Angebote zu "Necessary" (23 Treffer)

Kategorien

Shops

User Interface Concepts for Semantic Informatio...
49,00 € *
ggf. zzgl. Versand

In recent years large efforts were invested in the development of a semantic desktop as an innovative mean for dealing with information overflow. Nevertheless, user interface concepts which make a semantic desktop accessible for a larger audience are still scarce and few. In this book the traditional desktop metaphor is enhanced with functionality to enable interaction with semantic information. Files become semantic and are thus called siles. Folders are removed all together and are replaced with tags and categories. Instead filters are used, which can be described best as dynamic queries. Several implementations of user interfaces for this abstraction model are presented. Since the results of a query can be numerous it was necessary to design models for the navigation of result lists. Further an intuitive interface for ontology navigation is presented. The concepts have been implemented and preliminary evaluation results are presented.

Anbieter: Dodax
Stand: 10.07.2020
Zum Angebot
RFID Applications in Chemical Storage Managemen...
49,90 € *
ggf. zzgl. Versand

The management of chemical inventory in laboratories is necessary for safety purpose as well as fulfilling regulatory compliance. As for academia laboratories, frequent inspections and data updating of chemicals storage are very crucial to prevent unexpected accidents to students and researchers. In most academia laboratories, management of chemicals are normally still being done manually which is very time consuming. As a result, the report data is not being updated and expired chemicals may accidentally being used. This book describes a research that proposes UHF Gen2 Passive Tags Radio Frequency Identification (RFID)and web-based technologies to be used in the chemical inventory management system to help shorten the inventory process time.

Anbieter: Dodax
Stand: 10.07.2020
Zum Angebot
Organic Thin Film Transistor Integration
111,67 € *
ggf. zzgl. Versand

Research on organic electronics (or plastic electronics) is driven by the need to create systems that are lightweight, unbreakable, and mechanically flexible. With the remarkable improvement in the performance of organic semiconductor materials during the past few decades, organic electronics appeal to innovative, practical, and broad-impact applications requiring large-area coverage, mechanical flexibility, low-temperature processing, and low cost. Thus, organic electronics appeal to a broad range of electronic devices and products including transistors, diodes, sensors, solar cells, lighting, displays, and electronic identification and tracking devices A number of commercial opportunities have been identified for organic thin film transistors (OTFTs), ranging from flexible displays, electronic paper, radio-frequency identification (RFID) tags, smart cards, to low-cost disposable electronic products, and more are continually being invented as the technology matures. The potential applications for "plastic electronics" are huge but several technological hurdles must be overcome. In many of these applications, transistor serves as a fundamental building block to implement the necessary electronic functionality. Hence, research in organic thin film transistors (OTFTs) or organic field effect transistors (OFETs) is eminently pertinent to the development and realization of organic electronics. This book presents a comprehensive investigation of the production and application of a variety of polymer based transistor devices and circuits. It begins with a detailed overview of Organic Thin Film Transistors (OTFTs) and discusses the various possible fabrication methods reported so far. This is followed by two major sections on the choice, optimization and implementation of the gate dielectric material to be used. Details of the effects of processing on the efficiency of the contacts are then provided. The book concludes with a chapter on the integration of such devices to produce a variety of OTFT based circuits and systems. The key objective is to examine strategies to exploit existing materials and techniques to advance OTFT technology in device performance, device manufacture, and device integration. Finally, the collective knowledge from these investigations facilitates the integration of OTFTs into organic circuits, which is expected to contribute to the development of new generation of all-organic displays for communication devices and other pertinent applications. Overall, a major outcome of this work is that it provides an economical means for organic transistor and circuit integration, by enabling the use of a well-established PECVD infrastructure, while not compromising the performance of electronics. The techniques established here are not limited to use in OTFTs only, the organic semiconductor and SiNx combination can be used in other device structures (e.g., sensors, diodes, photovoltaics). Furthermore, the approach and strategy used for interface optimization can be extended to the development of other materials systems.

