Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
The "digital revolution" of the last two decades has pervaded
innumerable aspects of our daily lives and changed our planet
irreversibly. The shift from analog to digital broadcasting has
facilitated a seemingly infinite variety of new
applications-audience interactivity being but one example. The
greater efficiency and compression of digital media have endowed
broadcasters with a "digital dividend" of spare transmission
capacity over and above the requirements of terrestrial
broadcasting. The question is, who will use it, and how? Comparing
the European experience with that of broadcasters elsewhere in the
world, the author sketches the current status of international
frequency management, quantifies the value of the "dividend"
itself, analyzes the details of the analog-to-digital switchovers
already completed, and posits what the future holds for the sector.
As we grapple with new devices, inconceivable a mere generation
ago, that allow us to access digital media instantly, anywhere and
at any time of day, this book is a potent reminder that what we
have witnessed so far may be just the first wavering steps along a
road whose destination we can only guess at.
Complex Orthogonal Space-Time Processing in Wireless Communications incorporates orthogonal space-time processing using STBCs in MIMO wireless communication systems. Complex Orthogonal STBCs (CO STBCs) are given emphasis because they can be used for PSK/QAM modulation schemes and are more practical than real STBCs. The overall coverage provides general knowledge about space-time processing and its applications for broad audiences. It also includes the most up-to-date review of the literature on space-time processing in general, and space-time block processing in particular. The authors also examine open issues and problems for future research in this area.
The Internet of Things (IoT) is the next big challenge for the research community. The IPv6 over low power wireless personal area network (6LoWPAN) protocol stack is considered a key part of the IoT. In 6LoWPAN networks, heavy network traffic causes congestion which significantly degrades network performance and impacts on quality of service aspects. This book presents a concrete, solid and logically ordered work on congestion control for 6LoWPAN networks as a step toward successful implementation of the IoT and supporting the IoT application requirements. The book addresses the congestion control issue in 6LoWPAN networks and presents a comprehensive literature review on congestion control for WSNs and 6LoWPAN networks. An extensive congestion analysis and assessment for 6LoWPAN networks is explored through analytical modelling, simulations and real experiments. A number of congestion control mechanisms and algorithms are proposed to mitigate and solve the congestion problem in 6LoWPAN networks by using and utilizing the non-cooperative game theory, multi-attribute decision making and network utility maximization framework. The proposed algorithms are aware of node priorities and application priorities to support the IoT application requirements and improve network performance in terms of throughput, end-to-end delay, energy consumption, number of lost packets and weighted fairness index.
This book explores recent advances in the Internet of things (IoT) via advanced technologies and provides an overview of most aspects which are relevant for advance secure, distributed, decentralized blockchain technology in the Internet of things, their applications, and industry IoT. The book provides an in-depth analysis of the step-by-step evolution of IoT to create a change by enhancing the productivity of industries. It introduces how connected things, data, and their communication (data sharing) environment build a transparent, reliable, secure environment for people, processes, systems, and services with the help of blockchain technology.
This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today's Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies.
As the IoT market is booming, several issues are delaying the full realization of the technology. IoT devices, in cybersecurity terms, greatly increase security risk. This means that any scientific work that offers cybersecurity strategies will excite security experts who will be glad to expand their knowledge base on IoT cybersecurity. As a result of the booming of the IoT market, business competitors are jockeying for a piece of the market. This means that solutions from researchers that address compatibility issues will be greatly welcomed by IoT technology developers. Connectivity providers are likely to embrace solutions to challenges of bandwidth since a growing IoT market must be followed up by bandwidth-intensive IoT applications which tend to jostle for space on the current client-server model. Overpromising followed by underdelivering, has been the current approach by many innovators and the mismatch results in losses in production, orphaned technologies accompanied by frequent system failures. Solutions that address IoT performance issues are likely to excite many start-ups. Solutions to challenges of fragmentation presented by thousands of devices from different manufacturers operating on proprietary ecosystems are likely to be warmly embraced by many IoT brands developers. As such, a publication that specifically addresses the challenges faced in the rolling out of IoT technologies is sorely needed.
This practical resource is essential reading for wireless communications engineers whose projects involve the use of cutting-edge software radio technology. It covers all aspects of systems design and explains various options for hardware, including a look at current and state of the art silicon technologies. The book places special emphasis on how software radio technology can solve many of the problems faced by professionals designing third-generation cellular mobile systems. The book concludes with an overview of engineering design assistance software tools that are becoming so important for the successful development of embedded radio products.
