Sensor Network Operations
Home > Science, Technology & Agriculture > Electronics and communications engineering > Communications engineering / telecommunications > Sensor Network Operations
31%
Sensor Network Operations

Sensor Network Operations

|
     0     
5
4
3
2
1




Out of Stock


Notify me when this book is in stock
About the Book

This excellent title introduces the concept of mission oriented sensor networks as distributed dynamic systems of interacting sensing devices that are networked to jointly execute complex real time missions under uncertainty. It provides the latest, yet unpublished results on the main technical and application challenges of mission oriented sensor networks. The authors of each chapter are research leaders from multiple disciplines who are presenting their latest innovations on the issues. Together, the editors have compiled a comprehensive treatment of the subject that flows smoothly from chapter to chapter. This interdisciplinary approach significantly enhances the science and technology knowledge base and influences the military and civilian applications of this field. Dr. Shashi Phoha is the guest editor of "IEEE Transactions in Mobile Computing, Special Issue on Mission Oriented Sensor Networks". She is the Head of the Information Sciences and Technology Division of ARL and Professor of Electrical and Computer Engineering at Pennsylvania State University. She has led major research programs of multi million dollars for military sensor networks in industry as well as in academia. In addition to more than a hundred journal articles, she authored or co authored several books in related areas. Dr. Thomas La Porta is the Editor of the "IEEE Transactions on Mobile Computing". He received his B.S.E.E. and M.S.E.E. degrees from The Cooper Union, New York, NY and his Ph.D. degree in Electrical Engineering from Columbia University, New York, NY. He joined the Computer Science and Engineering Department at Penn State in 2002 as a Full Professor. He is Director of the Networking Research Center at Penn State. Prior to joining Penn State, Dr. LaPorta was with Bell Laboratories since 1986. He was the Director of the Mobile Networking Research Department Bell Laboratories, Lucent Technologies, where he led various projects in wireless and mobile networking. He is an IEEE Fellow, Bell Labs Fellow, received the Bell Labs Distinguished Technical Staff Award, and an Eta Kappa Nu Outstanding Young Electrical Engineer Award. He has published over 50 technical papers and holds over 20 patents. Christopher Griffin holds a Masters degree in Mathematics from Penn State and is currently pursuing his Ph.D. there. Mr. Griffin has worked as a research engineer at the Penn State Applied Research Laboratory for the last six years on several DARPA and or Army Research Laboratory sponsored programs, including: the Emergent Surveillance Plexus (ESP) program as a lead engineer; the DARPA sponsored Semantic Information Fusion program under the SensIT initiative, where he co developed a distributed target tracking system and managed the development of a target classification algorithm using Level 1 sensor fusion techniques; as a co principal software architect for the DARPA Joint Force Component Controller (JFACC) initiative, an adaptive C2 program aimed at improving Air Force response times; and he was the principal software architect for the Boeing/ARFL Insertion of Embedding Infosphere Technology (IEIST) program. His areas of research expertise are distributed tracking systems, mission oriented control, and system modeling.