Anbieter: Dodax
Stand: 10.07.2020
Zum Angebot
Hardware Security and Trust
128,25 € *
ggf. zzgl. Versand

This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools. Secure protocols are discussed, which protect access to necessary test infrastructures and enable the design of secure access controllers.

Anbieter: Dodax
Stand: 10.07.2020
Zum Angebot
Hardware Security and Trust
97,34 € *
ggf. zzgl. Versand

This book provides a comprehensive introduction to hardware security, from specification to implementation. Applications discussed include embedded systems ranging from small RFID tags to satellites orbiting the earth. The authors describe a design and synthesis flow, which will transform a given circuit into a secure design incorporating counter-measures against fault attacks. In order to address the conflict between testability and security, the authors describe innovative design-for-testability (DFT) computer-aided design (CAD) tools that support security challenges, engineered for compliance with existing, commercial tools. Secure protocols are discussed, which protect access to necessary test infrastructures and enable the design of secure access controllers.

Anbieter: Dodax
Stand: 10.07.2020
Zum Angebot
Electronic Arts Battlefield 4, PlayStation 3 Vi...
21,99 € *
ggf. zzgl. Versand

- Stand alongside your squad in a blistering single player campaign set in battle-scarred Shanghai.- Hone your skills with a devestating arsenal of weapons and expert fighting classes.- Pilot heavily armed helicopters, boats, tanks, fighter jets and other vehicles to give you the advantage in combat.- Immerse yourself in all-out war and become a Battlefield legend with online multiplayer games.A new global conflictThe year is 2020. Six years after the events of Battlefield 3, the global military situation is more fragile than ever as the world teeters on the brink of not just another cold war, but an all-out conflict between the USA and Russia. While tensions run high between the two superpowers, China is thrown into a state of turmoil within its own borders as power-hungry General Chang ignites a military coup which could see the Chinese government overthrown – and their mighty army standing shoulder to shoulder with Russia in the global conflict.In a last ditch attempt to neutralise the growing threat, a US special operations squad codenamed Tombstone is deployed to go behind enemy lines and do whatever is necessary to protect American interests.You play as Sgt. Daniel “Reck” Recker, tasked alongside a squad of fellow commandos to infiltrate highly sensitive areas in China and throughout the world and use your skills to secure VIP personnel, vital information and do whatever it takes to stop a new world war from igniting. Outnumbered, outgunned and against all odds, you’ll need to call on all of your training and combat expertise if you want to survive on the battlefield.The beauty of the battlefieldBoth the campaign and multiplayer modes offer a huge range of beautifully detailed environments in which to wage war. Within the first few acts of the single player campaign, you’re transported from dusty, industrial Azerbaijan, to a highly detailed recreation of inner-city Shanghai, complete with glaring neon, towering skyscrapers – and intense explosions.In multiplayer games, tropical islands, snow-bound mountain bunkers, inner city park land, bullet-riddled towns and many other urban and rural maps provide a wide range of terrain to take down your opposition. The various game modes can thrust you into close-quarters combat on small maps or, in the case of Conquest game, into vast areas that require different tactics and expertise piloting vehicles.Waging war on such a massive scale is an intense experience, explosions rock the ground beneath you, buildings crumble and bullets fly past your head giving an overwhelming sense of being in the heat of the battle. When a building comes down or vehicles are destroyed, the course of the game can change as the terrain evolves, giving you bunkers, rubble and charred remains of tanks and helicopters to take cover behind.Fight on land, sea and in the airSurvival in both the single player campaign and online multiplayer modes will rely on a tactical mix of attacking and defensive strategies – a “run and gun” frenzy will see your dog tags littering the rubble in no time at all. Using cover is vital, but staying in the same place for too long will prove fatal, as much of the environment around you will be fully destructible. That wall you’ve been cowering behind may be reduced to a pile of bricks, leaving you exposed to enemy gunfire.Approaching every contact with your squad around you and knowing where they are on the battlefield is also an important tactic. As you prepare to engage the enemy, you can mark them for your squad before issuing the order to assault, allowing you to mount surprise attacks and ambushes. You’ll also need to learn your weapon classes and mould your fighting style around the armoury that you can stash in weapons crates. Each weapon can be customised and upgraded with new items that unlock as you level up or complete the assignments that feature in each mission.Throughout the game and in online multiplayer mode, you can pilot a range of heavy and light vehicles, including tanks, helicopters, jet skis, fighter jets and more. Becoming familiar with the controls of each vehicle and how they can be best used in battle can be essential in giving you the edge over the opposition.You and whose army?Multiplayer mode will throw you headlong into battle as one of three factions: China, Russia and the US. Veterans of the Battlefield series will find old favourite game modes present and correct, including the classic Conquest game mode which pits teams against each other on huge, destructible maps in a fight to control various objectives. Vehicles including tanks, helicopters, boats and fighter jets are all at the player’s disposal in Conquest, providing many different ways to rain destruction down upon the enemy positions.Other game modes include the classics Team or Squad Deathmatch, Obliteration which sees teams fight for possession of a bomb, Rush, an all-out fight for sequences of dual objectives, Domination for close-quarters fighting and Defuse, comprising of multiple fast rounds with no redeploy and no vehicles.Before deploying into battle you’ll have to choose one of the four classes to fight as, each with their own weapons load out. The Assault class is equipped with an assault rifle and grenades as standard, while the Engineer has a rocket launcher strapped to his back and the ability to fix damaged vehicles. The Support class can take out enemies at long range with a sniper rifle, and Recon can plant explosive devices at tactical positions on the battlefield. Your prowess in combat will be rewarded with XP that unlocks new weapons, gadgets and support abilities as you progress, that can be used to customise each class to suit your fighting style.

