Angebote zu "Networks" (34 Treffer)

Kategorien

Shops

Intelligent Supply Chain Networks
49,00 € *
ggf. zzgl. Versand

Supply Chain Management has become the primary competitive weapon in many industries. This book describes a model of intelligent supply chain networks that will improve information visibility and flow within the supply chain. In the proposed model, products will have the intelligence to direct themselves throughout the distribution network and will have the capability to be purchased and sold while in transit. The book gives an overview of the supporting technologies that make such a supply chain a reality. It is intended to provide a preliminary outlook at the various issues related to implementation and could be used for future research as a basis for building the infrastructure required for the new model. An effort has been made to provide a design structure for XML identification tags, which will be one of the most critical components of the system. In addition to that, this report will describe the results of a simulation analysis using a model of a hypothetical public logistics network covering the southeastern United States.

Anbieter: Dodax
Stand: 14.08.2020
Zum Angebot
Lightweight and Robust Security for Application...
71,90 € *
ggf. zzgl. Versand

Internet of Things (IoT) has been attracted more and more attentions in both academy and industry recently. It is envisioned as a key technology for extending traditional interconnection of human to interconnection of physical objects such as sensors, RFID tags, and mobile smart phones. A lot of novel applications come, e.g., smart grid, machine-to-machine (M2M), mobile cloud computing, EPCglobal networks, unattended wireless sensor networks, and mobile social networks. The security in those typical IoT applications is of upmost importance for their deployment in reality. In different applications, the security requirements or concentrations are various and challenges are distinct, e.g., privacy protection, trust management, authentication, key management, confidentiality, to name a few. This book analyzes the most important security requirements and proposes corresponding security solutions for those applications. In particular, all solutions are lightweight in terms of computation (communication) and robust in terms of resilience to compromising, so as to tackle corresponding challenges in different applications of IoT.

Anbieter: Dodax
Stand: 14.08.2020
Zum Angebot
Image Analysis
39,00 € *
ggf. zzgl. Versand

High Quality Content by WIKIPEDIA articles! Image analysis is the extraction of meaningful information from images, mainly from digital images by means of digital image processing techniques. Image analysis tasks can be as simple as reading bar coded tags or as sophisticated as identifying a person from their face. Computers are indispensable for the analysis of large amounts of data, for tasks that require complex computation, or for the extraction of quantitative information. On the other hand, the human visual cortex is an excellent image analysis apparatus, especially for extracting higher-level information, and for many applications including medicine, security, and remote sensing human analysts still cannot be replaced by computers. For this reason, many important image analysis tools such as edge detectors and neural networks are inspired by human visual perception models.

Anbieter: Dodax
Stand: 14.08.2020
Zum Angebot
Crowdsourcing cultural heritage metadata throug...
39,90 € *
ggf. zzgl. Versand

Crowdsourcing has been used in the cultural heritage domain for a variety of tasks. One of them is generation of descriptive metadata for digital archives. Gamification offers citizens a more entertaining way to interact with digital collections and generate useful metadata as a side effect of gameplay. In this work, we explore the integration of social networks with crowdsourcing games for generating archival metadata. We studied crowdsourcing, gamification and social dynamics from the perspective of cultural heritage and combined their features in a metadata game prototype on the Facebook platform. We tested our prototype and evaluated its results by analysing participation, contribution and player feedback. The two-week testing phase showed promising results in terms of user engagement and produced metadata: almost 3000 tags were added, 90% of which were valid dictionary terms. We conclude that deploying metadata games on social networking platforms is a feasible method for digital archives to harness human intelligence from large shared spaces. This book is recommended for curators of digital collections as well as designers of modern data-driven social games.

Anbieter: Dodax
Stand: 14.08.2020
Zum Angebot
DRISHTI - Indoor Orientation for Visually Impaired
49,00 € *
ggf. zzgl. Versand

DRISHTI is a wireless indoor orientation system specifically designed for the Visually Impaired (VI), that continuously and in real-time can determine the position of a person from a distance within a confined physical space. We use it to help a VI move around in an unknown and unfamiliar indoor environment (which means that the VI is not oriented, making DRISHTI unique from other Electronic Travel Aids), providing him with the relevant contextual information. DRISHTI does not require any kind of navigational aids like guide canes, guide dogs or wheel chairs to help the VI. The system constantly guides the VI to navigate through auditory cues, issued by the system, based on static and dynamic data collected by the obstacle avoidance system. In this text we integrate several technologies including wearable computers, RFID networks, wireless sensors, voice recognition and synthesis and Bluetooth Technology. The underlying wireless network can either be of RFID tags or Wireless Sensors.

