0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • R2,500 - R5,000 (1)
  • R5,000 - R10,000 (2)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

RFID and Sensor Networks - Architectures, Protocols, Security, and Integrations (Paperback): Yan Zhang, Laurence T. Yang,... RFID and Sensor Networks - Architectures, Protocols, Security, and Integrations (Paperback)
Yan Zhang, Laurence T. Yang, Jiming Chen
R2,217 Discovery Miles 22 170 Ships in 12 - 19 working days

The escalating demand for ubiquitous computing along with the complementary and flexible natures of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) have sparked an increase in the integration of these two dynamic technologies. Although a variety of applications can be observed under development and in practical use, there has been a need for a resource that brings together timely coverage of RFIS, Sensor Networks, and their integration. Filling this need, RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations is the authoritative reference on RFID and WSNs. Covering a broad range of topics that includes everything from the basics to insights into future directions, this cutting-edge book reviews architectures, protocols, standards, security, and applications. With sections devoted to each individual element, the text starts by covering the tags, readers, and middleware associated with RFID. Next, it provides insights into the routing, medium access control, and cross-layer optimization of WSNs. The third section focuses on the integration of RFID and WSN, addresses contemporary challenges, and illustrates concepts and applications with practical examples. This forward looking resource details the enhanced visibility and monitoring capabilities that are possible with RFID and WSNs and highlights contemporary applications including smart homes, surveillance systems, and personal health care. Providing a complete understanding of the essential fundamentals behind RFID and WSNs, this book will help you foster the skills needed to materialize the enhancements possible when these two promising technologies are used together.

Rechargeable Sensor Networks: Technology, Theory, And Application - Introducing Energy Harvesting To Sensor Networks... Rechargeable Sensor Networks: Technology, Theory, And Application - Introducing Energy Harvesting To Sensor Networks (Hardcover)
Jiming Chen, Shibo He, You-Xian Sun
R3,510 Discovery Miles 35 100 Ships in 10 - 15 working days

The harvesting of energy from ambient energy sources to power electronic devices has been recognized as a promising solution to the issue of powering the ever-growing number of mobile devices around us.Key technologies in the rapidly growing field of energy harvesting focus on developing solutions to capture ambient energy surrounding the mobile devices and convert it into usable electrical energy for the purpose of recharging said devices. Achieving a sustainable network lifetime via battery-aware designs brings forth a new frontier for energy optimization techniques. These techniques had, in their early stages, resulted in the development of low-power hardware designs. Today, they have evolved into power-aware designs and even battery-aware designs.This book covers recent results in the field of rechargeable sensor networks, including technologies and protocol designs to enable harvesting energy from alternative energy sources such as vibrations, temperature variations, wind, solar, and biochemical energy and passive human power.

RFID and Sensor Networks - Architectures, Protocols, Security, and Integrations (Hardcover): Yan Zhang, Laurence T. Yang,... RFID and Sensor Networks - Architectures, Protocols, Security, and Integrations (Hardcover)
Yan Zhang, Laurence T. Yang, Jiming Chen
R5,716 Discovery Miles 57 160 Ships in 12 - 19 working days

The escalating demand for ubiquitous computing along with the complementary and flexible natures of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) have sparked an increase in the integration of these two dynamic technologies. Although a variety of applications can be observed under development and in practical use, there has been a need for a resource that brings together timely coverage of RFIS, Sensor Networks, and their integration.

Filling this need, RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations is the authoritative reference on RFID and WSNs. Covering a broad range of topics that includes everything from the basics to insights into future directions, this cutting-edge book reviews architectures, protocols, standards, security, and applications. With sections devoted to each individual element, the text starts by covering the tags, readers, and middleware associated with RFID. Next, it provides insights into the routing, medium access control, and cross-layer optimization of WSNs. The third section focuses on the integration of RFID and WSN, addresses contemporary challenges, and illustrates concepts and applications with practical examples.

This forward looking resource details the enhanced visibility and monitoring capabilities that are possible with RFID and WSNs and highlights contemporary applications including smart homes, surveillance systems, and personal health care. Providing a complete understanding of the essential fundamentals behind RFID and WSNs, this book will help you foster the skills needed to materialize the enhancements possible when these two promising technologies are used together.

Cyber Security for Industrial Control Systems - From the Viewpoint of Close-Loop (Paperback): Peng Cheng, Heng Zhang, Jiming... Cyber Security for Industrial Control Systems - From the Viewpoint of Close-Loop (Paperback)
Peng Cheng, Heng Zhang, Jiming Chen
R1,388 Discovery Miles 13 880 Ships in 12 - 19 working days

Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts. The first three chapters extensively introduce secure state estimation technologies, providing a systematic presentation on the latest progress in security issues regarding state estimation. The next five chapters focus on the design of secure feedback control technologies in industrial control systems, displaying an extraordinary difference from that of traditional secure defending approaches from the viewpoint of network and communication. The last two chapters elaborate on the systematic secure control architecture and algorithms for various concrete application scenarios. The authors provide detailed descriptions on attack model and strategy analysis, intrusion detection, secure state estimation and control, game theory in closed-loop systems, and various cyber security applications. The book is useful to anyone interested in secure theories and technologies for industrial control systems.