Published in commemoration of the one-hundredth anniversary of the "Titanic"'s sinking, this book tells the story of that fateful night from an unusual angle: through the many wireless communications sent to and from the land stations and the ships involved as the tragic events unfolded.Drawing on the extensive record of wireless transmissions in the Marconi Archives, "Titanic Calling" recounts this legendary story the way it was first heard, beginning with repeated warnings--just hours before the collision--of several large icebergs unusually far south and alarmingly close to the "Titanic"'s course. The story follows senior operator Jack Phillips as he sends distress messages to nearby ships and shows how these urgent calls for help were received and rapidly relayed across the Atlantic in a desperate attempt to save the lives of the "Titanic"'s passengers and crew. Finally, the distant SS "Virginian" receives the "Titanic"'s final, broken message. The story concludes with the rescue of the fortunate survivors, who radio messages to loved ones from aboard the RMS "Carpathia "while safely on their way to New York. Illustrated throughout with photographs of the messages and including full transcripts of original material, the book also features an introduction to the development of maritime wireless communications and a discussion of the Marconi Archives's "Titanic "collection. The forced brevity of the messages lends the narrative a startling sense of immediacy and brings to life to the voices of the individuals involved.
Mobile is impacting heavily on our society today. In this book, Nicoletti analyzes the application of mobile to the world of financial institutions. He considers future developments and the possible use of mobile to help the transformation in products, processes, organizations and business models of financial institutions globally.
Riding on the success of 3D cinema blockbusters and advances in stereoscopic display technology, 3D video applications have gathered momentum in recent years. 3D-TV System with Depth-Image-Based Rendering: Architectures, Techniques and Challenges surveys depth-image-based 3D-TV systems, which are expected to be put into applications in the near future. Depth-image-based rendering (DIBR) significantly enhances the 3D visual experience compared to stereoscopic systems currently in use. DIBR techniques make it possible to generate additional viewpoints using 3D warping techniques to adjust the perceived depth of stereoscopic videos and provide for auto-stereoscopic displays that do not require glasses for viewing the 3D image. The material includes a technical review and literature survey of components and complete systems, solutions for technical issues, and implementation of prototypes. The book is organized into four sections: System Overview, Content Generation, Data Compression and Transmission, and 3D Visualization and Quality Assessment. This book will benefit researchers, developers, engineers, and innovators, as well as advanced undergraduate and graduate students working in relevant areas.
This book presents a new filter design approach and concentrates on the circuit techniques that can be utilized when designing continuous-time low-pass filters in modern ultra-deep-submicron CMOS technologies for integrated wideband radio receivers. Coverage includes system-level issues related to the design and implementation of a complete single-chip radio receiver and related to the design and implementation of a filter circuit as a part of a complete single-chip radio receiver. Presents a new filter design approach, emphasizing low-voltage circuit solutions that can be implemented in modern, ultra-deep-submicron CMOS technologies;Includes filter circuit implementations designed as a part of a single-chip radio receiver in modern 1.2V 0.13um and 65nm CMOS;Describes design and implementation of a continuous-time low-pass filter for a multicarrier WCDMA base-station;Emphasizes system-level considerations throughout.
Fiber-optic communication systems have revolutionized our telecommunication infrastructures a" currently, almost all telephone land-line, cellular, and internet communications must travel via some form of optical fibers. In these transmission systems, neither the phase nor frequency of the optical signal carries information a" only the intensity of the signal is used. To transmit more information in a single optical carrier, the phase of the optical carrier must be explored. As a result, there is renewed interest in phase-modulated optical communications, mainly in direct-detection DPSK signals for long-haul optical communication systems. When optical amplifiers are used to maintain certain signal level among the fiber link, the system is limited by amplifier noises and fiber nonlinearities. Phase-Modulated Optical Communication Systems surveys this newly popular area, covering the following topics: - The transmitter and receiver for phase-modulated coherent lightwave systems - Method for performance analysis of phase-modulated optical signals - Direct-detection DPSK signal with fiber nonlinearities, degraded by nonlinear phase noise and intrachannel effects - Wavelength-division-multiplexed direct-detection DPSK signals - Multi-level phase-modulated optical signals, such as the four-phase DQPSK signal. Graduate students, professional engineers, and researchers will all benefit from this updated treatment of an important topic in the optical communications field.
A book offering advice on how to safeguard a company's telecommunication and computer networks against natural disaster, sabotage and human error. It aims to help identify the vulnerabilities of a system and describes specific risk avoidance measures.