Anbieter: Dodax
Stand: 10.07.2020
Zum Angebot
Design and Optimization of Passive UHF RFID Sys...
169,00 CHF *
ggf. zzgl. Versand

Radio Frequency IDentification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. An RFID tag is a small object that can be attached to or incorporated into a product, animal or person. An RFID tag contains an antenna to enable it to receive and respond to Radio-Frequency (RF) queries from an RFID reader or interrogator. Passive tags require no internal power source, whereas active tags require a power source. As of today (2006), the concepts of ubiquitous computing and ambient intelligence are becoming widespread. In order for these to become a reality, a number of key technologies are required. In brief, these technologies need to be sensitive, responsive, interconnected, contextualised, transparent and intelligent. RFID, and in particular passive RFID tags, are such a technology. In order to deliver the necessary characteristics that could lead to ambient intelligence, however, there are some challenges that need to be addressed. Remote powering of the tags is probably the most important challenge. Issues concerning the antenna-tag interface and the rectifier design, that allow the RF signal to be converted to Direct Current (DC) are top priorities. Secondly, the communication link and the reader should be optimized. The RF signal that contains the tag data suffers from a power of four decay with the distance between tag and reader. As a result, both the reader sensitivity and the tag backscattered power efficiency have to be maximized. Long-range powering, as well as sufficient communication quality, are the guidelines of this work. This work proposes a linear two-port model for an N-stage modified-Greinacher full wave rectifier. It predicts the overall conversion efficiency at low power levels where the diodes are operating near their threshold voltage. The output electrical behavior of the rectifier is calculated as a function of the received power and the antenna parameters. Moreover, the two-port parameter values are computed for particular input voltages and output currents for the complete N-stage rectifier circuit, using only the measured I-V and C-V characteristics of a single diode. Also presented in this work is an experimental procedure to measure how the impedance modulation at the tag side affects the signal at the reader. The method allows the tag designer to efficiently predict the effect of a modulator design at the system level and gives a useful instrument to choose the most appropriate impedances. Finally, the design of a fully-integrated, remotely powered and addressable RFID tag working at 2.45GHz is described. The achieved operating range at a 4W Effective Isotropically Radiated Power (EIRP) reader transmit power is at most 12 m. The Integrated Circuit (IC) is implemented in a 0.5 um silicon-on-sapphire technology. A state-of-the-art rectifier design is embedded to supply energy to the transponder. Inductive matching and a folded-dipole antenna are key elements for achieving this performance.