Energy-Efficient Area Coverage for Intruder Detection in Sensor Networks (Paperback, 2014): Shibo He, Jiming Chen, Junkun Li,... Energy-Efficient Area Coverage for Intruder Detection in Sensor Networks (Paperback, 2014)
Shibo He, Jiming Chen, Junkun Li, You-Xian Sun
R1,818 Discovery Miles 18 180 Ships in 10 - 15 working days

This Springer Brief presents recent research results on area coverage for intruder detection from an energy-efficient perspective. These results cover a variety of topics, including environmental surveillance and security monitoring. The authors also provide the background and range of applications for area coverage and elaborate on system models such as the formal definition of area coverage and sensing models. Several chapters focus on energy-efficient intruder detection and intruder trapping under the well-known binary sensing model, along with intruder trapping under the probabilistic sensing model. The brief illustrates efficient algorithms rotate the duty of each sensor to prolong the network lifetime and ensure intruder trapping performance. The brief concludes with future directions of the field. Designed for researchers and professionals working with wireless sensor networks, the brief also provides a wide range of applications which are also valuable for advanced-level students interested in efficiency and networking.

Data Dissemination and Query in Mobile Social Networks (Paperback, 2012): Jiming Chen, Jialu Fan, You-Xian Sun Data Dissemination and Query in Mobile Social Networks (Paperback, 2012)
Jiming Chen, Jialu Fan, You-Xian Sun
R1,152 Discovery Miles 11 520 Ships in 10 - 15 working days

With the increasing popularization of personal hand-held mobile devices, more people use them to establish network connectivity and to query and share data among themselves in the absence of network infrastructure, creating mobile social networks (MSNet). Since users are only intermittently connected to MSNets, user mobility should be exploited to bridge network partitions and forward data. Currently, data route/forward approaches for such intermittently connected networks are commonly "store-carry-and-forward" schemes, which exploit the physical user movements to carry data around the network and overcome path disconnection. And since the source and destination may be far away from each other, the delay for the destination to receive the data from the source may be long. MSNets can be viewed as one type of socially-aware delay tolerant networks (DTNs). Observed from social networks, the contact frequencies are probably different between two friends and two strangers, and this difference should be taken into consideration when designing data dissemination and query schemes in MSNets. In this book, the fundamental concepts of MSNets are introduced including the background, key features and potential applications of MSNets, while also presenting research topics, such as, MSNets as realistic social contact traces and user mobility models. Because the ultimate goal is to establish networks that allow mobile users to quickly and efficiently access interesting information, particular attention is paid to data dissemination and query schemes in subsequent sections. Combined with geography information, the concepts of community and centrality are employed from a social network perspective to propose several data dissemination and query schemes, and further use real social contact traces to evaluate their performance, demonstrating that such schemes achieve better performance when exploiting more social relationships between users.

Cyber Security for Industrial Control Systems - From the Viewpoint of Close-Loop (Hardcover): Peng Cheng, Heng Zhang, Jiming... Cyber Security for Industrial Control Systems - From the Viewpoint of Close-Loop (Hardcover)
Peng Cheng, Heng Zhang, Jiming Chen
R5,231 Discovery Miles 52 310 Ships in 12 - 19 working days

Cyber Security for Industrial Control Systems: From the Viewpoint of Close-Loop provides a comprehensive technical guide on up-to-date new secure defending theories and technologies, novel design, and systematic understanding of secure architecture with practical applications. The book consists of 10 chapters, which are divided into three parts. The first three chapters extensively introduce secure state estimation technologies, providing a systematic presentation on the latest progress in security issues regarding state estimation. The next five chapters focus on the design of secure feedback control technologies in industrial control systems, displaying an extraordinary difference from that of traditional secure defending approaches from the viewpoint of network and communication. The last two chapters elaborate on the systematic secure control architecture and algorithms for various concrete application scenarios. The authors provide detailed descriptions on attack model and strategy analysis, intrusion detection, secure state estimation and control, game theory in closed-loop systems, and various cyber security applications. The book is useful to anyone interested in secure theories and technologies for industrial control systems.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Deconstruction without Derrida
Martin McQuillan Hardcover R4,922 Discovery Miles 49 220
Sasol Birds of Southern Africa (With PVC…
Ian Sinclair, Phil Hockey Paperback R600 R541 Discovery Miles 5 410
Primer for Town Farmers - January 4…
United States Department of Agriculture Paperback R390 Discovery Miles 3 900
Dismissal
John Grogan Paperback  (2)
R1,044 R916 Discovery Miles 9 160
Book of the Aquarium and Water Cabinet
Shirley Hibberd Paperback R447 Discovery Miles 4 470
Morality Imposed - The Rehnquist Court…
Stephen E Gottlieb Hardcover R3,455 Discovery Miles 34 550
A Research Agenda for Territory and…
David Storey Paperback R978 Discovery Miles 9 780
Moederland
Madelein Rust Paperback R370 R347 Discovery Miles 3 470
Handbook on Planning and Power
Michael Gunder, Kristina Grange, … Hardcover R6,322 Discovery Miles 63 220
Almuric
Robert E Howard Hardcover R819 Discovery Miles 8 190

 

Partners