Architecture of a digital wireless data communication network for distributed sensor applications

Measurement ◽  
2004 ◽  
Vol 35 (1) ◽  
pp. 33-45 ◽  
Author(s):  
Giovanni Bucci ◽  
Edoardo Fiorucci ◽  
Carmine Landi ◽  
Gianfranco Ocera
1994 ◽  
Vol 40 (1) ◽  
pp. 20-27 ◽  
Author(s):  
Tay-Her Tsaur ◽  
Kwang-Cheng Chen ◽  
Chenhsin Lien ◽  
Ming-Tang Shih ◽  
C.P.J. Tzeng

Author(s):  
Chitra A. Dhawale ◽  
Naveen D. Jambhekar

Digital data transmitted over the insecure communication can be prone to attacks. Intruders try various attacks to unauthorized access of the confidential information. The Steganography is such as security system that provide the protection to the images, text and other type of data digitally transferred through the data communication network. This chapter elaborates the basics of Digital Image Steganographic techniques from ancient era to digital edge, types of images used for the steganography, payload used for the steganography, various attacks and different algorithms that can provide the information security. The performance analysis of the various Digital Image Steganographic algorithms are discussed. The current applications and their necessities are discussed in this chapter.


Author(s):  
Arash Aziminejad ◽  
Yan He

Abstract Radio-based Communication-Based Train Control (CBTC) systems are widely utilized in major urban centers around the world to improve capacity, performance, and safety of public rail transportation systems. The system primary functionalities are performed based on the wireless mobile communication media, through which wayside-onboard communication data links are established. The focus of the presented research is to improve the performance of the CBTC wireless network by providing an efficient framework for placement optimization of the wayside transceivers aiming to maximize the radio coverage. The QoS-oriented convex optimization cost function is based on a heuristic model of radio wave propagation in the tunnel environment. The optimization engine uses the robust, efficient, and well-behaved Nelder-Mead algorithm. Furthermore, to provide reliable means for verification, numerical results are compared with measured data produced through an empirical site survey process performed for an actual CBTC system deployment.


Author(s):  
Sohmyung Ha ◽  
Chul Kim ◽  
Patrick P. Mercier ◽  
Gert Cauwenberghs

Sign in / Sign up

Export Citation Format

Share Document