Tags
Language
Tags
March 2024
Su Mo Tu We Th Fr Sa
25 26 27 28 29 1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30
31 1 2 3 4 5 6

Novel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics

Posted By: szavatar
Novel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics

Novel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics
Publisher: Springer | Pages: 597 | Publication Date: 2008 | ISBN: 9781402087363 | PDF | 65.4 MB

About this book
Novel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics includes a set of rigorously reviewed world-class manuscripts addressing and detailing state-of-the-art research projects in the areas of Industrial Electronics, Technology & Automation, Telecommunications and Networking. Novel Algorithms and Techniques in Telecommunications, Automation and Industrial Electronics includes selected papers form the conference proceedings of the International Conference on Industrial Electronics, Technology & Automation (IETA 2007) and International Conference on Telecommunications and Networking (TeNe 07) which were part of the International Joint Conferences on Computer, Information and Systems Sciences and Engineering (CISSE 2007).
Topics Covered
Access Technologies, Medium Access Control, Network architectures and Equipment, Optical Networks and Switching, Telecommunication Technology, and Ultra Wideband Communications. Modeling and Simulation, OFDM technology , Space-time Coding, Spread Spectrum and CDMA Systems. Bluetooth , Cellular Wireless Networks, Cordless Systems and Wireless Local Loop, HIPERLAN, IEEE 802.11, Mobile Network Layer, Mobile Transport Layer, and Spread Spectrum. Authentication Applications, Block Ciphers Design Principles, Block Ciphers Modes of Operation, Electronic Mail Security, Encryption & Message Confidentiality, Firewalls, IP Security, Key Cryptography & Message Authentication, and Web Security. Advanced and Distributed Control Systems, Automation, Expert Systems, Robotics, Factory Automation, Intelligent Control Systems, Man Machine Interaction, Manufacturing Information System, Motion Control, and Process Automation.

Written for:
Professors, lecturers, instructors, teachers in colleges and universities, researchers/scientists (national research labs, industry research labs, industrial research and development centers, university research labs), graduate students, post-doctoral fellows and post-graduate students and advanced undergraduate students.

