Atjaunināt sīkdatņu piekrišanu

Skin-Close Computing and Wearable Technology [Hardback]

(Mahendra Engineering College, Tamil Nadu, India)
  • Formāts: Hardback, 168 pages, height x width: 234x156 mm, weight: 399 g, 23 Tables, black and white; 46 Line drawings, black and white; 31 Halftones, black and white; 77 Illustrations, black and white
  • Izdošanas datums: 25-Nov-2021
  • Izdevniecība: CRC Press
  • ISBN-10: 0367512165
  • ISBN-13: 9780367512163
Citas grāmatas par šo tēmu:
  • Hardback
  • Cena: 152,25 €
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Bibliotēkām
  • Formāts: Hardback, 168 pages, height x width: 234x156 mm, weight: 399 g, 23 Tables, black and white; 46 Line drawings, black and white; 31 Halftones, black and white; 77 Illustrations, black and white
  • Izdošanas datums: 25-Nov-2021
  • Izdevniecība: CRC Press
  • ISBN-10: 0367512165
  • ISBN-13: 9780367512163
Citas grāmatas par šo tēmu:
This book explains the concept of wearable computing, need for wearable technology, its advantages, application areas, state of art developments in this area, required material and technology, possible future applications including cyborg developments and the need for this sphere of influence in the future. The scope encompasses three major components, wearable computing (next generation of conventional computing, ergonomics), wearable technology (medical support, rehabilitation engineering, assistive technology support devices, army/combat usage) and allied technologies (miniature components, reliability, high performance integration, cyber physical systems, robotics).











Aids reader to recognize the need and functional operations of a wearable computing device Includes diversified examples and case studies from different domains Presents a hybrid concept relating medical care and augmented reality Illustrates product level description examples and research ideas for future development Introduces various wearable technologies and other related technologies for enabling wearable computing

This book is aimed at senior undergraduate, graduate students and researchers in computer and biomedical engineering, bioinstrumentation, biosensors, and assistive technology.
Foreword xiii
Preface xv
Acknowledgments: Special Thanks xvii
Author's Biography xix
1 Basic Wearable Computing Requirements and Advantages 1(6)
1.1 Wearable Computing and Wearables
2(2)
1.2 Wearable Types
4(1)
1.3 Wearable Computer Examples
5(2)
2 Ergonomics and Its Benefits 7(6)
2.1 Definition
7(1)
2.2 Why Ergonomics
7(1)
2.3 Work-Related Injuries and Causes of Sickness
8(1)
2.4 Ergonomic Importance of the Present
9(1)
2.5 Ergonomics in Wearables
10(1)
2.6 Ergonomics and Biometrics
11(2)
3 Applications of Wearable Technology 13(12)
3.1 Wearable Types and Applications
13(10)
3.1.1 Fashion Wearable (Ornaments, Tattoos)
13(1)
