Routing in Opportunistic Networks

Routing in Opportunistic Networks
Author: Isaac Woungang
Publisher: Springer Science & Business Media
Total Pages: 421
Release: 2013-09-10
Genre: Technology & Engineering
ISBN: 1461435145

Routing in Opportunistic Networks focuses on the basics of opportunistic networks, modeling and communication in opportunistic networks, routing in opportunistic networks, and collaboration and cooperation in opportunistic networks. The editors will cover such topics as mobility characterization and discovery in opportunistic networks, scheduling and medium access control in opportunistic networks as well as testbed, tools, and measurements for opportunistic networks.

Handbook of Nature-Inspired and Innovative Computing

Handbook of Nature-Inspired and Innovative Computing
Author: Albert Y. Zomaya
Publisher: Springer Science & Business Media
Total Pages: 758
Release: 2006-01-10
Genre: Computers
ISBN: 9780387405322

As computing devices proliferate, demand increases for an understanding of emerging computing paradigms and models based on natural phenomena. Neural networks, evolution-based models, quantum computing, and DNA-based computing and simulations are all a necessary part of modern computing analysis and systems development. Vast literature exists on these new paradigms and their implications for a wide array of applications. This comprehensive handbook, the first of its kind to address the connection between nature-inspired and traditional computational paradigms, is a repository of case studies dealing with different problems in computing and solutions to these problems based on nature-inspired paradigms. The "Handbook of Nature-Inspired and Innovative Computing: Integrating Classical Models with Emerging Technologies" is an essential compilation of models, methods, and algorithms for researchers, professionals, and advanced-level students working in all areas of computer science, IT, biocomputing, and network engineering.

An Integrated Approach to Home Security and Safety Systems

An Integrated Approach to Home Security and Safety Systems
Author: Sonali Goyal
Publisher: CRC Press
Total Pages: 159
Release: 2021-10-15
Genre: House & Home
ISBN: 1000465195

This book provides an integrated solution for security and safety in the home, covering both assistance in health monitoring and safety from strangers/intruders who want to enter the home with harmful intentions. It defines a system whereby recognition of a person/stranger at the door is done using three modules: Face Recognition, Voice Recognition and Similarity Index. These three modules are taken together to provide a percentage likelihood that the individual is in the "known" or "unknown" category. The system can also continuously monitor the health parameters of a vulnerable person living alone at home and aid them in calling for help in an emergency. The authors have analyzed a number of existing biometric techniques to provide security for an individual living alone at home. These biometric techniques have been tested using MATLAB® image processing and signal processing toolboxes, and results have been calculated on the basis of recognition rate. A major contribution in providing security is a hybrid algorithm proposed by the author named PICA, which combines features of both PCA (Principle Component Analysis) and ICA (Independent Component Analysis) algorithms. This hybrid approach gives better performance recognition than either system alone. The second proposed hybrid algorithm for voice recognition is named as a MFRASTA algorithm by combining features of MFCC (Mel Frequency Cepstral Coefficient) and RASTA-PLP (RelAtive SpecTrA-Perceptual Linear Prediction) algorithm. After performing experiments, results are collected on the basis of recognition rate. The authors have also proposed a third technique named as a Similarity Index to provide trust-based security for an individual. This technique is text independent in which a person is recognized by pronunciation, frequency, tone, pitch, etc., irrespective of the content spoken by the person. By combining these three techniques, a high recognition rate is provided to the person at the door and high security to the individual living independently at home. In the final contribution, the authors have proposed a fingertip-based application for health monitoring by using the concept of sensors. This application is developed using iPhone 6’s camera. When a person puts their fingertip on a camera lens, with the help of brightness of the skin, the person’s heartbeat will be monitored. This is possible even with a low-quality camera. In case of any emergency, text messages will be sent to the family members of the individual living alone by using 3G Dongle and MATLAB tool. Results show that the proposed work outperforms all the existing techniques used in face recognition, voice recognition, and health monitoring alone.

Mobile Lightweight Wireless Systems

Mobile Lightweight Wireless Systems
Author: Fabrizio Granelli
Publisher: Springer Science & Business Media
Total Pages: 444
Release: 2009-08-10
Genre: Computers
ISBN: 3642038190

The First International Conference on Mobile Lightweight Systems (MOBILIGHT) was held in Athens during May 18–20, 2009. The decision to organize a scientific event on wireless communications, where competition is really enormous, was motivated by discussions with some colleagues about the current unprecedented request for lightweight, wireless communication devices with high usability and performance able to support added-value services in a highly mobile environment. Such devices follow the user everywhere he/she goes (at work, at home, while travelling, in a classroom, etc.), but also result in exciting - search, development and business opportunities. Such a scenario clearly demands significant upgrades to the existing communi- tion paradigm in terms of infrastructure, devices and services to support the anytime, anywhere, any device philosophy, introducing novel and fast-evolving requirements and expectations on research and development in the field of information and com- nication technologies. The core issue is to support the desire of wireless users to have 24/7 network availability and transparent access to "their own" services.

