| Remote web-based experimentation, enabling students and researchers to access the laboratory anytime via the Internet, is becoming an increasingly attractive way to complement or even replace traditional laboratory sessions. Placing a video camera & microphone before the equipment and apparatus to capture what is actually happening in the laboratory allows the images and audio data to be streamed to the client side. Researchers in different countries can share equipment and conduct research cooperatively and remotely. The authors summarise their research and discuss the development of the 5 web-based laboratories launched from the National University of Singapore. The principles, structure, and technologies required for the creation of Internet remote experimentation systems are discussed with particular emphasis on the integration of hardware and software systems. Also highlighted is the design and development of interfaces and components for use in typical web-based laboratories or similar web-control applications. |
|
|
Game Audio Development with Unity 5.X
Key Features
-
Explore the basics of audio development in Unity to create spatial sound, mixing, effects, composition, adaptive audio and more.
-
Leverage the Audio Mixer of Unity 5.x to create blockbuster sound and music for your game.
-
Learn about developing professional audio for games with
... | | Practical Guide to Testing Object-Oriented SoftwareTesting software is a very important and challenging activity. This is a book for people who test software during its development. Our focus is on object-oriented and component-based software, but you can apply many of the techniques discussed in this book regardless of the development paradigm. We assume our reader is familiar... | | Wireless Networks and Security: Issues, Challenges and Research Trends (Signals and Communication Technology)
“Wireless Networks and Security” provides a broad coverage of wireless security issues including cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, security issues in... |
|