3.1.2 Sports Gear (Shoes, Knee Cap, etc.)
14(1)
3.1.3 Comfort Wearables (Pads, Elastic Bands, Thermal Comfort Wearables)
14(1)
3.1.4 Wearable for Childcare (Baby Carriers)
14(1)
3.1.5 Wearables for Recreation (Tokens, Dollars, Wristbands, and Tattoos)
15(1)
3.1.6 Wearable for Road Safety (Helmet, Seat Belts)
15(1)
3.1.7 Wearable for Life Safety (Life Jackets, Anti-Bomb Suit, Biomedical Suits)
15(1)
3.1.8 Operational Wearable (Gun Holders, Tool Holders, Armor Belts)
15(1)
3.1.9 Camouflaging Wearable (Nets, Leafy, Grassy Suits, and Helmets for Snippers)
15(2)
3.1.10 Wearable for Work Place/Manufacturing/Plantations/Farming/Cooking (Apron, Gloves, Cap)
17(1)
3.1.11 Wearable to Carry Weapon (Rocket Launcher Belt, Grenade Hooks, Bombs, Suicide Bombs)
17(1)
3.1.12 Wearable for Protection Against Climate (Puffer Jacket, Warmers, Sweaters)
17(1)
3.1.13 Wearable for Protection Against Water (Swim Suits, Dive Suits, Pressure Resistive Suits)
17(1)
3.1.14 Wearable for Protection Against High Pressure/Low Pressure (Suits that are Designed for Divers and Astronauts)
18(1)
3.1.15 Wearable for Fire Safety (Fire-Resistant Suits)
18(1)
3.1.16 Wearable for Protection Against Vacuum/ Cosmic Rays/Heat (Astronaut Suits)
18(1)
3.1.17 Wearable for Protection Against Chemical (Anticorrosive Suits)
19(1)
3.1.18 Wearable for Protection Against Germs (Masks to Protect From Virus like COVID 19, or VD, STD)
20(1)
3.1.19 Wearable for Protection Against Animals/Fishes (Wire Mesh Swim Suits)
21(1)
3.1.20 Wearable for Advertisements (Fancy Add-Ons)
21(1)
3.1.21 Wearables for Magic (Magnetic, Covering, Especially Stitched Garments)
21(1)
3.1.22 Wearable for Communication (Gloves Like 5DT)
21(1)
3.1.23 Wearables for Wellness (Stress Busters)
22(1)
3.1.24 Wearable for Communication with Vehicles (Gloves and Microphones)
22(1)
3.1.25 Wearable for Managing Vision Impairments (Spectacles, Lenses, AR Smart Glasses)
22(1)
3.1.26 Wearable for Communication with Devices/Life Support (Gesture, Movement Capturing Gadgets)
22(1)
3.1.27 Wearable for Communication with Robots/Cyborgs (Gloves, Rings, with Embedded Electrodes, Lights, Sensors)
23(1)
3.1.28 Wearable in Warfare (Bulletproof Suits, Metal-Plated Suits, Proximity Alarms, Weapon Sensors)
23(1)
3.1.29 Wearable for Pets
23(1)
3.2 Development of Wearables
23(2)
4 Simple User Interface Design for Wearable Computing and Wearable Technology 25(6)
4.1 Construction of a Hand Glove with Flex Sensors
25(1)
4.2 Motion Detection Sensors
26(1)
4.3 Energy Saver/Rain Protection (Multiutility)
27(3)
4.4 Wearable Band
30(1)
5 Materials and Components (Constructing a Simple Wearable Technology Device) 31(8)
5.1 Flex/Bend Sensors
31(2)
5.2 Accelerometer/Magnetometer/Gyroscope
33(1)
5.3 Vibration Sensors
34(2)
5.4 Pressure Sensors/Force Sensors
36(1)
5.5 Smoke/Fire Sensors
36(1)
5.6 Moisture Sensors
37(1)
5.7 Design Considerations
37(2)
6 Assistive Technology and WT 39(56)
6.1 Wearable Electrodes for BCl/BMI
39(5)
6.1.1 EEG Rhythms
43(1)
6.1.2 Signal Acquisition by Wearable Methods
43(1)
6.2 BCI - Example 1: Single Trial Source Separations of Visual Evoked Potential Signals Using Various Methods and Techniques to Identify Controls from Alcoholics
44(14)
6.2.1 The Methods Involved in This BCI Demonstration
48(1)
6.2.2 Artificial VEP Simulation
48(2)
6.2.2.1 Applying Principal Component Analysis
49(1)
6.2.3 Signal-to-Noise Ratio Calculation
50(1)
6.2.4 Single Trial P3 Responses Experiment Using Real VEP
50(2)
6.2.5 Outcome of the BCI Experiment 1
52(6)
6.3 BCI Example 2: Speller Paradigm
58(1)
6.4 BCI Example 3: Picture Paradigm
59(1)
6.5 Example 4: Bio-Cyber Machine Gun - A New Mode of Authentication Access Using Visual Evoked Potentials
59(3)
