Ammari | Mission-Oriented Sensor Networks and Systems: Art and Science | E-Book | www.sack.de
E-Book

E-Book, Englisch, Band 164, 797 Seiten

Reihe: Studies in Systems, Decision and Control

Ammari Mission-Oriented Sensor Networks and Systems: Art and Science

Volume 2: Advances
1. Auflage 2019
ISBN: 978-3-319-92384-0
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark

Volume 2: Advances

E-Book, Englisch, Band 164, 797 Seiten

Reihe: Studies in Systems, Decision and Control

ISBN: 978-3-319-92384-0
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark



This book presents a broad range of deep-learning applications related to vision, natural language processing, gene expression, arbitrary object recognition, driverless cars, semantic image segmentation, deep visual residual abstraction, brain-computer interfaces, big data processing, hierarchical deep learning networks as game-playing artefacts using regret matching, and building GPU-accelerated deep learning frameworks. Deep learning, an advanced level of machine learning technique that combines class of learning algorithms with the use of many layers of nonlinear units, has gained considerable attention in recent times. Unlike other books on the market, this volume addresses the challenges of deep learning implementation, computation time, and the complexity of reasoning and modeling different type of data. As such, it is a valuable and comprehensive resource for engineers, researchers, graduate students and Ph.D. scholars.

