Listing 1 - 10 of 13 | << page >> |
Sort by
|
Choose an application
Choose an application
UAVs are becoming a reality and attract increasing attention. They can be remotely controlled or completely autonomous and be used alone or as a fleet and in a large set of applications. They are constrained by hardware since they cannot be too heavy and rely on batteries. Their use still raises a large set of exciting new challenges in terms of trajectory optimization and positioning when they are used alone or in cooperation, and communication when they evolve in swarm, to name but a few examples. This book presents some new original contributions regarding UAV or UAV swarm optimization and communication aspects.
Information technology industries --- direction-of-arrival estimation --- unmanned aerial vehicles --- UAV swarm --- aperiodic arrays --- MUSIC --- Cramer–Rao bound --- stochastic system --- configuration control --- multiplicative noises --- dynamic model --- stochastic robustness analysis and design --- wireless sensor networks --- unmanned aerial vehicle --- mission completion time --- trajectory planning --- UAV secure communication --- secrecy rate maximization --- jamming --- trajectory design --- power control --- sensors --- data collection utility --- GPS measurement --- UAV --- 3D models --- measurement precision --- unmanned aerial vehicle (UAV) --- cooperative communication --- topology structure --- complex field network coding (CFNC) --- edge computing --- internet of things --- mobile robots --- resource allocation --- control co-design --- data offloading --- UAV-enabled computing --- resource-based pricing --- risk-awareness --- multi-access edge computing systems --- UAV fleet --- energy consumption --- self-organization --- algorithms --- optimization --- UAV replacement --- multiple unmanned aerial vehicles --- mobile nodes --- data collection --- collision-free --- synchronized multi-agent formation --- decentralized sliding mode control --- drones --- wireless --- swarm --- communication
Choose an application
UAVs are becoming a reality and attract increasing attention. They can be remotely controlled or completely autonomous and be used alone or as a fleet and in a large set of applications. They are constrained by hardware since they cannot be too heavy and rely on batteries. Their use still raises a large set of exciting new challenges in terms of trajectory optimization and positioning when they are used alone or in cooperation, and communication when they evolve in swarm, to name but a few examples. This book presents some new original contributions regarding UAV or UAV swarm optimization and communication aspects.
Information technology industries --- direction-of-arrival estimation --- unmanned aerial vehicles --- UAV swarm --- aperiodic arrays --- MUSIC --- Cramer–Rao bound --- stochastic system --- configuration control --- multiplicative noises --- dynamic model --- stochastic robustness analysis and design --- wireless sensor networks --- unmanned aerial vehicle --- mission completion time --- trajectory planning --- UAV secure communication --- secrecy rate maximization --- jamming --- trajectory design --- power control --- sensors --- data collection utility --- GPS measurement --- UAV --- 3D models --- measurement precision --- unmanned aerial vehicle (UAV) --- cooperative communication --- topology structure --- complex field network coding (CFNC) --- edge computing --- internet of things --- mobile robots --- resource allocation --- control co-design --- data offloading --- UAV-enabled computing --- resource-based pricing --- risk-awareness --- multi-access edge computing systems --- UAV fleet --- energy consumption --- self-organization --- algorithms --- optimization --- UAV replacement --- multiple unmanned aerial vehicles --- mobile nodes --- data collection --- collision-free --- synchronized multi-agent formation --- decentralized sliding mode control --- drones --- wireless --- swarm --- communication
Choose an application
UAVs are becoming a reality and attract increasing attention. They can be remotely controlled or completely autonomous and be used alone or as a fleet and in a large set of applications. They are constrained by hardware since they cannot be too heavy and rely on batteries. Their use still raises a large set of exciting new challenges in terms of trajectory optimization and positioning when they are used alone or in cooperation, and communication when they evolve in swarm, to name but a few examples. This book presents some new original contributions regarding UAV or UAV swarm optimization and communication aspects.
direction-of-arrival estimation --- unmanned aerial vehicles --- UAV swarm --- aperiodic arrays --- MUSIC --- Cramer–Rao bound --- stochastic system --- configuration control --- multiplicative noises --- dynamic model --- stochastic robustness analysis and design --- wireless sensor networks --- unmanned aerial vehicle --- mission completion time --- trajectory planning --- UAV secure communication --- secrecy rate maximization --- jamming --- trajectory design --- power control --- sensors --- data collection utility --- GPS measurement --- UAV --- 3D models --- measurement precision --- unmanned aerial vehicle (UAV) --- cooperative communication --- topology structure --- complex field network coding (CFNC) --- edge computing --- internet of things --- mobile robots --- resource allocation --- control co-design --- data offloading --- UAV-enabled computing --- resource-based pricing --- risk-awareness --- multi-access edge computing systems --- UAV fleet --- energy consumption --- self-organization --- algorithms --- optimization --- UAV replacement --- multiple unmanned aerial vehicles --- mobile nodes --- data collection --- collision-free --- synchronized multi-agent formation --- decentralized sliding mode control --- drones --- wireless --- swarm --- communication
Choose an application
This book constitutes the thoroughly refereed proceedings of the fourth International Conference on Ad Hoc Networks, ADHOCNETS 2012, held in Paris, France, in October 2012. The 18 revised full papers presented were carefully selected and reviewed from 43 submissions. These – and 6 invited papers now cover and even broader scope, referring to many types of autonomous wireless networks designed and deployed for a specific task or function, such as wireless sensor networks, vehicular networks, and home networks. They are organized in topical sections on MAC and PHY layers, localization and position-based protocols in WSNs, resource allocations and cognitive radio, key, service and caching management, network architectures and frameworks, and mobility and disconnection management.
