|
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
Cluster or co-cluster analyses are important tools in a variety of
scientific areas. The introduction of this book presents a state of
the art of already well-established, as well as more recent methods
of co-clustering. The authors mainly deal with the two-mode
partitioning under different approaches, but pay particular
attention to a probabilistic approach. Chapter 1 concerns
clustering in general and the model-based clustering in particular.
The authors briefly review the classical clustering methods and
focus on the mixture model. They present and discuss the use of
different mixtures adapted to different types of data. The
algorithms used are described and related works with different
classical methods are presented and commented upon. This chapter is
useful in tackling the problem of co-clustering under the mixture
approach. Chapter 2 is devoted to the latent block model proposed
in the mixture approach context. The authors discuss this model in
detail and present its interest regarding co-clustering. Various
algorithms are presented in a general context. Chapter 3 focuses on
binary and categorical data. It presents, in detail, the
appropriated latent block mixture models. Variants of these models
and algorithms are presented and illustrated using examples.
Chapter 4 focuses on contingency data. Mutual information,
phi-squared and model-based co-clustering are studied. Models,
algorithms and connections among different approaches are described
and illustrated. Chapter 5 presents the case of continuous data. In
the same way, the different approaches used in the previous
chapters are extended to this situation. Contents 1. Cluster
Analysis. 2. Model-Based Co-Clustering. 3. Co-Clustering of Binary
and Categorical Data. 4. Co-Clustering of Contingency Tables. 5.
Co-Clustering of Continuous Data. About the Authors Gerard Govaert
is Professor at the University of Technology of Compiegne, France.
He is also a member of the CNRS Laboratory Heudiasyc (Heuristic and
diagnostic of complex systems). His research interests include
latent structure modeling, model selection, model-based cluster
analysis, block clustering and statistical pattern recognition. He
is one of the authors of the MIXMOD (MIXtureMODelling) software.
Mohamed Nadif is Professor at the University of Paris-Descartes,
France, where he is a member of LIPADE (Paris Descartes computer
science laboratory) in the Mathematics and Computer Science
department. His research interests include machine learning, data
mining, model-based cluster analysis, co-clustering, factorization
and data analysis. Cluster Analysis is an important tool in a
variety of scientific areas. Chapter 1 briefly presents a state of
the art of already well-established as well more recent methods.
The hierarchical, partitioning and fuzzy approaches will be
discussed amongst others. The authors review the difficulty of
these classical methods in tackling the high dimensionality,
sparsity and scalability. Chapter 2 discusses the interests of
coclustering, presenting different approaches and defining a
co-cluster. The authors focus on co-clustering as a simultaneous
clustering and discuss the cases of binary, continuous and
co-occurrence data. The criteria and algorithms are described and
illustrated on simulated and real data. Chapter 3 considers
co-clustering as a model-based co-clustering. A latent block model
is defined for different kinds of data. The estimation of
parameters and co-clustering is tackled under two approaches:
maximum likelihood and classification maximum likelihood. Hard and
soft algorithms are described and applied on simulated and real
data. Chapter 4 considers co-clustering as a matrix approximation.
The trifactorization approach is considered and algorithms based on
update rules are described. Links with numerical and probabilistic
approaches are established. A combination of algorithms are
proposed and evaluated on simulated and real data. Chapter 5
considers a co-clustering or bi-clustering as the search for
coherent co-clusters in biological terms or the extraction of
co-clusters under conditions. Classical algorithms will be
described and evaluated on simulated and real data. Different
indices to evaluate the quality of coclusters are noted and used in
numerical experiments.
This book gives a review of the principles, methods and techniques
of important and emerging research topics and technologies in
Channel Coding, including theory, algorithms, and applications.
Edited by leading people in the field who, through their
reputation, have been able to commission experts to write on a
particular topic. With this reference source you will: Quickly
grasp a new area of research Understand the underlying principles
of a topic and its applications Ascertain how a topic relates to
other areas and learn of the research issues yet to be resolved
Wireless Public Safety Networks, Volume Two: A Systematic Approach
presents the latest advances in the wireless Public Safety Networks
(PSNs) field, the networks established by authorities to either
prepare the population for an eminent catastrophe, or those used
for support during crisis and normalization phases. Maintaining
communication capabilities in a disaster scenario is crucial for
avoiding loss of lives and damages to property. This book examines
past communication failures that have directly contributed to the
loss of lives, giving readers in-depth discussions of the public
networks that impact emergency management, covering social media,
crowdsourcing techniques, wearable wireless sensors, moving-cells
scenarios, mobility management protocols, 5G networks, broadband
networks, data dissemination, and the resources of the frequency
spectrum.
Satellite Soil Moisture Retrieval: Techniques and Applications
offers readers a better understanding of the scientific
underpinnings, development, and application of soil moisture
retrieval techniques and their applications for environmental
modeling and management, bringing together a collection of recent
developments and rigorous applications of soil moisture retrieval
techniques from optical and infrared datasets, such as the
universal triangle method, vegetation indices based approaches,
empirical models, and microwave techniques, particularly by
utilizing earth observation datasets such as IRS III, MODIS,
Landsat7, Landsat8, SMOS, AMSR-e, AMSR2 and the upcoming SMAP.
