Advances in Sensing with Security Applications, edited by Jim Byrnes, (electronic resource)
Resource Information
The instance Advances in Sensing with Security Applications, edited by Jim Byrnes, (electronic resource) represents a material embodiment of a distinct intellectual or artistic creation found in University of Oklahoma Libraries. This resource is a combination of several types including: Instance, Electronic.
The Resource
Advances in Sensing with Security Applications, edited by Jim Byrnes, (electronic resource)
Resource Information
The instance Advances in Sensing with Security Applications, edited by Jim Byrnes, (electronic resource) represents a material embodiment of a distinct intellectual or artistic creation found in University of Oklahoma Libraries. This resource is a combination of several types including: Instance, Electronic.
- Label
- Advances in Sensing with Security Applications, edited by Jim Byrnes, (electronic resource)
- Medium
- electronic resource
- Statement of responsibility
- edited by Jim Byrnes
- Note
-
- "Published in cooperation with NATO Public Diplomacy Division."
- "Proceedings of the NATO Advanced Study Institute on Advances in Sensing with Security Applications, II Ciocco, Italy, July 2005"--T.p.verso
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Content category
- text
- Content type code
-
- txt
- Contents
- Preface. Acknowledgments.Bistatic and multistatic radar sensors for homeland security.. 1. Introduction -- 2 Definitions .-3. Bistatic essentials -- 4. Passive Coherent Location (PCL) -- 5. Multistatic radar .-6. Conclusions -- 7. Acknowlegments .-References.The Terrorist Threat and Its Implications for Sensor Technologies.1. Introduction -- 2. What is Terrorism? -- 3. General Trends in Terrorism -- 4.Significant Domestic Threats -- 5. State Sponsored Terrorism -- 6. Future Threats -- 7. Preventions Efforts The Role of Sensors -- 8. Improving Sensors -- 9. Conclusions -- References. Advances in sensors; the lessons from Neurosciences.1. Energies that affect earth living organisms survival -- 2. The emergence of a nervous system. 3. Neurons as excitable cells -- 4. Sensory neurons -- 5. Sensory transduction -- 6. Molecules of sensory transduction -- 7. Hearing system and mechanosensation -- 8. Temperature receptors -- 9. Pain receptors -- 10. Olfaction -- 11. Vision .-12. General view of the sensory systems -- References. Chemical sensors and chemical sensor systems.1. Introduction—Parameters -- 2. Fundamentals Devices; 3. Thermopiles -- 4. Kelvin Probe -- 5. Bulk Acoustic Waves -- 6. Surface Acoustic Waves -- 7. Natural and Artificial Olfaction -- 8. Optical Fibre Sensor -- 9. Surface Plasmon Resonance -- 10. Conclusions -- References. Wireless Sensor Networks for Security: Issues and Challenges.1. Introduction -- 2. Neyman-Pearson Detection -- 3. Breach Probability Analysis [30].-4. Data Processing Architecture for Target Tracking -- 5. Maximum Mutual Information Based Sensor Selection Algorithm -- 6. Simulation Results -- 7. Conclusion.-References. Internet-Scale Chemical Sensing.1. Introduction -- 2. Chemical Sensing and Biosensing -- 3. Miniaturised Analytical Instruments — Lab on a Chip Devices -- 4. Analytical Device Hierarchy.-5. Networking Options.-6. Integrating Chemical Sensors and Biosensors with Wireless Networks -- 7. Scale-up Issues for Densely Distributed Analytical Devices -- 8. Chemo- & Bio-warfare Agents -- 9. Sensor communities and group behaviour -- 10. pHealth -- 11. Conclusions -- References. Data analysis for chemical sensor arrays..1. Feature extraction.-2. Data Pre—processing: Scaling -- 3. Normalization.-4 -- Multivariate data exploration -- 5. Principal Component Analysis -- 6. Supervised Classification -- 7. Linear Discrimination -- 8. Application to the investigation of Chemical Sensors properties -- 9. Conclusions -- References. Fundamentals of Tomography and Radar. 1. Introduction.