Anbieter: Orell Fuessli CH
Stand: 10.07.2020
Zum Angebot
Design and Optimization of Passive UHF RFID Sys...
145,00 CHF *
ggf. zzgl. Versand

Radio Frequency IDentification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags or transponders. An RFID tag is a small object that can be attached to or incorporated into a product, animal or person. An RFID tag contains an antenna to enable it to receive and respond to Radio-Frequency (RF) queries from an RFID reader or interrogator. Passive tags require no internal power source, whereas active tags require a power source. As of today (2006), the concepts of ubiquitous computing and ambient intelligence are becoming widespread. In order for these to become a reality, a number of key technologies are required. In brief, these technologies need to be sensitive, responsive, interconnected, contextualised, transparent and intelligent. RFID, and in particular passive RFID tags, are such a technology. In order to deliver the necessary characteristics that could lead to ambient intelligence, however, there are some challenges that need to be addressed. Remote powering of the tags is probably the most important challenge. Issues concerning the antenna-tag interface and the rectifier design, that allow the RF signal to be converted to Direct Current (DC) are top priorities. Secondly, the communication link and the reader should be optimized. The RF signal that contains the tag data suffers from a power of four decay with the distance between tag and reader. As a result, both the reader sensitivity and the tag backscattered power efficiency have to be maximized. Long-range powering, as well as sufficient communication quality, are the guidelines of this work. This work proposes a linear two-port model for an N-stage modified-Greinacher full wave rectifier. It predicts the overall conversion efficiency at low power levels where the diodes are operating near their threshold voltage. The output electrical behavior of the rectifier is calculated as a function of the received power and the antenna parameters. Moreover, the two-port parameter values are computed for particular input voltages and output currents for the complete N-stage rectifier circuit, using only the measured I-V and C-V characteristics of a single diode. Also presented in this work is an experimental procedure to measure how the impedance modulation at the tag side affects the signal at the reader. The method allows the tag designer to efficiently predict the effect of a modulator design at the system level and gives a useful instrument to choose the most appropriate impedances. Finally, the design of a fully-integrated, remotely powered and addressable RFID tag working at 2.45GHz is described. The achieved operating range at a 4W Effective Isotropically Radiated Power (EIRP) reader transmit power is at most 12 m. The Integrated Circuit (IC) is implemented in a 0.5 um silicon-on-sapphire technology. A state-of-the-art rectifier design is embedded to supply energy to the transponder. Inductive matching and a folded-dipole antenna are key elements for achieving this performance.

Anbieter: Orell Fuessli CH
Stand: 10.07.2020
Zum Angebot
Tag Counting and Monitoring in Large-Scale RFID...
137,00 CHF *
ggf. zzgl. Versand

This book provides a comprehensive treatment of the theoretical foundation and algorithmic tools necessary in the design of efficient tag counting and monitoring algorithms in emerging RFID systems. The book delivers an in-depth analysis on the following problems ranging from theoretical modeling and analysis, to practical algorithm design and optimization: Stability analysis of the frame slotted Aloha protocol, the de facto standard in RFID tag counting and identification; Tag population estimation in dynamic RFID systems; Missing tag event detection in the presence of unexpected tags; Missing tag event detection in multi-group multi-region RFID systems. The target readers are researchers and advanced-level engineering students interested in acquiring in-depth knowledge on the topic and on RFID systems and their applications.

Anbieter: Orell Fuessli CH
Stand: 10.07.2020
Zum Angebot