Through its coverage of a wide variety of soil moisture retrieval
applications, including drought, flood, irrigation scheduling,
weather forecasting, climate change, precipitation forecasting, and
several others, this is the first book to promote synergistic and
multidisciplinary activities among scientists and users working in
the hydrometeorological sciences.
RFID and Wireless Sensors using Ultra-Wideband Technology explores
how RFID-based technologies are becoming the first choice to
realize the last (wireless) link in the chain between each element
and the Internet due to their low cost and simplicity. Each day,
more and more elements are being connected to the Internet of
Things. In this book, ultra-wideband radio technology (in time
domain) is exploited to realize this wireless link. Chipless,
semi-passive and active RFID systems and wireless sensors and
prototypes are proposed in terms of reader (setup and signal
processing techniques) and tags (design, integration of sensors and
performance). The authors include comprehensive theories, proposals
of advanced techniques, and their implementation to help readers
develop time-domain ultra-wideband radio technology for a variety
of applications. This book is suitable for post-doctoral
candidates, experienced researchers, and engineers developing RFID,
tag antenna designs, chipless RFID, and sensor integration.
Meeting People via WiFi and Bluetooth will contain an overview of
how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi)
and Bluetooth 802.15 Radio Frequencies. The content contained here
came from research and materials originally presented at Defcon
Wireless CTF Village in August 2015 entitled "Meeting People Via
Wi-Fi". The book will go over the hardware and software needed in
order to do this tracking, how to use these particular tools in
order to do attribution, and tips for protecting yourself from
being attributed via those signals.
Body centric wireless networking and communications is an emerging
4G technology for short (1-5 m) and very short (below 1 m) range
communications systems, used to connect devices worn on (or in) the
body, or between two people in close proximity. It has great
potential for applications in healthcare delivery, entertainment,
surveillance, and emergency services. This book brings together
contributions from a multidisciplinary team of researchers in the
field of wireless and mobile communications, signal processing and
medical measurements to present the underlying theory,
implementation challenges and applications of this exciting new
technology. Topics covered include: diversity and cooperative
communications in body area networks; ultra wideband radio channel
characterisation for body-centric wireless communication; sparse
characterisation of body-centric radio channels; antenna / human
body interactions in the 60 GHz band; antennas for ingestible
capsule telemetry; in vivo wireless channel modelling; diversity
and MIMO for efficient front-end design of body-centric wireless
communications devices; on-body antennas and radio channels for GPS
applications; textile substrate integrated waveguide technology for
the next-generation wearable microwave systems; ultra wideband
body-centric networks for localisation and motion capture
application; down scaling to the nano-scale in body-centric
nano-networks; and the road ahead for body-centric wireless
communication and networks.
The communication field is evolving rapidly in order to keep up
with society's demands. As such, it becomes imperative to research
and report recent advancements in computational intelligence as it
applies to communication networks. The Handbook of Research on
Recent Developments in Intelligent Communication Application is a
pivotal reference source for the latest developments on emerging
data communication applications. Featuring extensive coverage
across a range of relevant perspectives and topics, such as
satellite communication, cognitive radio networks, and wireless
sensor networks, this book is ideally designed for engineers,
professionals, practitioners, upper-level students, and academics
seeking current information on emerging communication networking
trends.
Mobile Ad Hoc Networks (MANETs) are a popular form of network for
data transfer due to the fact that they are dynamic, require no
fixed infrastructure, and are scalable. However, MANETs are
particularly susceptible to several different types of widely
perpetrated cyberattack. One of the most common hacks aimed at
MANETs is the Black Hole attack, in which a particular node within
the network displays itself as having the shortest path for the
node whose packets it wants to intercept. Once the packets are
drawn to the Black Hole, they are then dropped instead of relayed,
and the communication of the MANET is thereby disrupted, without
knowledge of the other nodes in the network. Due to the
sophistication of the Black Hole attack, there has been a lot of
research conducted on how to detect it and prevent it. The authors
of this short format title provide their research results on
providing an effective solution to Black Hole attacks, including
introduction of new MANET routing protocols that can be implemented
in order to improve detection accuracy and network parameters such
as total dropped packets, end-to-end delay, packet delivery ratio,
and routing request overhead.
The implementation of wireless sensor networks has wide-ranging
applications for monitoring various physical and environmental
settings. However, certain limitations with these technologies must
be addressed in order to effectively utilize them. The Handbook of
Research on Advanced Wireless Sensor Network Applications,
Protocols, and Architectures is a pivotal reference source for the
latest research on recent innovations and developments in the field
of wireless sensors. Examining the advantages and challenges
presented by the application of these networks in various areas,
this book is ideally designed for academics, researchers, students,
and IT developers.