Ammari Mission-Oriented Sensor Networks and Systems: Art and Science jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1;Foreword;10
2;Contents;12
3;About the Editor;15
4;Introduction;19
4.1;1 Mission-Oriented Sensor Networks and Systems: Art and Science;19
4.2;2 Book Organization;21
4.3;3 Acknowledgements;23
5;Mission-Critical Applications and Cyber-Physical Systems;27
6;Autonomous Cooperative Routing for Mission-Critical Applications;28
6.1;1 Introduction;29
6.1.1;1.1 Team-Based Mission-Critical Applications;29
6.2;2 Mobile Ad Hoc Routing Revisited;32
6.3;3 Autonomous Cooperative Networking Solutions;34
6.3.1;3.1 Autonomous Cooperative Routing Background;34
6.3.2;3.2 Why Autonomous Cooperative Routing?;36
6.4;4 A Higher Degree of Autonomy;44
6.4.1;4.1 Motivation;45
6.4.2;4.2 Full Autonomy Enabled by Geo-routing;47
6.4.3;4.3 Random Access;49
6.4.4;4.4 Self-localization Scheme;50
6.5;5 Practical Implementation Challenges;53
6.5.1;5.1 Wireless Channel Model;53
6.5.2;5.2 Cooperative Carrier Frequency Offset;54
6.5.3;5.3 Cooperative Power Delay Profile;59
6.5.4;5.4 Self-localization Random Access Blocks;62
6.6;6 Experimental Performance Evaluation Results;63
6.6.1;6.1 Development Platform;63
6.6.2;6.2 Equalizer Performance;65
6.6.3;6.3 Array Gain;67
6.7;7 Conclusions;68
6.8;References;68
7;Using Models for Communication in Cyber-Physical Systems;72
7.1;1 Introduction;72
7.2;2 Using Communication for Tracking a Vehicle (or a System);74
7.3;3 Example of Models for Vehicle Movement;78
7.4;4 Using Models in MBC;80
7.5;5 Using a Hybrid Automaton Model in MBC;82
7.6;6 Evaluating MBC with Collision Warning Application;83
7.6.1;6.1 A Sample FCW Algorithm;84
7.6.2;6.2 Performance Metrics;85
7.6.3;6.3 Communication Strategies;85
7.7;7 Evaluation Using 100-Car Naturalistic Driving Data and Car Following Models;86
7.7.1;7.1 Improving MBC-Based Method with Network Awareness;92
7.7.2;7.2 Improvements to Tracking Accuracy;92
7.8;8 An Example of MBC with Model Construct Changes;93
7.8.1;8.1 Rules for Communication of Models;95
7.9;9 Concluding Remarks;95
7.10;References;97
8;Internet of Things;99
9;Urban Microclimate Monitoring Using IoT-Based Architecture;100
9.1;1 Introduction;100
9.2;2 Literature Review;102
9.3;3 Design of IoT-Based Architecture for Sensor Node;106
9.3.1;3.1 Hardware;108
9.3.2;3.2 Software;126
9.3.3;3.3 Testbed for IoT Applications;134
9.4;4 Implementation of Urban Microclimate Monitoring Using IoT-Based Architecture;137
9.4.1;4.1 Sensor Selection;137
9.4.2;4.2 Hardware Development;139
9.4.3;4.3 Software Development;139
9.4.4;4.4 Communication Module;141
9.4.5;4.5 Sensor Node Deployment;142
9.4.6;4.6 Data from a Sensor Node;143
9.5;5 Conclusion;144
9.6;References;146
10;Models for Plug-and-Play IoT Architectures;150
10.1;1 Peripheral Plug-and-Play (PnP) Definition and First Attempts;151
10.1.1;1.1 NuBus;151
10.1.2;1.2 MSX Bus;151
10.1.3;1.3 Micro Channel Bus;152
10.2;2 PnP Architectures;152
10.2.1;2.1 PnP Requirements in IoT;152
10.3;3 PnP General Architecture;155
10.3.1;3.1 Thing Identification;155
10.3.2;3.2 Thing Drivers;156
10.3.3;3.3 Thing Network Discovery and Operation;158
10.4;4 Plug-and-Play Models for IoT Applications;161
10.4.1;4.1 MicroPnP;161
10.4.2;4.2 IEEE 1451 Standard 1451sps0;165
10.4.3;4.3 The TEDS Structure;166
10.5;5 Conclusion;182
10.6;References;182
11;Digital Forensics for IoT and WSNs;186
11.1;1 Introduction;187
11.2;2 Digital Forensics;189
11.3;3 Related Background on IoT and WSNs;190
11.4;4 Applying Digital Forensics to IoT and WSNs;192
11.4.1;4.1 Challenges in IoT and WSN Forensics;193
11.4.2;4.2 Device-Level Investigation;198
11.4.3;4.3 Network-Level Investigation;203
11.4.4;4.4 Cloud-Level Investigation;213
11.4.5;4.5 Future Research;216
11.4.6;4.6 Conclusion;218
11.5;References;218
12;Dependable Wireless Communication and Localization in the Internet of Things;223
12.1;1 Introduction;224
12.2;2 Fundamentals of Wireless Propagation Channels;226
12.2.1;2.1 Modeling of Multipath Channels;226
