ECUMICT 2014

Proceedings of the European Conference on the Use of Modern Information and Communication Technologies, Gent, March 2014
 
 
Springer (Verlag)
  • erschienen am 22. Februar 2014
  • |
  • VIII, 231 Seiten
 
E-Book | PDF mit Wasserzeichen-DRM | Systemvoraussetzungen
978-3-319-05440-7 (ISBN)
 

This proceeding present the outcome of the 6th. European Conference on the Use of Modern Information and Communication Technologies. The ECUMICT 2014 was hold in Gent in March 2014 and presented recent research, that has a close relationship with practical implementation of

Security for mobile communications and data access
Interface technology for mobile devices
Application development for mobile devices
Positioning and localization, asset tracking and tracing
Design and applications of RFID systems
Developments in the framework of IoT and M2M communications
Design and applications of WSNs
Embedded programming for WSNs
New developments and applications of WPAN/WLAN standards
Mobile multimedia systems
Wireless telecommunication networks and mobile services
Optimization techniques in wireless networks
Developments in ad-hoc and mesh networks
Applications of digital signal processing for mobile applications
Applications of MEMs in WSNs

2014
  • Englisch
  • Cham
  • |
  • Schweiz
Springer International Publishing
  • 92 s/w Abbildungen
  • |
  • 92 schwarz-weiße Abbildungen, Bibliographie
  • 11,17 MB
978-3-319-05440-7 (9783319054407)
10.1007/978-3-319-05440-7
weitere Ausgaben werden ermittelt
  • Intro
  • Preface
  • Contents
  • Optimization of the POWER Pulse
  • 1 Introduction
  • 2 Design Aspects Concerning the POWER Pulse
  • 3 Optimization of the POWER Pulse
  • 4 Conclusion and Future Work
  • References
  • Influence of Impulse Noise on Alamouti Code Performances
  • 1 Introduction
  • 2 Middleton Class-A Model
  • 3 Mathematical Model of MIMO System
  • 4 Simulation Results
  • 4.1 Pdf Analysis
  • 4.2 Bit Error Rate Analysis
  • 5 Conclusions
  • References
  • Making OpenID Mobile and Privacy-Friendly
  • 1 Introduction
  • 2 Background and RelatedWork
  • 3 Approach
  • 3.1 Requirements
  • 3.2 Improvement Strategies
  • 3.3 Trust Relations and Enforcement
  • 4 Proof of Concept
  • 4.1 Strategy 1
  • 4.2 Strategy 3
  • 5 Evaluation
  • 5.1 Requirements Evaluation
  • 5.2 Network Anonymity
  • 5.3 Discussion
  • 6 Conclusion
  • References
  • ErasmusApp: A Location-Based Collaborative System for Erasmus Students
  • 1 Introduction
  • 2 Context-aware Mobile Applications
  • 3 Development Environment
  • 4 ErasmusApp Location-Based Collaborative System
  • 4.1 Architecture
  • 4.2 Distance-to-User
  • 4.3 Functionalities
  • 5 Tests and Results
  • 6 Conclusion
  • References
  • Smart Object for 3D Interaction
  • 1 Introduction
  • 2 3D Interactive Objects
  • 3 Support Technologies
  • 3.1 Microcontroller
  • 3.2 Sensors
  • 3.3 Power Supply
  • 3.4 Wireless Data Connection
  • 4 Project Development
  • 4.1 System Components
  • 4.2 Data Flow
  • 4.3 Software Modules
  • 4.4 Building and Assembly
  • 5 Conclusion
  • References
  • Study of a Wake Up Radio Architecture for Home Multimedia Networks
  • 1 Introduction
  • 2 Wake-Up Radio Architecture Description
  • 3 Energy Consumption Estimation
  • 4 Conclusion
  • References
  • Hybrid Multi-objective Network Planning Optimization Algorithm
  • 1 Introduction
  • 2 Configuration and Fitness Function
  • 2.1 Configuration
  • 2.2 Fitness Functions
  • 3 Scenarios
  • 3.1 Scenario I: Coverage with Minimal Number of APs
  • 3.2 Scenario II: Coverage with Minimal Human Exposure
  • 3.3 Scenario III: Coverage with Minimal Human Exposure and Minimal Number of APs
  • 4 Our Algorithm
  • 5 Results
  • 5.1 Simple Indoor Dominant Path Loss Model (SIDP)
  • 5.2 TGn Model
  • 6 Conclusions
  • References
  • A Context-Aware Framework for Media Recommendation on Smartphones
  • 1 Introduction
  • 2 Related Work
  • 3 Problem Definition and System Requirements
  • 3.1 Context Recognition and Representation
  • 3.2 User and Media Content Profiling
  • 3.3 Content Classification and Recommendation
  • 4 Context Aware Framework for Media Recommendation
  • 4.1 Context Recognition
  • 4.2 Contextual User Profiling Service
  • 4.3 Contextual User Profile Information Store
  • 4.4 User Feedback Manager
  • 4.5 Media Item Content Profile Service
  • 4.6 Media Item Recommendation Service
  • 5 Framework Implementation and Evaluation
  • 5.1 Framework Component Integration
  • 5.2 CAMR Implementation