Wireless Public Safety Networks, Volume One: Overview and
Challenges presents the latest advances in the wireless Public
Safety Networks (PSNs) field, the networks established by
authorities to either prepare the population for an eminent
catastrophe, or as support during crisis and normalization phases.
Maintaining communication capabilities in a disaster scenario is
crucial for avoiding loss of lives and damages to property.
Wireless Public Safety Networks examines past communication
failures that have directly contributed to the loss of lives. This
book will give readers a broad view of the PSNs field, analyzing
the benefits PSNs may bring to society, the main challenges related
to the establishment and maintenance of these networks, the latest
advancements in the field, and future perspectives.
This book is the first to cover the recently developed MPEG-V
standard, explaining the fundamentals of each part of the
technology and exploring potential applications. Written by an
expert in the field, who was instrumental in the development of the
standard, the book goes beyond the scope of the official standard
documentation, describing how to use the technology in a practical
context and how to combine it with other information such as audio,
video, images, and text. Each chapter follows an easy-to-understand
format, first examining how each part of the standard is composed,
then discussing some intended uses and applications for each
particular effect.
With this book, you will learn how to:
-Use the MPEG-V standard to develop applications
-Develop systems for various use cases using MPEG-V
-Synchronize the virtual world and real world
-Create and render sensory effects for media
-Understand and use MPEG-V for the research of new types of media
related technology and services.
The first book on the new MPEG-V standard, which enables
interoperability between virtual worlds and the real world
Provides the technical foundations for understanding and using
MPEG-V for various virtual world, mirrored world, and mixed world
use cases
Accompanying website features schema files for the standard, with
example XML files, source code from the reference software and
example applications."
Radar is a key technology in the safety system of a modern vehicle.
Automotive radars are the critical sensors in advanced
driver-assistance systems, which are used in adaptive cruise
control, collision avoidance, blind spot detection, lane change
assistance, and parking assistance. The book covers all the modern
radars used in automotive technology. A long-range radar mounted in
the front of the vehicle is usually for adaptive cruise control.
The medium range radars mounted in the front and rear provide wider
coverage than the long-range radars and they can be used for cross
traffic alert and lane change assistance. The corner mounted short
range radars support parking aid, obstacle/pedestrian detection and
blind spot monitoring. In real applications, these radars usually
work together to provide more robust detection results. In this
book, we also recognize that the future of automotive radars should
not only address conventional exterior applications, but also play
important roles for interior applications, such as gesture sensing
for human-vehicle interaction and driver/passenger vital signs and
presence monitoring. The book is aimed at those radar engineers who
are working on automotive applications.
In the ever-evolving telecommunication industry, smart mobile
computing devices have become increasingly affordable and powerful,
leading to significant growth in the number of advanced mobile
users and their bandwidth demands. Due to this increasing need, the
next generation of wireless networks needs to enable solutions to
bring together broadband, broadcast, and cellular technologies for
global consumers. Paving the Way for 5G Through the Convergence of
Wireless Systems provides innovative insights into wireless
networks and cellular coexisting solutions that aim at paving the
way towards 5G. Through examining data offloading, cellular
technologies, and multi-edge computing, it addresses coexistence
problems at different levels (i.e., physical characteristics, open
access, technology-neutrality, economic characteristics,
healthcare, education, energy, etc.), influencing networks to
provide solutions for next generation wireless networks. Bridging
research and practical solutions, this comprehensive reference
source is ideally designed for graduate-level students, IT
professionals and technicians, engineers, academicians, and
researchers.
Several evolutionary algorithms (EAs) have emerged in recent
decades that mimic the behaviour and evolution of biological
entities. EAs are widely used to solve single and multi-objective
optimization engineering problems. EAs have also been applied to a
variety of microwave components, antenna design, radar design, and
wireless communications problems. These techniques, among others,
include genetic algorithms (GAs), evolution strategies (ES),
particle swarm optimization (PSO), differential evolution (DE), and
ant colony optimization (ACO). In addition, new innovative
algorithms that are not only biology-based but also physics-based
or music-based are also emerging, as are hybrid combinations of
EAs. The use of evolutionary algorithms is having an increasing
impact on antenna design and wireless communications problems. EAs
combined with numerical methods in electromagnetics have obtained
significant and successful results. This book aims to present some
of the emerging EAs and their variants. Chapter 1 introduces the
optimization methods in general and the evolutionary algorithms.
Chapter 2 presents briefly some of the most popular evolutionary
algorithms, such as particle swarm optimization (PSO), differential
evolution (DE), and ant colony optimization (ACO) as well as some
emerging ones. Chapter 3 focuses on antenna array synthesis, which
constitutes a wide range of antenna design problems. Chapter 4
gives an overview of patch antenna design using evolutionary
algorithms. Chapter 5 presents design cases from different
microwave structure cases. Chapter 6 discusses on various
representative design problems in wireless communications. Chapter
7 deals with design cases for 5G and beyond.
|
You may like...
Mermaid Fillet
Mia Arderne
Paperback
(2)
R320
R286
Discovery Miles 2 860
|