Sensor networks have been referred to as part of the background infrastructure required to achieve ubiquitous computing. this has recently promoted a considerable amount of attention from the research community that c...
详细信息
ISBN:
(纸本)9781424449965
Sensor networks have been referred to as part of the background infrastructure required to achieve ubiquitous computing. this has recently promoted a considerable amount of attention from the research community that concluded that existing protocols and techniques for service discovery, such as JINI or UPnP are not suitable for the case of resource poor, battery-powered sensor nodes. We do not really agree withthis approach. We think that those protocols could be a good starting point to "power-up" sensor nodes with poor resources for ubiquitous computing support. Starting from this principle and recognizing that existing sensor node system software is not suitable for our purpose, we decided to build a new sensor node software stack. the result was a stand-alone Java Virtual Machine, suitable for sensor nodes with poor resources, an implementation of the ubiquitous TCP/IP communication stack and Jini based middleware to achieve automatic service discover and usage. this software stack was tailored to perfectly fit in the state-of-the-art Mica2 class of sensor nodes.
Indoor air quality has a major impact on health and comfort of building occupants. Poor air quality may reduce productivity in offices and impair students learning in classes. In order to provide localized air polluti...
详细信息
ISBN:
(纸本)9781538643990
Indoor air quality has a major impact on health and comfort of building occupants. Poor air quality may reduce productivity in offices and impair students learning in classes. In order to provide localized air pollution data and tailor it for individual, wearable air quality sensor is a promising solution. Furthermore, crowd sensing has emerged as an Internet-of-things (IoT) solution, which is economical, scalable and easy to deploy and re-deploy as it uses the power of crowd data collection. the goal of our proposed system is to monitor indoor air quality through a crowd sensing system that will use a set of sensors to measure air quality, monitor the concentration of pollutants continuously, and make recommendations in real time for improved air quality. In this paper artificial network is developed to perform real-time indoor air quality control. Utilizing created neural network embedded into a smart controller comfort level of air quality parameters such as temperature, CO2 air concentration and humidity could be estimated after every measurement and used for adapting air conditioning systems to adjust air quality. Neural network data preparation and training process are discussed along with deployment of trained network on a smart controller.
this paper presents a FPGA implementation of a one-dimensional prime-length Discrete Hartley Transform. the architecture for the hardware realization has been formulated to ensure maximum area and time efficiency. the...
详细信息
ISBN:
(纸本)0780381858
this paper presents a FPGA implementation of a one-dimensional prime-length Discrete Hartley Transform. the architecture for the hardware realization has been formulated to ensure maximum area and time efficiency. the presented design exploits the advantages presented by the Distributed Arithmetic and Circular Formulation Techniques. Distributed Arithmetic is very useful in creating efficient FPGA implementations while cyclic convolution provides the advantages of high computing parallelism, and low computation complexity. A single FPGA has been used to provide an area efficient design with a sampling rate of 12.5 Million samples per second. the results indicate comparable speeds to that of the DCT.
Tourism is an important element in Indonesian economy as it brings consistent flow of foreign currencies as well as supporting local industries. One way for the Indonesian government to improve this industry is to ide...
详细信息
ISBN:
(纸本)9781538666142
Tourism is an important element in Indonesian economy as it brings consistent flow of foreign currencies as well as supporting local industries. One way for the Indonesian government to improve this industry is to identify areas and localities which requires more attention and investment. this paper presents our finding from analysing the large amount of data that the Indonesian Government Tourism Office, specifically regarding tourism in Bali. We use K-Means and X-Means algorithms to cluster the various type of tourist attractions in Bali according to their popularity and Power BI to develop the interactive dashboard. the visualisation of the results is subsequently generated for non-technical persons to be able to understand. the output of this research should feed into the decision making process taken by the Bali Provincial Government in order to improve the number of visitors to the numerous tourist attractions spread throughout the region.
