaly Detection Mechanisms.
    10.7 Test Bed for Software Anomaly Detection in Mobile Robot Application.
    10.8 Results and Discussion.
    10.9 Conclusions and Future Work.
    Appendix A.
    Appendix B.
    References.
    11 Multisensor Network-Based Framework for Video Surveillance: Real-Time Superresolution Imaging.

    11.1 Introduction.
    11.2 Basic Model of Distributed Multisensor Surveillance System.
    11.3 Superresolution Imaging.
    11.4 Optical Flow Computation.
    11.5 Superresolution Image Reconstruction.
    11.6 Experimental Results.
    11.7 Conclusion.
    References.
    12 Using Information Theory to Design Context-Sensing Wearable Systems.
    12.1 Introduction.
    12.2 Related Work.
    12.3 Theoretical Background.
    12.4 Adaptations.
    12.5 Design Considerations.
    12.6 Case Study.
    12.7 Results.
    12.8 Conclusion.
    Appendix.
    References.
    13 Multiple Bit Stream Image Transmission over Wireless Sensor Networks.
    13.1 Introduction.
    13.2 System Description.
    13.3 Experimental Results.
    13.4 Summary and Discussion.
    References.
    14 Hybrid Sensor Network Test Bed for Reinforced Target Tracking.
    14.1 Introduction.
    14.2 Sensor Network Operational Components.
    14.3 Sensor Network Challenge Problem.
    14.4 Integrated Target Surveillance Experiment.
    14.5 Experimental Results and Evaluation.
    14.6 Conclusion.
    References.
    15 Noise-Adaptive Sensor Network for Vehicle Tracking in the Desert.
    15.1 Introduction.
    15.2 Distributed Tracking.
    15.3 Algorithms.

    15.4 Experimental Methods.
    15.5 Results and Discussion.
    15.6 Conclusion.
    References.
    ACKNOWLEDGMENTS.
    INDEX.
    ABOUT THE EDITORS.

贊助商廣告
 
金石堂 - 今日66折
成語就是這樣讀和寫--看成語笑話拚字音字形競賽
作者:呂淑敏
出版社:五南圖書出版股份有限公司
出版日期:2017-03-25
66折: $ 251 
金石堂 - 今日66折
實習神明手冊有聲書﹝第1輯﹞
作者:許添盛醫師主講、齊世芳執筆
出版社:賽斯文化
出版日期:2019-10-05
66折: $ 660 
金石堂 - 今日66折
STEM的一天:工程-配合108課綱自然科學領域,培養小學生科技素養,具備創意設計與實作能力!
作者:南西迪克曼
出版社:五南圖書出版股份有限公司
出版日期:2020-03-28
66折: $ 211 
金石堂 - 今日66折
STEM的一天套書:科學、科技、工程、數學【配合108課綱,跨領域學習,培養自然科學和數理素養】
作者:安魯尼、南西迪克曼
出版社:五南圖書出版股份有限公司
出版日期:2020-05-28
66折: $ 845 
 
金石堂 - 暢銷排行榜
哈利路亞寶貝 (1)
作者:仔縞樂々
出版社:台灣角川股份有限公司
出版日期:2025-02-20
$ 126 
博客來 - 暢銷排行榜
偽裝的真實之吻 break 上+下(首刷限定版)
出版日期:2025-02-05
$ 357 
金石堂 - 暢銷排行榜
還在戀愛試用期,未免也太喜歡(全)
作者:悠ちとせ
出版社:東立出版社
出版日期:2025-02-19
$ 119 
Taaze 讀冊生活 - 暢銷排行榜
現象在一念之間改變 「量子力學式」平行世界的法則
作者:村松大輔
出版社:楓書坊文化出版社
出版日期:2024-02-27
$ 276 
 
博客來 - 新書排行榜
16647(1)
出版日期:2025-02-13
$ 300 
Taaze 讀冊生活 - 新書排行榜
武霸龍荒1
作者:薩爾的迷茫
出版社:今古傳奇(滾石移動)
出版日期:2025-02-21
$ 210 
博客來 - 新書排行榜
SPY×FAMILY 間諜家家酒 14
作者:遠藤達哉
出版社:東立
出版日期:2025-02-04
$ 93 
博客來 - 新書排行榜
鐵拳對鋼拳 愛藏版 1~5 (首刷書盒版)
作者:森田真法
出版社:東立
出版日期:2025-02-20
$ 1190 
 

©2025 FindBook.com.tw -  購物比價  找書網  找車網  服務條款  隱私權政策