6.6 BCI Example 5a: Motor Imagery - Adaptive Bandpass Filter
62(16)
6.6.1 Demonstration Method
65(1)
6.6.2 Description of the Dataset
65(1)
6.6.3 Preprocessing and Feature Extraction
65(2)
6.6.4 Classification of the Features
67(1)
6.6.5 Communication with OPC
68(1)
6.6.6 Experimental Results and Discussion
69(1)
6.6.7 Consolidation of BMI Design
69(3)
6.6.8 BCI Example 6b: Motor Imagery - Fractal Dimensions in Estimating Features
72(6)
6.6.8.1 Data and Method of Operation
74(1)
6.6.8.2 Feature Extraction by Assorted Methods of FD
74(1)
6.6.8.3 TDFD Method
75(1)
6.6.8.4 DFD and DS Methods
75(1)
6.6.8.5 Classification
76(1)
6.6.8.6 Findings
76(2)
6.7 Sign Language
78(7)
6.7.1 Need for Sign Language
78(1)
6.7.2 Sign Language Automation
79(2)
6.7.3 Classes of Sign Language Automation
81(1)
6.7.4 The Hand Glove or Data Glove
81(1)
6.7.5 Advantages in Glove-Based Sign Language System
82(3)
6.8 Wearables in Treatment
85(1)
6.9 The Wearable Assistive Device PhysiofastHeal
86(7)
6.9.1 The Need and Challenge for the Invention of the Device
87(1)
6.9.2 Beneficiaries
87(1)
6.9.3 System Design
87(2)
6.9.4 Technology Design
89(1)
6.9.5 The Innovation Introduced in PhysiofastHeal
90(1)
6.9.6 The Uniqueness of Innovation in Comparison to the Others in This Sector
91(2)
6.10 Wearables for Blind Population
93(2)
7 Security Technology and WT 95(22)
7.1 Signature Verification
96(3)
7.1.1 Introduction to Online Signature Verification
96(3)
7.2 Augmented/Robust Signature Verification
99(7)
7.2.1 The Modifications in Equipment Setup
100(1)
7.2.2 Subjects and Signal Acquisition Methods
101(1)
7.2.3 Experimental Setup
102(1)
7.2.4 Preprocessing and Feature Vector Construction
103(1)
7.2.5 Matching and Classification
104(1)
7.2.6 Results and Discussions
104(2)
7.2.7 Conclusions
106(1)
7.3 Emergency Response System for Elderly/Disabled/Persons in Ambulance
106(11)
7.3.1 Data Description
107(1)
7.3.2 Wearable Emergency Response System
108(1)
7.3.3 Feature Extraction Techniques for System Implementation
109(2)
7.3.3.1 Singular Value Decomposition
109(1)
7.3.3.2 Fractal Dimension (FD)
109(1)
7.3.3.3 KATZ'S Method
110(1)
7.3.3.4 Fast Fourier Transformations (FFT)
110(1)
7.3.3.5 SVD with Average Distribution
110(1)
7.3.4 Classification Techniques
111(1)
7.3.4.1 Euclidean Distance
111(1)
7.3.4.2 Linear Discriminant Analysis
111(1)
7.3.5 Association of Paradigms
111(2)
7.3.5.1 Association Between Paradigms
111(1)
7.3.5.2 Results of the Experiments
112(1)
7.3.5.3 Discussions
112(1)
7.3.5.4 Recommendations Based on the Experiment
113(1)
7.3.6 Intratrial Variability
113(4)
7.3.6.1 Discussions and Recommendations Based on ITV
113(1)
7.3.6.2 Optimization of This Work
114(1)
7.3.6.3 Singular Value Decomposition with Random Average Distribution
115(1)
7.3.6.4 Contribution of the Research Work
116(1)
8 Strategic Operation Technology and WT 117(26)
8.1 The Need for Simple and Fast Feature Identification
117(5)
8.1.1 Modeling the Signal by Zone
118(1)
8.1.2 Standard Deviation as a Comparison Feature
119(1)
8.1.3 Results of Comparison Features
119(2)
8.1.4 Promises Found in the Wearable Strategic Operation Technology
121(1)
8.2 Consequences of Strategic Operational Technology Using Wearable Technology
122(1)
8.3 Fast and Easy Gesture Recognition by Wearable in Strategic Operations
123(19)
8.3.1 Mode of Experiments
124(3)
8.3.2 Use of Singular Value Decomposition (SVD) to Quantify Feature Set
127(1)
8.3.3 Use of Fractal Dimension (FD) to Quantify the Feature Set
127(1)
8.3.4 Results of the Experiment
128(5)
8.3.5 Discussion on the Experiment and Its Results
133(5)
8.3.6 Consolidation of Gesture Movement
138(3)
8.3.7 Recommendations
141(1)
8.3.8 Discussions
141(1)
8.3.9 Conclusion of the Experiment
142(1)