Anbieter: Dodax
Stand: 14.08.2020
Zum Angebot
Image Moment
34,00 € *
ggf. zzgl. Versand

High Quality Content by WIKIPEDIA articles! Image analysis is the extraction of meaningful information from images, mainly from digital images by means of digital image processing techniques. Image analysis tasks can be as simple as reading bar coded tags or as sophisticated as identifying a person from their face. Computers are indispensable for the analysis of large amounts of data, for tasks that require complex computation, or for the extraction of quantitative information. On the other hand, the human visual cortex is an excellent image analysis apparatus, especially for extracting higher-level information, and for many applications including medicine, security, and remote sensing human analysts still cannot be replaced by computers. For this reason, many important image analysis tools such as edge detectors and neural networks are inspired by human visual perception models.

Anbieter: Dodax
Stand: 14.08.2020
Zum Angebot
A Sensor Based Water Monitoring Platform
49,90 € *
ggf. zzgl. Versand

Water is a basic requirement of human life and economy, and its quality is increasingly threatened by pollution. Therefore, efficient and real time measurements need to be performed on waterways to cope with the ever-growing threat of water pollution. Several water quality monitoring systems are proposed in literature. However, these systems are highly expensive and complex, they offer inaccurate pollution positions, and they do not perform auto-disagnosis to recover from faults and cope with the caracteristics of the monitored environement. In this report, we propose a novel water quality monitoring platform which combines wireless sensor networks and radio frequency identification (RFID) technology. In fact, the system uses a set of fixed RFID tags that are deployed next to the waterway and a set of mobile sensor nodes which integrate RFID readers. This proposed water monitoring platform can offer several enhancements in comparison to the existing water monitoring platforms such as: cost effectiveness, low energy consumption, system performance monitoring, and tolerance to errors and loss of information.

Anbieter: Dodax
Stand: 14.08.2020
Zum Angebot
S-CBIR Algorithm for Image Retrieval in ImageRi...
39,90 € *
ggf. zzgl. Versand

Social networking and image hosting websites like Facebook and Flickr allow users to upload, tag and share images on internet, such type of sites have millions of users who actually upload millions of images daily. Famous e commerce web sites like amazon, flipkart, and snapdeal etc. also show product related images to customers. Images which are available on social multimedia networking, image hosting and e commerce websites are accompanied by different annotations, tags, comments, and other related information which tend to form an image rich information networks. Due to existence of different related information to images (tags, annotations, comments etc.) retrieval of images from image rich information networks is very challenging and complex task. In this work an integrated approach of algorithms to retrieve an image from image rich information networks is proposed.

Anbieter: Dodax
Stand: 14.08.2020
Zum Angebot
Algorithms and Silicon Architectures for Public...
68,00 € *
ggf. zzgl. Versand

In recent years, the use of cryptography has become more widespread, due to the advent and expansion of the electronic communication age. This has been fuelled by the growing popularity of services such as e-mail, and on-line shopping and banking. Therefore, the security industry has a requirement to produce high-speed, low cost, and high-strength cryptographic products in order to satisfy customer demands for real-time encryption. In particular, hardware based algorithms, architectures, and implementations of encryption algorithms offer several key benefits over software solutions. Therefore, the overall aim of the work presented in this book has been to develop reusable hardware based public-key cryptographic solutions, capable of performing high-strength encryption in real-time. Particular focus has been on the RSA cryptosystem, Montgomery modular multiplication and inversion, elliptic curve cryptosystems, and public-key cryptography for wireless sensor networks and RFID tags. Worked examples are provided throughout the book in order to provide a more detailed insight into the many cryptographic algorithms and architectures described.

Anbieter: Dodax
Stand: 14.08.2020
Zum Angebot