Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 7 of 7 matches in All Departments
This book provides applications of wireless sensor networks (WSN) in environmental monitoring, with an emphasis on livestock disease detection and agricultural management in Africa to aid farmers. This proposed system entails current and innovative monitoring technologies intended to improve agricultural conditions in Africa, with a focus on Botswana, and addresses the Internet of Things (IoT) as a set of remote monitoring protocols using WSNs to improve and ensure proper environmental maintenance. In this book, the author introduces WSNs, and how the IoT can be applied to develop a system of "smart agriculture" in Africa, taking into account livestock health, climate change impacts on crops and wildlife, and technological innovations in response to climate change such as windmills and solar panels. The book will be interesting to students and researchers in engineering and life sciences, as well as practitioners working with sensing technologies for agricultural monitoring and improvement.
In this book, three different methods are presented to enhance the capacity and coverage area in LTE-A cellular networks. The scope involves the evaluation of the effect of the RN location in terms of capacity and the determination of the optimum location of the relay that provides maximum achievable data rate for users with limited interference at the cell boundaries. This book presents a new model to enhance both capacity and coverage area in LTE-A cellular network by determining the optimum location for the RN with limited interference. The new model is designed to enhance the capacity of the relay link by employing two antennas in RN. This design enables the relay link to absorb more users at cell edge regions. An algorithm called the Balance Power Algorithm (BPA) is developed to reduce MR power consumption. The book pertains to postgraduate students and researchers in wireless & mobile communications.
This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption; Provides a variety of methods to achieve characteristic region Steganography synchronization; Shows how Steganography improves upon cryptography by using obscurity features.
This book provides applications of wireless sensor networks (WSN) in environmental monitoring, with an emphasis on livestock disease detection and agricultural management in Africa to aid farmers. This proposed system entails current and innovative monitoring technologies intended to improve agricultural conditions in Africa, with a focus on Botswana, and addresses the Internet of Things (IoT) as a set of remote monitoring protocols using WSNs to improve and ensure proper environmental maintenance. In this book, the author introduces WSNs, and how the IoT can be applied to develop a system of "smart agriculture" in Africa, taking into account livestock health, climate change impacts on crops and wildlife, and technological innovations in response to climate change such as windmills and solar panels. The book will be interesting to students and researchers in engineering and life sciences, as well as practitioners working with sensing technologies for agricultural monitoring and improvement.
This book covers newly developed and novel Steganography techniques and algorithms. The book outlines techniques to provide security to a variety of applications using Steganography, with the goal of both hindering an adversary from decoding a hidden message, and also preventing an adversary from suspecting the existence of covert communications. The book looks into applying these newly designed and improved algorithms to provide a new and efficient Steganographic system, called Characteristic Region-Based Image Steganography (CR-BIS). The algorithms combine both the robustness of the Speeded-Up Robust Features technique (SURF) and Discrete Wavelet Transform (DWT) to achieve characteristic region Steganography synchronization. The book also touches on how to avoid hiding data in the whole image by dynamically selecting characteristic regions for the process of embedding. Applies and discusses innovative techniques for hiding text in a digital image file or even using it as a key to the encryption; Provides a variety of methods to achieve characteristic region Steganography synchronization; Shows how Steganography improves upon cryptography by using obscurity features.
In this book, three different methods are presented to enhance the capacity and coverage area in LTE-A cellular networks. The scope involves the evaluation of the effect of the RN location in terms of capacity and the determination of the optimum location of the relay that provides maximum achievable data rate for users with limited interference at the cell boundaries. This book presents a new model to enhance both capacity and coverage area in LTE-A cellular network by determining the optimum location for the RN with limited interference. The new model is designed to enhance the capacity of the relay link by employing two antennas in RN. This design enables the relay link to absorb more users at cell edge regions. An algorithm called the Balance Power Algorithm (BPA) is developed to reduce MR power consumption. The book pertains to postgraduate students and researchers in wireless & mobile communications.
This book presents new models to enhance both capacity and coverage area in WiMAX FFR cellular network by considering the effect of interference of 18 base stations on the cell border users. The concepts provide a solid scientific base for analyzing and understanding WiMAX technology. This book enables the audience or researchers to understand the concept of the FFR technique. These basic concepts represent the important features of WiMAX technology which have been used to create new algorithms.
|
You may like...
|