8.4 Zero Error Wearable Technology Applications
142(1)
9 Software and Power Requirements of WT 143(6)
9.1 Writing Codes for Wearable Devices
143(1)
9.2 Platforms for Development
144(1)
9.3 Understanding the Components of a Device in Operation
145(1)
9.4 Power Requirements for Wearables
146(1)
9.5 Energy Harvesting in Wearables for Self-power
146(3)
10 Higher-Order Human-Robot Interface 149(14)
10.1 Human Interface and Robotic Interface
149(1)
10.2 Magic Ring for Recognition
150(1)
10.3 Authentication of Sex Robot Access Using Wearables
150(13)
10.3.1 The Problem of the Future Generation
151(2)
10.3.2 The Reason for Focus Toward Robotic Emotions
153(1)
10.3.3 Related Examples
153(1)
10.3.4 The Era of Personal Robots and Their Characters
154(2)
10.3.4.1 Need for Personal Robots
154(1)
10.3.4.2 Gender Approaches - Transgender Robots
155(1)
10.3.5 Is It Possible to Have Affective Approaches with Robots?
156(2)
10.3.5.1 Creation of Feelings
156(1)
10.3.5.2 Appreciation and Rewards: How Robots View This?
157(1)
10.3.5.3 Psychological and Sociological Approaches
157(1)
10.3.5.4 Rights of Robots? and Robo-ethics
158(1)
10.3.6 Areas Where Humans Excel the Robots
158(3)
10.3.6.1 Preach - Cannot Repent or Realize
158(1)
10.3.6.2 Indulge Carnal Pleasure - Cannot Produce Own Children
158(1)
10.3.6.3 Remember - Cannot Imagine
159(1)
10.3.6.4 Say a Lot of Stories - Cannot Write One by Own
159(1)
10.3.6.5 Sense and Show Expressions - Cannot Feel Anything, Empathy Sympathy Joy, etc
159(1)
10.3.6.6 Restricted to Only the Language of Operation - Humans Can Learn an Unknown Language with Time
160(1)
10.3.6.7 Can Control Animals - Cannot Pet or Dominate Animals
160(1)
10.3.6.8 Can Do the Work Given - Can't Act in Different Roles and Not Trustable
160(1)
10.3.6.9 Can Give Lecture - Cannot Teach Various Children According to Their Knowledge and Intelligence Capacity
160(1)
10.3.6.10 Can Travel - Cannot Do a Solo Travel to an Unplanned Location and Come Back
161(1)
10.3.7 Solution and Research Direction
161(2)
11 Soft Cyborgs and Cyber Physical Systems by WT 163
11.1 Soft Robotics
163(1)
11.2 Cyborgs
164(2)
11.2.1 Hard Cyborg and Soft Cyborg
165(1)
11.3 Cyber Physical Systems
166
Professor Dr Andrews Samraj is Director of the research group Wearable computing and non invasive cyborgs in Mahendra College of Engineering. He has completed his Brain Computer Research from Multimedia University Malaysia, and His post doctorate is from Hellenic naval academy and WSEAS, of Greece. With his 22+ years of experience as an academician in India and abroad, he has conducted many international forums on wearable computing around the globe. The novel, simplified and cost effective technologies invented by him over a decade will surely facilitate the transforming process of intensive research out comes into attractive wearable computing products. He has been recognized internationally as an Indian scientist who contributed immensely to the field of rehabilitation and security for the paralyzed, bedridden, physically challenged and seriously ill patients in a non-invasive way of ability augmentation for the improvement of their quality of life. His Innovations in this area won the NASSCOM Social Innovation Forum Award 2017*, the nations highest award of this category. He received further awards from IBM in year 2005 and 2006 for his projects. He is the recipient of Distinguished Professor award from AIRF and The best Engineering Teacher Award for the year 2017 from ISTE. His patent application for a biomedical engineering product was Published in India, in 2018. He has received various funding grants from India and abroad for his research projects, supported and recognized by agencies including UGC and MSME.