Broadband Satellite Communication Systems and the Challenges of Mobility is an essential reference for both academic and professional researchers in the field of telecommunications, computer networking and wireless networks. Recently the request of multimedia services has been rapidly increasing and satellite networks appear to be attractive for a fast service deployment and for extending the typical service area of terrestrial systems. In comparison with traditional wide area networks, a characteristic of satellite communication systems is their ability in broadcasting and multicasting multimedia information flows anywhere over the satellite coverage. The papers presented in this volume highlight key areas such as Satellite Network Architectures, Services and Applications; Mobile Satellite Systems and Services; and Hybrid Satellite and Terrestrial Networks. Mobility will inevitably be one of the main characteristics of future networks, terminals and applications and, thus, extending and integrating fixed network protocols and services to mobile systems represents one of the main issues of present networking. The secondary focus of this volume is on challenges of mobility, that is, on technologies, protocols and services for the support of seamless and nomadic user access to new classes of applications in person-to-person, device-to-device and device-to-person environments. The book comprises recent results of research and development in the following areas; Seamless mobility; Mobile ad hoc and sensor networks; Analysis, simulation and measurements of mobile and wireless systems; Integration and inter-working of wired and wireless networks; QoS in mobile and wireless networks; Future trends and issues concerning mobility. This state -of-the-art volume contains a collection of papers from two of the workshops of the 18th IFIP World Computer Congress, held August 22-27, 2004, in Toulouse, France: the Workshop on Broadband Satellite Communication Systems, and the Workshop on the Challenges of Mobility.
This book summarizes the authors' latest research on narrowband interference and impulsive noise mitigation and cancelation, including (i) mitigating the impacts of NBI on synchronization; (ii) improving time-frequency interleaving performance under NBI and IN; (iii) accurately recovering and eliminating NBI and IN. The complicated, random and intensive narrowband interference and impulsive noise are a serious bottleneck of the next-generation wireless communications and Internet of things. This book also proposes effective and novel frameworks and algorithms, which will significantly improve the capability of mitigating and eliminating NBI and IN in the next-generation broadband communications systems. This book not only presents thorough theoretical models and algorithm design guidelines, but also provides adequate simulation and experimental engineering methods and results. The book is a valuable reference for those engaged in theoretical study, algorithm design and engineering practice in related fields, such as wireless communications, smart lighting, IoT and smart grid communications.
Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, allowing them to be programmed to perform specific duties. This extensively updated, second edition of the popular Artech House book, Smart Card Security and Applications, offers a current overview of the ways smart cards address the computer security issues of today's varied applications. Brand new discussions on multi-application operating systems, computer networks, and the Internet are included to keep technical and business professionals abreast of the very latest developments in this field. The book provides technical details on the newest protection mechanisms, features a discussion on the effects of recent attacks, and presents a clear methodology for solving unique security problems.
This comprehensive and didactic overview explores the nonlinear effects from a physical point of view and discusses the implications for signal capacity. Enriched with practical considerations and experimental results, the book offers special chapters dealing with applications of nonlinear effects for signal processing, ultrafast-optical switching, wavelength conversion, nonlinear amplification, and optical phase-conjugation. Equipped with chapter-end summaries and problems, this valuable reference can also serve as a graduate-level textbook.
I have written this book to ?ll a void between theory and practice, a void that Iperceivedwhileconductingmyownresearchanddevelopmentofcomponents and instruments over the last ?ve years. In the chapters that follow I have pulled materials from the technical and patent literature that are relevant to the understanding and practice of polarization optics in telecommuni- tions, material that is often known by the respective experts in industry and academia but is rarely if ever found in one place. By bringing this material intoonemonograph, andbyapplyingasingleformalismthroughout, Ihopeto create a "base level" upon which future research and development can grow. Polarization optics in telecommunications is an ever-evolving ?eld. Each yearsigni?cantadvancementsaremade, punctuatedbyimportantdiscoveries. The references upon which this book is based are only a snap-shot in time. Areasthatremainunresolvedatthetimeofpublicationmayverywellbecl- i?ed in the years to come. Moreover, the focus of the ?eld changes in time: for instance, there have been few passive nonreciprocal component advancements reported in the last few years, but PMD and PDL advancement continues with only modest abatement.
In the last few years, a stimulating idea is fast emergingin the wireless scenario: the pervasive presence around us of a variety of "things" or "objects," such as RFID, sensors, actuators, mobile phones, which, through unique addressing schemes, are able to interact with each other and cooperate with their neighboring "smart" c- ponents to reach common goals. This novel paradigm, named "The Internet of Things" (IoT) continues on the path set by the concept of smart environments and paves the way to the depl- ment of numerous applications with a signi cant impact on many elds of future every-day life. In this context, logistics, Intelligent Transportation Systems (ITS), business/process management, assisted living, and e-health are only a few examples of possible application elds in which this novel paradigm will play a leading role in the next future. Actually, manychallengingissues still needto be addressedand both technolo- calandsocialnodesuntiedbeforethe IoTideabeingwidelyaccepted.Centralissues are making a full interoperabilityof such devices possible, enablingtheir adaptation and autonomousbehavior, as well as guaranteeingtrust, privacy, and security. Also, the IoT idea poses several new problemsconcerningthe networkingaspects. In fact, the "things" composing the IoT will be characterized by low resources in terms of both computation and energy capacity. Accordingly, the proposed solutions need to payspecial attentionto resourceef ciencybesides the obviousscalability problems. The papers included in this volume present a picture of the current state of the art on the above issues; more speci cally, concepts and ideas are discussed on n- working, middleware, security and privacy, RFID and sensor networks, as well as electromagnetic aspects.
