|
Showing 1 - 7 of
7 matches in All Departments
This book provides applications of wireless sensor networks (WSN)
in environmental monitoring, with an emphasis on livestock disease
detection and agricultural management in Africa to aid farmers.
This proposed system entails current and innovative monitoring
technologies intended to improve agricultural conditions in Africa,
with a focus on Botswana, and addresses the Internet of Things
(IoT) as a set of remote monitoring protocols using WSNs to improve
and ensure proper environmental maintenance. In this book, the
author introduces WSNs, and how the IoT can be applied to develop a
system of "smart agriculture" in Africa, taking into account
livestock health, climate change impacts on crops and wildlife, and
technological innovations in response to climate change such as
windmills and solar panels. The book will be interesting to
students and researchers in engineering and life sciences, as well
as practitioners working with sensing technologies for agricultural
monitoring and improvement.
In this book, three different methods are presented to enhance the
capacity and coverage area in LTE-A cellular networks. The scope
involves the evaluation of the effect of the RN location in terms
of capacity and the determination of the optimum location of the
relay that provides maximum achievable data rate for users with
limited interference at the cell boundaries. This book presents a
new model to enhance both capacity and coverage area in LTE-A
cellular network by determining the optimum location for the RN
with limited interference. The new model is designed to enhance the
capacity of the relay link by employing two antennas in RN. This
design enables the relay link to absorb more users at cell edge
regions. An algorithm called the Balance Power Algorithm (BPA) is
developed to reduce MR power consumption. The book pertains to
postgraduate students and researchers in wireless & mobile
communications.
This book covers newly developed and novel Steganography techniques
and algorithms. The book outlines techniques to provide security to
a variety of applications using Steganography, with the goal of
both hindering an adversary from decoding a hidden message, and
also preventing an adversary from suspecting the existence of
covert communications. The book looks into applying these newly
designed and improved algorithms to provide a new and efficient
Steganographic system, called Characteristic Region-Based Image
Steganography (CR-BIS). The algorithms combine both the robustness
of the Speeded-Up Robust Features technique (SURF) and Discrete
Wavelet Transform (DWT) to achieve characteristic region
Steganography synchronization. The book also touches on how to
avoid hiding data in the whole image by dynamically selecting
characteristic regions for the process of embedding. Applies and
discusses innovative techniques for hiding text in a digital image
file or even using it as a key to the encryption; Provides a
variety of methods to achieve characteristic region Steganography
synchronization; Shows how Steganography improves upon cryptography
by using obscurity features.
This book provides applications of wireless sensor networks (WSN)
in environmental monitoring, with an emphasis on livestock disease
detection and agricultural management in Africa to aid farmers.
This proposed system entails current and innovative monitoring
technologies intended to improve agricultural conditions in Africa,
with a focus on Botswana, and addresses the Internet of Things
(IoT) as a set of remote monitoring protocols using WSNs to improve
and ensure proper environmental maintenance. In this book, the
author introduces WSNs, and how the IoT can be applied to develop a
system of "smart agriculture" in Africa, taking into account
livestock health, climate change impacts on crops and wildlife, and
technological innovations in response to climate change such as
windmills and solar panels. The book will be interesting to
students and researchers in engineering and life sciences, as well
as practitioners working with sensing technologies for agricultural
monitoring and improvement.
This book covers newly developed and novel Steganography techniques
and algorithms. The book outlines techniques to provide security to
a variety of applications using Steganography, with the goal of
both hindering an adversary from decoding a hidden message, and
also preventing an adversary from suspecting the existence of
covert communications. The book looks into applying these newly
designed and improved algorithms to provide a new and efficient
Steganographic system, called Characteristic Region-Based Image
Steganography (CR-BIS). The algorithms combine both the robustness
of the Speeded-Up Robust Features technique (SURF) and Discrete
Wavelet Transform (DWT) to achieve characteristic region
Steganography synchronization. The book also touches on how to
avoid hiding data in the whole image by dynamically selecting
characteristic regions for the process of embedding. Applies and
discusses innovative techniques for hiding text in a digital image
file or even using it as a key to the encryption; Provides a
variety of methods to achieve characteristic region Steganography
synchronization; Shows how Steganography improves upon cryptography
by using obscurity features.
In this book, three different methods are presented to enhance the
capacity and coverage area in LTE-A cellular networks. The scope
involves the evaluation of the effect of the RN location in terms
of capacity and the determination of the optimum location of the
relay that provides maximum achievable data rate for users with
limited interference at the cell boundaries. This book presents a
new model to enhance both capacity and coverage area in LTE-A
cellular network by determining the optimum location for the RN
with limited interference. The new model is designed to enhance the
capacity of the relay link by employing two antennas in RN. This
design enables the relay link to absorb more users at cell edge
regions. An algorithm called the Balance Power Algorithm (BPA) is
developed to reduce MR power consumption. The book pertains to
postgraduate students and researchers in wireless & mobile
communications.
This book presents new models to enhance both capacity and coverage
area in WiMAX FFR cellular network by considering the effect of
interference of 18 base stations on the cell border users. The
concepts provide a solid scientific base for analyzing and
understanding WiMAX technology. This book enables the audience or
researchers to understand the concept of the FFR technique. These
basic concepts represent the important features of WiMAX technology
which have been used to create new algorithms.
|
You may like...
A Quiet Man
Tom Wood
Paperback
R444
R409
Discovery Miles 4 090
Nobody's Fool
Harlan Coben
Paperback
R390
R315
Discovery Miles 3 150
Simply Lies
David Baldacci
Paperback
R340
R263
Discovery Miles 2 630
|