12.2.2;2.2 Signal Classification in Terms of Bandwidth;229
12.3;3 Physical-Layer Signal Processing;230
12.3.1;3.1 Signal Processing for Wireless Communications;231
12.3.2;3.2 Signal Processing for Wireless Localization;235
12.4;4 Hardware;239
12.4.1;4.1 Transceivers;240
12.4.2;4.2 RF and Microwave Filters for the Internet of Things;244
12.4.3;4.3 Antennas;248
12.5;5 Networking;252
12.5.1;5.1 Impact of Medium Access Control on Dependability;253
12.5.2;5.2 Impact of Bandwidth on Dependability;255
12.5.3;5.3 Impact of Networking Design Space on Dependability;256
12.6;6 Conclusions and Future Work;263
12.7;References;264
13;Crowdsensing and Smart Cities;271
14;User Incentivization in Mobile Crowdsensing Systems;272
14.1;1 Introduction;273
14.2;2 Related Work;274
14.3;3 The Model;278
14.3.1;3.1 The Task;278
14.3.2;3.2 The Server;280
14.3.3;3.3 The Crowd;282
14.4;4 Performance Evaluation;283
14.4.1;4.1 Experimental Setup and Metrics;283
14.4.2;4.2 Incentive Policies' Performance;284
14.4.3;4.3 Workload Balance and Overall Task Quality;294
14.4.4;4.4 Utility Function and Incentive Policy Impact;295
14.5;5 Conclusions and Future Work;297
14.6;References;298
15;Vehicular Ad Hoc/Sensor Networks in Smart Cities;300
15.1;1 Introduction;300
15.2;2 Background;302
15.2.1;2.1 Architecture;302
15.2.2;2.2 Environment;303
15.2.3;2.3 DSRC/WAVE Protocol Stacks;304
15.3;3 Unique Challenges of Vehicular Networks;304
15.4;4 Routing in VANETs;307
15.4.1;4.1 Topology-Based (Ad Hoc) Routing Protocols;307
15.4.2;4.2 Position-Based Routing Protocols;308
15.4.3;4.3 Cluster-Based Routing Protocols;310
15.4.4;4.4 Broadcast-Based Routing Protocols;311
15.4.5;4.5 Infrastructure-Based Routing Protocols;313
15.5;5 Macro–Micro Model for Routing Protocols;315
15.5.1;5.1 State Awareness Routing Protocols;315
15.5.2;5.2 Macro–Micro Model;316
15.5.3;5.3 Mapping in Macro–Micro Model;317
15.6;6 Vehicular Sensing Applications;319
15.6.1;6.1 Safety Application;319
15.6.2;6.2 Non-safety Application;320
15.7;7 Conclusion and Future Research Directions;321
15.8;References;321
16;Wearable Computing;324
17;An Overview of Wearable Computing;325
17.1;1 Introduction;325
17.2;2 The History of Wearable Computing;326
17.2.1;2.1 Early Wearable Technology (1700–1907s);327
17.2.2;2.2 Wearable Computing Using Modern Electronics (1960–2005);329
17.2.3;2.3 Advanced Wearable Computing (2006–Present);332
17.2.4;2.4 Lessons Learned from the History of Wearable Computing;337
17.3;3 Applications of Wearable Computing;341
17.3.1;3.1 Education;344
17.3.2;3.2 Health;344
17.3.3;3.3 Business and Manufacturing;346
17.3.4;3.4 Military;347
17.3.5;3.5 Personal Enhancement;348
17.4;4 Case Studies: Activity Recognition and Biometrics;348
17.4.1;4.1 Data Collection;349
17.4.2;4.2 Data Transformation;350
17.4.3;4.3 Activity Recognition Experiments and Results;351
17.4.4;4.4 Biometrics Experiments and Results;352
17.5;5 Summary and Future Directions;357
17.6;References;360
18;Wearables Security and Privacy;362
18.1;1 Introduction;362
18.2;2 Wearable Devices;365
18.2.1;2.1 Sensors;365
18.2.2;2.2 Signal Processing;371
18.2.3;2.3 Processors;372
18.2.4;2.4 Software;374
18.3;3 Wireless Communications Security;375
18.3.1;3.1 Bluetooth;376
18.3.2;3.2 Zigbee;379
18.3.3;3.3 IEEE 802.15.6;381
18.3.4;3.4 ANT+;382
18.3.5;3.5 UWB;382
18.3.6;3.6 NFC;383
18.4;4 Device Security;384
18.4.1;4.1 System Security;384
18.4.2;4.2 Vulnerabilities;385
18.4.3;4.3 Malware;385
18.5;5 Privacy Issues;386
18.5.1;5.1 Access Controls;386
18.5.2;5.2 Outsourcing;387
18.5.3;5.3 Health-Related Information of Non-health-Related Applications;387
18.5.4;5.4 Tracking;387
18.6;6 Conclusions;388
18.7;References;388
19;Wearable Computing and Human-Centricity;392
19.1;1 Introduction;392
19.2;2 Definitions;393
19.3;3 What Is a Wearable Computer?;394
19.4;4 History of Wearable Computers;395
19.5;5 Wearable Device Interfaces;397
19.5.1;5.1 Wearable Interfaces by Modality;398
19.5.2;5.2 Examples of Modern Wearable Interfaces;402
19.6;6 Areas of Application;405
19.6.1;6.1 Fashion;405