Table of Contents:
PREFACE. CONTRIBUTORS. I SENSOR NETWORK OPERATIONS OVERVIEW. 1 Overview of Mission Oriented Sensor Networks. 1.1 Introduction. 1.2 Trends in Sensor Development. 1.3 Mission Oriented Sensor Networks: Dynamic Systems Perspective. References. II SENSOR NETWORK DESIGN AND OPERATIONS. 2 Sensor Deployment, Self Organization, and Localization. 2.1 Introduction. 2.2 SCARE: A Scalable Self Configuration and Adaptive Reconfiguration Scheme for Dense Sensor Networks. 2.3 Robust Sensor Positioning in Wireless Ad Hoc Sensor Networks. 2.4 Trigonometric k Clustering (TKC) for Censored Distance Estimation. 2.5 Sensing Coverage and Breach Paths in Surveillance Wireless Sensor Networks. References. 3 Purposeful Mobility and Navigation. 3.1 Introduction. 3.2 Controlled Mobility for Efficient Data Gathering in Sensor Networks with Passively Mobile Nodes. 3.3 Purposeful Mobility in Tactical Sensor Networks. 3.4 Formation and Alignment of Distributed Sensing Agents with Double Integrator Dynamics and Actuator Saturation. 3.5 Modeling and Enhancing the Data Capacity of Wireless Sensor Networks. References. 4 Lower Layer Issues MAC, Scheduling, and Transmission. 4.1 Introduction. 4.2 SS TDMA: A Self Stabilizing Medium Access Control (MAC) for Sensor Networks. 4.3 Comprehensive Performance Study of IEEE 802.15.4. 4.4 Providing Energy Efficiency for Wireless Sensor Networks Through Link Adaptation Techniques. References. 5 Network Routing. 5.1 Introduction. 5.2 Load Balanced Query Protocols for Wireless Sensor Networks. 5.3 Energy Efficient and MAC Aware Routing for Data Aggregation in Sensor Networks. 5.4 LESS: Low Energy Security Solution for Large scale Sensor Networks Based on Tree Ripple Zone Routing Scheme. References. 6 Power Management. 6.1 Introduction. 6.2 Adaptive Sensing and Reporting in Energy Constrained Sensor Networks. 6.3 Sensor Placement and Lifetime of Wireless Sensor Networks: Theory and Performance Analysis. 6.4 Algorithms for Maximizing Lifetime of Battery Powered Wireless Sensor Nodes. 6.5 Battery Lifetime Estimation and Optimization for Underwater Sensor Networks. References. 7 Distributed Sensing and Data Gathering. 7.1 Introduction. 7.2 Secure Differential Data Aggregation for Wireless Sensor Networks. 7.3 Energy Conserving Data Gathering Strategy Based on Trade off Between Coverage and Data Reporting Latency in Wireless Sensor Networks. 7.4 Quality Driven Information Processing and Aggregation in Distributed Sensor Networks. 7.5 Progressive Approach to Distributed Multiple Target Detection in Sensor Networks. References. 8 Network Security. 8.1 Introduction. 8.2 Energy Cost of Embedded Security for Wireless Sensor Networks. 8.3 Increasing Authentication and Communication Confidentiality in Wireless Sensor Networks. 8.4 Efficient Pairwise Authentication Protocols for Sensor and Ad Hoc Networks. 8.5 Fast and Scalable Key Establishment in Sensor Networks. 8.6 Weil Pairing Based Round, Efficient, and Fault Tolerant Group Key Agreement Protocol for Sensor Networks. References. III SENSOR NETWORK APPLICATIONS. 9 Pursuer Evader Tracking in Sensor Networks. 9.1 Introduction. 9.2 The Problem. 9.3 Evader Centric Program. 9.4 Pursuer Centric Program. 9.5 Hybrid Pursuer Evader Program. 9.6 Efficient Version of Hybrid Program. 9.7 Implementation and Simulation Results. 9.8 Discussion and Related Work. References. 10 Embedded Soft Sensing for Anomaly Detection in Mobile Robotic Networks. 10.1 Introduction. 10.2 Mobile Robot Simulation Setup. 10.3 Software Anomalies in Mobile Robotic Networks. 10.4 Soft Sensor. 10.5 Software Anomaly Detection Architecture. 10.6 Anomaly Detection Mechanisms. 10.7 Test Bed for Software Anomaly Detection in Mobile Robot Application. 10.8 Results and Discussion. 10.9 Conclusions and Future Work. Appendix A. Appendix B. References. 11 Multisensor Network Based Framework for Video Surveillance: Real Time Superresolution Imaging. 11.1 Introduction. 11.2 Basic Model of Distributed Multisensor Surveillance System. 11.3 Superresolution Imaging. 11.4 Optical Flow Computation. 11.5 Superresolution Image Reconstruction. 11.6 Experimental Results. 11.7 Conclusion. References. 12 Using Information Theory to Design Context Sensing Wearable Systems. 12.1 Introduction. 12.2 Related Work. 12.3 Theoretical Background. 12.4 Adaptations. 12.5 Design Considerations. 12.6 Case Study. 12.7 Results. 12.8 Conclusion. Appendix. References. 13 Multiple Bit Stream Image Transmission over Wireless Sensor Networks. 13.1 Introduction. 13.2 System Description. 13.3 Experimental Results. 13.4 Summary and Discussion. References. 14 Hybrid Sensor Network Test Bed for Reinforced Target Tracking. 14.1 Introduction. 14.2 Sensor Network Operational Components. 14.3 Sensor Network Challenge Problem. 14.4 Integrated Target Surveillance Experiment. 14.5 Experimental Results and Evaluation. 14.6 Conclusion. References. 15 Noise Adaptive Sensor Network for Vehicle Tracking in the Desert. 15.1 Introduction. 15.2 Distributed Tracking. 15.3 Algorithms. 15.4 Experimental Methods. 15.5 Results and Discussion. 15.6 Conclusion. References. ACKNOWLEDGMENTS. INDEX. ABOUT THE EDITORS.


Best Sellers


Product Details
  • ISBN-13: 9780471784173
  • Publisher: John Wiley and Sons Ltd
  • Publisher Imprint: John Wiley & Sons Inc
  • Language: English
  • Weight: 10 gr
  • ISBN-10: 0471784176
  • Publisher Date: 07 Oct 2005
  • Binding: Other digital
  • No of Pages: 448


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Sensor Network Operations
John Wiley and Sons Ltd -
Sensor Network Operations
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Sensor Network Operations

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!