Table od contents:
1. Kernel Locally Linear Embedding Algorithm for Quality Control
2. A New Method for Synchronization and Control of the Chen Chaotic System
3. The Intra Prediction in H.264
4. Design and Implementation of Wireless Sensor Network Using Virtual Instruments and ZigBee Communication Protocol
5. Inter-Agent Communication Adaptations for Power Network Processes Simulation
6. DC Motor Monitoring and Control System
7. Web-Based Tele-Operated Control System of a Robotic Vehicle
8. Number Plate Recognition Using Analytical Fourier Mellin Transform
9. Middleware-Based Kalman Filter Design for a Driver’s Aid System
10. Improving Neural Network Performances – Training with Negative Examples
11. Synthesis of Optimal Control Systems: A Comparison Between Model Checking and Dynamic Programming Techniques
12. An Artificial Immune System Based Multi-Agent Robotic Cooperation
13. Towards ASSL Specification of Self-Scheduling Design and Monitoring in Team-Robotics Modeled with AS-TRM
14. A Novel Control System for a Direct Drive Linear Permanent Magnet Actuator with Intrinsic Position Hold
15. Characterizing the Exact Collision Course in the Plane for Mobile Robotics Application
16. Acquisition System for Monitoring Vibrations
17. Object-of-Interest Selection for Model-Based 3D Pose Tracking with Background Clutter
18. The Principles and Planning Process of an Electronic Kanban System
19. Design and Control of an Omni-Directional Mobile Robot
20. Preventing Pole-Zero Cancellation for Improved Input Disturbance Rejection in Iterative Feedback Tuning Systems
21. General Inverse Neural Current Control for Buck Converter
22. Management Study of Layered Architecture to Incorporate Mobile Devices and Grid Computing
23. Robust Control PID for Time Delays Systems
24. Wavelets vs Shape-Based Approaches for Image Indexing and Retrieval
25. Formal Specification and Simulation of the Robot Perceptual System
26. Enhancing Diagnosis Ability for Embedded Electronic Systems Using Co-Modeling
27. Development Environment Using FPGA for Domotics Applications Based on X10 Technology
28. Robustness of a Robot Control Scheme for Liquid Transfer
29. A Process Application of Step-Wise Safe Switching Control
30. Use of a Connection Model for Dynamic Systems
31. A High Performance Domain Specific OCR for Bangla Script
32. Tracking Performance of an Identical Master-Slave Teleoperation System Under Variable Time Delays
33. New Concept in Optimizing Manipulability Index of Serial Manipulators, Using SVD Method
34. Region of Interest Labeling of Ultrasound Abdominal Images Using Hausdorff Distance
35. Control of Electric Motor Parameters on the Basis of QR- Decomposition Technique
36. Navigation of Mobile Robots Using 6DOF SLAM Accelerated by Leveled Maps
37. A Peer-to-Peer Collaboration Framework for Multi-Sensor Data Fusion
38. Software Implementation of Explicit DMC Algorithm with Improved Dependability
39. Simulation Strategy of the Analog Front End for UHF Passive RFID Transponders
40. Various Methods of Economical Load Distribution in Power Plant Units in Comparison to Neural Networks Method
41. Automated Surveillance of Intruders at US Borders
42. PDFF and H! Controller Design for PMSM Drive
43. On Facilitating the Process of Providing Expert Advises Applying Association Rules
44. Analog Computer to Solve Third-Order Linear Differential Equation
45. Data Processing for Mapping in Mobile Robotics
46. Piecewise Continuous Systems Used in Trajectory Tracking of a Vision Based X-Y Robot
47. Reliability Model for MEMS Accelerometers
48. Diagram, Dynamic Geometry and Sangaku
49. A Modeling Technique for Execution and Simulation of Discrete Automation
50. Using DES in a Modified Design to Keep it from Oblivion
51. One-Time Password Authentication with Infinite Hash Chains
52. Estimation of OFDM Time-Varying Fading Channels Based on Two-Cross-Coupled Kalman Filters
53. EcoLocate: A Heterogeneous Wireless Network System for Wildlife Tracking
54. Enhancement of Throughput in 802.15.4 MAC Layer Using the Principle of Circularity
55. Wireless LAN Security Mechanisms at the Enterprise and Home Level
56. Synchronization Solution for the TDSC-UWB Detection Method
57. An Efficient In-Network Event Detection Algorithm for Wireless Sensor Nodes
58. Performance Evaluation of Distance Vector Routing Protocol on a Wireless Circular Model
59. Performance Evaluation of Mobile Ad-Hoc Routing Protocols
60. Optimizing Bandwidth Usage and Response Time Using Lightweight Agents on Data Communication Network
61. Location Information Discovery for IP Telephony
62. A Flow Based Traffic Characterization of IP Telephony Protocols
63. A Survey of Energy-Efficient and QoS-Aware Routing Protocols for Wireless Sensor Networks
64. Stepping-Stone Intrusion Detection Using Neural Networks Approach
65. Packet Fluctuation Approach for Stepping-Stone Detection
66. Using Mobile Telephone as an Operator Independent, Secure Micro-Payment Tool
67. Multiplexing Overlays on Bluetooth
68. The Problem of Predicting the Data Transmitting Delay in the Network with the Self-Similar Nature of Traffic, for the Purpose of Improving the Real-Time Conferencing
69. Guidelines for Constructing Robust Discrete-Time Computer Network Simulations
70. A Study on Enhanced Multipath Routing Protocol in Hybrid Wireless Mesh Network
71. Pseudorandom Number Generation Using Cellular Automata
72. An Efficient Estimation Algorithm for MIMO OFDM System Using Turbo Codes
73. Dynamic Rate Control Algorithm for Streaming Media Over Wireless Channel
74. Interactive Compression Algorithms for Streaming Media Over High Speed Networks
75. The Adaptive Potential of Reconfigurable MEMS in MIMO Antenna Technology
76. Voice, Video and Data Transmission Over Electrical Power Supply Networks. PLC (Power Line Communications): A Last Mile Alternative for Venezuela
77. Design and Analysis of Optical Interconnection Networks for a Dataflow Parallel Computer
78. Tracking of Mobile Nodes in Sensor Networks
79. IP Based Mobility Management for Next Generation Wireless Networks
80. Addressing Spam at the Systems-Level Through a Peered Overlay Network-Based Approach
81. A Step Towards an Autonomous Tuning Engine Design for Self-Protection and Self-Configuration
82. Enhancing Network Performance with TCP Configuration
83. Hybrid Scheme by Using Linear Feedback Shift Registers & RSA Security
84. Analysis of Optical WDM Network Topologies with Application of LRWC Under Symmetric Erlang –C Traffic
85. Estimation of Radar Alignment Parameters in Multi Sensor Data Fusion Systems Using MLE Technique
86. Pre-amp EDFA ASE Noise Minimization for Optical Receiver Transmission Performance Optimization
87. Light Weight Cryptography and Applications
88. Energy Dependent Connection Availability Model for Ad Hoc Networks
89. Trust Management in Ad Hoc Network for Secure DSR Routing
90. Investigating the Effects of Encoder Schemes, WFQ & SAD on VoIP QoS
91. A Novel Approach for Creating Consistent Trust and Cooperation (CTC) among Mobile Nodes of Ad Hoc Network
92. Bandwidth Problem in High Performance Packet Switching Network
93. An Efficient Scheme for Traffic Management in ATM Networks
94. Use of Self-Adaptive Methodology in Wireless Sensor Networks for Reducing the Energy Consumption
95. Reducing Malicious Behavior of Mobile Nodes in Ad Hoc Networks
96. Application and Evaluation of the LDPC Codes for the Next Generation Communication Systems
97. Adjusting the Power Consumption of a Solar Energy Powered Wireless Network Node in Accordance with Weather Forecasts
98. A System Architecture for SIP/IMS-Based Multimedia Services
99. Further Improvements to the Kerberos Timed Authentication Protocol
100. Self-Repairing Network in a Dynamic Environment with a Changing Failure Rate
101. Information Sharing Between CSIRT and IDS
102. Cellular Automata Used for Congestion Control in Wireless LANs
103. Performance Model of a Campus Wireless LAN