-2. Imaging and Resolution -- 3. Tomographic Imaging -- 4. The Projection Slice Theorem -- 5. Tomography of Moving Targets -- 6. Applications -- 7. Automatic Target Recognition -- 8. Bandwidth Extrapolation -- 9. Target-matched Illumination -- 10. Conclusion.-11. Acknowledgements -- References. Remote Sensing using Space Based Radar.. 1. Introduction -- 2. Geometry -- 3. Range Foldover and Earth’s Rotation -- 4. Application of STAP for SBR .-5. Orthogonal Pulsing Scheme -- References. Continuous wave radars—monostatic, multistatic and network .1.Introduction -- 2. Radar fundamentals -- 3. Linear Frequency Modulated Continuous Wave Radar -- 4. Noise Radar -- 5. Noise radar range equation -- 6. Bi-static and multi-static continuous wave radars -- 7. Target identification in continuous wave radars.-References. Terahertz Imaging, Millimeter-Wave Radar. 1. Introduction -- 2. Atmospheric Limitations -- 3. Millimeter-Wave and Terahertz Sources of Radiation.-4. Millimeter-Wave and Terahertz Detectors and Receivers -- 5. Millimeter-Wave and Terahertz Optics.-6. Millimeter-Wave and Terahertz Systems -- 7. Summary -- References. Sensor Management for Radar: A Tutorial; 1. Introduction -- 2. Radar Fundamentals -- 3. Sensor Management Overview -- 4. Theory of Waveform Libraries.-5. Sensor scheduling simulations and results -- References. Waveform Design, Range CFAR and Target Recognition. 1. Introduction -- 2. Combination of LFMCW and FSK modulation principles for automotive radar systems -- Automotive Radar Network Based On 77GHz FMCW Sensors -- 4. Range CFAR Techniques -- 5. Conclusion.-References. Tomography of Moving Targets (TMT) for Security and Surveillance. . 1.Introduction -- 2. Tomography Concept and Framework .-3. Bistatic Geometry and Observables .-4. Matched Filter Processing (MFP) -- 5. TMT Netted Radar System.-6. TMT MFP Simulation -- 7. Detection Perfomance.-8. Summary -- 9. Acknowledgements -- References. Near Infrared Imaging and Spectroscopy for Brain Activity Monitoring..1. Introduction -- 2. NIR Imaging and Spectroscopy Systems -- 3. Hemodynamic Response -- 4. Neuronal Response -- 5. Human Subject Studies -- 6. Concluding Remarks and Future Directions.-References. Topic Index
- Dimensions
- unknown
- Edition
- 1st ed. 2006.
- Extent
- 1 online resource (386 p.)
- Form of item
- online
- Isbn
- 9781402042959
- Media category
- computer
- Media type code
-
- c
- Other control number
- 10.1007/1-4020-4295-7
- Record ID
- 99536790702042
- Specific material designation
- remote
- System control number
-
- (CKB)1000000000236516
- (EBL)303518
- (OCoLC)317881368
- (SSID)ssj0000099187
- (PQKBManifestationID)11114026
- (PQKBTitleCode)TC0000099187
- (PQKBWorkID)10011908
- (PQKB)10310869
- (DE-He213)978-1-4020-4295-9
- (MiAaPQ)EBC303518
- (EXLCZ)991000000000236516
Context
Context of Advances in Sensing with Security Applications, edited by Jim Byrnes, (electronic resource)Instantiates
Embed (Experimental)
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.libraries.ou.edu/resource/O_NM_1KBtUQ/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.libraries.ou.edu/resource/O_NM_1KBtUQ/">Advances in Sensing with Security Applications, edited by Jim Byrnes, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.libraries.ou.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.libraries.ou.edu/">University of Oklahoma Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Instance Advances in Sensing with Security Applications, edited by Jim Byrnes, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.libraries.ou.edu/resource/O_NM_1KBtUQ/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.libraries.ou.edu/resource/O_NM_1KBtUQ/">Advances in Sensing with Security Applications, edited by Jim Byrnes, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.libraries.ou.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.libraries.ou.edu/">University of Oklahoma Libraries</a></span></span></span></span></div>