Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 8 of 8 matches in All Departments
"Advanced Technologies in Ad Hoc and Sensor Networks "collects selected papers from the 7th China Conference on Wireless Sensor Networks (CWSN2013) held in Qingdao, October 17-19, 2013. The book features state-of-the-art studies on Sensor Networks in China with the theme of Advances in wireless sensor networks of China . The selected works can help promote development of sensor network technology towards interconnectivity, resource sharing, flexibility and high efficiency. Researchers and engineers in the field of sensor networks can benefit from the book. Xue Wang is a professor at Tsinghua University; Li Cui is a professor at Institute of Computing Technology, Chinese Academy of Sciences; Zhongwen Guo is a professor at Ocean University of China."
This book constitutes the refereed proceedings of the 11th China Conference on Wireless Sensor Networks, CWSN 2017, held in Tianjin, China, in October 2017. The 28 revised full papers were carefully reviewed and selected from 213 submissions. The papers are organized in topical sections on wireless sensor networks; energy efficiency and harvesting; data fusion; mobile computing and social services.
Advanced Technologies in Ad Hoc and Sensor Networks collects selected papers from the 7th China Conference on Wireless Sensor Networks (CWSN2013) held in Qingdao, October 17-19, 2013. The book features state-of-the-art studies on Sensor Networks in China with the theme of “Advances in wireless sensor networks of China”. The selected works can help promote development of sensor network technology towards interconnectivity, resource sharing, flexibility and high efficiency. Researchers and engineers in the field of sensor networks can benefit from the book. Xue Wang is a professor at Tsinghua University; Li Cui is a professor at Institute of Computing Technology, Chinese Academy of Sciences; Zhongwen Guo is a professor at Ocean University of China.
Robots interact with the world through curves and surfaces - the subjects of study in differential geometry. This book applies the moving-frame method, developed extensively by Elie Cartan, and the adjoint approach, conceived by Ernesto Cesaro, to study the kinematics of two surfaces subject to rolling contact and sliding-rolling contact to demonstrate the applications in robotic in-hand manipulation.Firstly, it explores two surfaces, and the geometry of both surfaces comes into play. Secondly, the book focuses on the geometry of the two surfaces within the encompassing space (extrinsic) rather than within the surfaces (intrinsic) because the book is concerned with the kinematics of one surface in three-dimensional Euclidean space - the real world. The book then concludes by applying this approach in robotic in-hand manipulation in the last chapter.
This book constitutes the refereed proceedings of the 16th China Conference on Wireless Sensor Networks, CWSN 2022, which took place in Guangzhou, China, in November 2022. The 17 full papers presented in this volume were carefully reviewed and selected from 204 submissions, including 87 English papers and 117 Chinese papers. The conference provided an academic exchange of research and a development forum for IoT researchers, developers, enterprises, and users. Exchanging results and experience of research and applications in IoT, and discussing the key challenges and research hotspots, is the main goal of the forum. As a high-level forum for the design, implementation, and application of IoT, the conference promoted the exchange and application of the oriesand technologies of IoT-related topics.
This book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that existing protection methods can result in low data utility and unbalanced trade-offs, personalized privacy protection has become a rapidly expanding research topic.In this book, the authors explore emerging threats and existing privacy protection methods, and discuss in detail both the advantages and disadvantages of personalized privacy protection. Traditional methods, such as differential privacy and cryptography, are discussed using a comparative and intersectional approach, and are contrasted with emerging methods like federated learning and generative adversarial nets. The advances discussed cover various applications, e.g. cyber-physical systems, social networks, and location-based services. Given its scope, the book is of interest to scientists, policy-makers, researchers, and postgraduates alike.
This book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that existing protection methods can result in low data utility and unbalanced trade-offs, personalized privacy protection has become a rapidly expanding research topic.In this book, the authors explore emerging threats and existing privacy protection methods, and discuss in detail both the advantages and disadvantages of personalized privacy protection. Traditional methods, such as differential privacy and cryptography, are discussed using a comparative and intersectional approach, and are contrasted with emerging methods like federated learning and generative adversarial nets. The advances discussed cover various applications, e.g. cyber-physical systems, social networks, and location-based services. Given its scope, the book is of interest to scientists, policy-makers, researchers, and postgraduates alike.
This book constitutes the refereed proceedings of the 15th China Conference on Wireless Sensor Networks, CWSN 2021 held in Guilin, China, in October 2021.The 19 papers were carefully reviewed and selected from 60 submissions. The papers are organized in topical sections on theory and technology on wireless sensor network; application on internet of things; security and privacy protection on internet of things; fog computing and wireless computing.
|
You may like...Not available
|