Ubicomp 2001: Ubiquitous Computing

Ubicomp 2001: Ubiquitous Computing
Author: Gregory D. Abowd
Publisher: Springer Science & Business Media
Total Pages: 385
Release: 2001-09-19
Genre: Computers
ISBN: 3540426140

This book constitutes the refereed proceedings of the Third International Conference on Ubiquitous Computing, Ubicomp 2001, held in Atlanta, GA, USA in September/October 2001. The 14 revised full papers and 15 revised technical notes were carefully selected during a highly competitive reviewing process from a total of 160 submissions (90 paper submissions and 70 technical notes submissions). All current aspects of research and development in the booming area of ubiquitous computing are addressed. The book offers topical sections on location awareness, tools and infrastructure, applications for groups, applications and design spaces, research challenges and novel input, and output.

Encyclopedia of Information Science and Technology, Third Edition

Encyclopedia of Information Science and Technology, Third Edition
Author: Khosrow-Pour, Mehdi
Publisher: IGI Global
Total Pages: 7972
Release: 2014-07-31
Genre: Computers
ISBN: 1466658894

"This 10-volume compilation of authoritative, research-based articles contributed by thousands of researchers and experts from all over the world emphasized modern issues and the presentation of potential opportunities, prospective solutions, and future directions in the field of information science and technology"--Provided by publisher.

Ubiquitous Computing Fundamentals

Ubiquitous Computing Fundamentals
Author: John Krumm
Publisher: CRC Press
Total Pages: 328
Release: 2018-10-08
Genre: Mathematics
ISBN: 1420093614

"...a must-read text that provides a historical lens to see how ubicomp has matured into a multidisciplinary endeavor. It will be an essential reference to researchers and those who want to learn more about this evolving field." -From the Foreword, Professor Gregory D. Abowd, Georgia Institute of Technology First introduced two decades ago, the term ubiquitous computing is now part of the common vernacular. Ubicomp, as it is commonly called, has grown not just quickly but broadly so as to encompass a wealth of concepts and technology that serves any number of purposes across all of human endeavor. While such growth is positive, the newest generation of ubicomp practitioners and researchers, isolated to specific tasks, are in danger of losing their sense of history and the broader perspective that has been so essential to the field’s creativity and brilliance. Under the guidance of John Krumm, an original ubicomp pioneer, Ubiquitous Computing Fundamentals brings together eleven ubiquitous computing trailblazers who each report on his or her area of expertise. Starting with a historical introduction, the book moves on to summarize a number of self-contained topics. Taking a decidedly human perspective, the book includes discussion on how to observe people in their natural environments and evaluate the critical points where ubiquitous computing technologies can improve their lives. Among a range of topics this book examines: How to build an infrastructure that supports ubiquitous computing applications Privacy protection in systems that connect personal devices and personal information Moving from the graphical to the ubiquitous computing user interface Techniques that are revolutionizing the way we determine a person’s location and understand other sensor measurements While we needn’t become expert in every sub-discipline of ubicomp, it is necessary that we appreciate all the perspectives that make up the field and understand how our work can influence and be influenced by those perspectives. This is important, if we are to encourage future generations to be as successfully innovative as the field’s originators.

The Evolution of Pervasive Information Systems

The Evolution of Pervasive Information Systems
Author: Manuele Kirsch Pinheiro
Publisher: Springer Nature
Total Pages: 196
Release: 2023-01-01
Genre: Computers
ISBN: 303118176X

This book covers several aspects related the evolution of Information Systems into Pervasive Information Systems. New IT trends have an important impact on IT infrastructures, which become increasingly heterogeneous, flexible, and dynamic. These new trends are transforming Information Systems into what we call Pervasive Information Systems. The purpose of this book is to combine “state-of-the-art” solutions from various research communities (such as Information Systems Engineering, Cloud Computing, Fog/Edge Computing, Pervasive systems, Distributed systems, and Middleware systems) related to the Pervasive Information Systems emergence as a common point of view. Through these multiple contributions, this book tackles important challenges concerning Information Systems evolution, promoting a holistic view of Pervasive Information System. Pervasive Information Systems (PIS) can be defined as a new class of Information Systems. It can be characterized by an IT that is gradually embedded in the physical environment and can accommodate the user’s requirements and desires when necessary. This evolution implies considering Information Systems beyond the organization's physical environment to integrate new technologies transparently, leading to a pervasive environment whose behavior should be more and more reactive & proactive. It corresponds to an important change in Information Systems Engineering. Pervasive Information Systems are deeply multidisciplinary systems, demanding a holistic view in which multiple domains are invited to contribute.