This book presents research in artificial techniques using intelligence for energy transition, outlining several applications including production systems, energy production, energy distribution, energy management, renewable energy production, cyber security, industry 4.0 and internet of things etc. The book goes beyond standard application by placing a specific focus on the use of AI techniques to address the challenges related to the different applications and topics of energy transition. The contributions are classified according to the market and actor interactions (service providers, manufacturers, customers, integrators, utilities etc.), to the SG architecture model (physical layer, infrastructure layer, and business layer), to the digital twin of SG (business model, operational model, fault/transient model, and asset model), and to the application domain (demand side management, load monitoring, micro grids, energy consulting (residents, utilities), energy saving, dynamic pricing revenue management and smart meters, etc.).
There can be no doubt that mobile technologies are here to stay. Global mobile traffic grew 74 percent in 2015 alone, with 563 million devices and connections added -- most of them tablets and Smartphones. This growth has been 4000-fold in the past 10 years and 400 million-fold in the past 15 years (Cisco, 2016). Mobile technologies permeate the lives of 21st century citizens as mainstays of organizational and institutional day-to-day operations, commerce, and communication and as tools used to support individuals' personal, social, and career responsibilities. In both the corporate and educational worlds, e- and m-learning and marketing with mobile technologies are moving forward at breakneck speed with, in many cases, a blurring of traditional sector boundaries. As neither the technology nor the uses are static, exploring practices and policies that underpin this quickly shifting mobile technology context is crucial for ensuring its intelligent, purposeful, and equitable use. This edited book provides a venue for researchers to share their work on mobile learning with a focus on uses for mobiles in informal settings and PK-20 classrooms, language learning, mobile gaming, leadership and policy issues, and what mobile learning in the future may be. It assists researchers and educators to consider and answer questions such as: What is "mobilelearning" today? How can mobiles be used to enable learning? How is mobile learning crossing or connecting economic, social, and/or cultural sectors? How do specific cultural practices with media influence mobile learning (e.g., youth practices, educator practices, parent practices, community practices)? What are policy and leadership implications in supporting mobile learning? What policies, practices, and/or pedagogical approaches are necessary to move forward with mobiles in schools or universities? In what ways is mobile learning impacting education; including how students learn and teachers teach? What will/ should/might mobile learning look like in the future?
This volume presents a parametric, packet-based, comprehensive model to measure and predict the audiovisual quality of Internet Protocol Television services as it is likely to be perceived by the user. The comprehensive model is divided into three sub-models referred to as the audio model, the video model, and the audiovisual model. The audio and video models take as input a parametric description of the audiovisual processing path, and deliver distinct estimates for both the audio and video quality. These distinct estimates are eventually used as input data for the audiovisual model. This model provides an overall estimate of the perceived audiovisual quality in total. The parametric description can be used as diagnostic information. The quality estimates and diagnostic information can be practically applied to enhance network deployment and operations. Two applications come to mind in particular: Network planning and network service quality monitoring. The audio model can be used indifferently for both applications. However, two variants of the video model have been developed in order to address particular needs of the applications mentioned above. The comprehensive model covers effects due to resolution, coding, and IP-packet loss in case of RTP-type transport. The model applied to quality monitoring is standardized under the ITU-T Recommendations P.1201 and P.1201.2.
This book focuses on the adoption of new technologies led by information and communication technologies by SMEs in developing countries. It identifies several factors that augment competitiveness of firms in the era of globalization. Contrary to the general belief, these factors are not uniform across developing world. Based on the empirical evidence from firms located in Malaysia, India, Nigeria, Jamaica, and Costa Rica, the study concludes that firms cannot remain competitive without institutional support. Since firms operate in different institutional and economic environment, form of support varies from one country to another.
This book presents a new approach to examining the perceived quality of audiovisual sequences. It uses electroencephalography (EEG) to explain in detail how user quality judgments are formed within a test participant, and what the physiological implications might be when subjects are exposed to lower quality media. The book redefines the experimental paradigms of using EEG in the area of quality assessment so that they better suit the requirements of standard subjective quality testing, and presents experimental protocols and stimuli that have been adjusted accordingly. |
You may like...
A Modern Guide to the Digitalization of…
Juan Montero, Matthias Finger
Hardcover
R3,939
Discovery Miles 39 390
The COVID-19 Pandemic and the…
Floribert Patrick Calvain Endong
Hardcover
R6,143
Discovery Miles 61 430
|