Computer science. --- Computer Communication Networks. --- Data protection. --- Data encryption (Computer science). --- Computer software. --- Computer Science. --- Systems and Data Security. --- Data Encryption. --- Algorithm Analysis and Problem Complexity. --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Telecommunications --- Information Technology --- Computer Science (Hardware & Networks) --- Software, Computer --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Informatics --- Computer communication systems. --- Computer security. --- Algorithms. --- Data encryption (Computer science) --- Ad hoc networks (Computer networks) --- MANETs (Computer networks) --- Mobile ad hoc networks --- Wireless ad hoc networks --- Computer networks --- Wireless communication systems --- Cryptology. --- Computer systems --- Computer security --- Cryptography --- Computer privacy --- Computer system security --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures --- Algorism --- Algebra --- Arithmetic --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Foundations --- Distributed processing
Choose an application
This book constitutes the proceedings of the 15th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2016, held in Lille, France in July 2016. The 23 full papers presented together with one short paper in this volume were carefully reviewed and selected from 64 submissions. The contributions are organized in topical sections named: resource allocation, theory and communications, PHY/MAC/routing in sensors/IoT, DTN/opportunistic networks, sensors/IoT, security, VANET and ITS, and robots and MANETs.
Computer science. --- Computer communication systems. --- Computer security. --- Electrical engineering. --- Computer Science. --- Computer Communication Networks. --- Information Systems Applications (incl. Internet). --- Communications Engineering, Networks. --- Systems and Data Security. --- Electric engineering --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Informatics --- Security measures --- Protection of computer systems --- Protection --- Engineering --- Data protection --- Security systems --- Hacking --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Science --- Distributed processing --- Telecommunication. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Mobile communication systems --- Application software. --- Application computer programs --- Application computer software --- Applications software --- Apps (Computer software) --- Computer software
Choose an application
This book constitutes the proceedings of the International Conference on Ad Hoc Networks, ADHOCNETS 2015, held in September 2015 in Italy. The 17 regular and 3 invited papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics such as physical layer; MAC and routing; mobility in networks; self-organization, virtualization and localization; cloud, virtualization and prototypage; security and fault tolerance in wireless mobile networks.
Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Computer science. --- Computer communication systems. --- Special purpose computers. --- Computer security. --- Computer Science. --- Computer Communication Networks. --- Special Purpose and Application-Based Systems. --- Systems and Data Security. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Special purpose computers --- Communication systems, Computer --- Computer communication systems --- Data networks, Computer --- ECNs (Electronic communication networks) --- Electronic communication networks --- Networks, Computer --- Teleprocessing networks --- Data transmission systems --- Digital communications --- Electronic systems --- Information networks --- Telecommunication --- Cyberinfrastructure --- Electronic data processing --- Network computers --- Informatics --- Science --- Protection --- Security measures --- Distributed processing --- Software engineering. --- Computer software engineering --- Engineering
Choose an application
Wireless sensor networks have gained much attention these last years thanks to the great set of applications that accelerated the technological advances. Such networks have been widely investigated and many books and articles have been published about the new challenges they pose and how to address them. One of these challenges is node mobility: sensors could be moved unexpectedly if deployed in an uncontrolled environment or hold by moving object/animals. Beyond all this, a new dimension arises when this mobility is controlled, i.e. if these sensors are embedded in robots. These robots cohabi
Wireless sensor networks. --- Wireless LANs. --- Robotics. --- Automation --- Machine theory --- Wi-Fi LANs --- WiFi LANs --- Wireless local area networks --- WLANs (Wireless LANs) --- Local area networks (Computer networks) --- Wireless communication systems --- WSNs (Sensor networks) --- Computer networks --- Low voltage systems --- Sensor networks --- Context-aware computing
Choose an application
This book constitutes the thoroughly refereed proceedings of the fourth International Conference on Ad Hoc Networks, ADHOCNETS 2012, held in Paris, France, in October 2012. The 18 revised full papers presented were carefully selected and reviewed from 43 submissions. These – and 6 invited papers now cover and even broader scope, referring to many types of autonomous wireless networks designed and deployed for a specific task or function, such as wireless sensor networks, vehicular networks, and home networks. They are organized in topical sections on MAC and PHY layers, localization and position-based protocols in WSNs, resource allocations and cognitive radio, key, service and caching management, network architectures and frameworks, and mobility and disconnection management.
Complex analysis --- Computer science --- Computer architecture. Operating systems --- Computer. Automation --- draadloze computernetwerken --- DES (data encryption standard) --- complexe analyse (wiskunde) --- bedrijfssoftware --- ad-hocnetwerken --- computers --- informatica --- computerbeveiliging --- computernetwerken --- computerkunde
Choose an application
This book constitutes the proceedings of the International Conference on Ad Hoc Networks, ADHOCNETS 2015, held in September 2015 in Italy. The 17 regular and 3 invited papers presented were carefully reviewed and selected from numerous submissions. The papers cover topics such as physical layer; MAC and routing; mobility in networks; self-organization, virtualization and localization; cloud, virtualization and prototypage; security and fault tolerance in wireless mobile networks.
Computer architecture. Operating systems --- Computer. Automation --- informatica --- hardware --- computerbeveiliging --- computernetwerken
Listing 1 - 10 of 13 | << page >> |
Sort by
|