19.6.2;6.2 Behavior Modification;406
19.6.3;6.3 Fitness;408
19.6.4;6.4 Assistive Devices;409
19.6.5;6.5 Navigation;410
19.7;7 Key Barriers to the Success of Wearable Computers;412
19.8;8 What Is Human-Centricity?;413
19.9;9 Concerns of Human-Centricity;414
19.9.1;9.1 Personal;414
19.9.2;9.2 Social;415
19.9.3;9.3 Cultural;416
19.9.4;9.4 Environmental;416
19.10;10 Universal Design Versus Human-Centric Design;417
19.11;11 Human-Centric Wearables;418
19.11.1;11.1 External Considerations;418
19.11.2;11.2 Internal Considerations;419
19.12;12 Conclusion;420
19.13;References;420
20;Wireless Charging and Energy Transfer;425
21;Wireless Transfer of Energy Alongside Information in Wireless Sensor Networks;426
21.1;1 Introduction;427
21.2;2 Related Work;429
21.2.1;2.1 Radio Frequency Identification (RFID);429
21.2.2;2.2 WISP;429
21.2.3;2.3 Backscattering;430
21.2.4;2.4 Multi-path Energy Routing;430
21.2.5;2.5 Near-Field Communication (NFC);430
21.2.6;2.6 Bokode;431
21.2.7;2.7 Microwave Power Transmission;431
21.2.8;2.8 Resonant Inductive Coupling;431
21.3;3 Consolidated Energy and Information Channels (CEICh) in Wireless Sensor Networks;432
21.3.1;3.1 Overview of CEICh;432
21.3.2;3.2 Design of CEICh;432
21.4;4 IPoint;438
21.4.1;4.1 Motivation and Possible Applications;438
21.4.2;4.2 Definition of the System with Respect to CEICh Design;439
21.4.3;4.3 Challenges and Approach;439
21.4.4;4.4 Our Solution;440
21.4.5;4.5 Detailed System Architecture;441
21.4.6;4.6 Multimodal Communications;443
21.4.7;4.7 Optimization Techniques;449
21.4.8;4.8 Summary;462
21.5;5 Conclusion and Future Research Directions;462
21.6;References;463
22;Efficient Protocols for Peer-to-Peer Wireless Power Transfer and Energy-Aware Network Formation;468
22.1;1 Introduction;469
22.2;2 Related Work;470
22.3;3 The Model;471
22.4;4 Problem Definition and Metrics;472
22.5;5 The Population Energy Balance Problem;474
22.5.1;5.1 Loss-Less Energy Transfer;474
22.5.2;5.2 Energy Transfer with Loss;477
22.6;6 The Energy-Aware Star Network Formation Problem;484
22.6.1;6.1 Full Transfer PFT;484
22.6.2;6.2 Half Transfer PHT;486
22.6.3;6.3 Degree Aware PDA;487
22.6.4;6.4 Fully Adaptive PFA;491
22.7;7 Performance Evaluation;493
22.7.1;7.1 The Population Energy Balance Problem;493
22.7.2;7.2 The Energy-Aware Star Network Formation Problem;497
22.8;8 Conclusion;510
22.9;References;510
23;Next-Generation Software-Defined Wireless Charging System;514
23.1;1 Introduction;514
23.2;2 Related Works;516
23.2.1;2.1 Energy Harvesting-Powered IoT;516
23.2.2;2.2 Distributed Wireless Energy Transfer;518
23.2.3;2.3 RF Energy Harvesting Circuits;519
23.2.4;2.4 Wireless Software-Defined Networking;519
23.3;3 DeepCharge Architecture Design;521
23.4;4 System Prototypes;524
23.4.1;4.1 Distributed Indoor Development;524
23.4.2;4.2 Self-powered Outdoor Development;529
23.4.3;4.3 RF Energy Harvesting Circuit Design;532
23.4.4;4.4 RF Energy Harvesting Circuit Evolutions;535
23.5;5 RF Exposure Safety and Scalability Analysis;540
23.6;6 Research Challenges;544
23.7;7 Conclusion;545
23.8;References;546
24;Robotics and Middleware;551
25;Robotic Wireless Sensor Networks;552
25.1;1 Introduction;553
25.2;2 What is an RWSN?;556
25.3;3 RWSN System Components;560
25.3.1;3.1 RSS Models, Measurements, and RF Mapping;560
25.3.2;3.2 Routing;563
25.3.3;3.3 Connectivity Maintenance;567
25.3.4;3.4 Communication-Aware Robot Positioning and Movement Control;572
25.3.5;3.5 Localization;579
25.4;4 RWSN Network Stack Layer Analysis;581
25.4.1;4.1 Internet Model for Network;583
25.4.2;4.2 An Unified System Architecture for RWSN;587
25.5;5 Collaborative Works on Networked Robots;588
25.6;6 Summary and Conclusion;589
25.7;References;591
26;Robot and Drone Localization in GPS-Denied Areas;603
26.1;1 Introduction;603
26.2;2 Robots and Drones;604
26.2.1;2.1 Autonomy;605
26.2.2;2.2 Form Factors;605
26.3;3 Localization in GPS-Denied Areas;607
26.4;4 Technologies for GPS-Less Localization;608
26.5;5 Radio Frequency Localization;608
26.5.1;5.1 Problems;609
