How will future generations refer to our times? Will it be known as one of space exploration, genetics, atomic energy or computing? Possibly, but I think it is more likely to be ‘The age of communications’. Not since printed books and newspapers were first introduced has there been such an explosion of communication. None of this technology could function without modern cables and, just as important, competent installers.
标签: Applications Cabling Copper
上传时间: 2020-05-27
上传用户:shancjb
Digital mobile wireless communication and the Internet have undergone a fantastic growth in the last few years and, despite originating from two different worlds, they are converging. This convergence corresponds to the evolution of mobile systems towards the highest broadband data transmissions (GSM, EDGE/GPRS, UMTS then HSDPA), while the computing world gets equipped with wireless technologies such as Wi-Fi or Wi-Max.
标签: Reconfigurable Systems Mobile Radio
上传时间: 2020-06-01
上传用户:shancjb
A wireless ad-hoc network is a wireless network deployed without any infrastructure. In such a network, there is no access point or wireless router to forward messages among the computing devices. Instead, these devices depend on the ad-hoc mode of their wireless net‐ work interface cards to communicate with each other. If the nodes are within the transmis‐ sion range of the wireless signal, they can send messages to each other directly. Otherwise, the nodes in between will forward the messages for them. Thus, each node is both an end system and a router simultaneously.
上传时间: 2020-06-01
上传用户:shancjb
Five years have passed since the first edition of this book was published.Over the five years,the world has witnessed a technological revolution headlined by an array of exciting consumer and industrial products such as the Nintendo Wii, Apple iPod/iPad, sensor-rich smart phones, phones with cameras,new operating systems for mobile phones and apps,e-books,WiFi,voice- over-IP calls, social networking, 3D animated movies, and cloud computing, to name the major ones that affect everyday living
标签: Foundations MEMS of
上传时间: 2020-06-06
上传用户:shancjb
The Raspberry Pi has become a computing phenomenon. This single-board miniature computer, first released in February 2012 by the Raspberry Pi Foundation, has grown into a series of nearly a dozen models that have sold a total of more than 10 million units in five years. Inexpensive to buy and to run, Raspberry Pi computers are great for enthusiasts, good for games, and fun for children. Raspberry Pi computers are also terrific in the classroom, enabling you to put on each desk an easily-manageable computer on which students can do everything from learning Internet use and essential office software skills, through grasping programming basics in an easy-to-learn format, to performing full-on programming in Python, Java, C, and other languages. Better yet, you can install all the software needed for those activities automatically alongside the operating system.
标签: Deploying Classroom Raspberry the Pi in
上传时间: 2020-06-06
上传用户:shancjb
With the proliferation of cloud computing and Internet online services, more and more data and computation are migrated to geographical distributed Internet data centers (IDCs), which can provide reliability, management, and cost benefits. However, IDC operators encounter several major problems in IDC operations, such as huge energy consumption and energy cost, and high carbon emission. To deal with the above problems, IDC operators have to efficiently manage the way of energy consumption and energy supply. Considering the potential of smart grid, we focus on the energy management of IDCs in smart grid from several perspectives, i.e., power outage, carbon emission, heterogeneous service delay guarantees, and operation risk.
上传时间: 2020-06-07
上传用户:shancjb
Driven by the rapid advancement of technology and the growing need of business requirements, cyber communications are embedded in many physical systems. The integration of cyber and physical capabilities leads to the creation of many applica- tions with enormous societal impact and economic benefit. The emerging systems that connect the cyber-world of computing and communications with the physical world are cyber-physical systems (CPS).
标签: Resiliency Analytics Security and
上传时间: 2020-06-07
上传用户:shancjb
Radio frequency identification (RFID) technology is witnessing a recent explosion of development in both industry and academia. A number of applications include supply chain management, electronic payments, RFID passports, environmental monitoring and control, office access control, intelligent labels, target detection and tracking, port management, food production control, animal identification, and so on. RFID is also an indispensable foundation to realize the pervasive computing paradigm—“Internet of things.” It is strongly believed that many more scenarios will be identified when the principles of RFID are thoroughly understood, cheap components available, and when RFID security is guaranteed.
标签: Architectures NETWORKS SENSOR RFID AND
上传时间: 2020-06-08
上传用户:shancjb
Radio frequency identification (RFID) is gaining in popularity, especially as we find ourselves in this communications age and headed towards a ubiquitous computing world. Automatic identification systems become an important aspect not just in today’s technology but also as part of our daily life. We need RFID in our cars, transportation systems, access points, and even simple transactions; we also acknowledge the need for RFID in our logistics systems, healthcare, and tracking and locating applications.
标签: RFID-Enabled Appications Design Sensor and
上传时间: 2020-06-08
上传用户:shancjb
We are in the era of ubiquitous computing in which the use and development of Radio Frequency Iden- tification (RFID) is becoming more widespread. RFID systems have three main components: readers, tags, and database. An RFID tag is composed of a small microchip, limited logical functionality, and an antenna. Most common tags are passive and harvest energy from a nearby RFID reader. This energy is used both to energize the chip and send the answer back to the reader request. The tag provides a unique identifier (or an anonymized version of that), which allows the unequivocal identification of the tag holder (i.e. person, animal, or items).
上传时间: 2020-06-08
上传用户:shancjb