Demand of multimedia contents in home network is growing rapidly and UPnP is expected to bring better multimedia experience with various A/V devices. However, UPnP AIV architecture, which allows the multimedia content...
详细信息
ISBN:
(纸本)0769525601
Demand of multimedia contents in home network is growing rapidly and UPnP is expected to bring better multimedia experience with various A/V devices. However, UPnP AIV architecture, which allows the multimedia contents to be shared between AIV devices, is limited to the environments where interoperable contents format and identical network protocols are used. In this paper, we propose an intelligent multimedia service framework which enables AIV contents to be adopted and shared according to user multimedia environments. We design and implement our multimedia service architecture based on UPnP A/V service and WEG-21 multimedia framework.
Trusted computing technology provides powerful support for the solution to security issues of embedded endpoints in mobile computing environment. When an endpoint connects to the network, the predefined security polic...
详细信息
ISBN:
(纸本)9781424421077
Trusted computing technology provides powerful support for the solution to security issues of embedded endpoints in mobile computing environment. When an endpoint connects to the network, the predefined security policy should be checked. Only the one that meets the security policy will be allowed to access to the network. Meanwhile, the one that does not meet the security policy will be isolated. therefore all the insecure endpoints will be refused to access the network automatically until they satisfy the policy. A lot of wireless network security issues can be solved effectively by making use of trusted endpoints and trusted access technology. In this paper, a solution to construct the hardware and software of embedded trusted endpoints is proposed, and a trusted access mechanism based on the 802.1X and Trusted Network Connection (TNC) technology defined by Trusted computing Group is discussed, and the design and implementation of a trusted access protocol Is given. Boththe trusted access mechanism and the trusted access protocol can be used in wireless networks.
Current and new-generation wireless mobile networks face a high demand for very large bandwidth. Due to the high costs of spectrum usage and of the access network development, the network operators could be interested...
详细信息
ISBN:
(纸本)9781479946235
Current and new-generation wireless mobile networks face a high demand for very large bandwidth. Due to the high costs of spectrum usage and of the access network development, the network operators could be interested in sharing spectrum and operating costs of the access network. Already, Carrier aggregation, defined in 3GPP Rel. 10 allows a form of easy inter-operator sharing. the cloud computing paradigm will also most likely be extended to cover not only the delivery of computing resources over the Internet, but, in the case of mobile networks, also the delivery of Core Network functionalities to the Access Network, M2M and multimedia applications. the paper discusses the main technological pillars for future converged mobile networks and proposes an architecture reference model for cloud-based management and monitoring of the shared network resources and radio spectrum. the main technical and economic challenges that need to be addressed for this architecture to be deployed are also highlighted.
Parallel computing model plays a great basic role in advanced computing;Based on researching existing parallel computing models, this paper brings forward a parallel computing model-Layer Forward Net toward Cubic-R ar...
详细信息
ISBN:
(纸本)9780769548524;9781467330930
Parallel computing model plays a great basic role in advanced computing;Based on researching existing parallel computing models, this paper brings forward a parallel computing model-Layer Forward Net toward Cubic-R architecture, and describes the model's structure, parameter, logic abstractly. Lastly towards typical N-Body problem, this paper designs a parallel algorithm, and analyses its complexity. the compared result shows that this model has low computing complexity, increase by layer and other merit.
Withthe technological advance and software improvement, Vehicular Ad-Hoc Networks have made a huge and impressive development in the recent years. this literature surveys different aspects of VANETs. the aim of the p...
详细信息
ISBN:
(纸本)9781509064656
Withthe technological advance and software improvement, Vehicular Ad-Hoc Networks have made a huge and impressive development in the recent years. this literature surveys different aspects of VANETs. the aim of the paper is to give an overview of the applications and systems embedded within VANETs. After a historical view of the main aspects of intelligent vehicles, various VANETs applications are to be presented mainly safety, commercial, comfort, productive and efficiency applications. the embedded systems in VANETs based on the RFID technology are to be described, as well.
暂无评论