26.5.2;5.2 Wi-Fi Localization;611
26.5.3;5.3 UWB Localization;613
26.5.4;5.4 LTE Localization;615
26.5.5;5.5 Cooperative Radio Frequency Localization;615
26.5.6;5.6 Range-Free Localization;618
26.6;6 Visual Localization and Navigation;620
26.6.1;6.1 Visual Markers;621
26.6.2;6.2 SLAM;624
26.6.3;6.3 Cooperative Visual Localization;626
26.6.4;6.4 Parallels with Visual Sensor Networks;627
26.7;7 Dead Reckoning and Filters;628
26.7.1;7.1 Dead Reckoning;628
26.7.2;7.2 Filtering and Estimation Techniques;629
26.8;8 Multi-robot Coordination;631
26.8.1;8.1 Centralized Coordination;631
26.8.2;8.2 Distributed Coordination;632
26.9;9 Open Challenges;633
26.10;10 Summary;633
26.11;References;633
27;Middleware for Multi-robot Systems;638
27.1;1 Introduction;639
27.2;2 Existing Multi-robot Systems and Applications;640
27.2.1;2.1 Existing Multi-robot Systems;641
27.2.2;2.2 Multi-robot System Applications;646
27.3;3 Design Goals for MRS Middleware;649
27.4;4 A Taxonomy of MRS Middleware;652
27.5;5 Representative Middleware for MRS;658
27.6;6 Future Directions and Challenges;671
27.7;References;673
28;Interference Mitigation, Radiation Control, and Encryption;679
29;Interference Mitigation Techniques in Wireless Body Area Networks;680
29.1;1 Wireless Body Area Networks Overview;681
29.1.1;1.1 Classification of WBANs;681
29.1.2;1.2 Communication Architecture of WBANs;686
29.2;2 Intra-WBAN Communication;687
29.3;3 Radio Co-channel Interference;690
29.3.1;3.1 Interference Between WBANs and Other Wireless Networks;692
29.3.2;3.2 Radio Co-channel Interference Among WBANs;692
29.3.3;3.3 Interference Mitigation Challenges;695
29.4;4 Co-channel Interference Mitigation Techniques;696
29.4.1;4.1 Resource Allocation;697
29.4.2;4.2 Power Control;702
29.4.3;4.3 Multiple Access;706
29.4.4;4.4 Link Adaptation;710
29.5;5 Conclusions and Future Research Directions;714
29.6;References;716
30;Radiation Control Algorithms in Wireless Networks;722
30.1;1 Introduction;723
30.2;2 Related Work;724
30.3;3 Radiation Awareness in Three-Dimensional Wireless Sensor Networks;727
30.3.1;3.1 Network Model and Radiation Definition;728
30.3.2;3.2 Point Radiation in Random Geometric Graphs;730
30.3.3;3.3 Point Radiation in Nearest Neighbor Random Graphs;733
30.3.4;3.4 Heuristics for MRP;736
30.3.5;3.5 A Linear Program for the Offline Optimum;739
30.3.6;3.6 Performance Evaluation;740
30.4;4 Low Radiation Efficient Wireless Energy Transfer in Wireless Distributed Systems;744
30.4.1;4.1 Network and Charging Model;745
30.5;5 Problem Statement and First Results;747
30.5.1;5.1 Computing the Objective Function;750
30.5.2;5.2 Computing the Maximum Radiation;751
30.5.3;5.3 A Local Improvement Heuristic for LREC;752
30.5.4;5.4 A Relaxation of LREC;752
30.5.5;5.5 Performance Evaluation;755
30.6;6 Conclusions;757
30.7;References;757
31;Subspace-Based Encryption;760
31.1;1 Introduction;760
31.2;2 Preliminaries;762
31.2.1;2.1 Cryptography;762
31.2.2;2.2 Cryptanalysis;763
31.2.3;2.3 Cryptanalysis Attacks;764
31.2.4;2.4 A Brief Reminder on Some Basics on Linear Algebra;766
31.3;3 Blind Source Separation in Cryptography;767
31.3.1;3.1 Blind Source Separation (BSS);767
31.3.2;3.2 BSS-Based Encryption;767
31.3.3;3.3 Cryptanalysis of BSS-Based Encryption;768
31.3.4;3.4 Comments on Cryptanalysis of BSS-Based Encryption Scheme;772
31.4;4 Subspace-Based Encryption;773
31.4.1;4.1 Encryption;774
31.4.2;4.2 Decryption;775
31.5;5 Iterative Subspace-Based Encryption;776
31.5.1;5.1 Encryption;777
31.5.2;5.2 Decryption;777
31.6;6 Cryptographic Robustness of the Subspace-Based Encryption Systems;777
31.6.1;6.1 Interpretation of the Subspace-Based Encryption in Terms of Confusion and Diffusion Requirements;778
31.6.2;6.2 Cipher-Text-Only Attack;778
31.6.3;6.3 Differential Attack;782
31.7;7 Application and Performance Evaluation;783
31.7.1;7.1 Application to Speech Encryption;784
31.7.2;7.2 Application to Image Encryption;788
31.8;8 Conclusion;795
31.9;References;795



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.