  • 5.3 Experimentation
  • 6 Discussion
  • 7 Conclusion
  • References
  • Measuring the NFC Peer-to-Peer Data Rate
  • 1 Introduction
  • 2 NFC Peer-to-Peer
  • 2.1 Protocol Stack
  • 2.2 Android NFC P2P Stack - API 16 and Higher
  • 3 Test Setup
  • 4 Results
  • 5 Conclusion
  • References
  • A Physical Model for Predicting throughput of Wireless LANs
  • 1 Introduction
  • 2 Exploratory Measurements
  • 2.1 Experiment Description
  • 2.2 Measurement I: Assessment of Channel Overlap and Interference Level Influence on throughput
  • 2.3 Measurement II: Joint Assessment of the Interference TxRate and Interference COD Influence on throughput
  • 3 Development of the Model
  • 3.1 Construction of Models
  • 3.2 Validation Measurements
  • 3.3 Validation Results
  • 4 Conclusion and Future Work
  • References
  • Study of New Organic Field Transistors for RFID, Optoelectronic and Mobile Applications
  • 1 Introduction
  • 2 Materials and Methods
  • 3 Results and Di iscussions
  • 4 Conclusions
  • References
  • Applicability of Amdahl's Law in Multisession TCP/IP Communication
  • 1 Introduction
  • 2 Delay Considerations
  • 3 Theoretical Approach
  • 4 Test Bench and Results
  • 5 Conclusions
  • References
  • Fine-Tunning a MAP Error Correction Algorithm for Five-Key Chording Keyboards
  • 1 Introduction
  • 2 Related Work
  • 3 Algorithm
  • 4 Evaluation Data
  • 5 Results
  • 5.1 Correction Rates
  • 5.2 Dictionary Effect
  • 5.3 Confusion Matrix Effect
  • 5.4 Word Length Effect
  • 6 Conclusion
  • References
  • Design of a Modular Simulation Environment for Vehicle Mounted Logical Units
  • 1 Introduction
  • 2 Factors to Be Simulated
  • 2.1 GPS Accuracy
  • 2.2 RFID in Sports Events
  • 2.3 Reliability of Wireless Networks
  • 2.4 Computer-Directed Human Behavior
  • 3 Methodology
  • 3.1 Overall Concept
  • 3.2 Algorithm Design
  • 4 Results
  • 5 Conclusion
  • References
  • Out-of-Band Password Based Authentication towards Web Services
  • 1 Introduction
  • 2 Related Work
  • 3 Design
  • 3.1 Requirements
  • 3.2 General Approach
  • 3.3 Protocols
  • 4 Realization
  • 5 Evaluation
  • 5.1 Requirements Evaluation
  • 5.2 Security Evaluation
  • 5.3 Discussion
  • 6 Conclusion
  • References
  • Measurement Based Indoor Radio Channel Modeling and Development of a Fading Optimized Circular Polarized Patch Antenna for Smart Home Systems within the SRD Band at 868 MHz
  • 1 Introduction
  • 2 Measurement Setup and Procedure
  • 2.1 Measurement Setup
  • 2.2 Circular Polarized Patch Antenna
  • 2.3 Measurement Procedure
  • 3 Path Loss Prediction Model
  • 4 Results
  • 5 Conclusion
  • References
  • Influence of Bluetooth Low Energy on WIFI Communications and Vice Versa
  • 1 Introduction
  • 2 Technical Characteristics
  • 3 Materials and Methods
  • 4 Results and Discussion
  • 4.1 Bluetooth Low Energy Advertising Channel 2402MHz, WIFI Communication Channel 2472MHz
  • 4.2 Bluetooth Low Energy Advertising Channel 2426MHz, WIFI Communication Channel 2427MHz
  • 5 Conclusions
  • References
  • Gestural Interfaces for Mobile and Ubiquitous Applications
  • 1 Introduction
  • 2 Object Based Interaction
  • 2.1 The Holding Posture
  • 2.2 Recognition and Analysis
  • 3 Gestural Interfaces for Mobile Applications
  • 4 Creating Gestural Interfaces: Guidelines
  • 4.1 Object Manipulation Gestures
  • 4.2 Precision Gestures and Complex Actions
  • 4.3 Culture Specific Gestures and Communication Oriented Gestures
  • 4.4 Involuntary Actions
  • 5 Conclusion and Future Work
  • References
  • Author Index

Dateiformat: PDF
Kopierschutz: Wasserzeichen-DRM (Digital Rights Management)

Systemvoraussetzungen:

Computer (Windows; MacOS X; Linux): Verwenden Sie zum Lesen die kostenlose Software Adobe Reader, Adobe Digital Editions oder einen anderen PDF-Viewer Ihrer Wahl (siehe E-Book Hilfe).

Tablet/Smartphone (Android; iOS): Installieren Sie die kostenlose App Adobe Digital Editions oder eine andere Lese-App für E-Books (siehe E-Book Hilfe).

E-Book-Reader: Bookeen, Kobo, Pocketbook, Sony, Tolino u.v.a.m. (nur bedingt: Kindle)

Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein "weicher" Kopierschutz verwendet. Daher ist technisch zwar alles möglich - sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.

Weitere Informationen finden Sie in unserer E-Book Hilfe.


Download (sofort verfügbar)

171,19 €
inkl. 7% MwSt.
Download / Einzel-Lizenz
PDF mit Wasserzeichen-DRM
siehe Systemvoraussetzungen
E-Book bestellen