![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
Probability, Random Processes, and Ergodic Properties is for mathematically inclined information/communication theorists and people working in signal processing. It will also interest those working with random or stochastic processes, including mathematicians, statisticians, and economists. Highlights: Complete tour of book and guidelines for use given in Introduction, so readers can see at a glance the topics of interest. Structures mathematics for an engineering audience, with emphasis on engineering applications. New in the Second Edition: Much of the material has been rearranged and revised for pedagogical reasons. The original first chapter has been split in order to allow a more thorough treatment of basic probability before tackling random processes and dynamical systems. The final chapter has been broken into two pieces to provide separate emphasis on process metrics and the ergodic decomposition of affine functionals. Many classic inequalities are now incorporated into the text, along with proofs; and many citations have been added.
Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a collection of defense mechanisms that operate at the lower-layers of the protocol stack and can defend wireless systems before the effects of attacks propagate up to higher-level applications and services. The book will focus on fundamental security problems that involve properties unique to wireless systems, such as the characteristics of radio propagation, or the location of communicating entities, or the properties of the medium access control layer. Specifically, the book provides detection mechanisms and highlights defense strategies that cope with threats to wireless localization infrastructure, attacks on wireless networks that exploit entity identity (i.e. spoofing attacks), jamming and radio interference that can undermine the availability of wireless communications, and privacy threats where an adversary seeks to infer spatial and temporal contextual information surrounding wireless communications. Additionally, the authors explore new paradigms of physical layer security for wireless systems, which can support authentication and confidentiality services by exploiting fading properties unique to wireless communications.
Over the past decade, the world has witnessed an explosion in the
development and deployment of new wireless network technologies.
From cellular mobile telephony to the ubiquitous "WiFi" networks in
coffee-shops and airports, to the emerging WiMAX wireless broadband
access networks, the menu of wireless access systems has become so
comprehensive that wireline access to user devices may soon become
a relic of the past. Wireless Networking serves as a one-stop view
of cellular, WiFi, and WiMAX networks, as well as the emerging
wireless ad hoc and sensor networks. Rather than provide
descriptive accounts of these technologies and standards, the book
emphasizes conceptual perspectives on the modeling, analysis,
design and optimization of such networks. Furthermore, the authors
present wireless networking within the unifying framework of
resource allocation, using simple abstractions of the underlying
physical wireless communication. In short, Wireless Networking is
an in-depth, exhaustive, and invaluable asset to anyone working in
this rapidly evolving field.
Combines in one volume the basics of evolving radio access technologies and their implementation in mobile phones * Reviews the evolution of radio access technologies (RAT) used in mobile phones and then focuses on the technologies needed to implement the LTE (Long term evolution) capability * Coverage includes the architectural aspects of the RF and digital baseband parts before dealing in more detail with some of the hardware implementation * Unique coverage of design parameters and operation details for LTE-A phone transceiver * Discusses design of multi-RAT Mobile with the consideration of cost and form factors * Provides in one book a review of the evolution of radio access technologies and a good overview of LTE and its implementation in a handset * Unveils the concepts and research updates of 5G technologies and the internal hardware and software of a 5G phone
Wireless sensor networks have the potential to become the third wireless revolution after wireless voice networks in the 80s and wireless data networks in the late 90s. Unfortunately, radio power consumption is still a major bottleneck to the wide adoption of this technology. Different directions have been explored to minimize the radio consumption, but the major drawback of the proposed solutions is a reduced wireless link robustness. The primary goal of Architectures and Synthesizers for Ultra-low Power Fast Frequency-Hopping WSN Radios is to discuss, in detail, existing and new architectural and circuit level solutions for ultra-low power, robust, uni-directional and bi-directional radio links. Architectures and Synthesizers for Ultra-low Power Fast Frequency-Hopping WSN Radios guides the reader through the many system, circuit and technology trade-offs he will be facing in the design of communication systems for wireless sensor networks. Finally, this book, through different examples realized in both advanced CMOS and bipolar technologies opens a new path in the radio design, showing how radio link robustness can be guaranteed by techniques that were previously exclusively used in radio systems for middle or high end applications like Bluetooth and military communications while still minimizing the overall system power consumption.
Based on a rigorous selection of submissions to The 29th International Symposium on Computer and Information Sciences (ISCIS 2014), this books includes some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks. It offers the reader a timely access to innovative research and advances in computing and communications from many different areas of the world. The topics covered include (but are not limited to) computer architectures and digital systems, algorithms, theory, software engineering, data engineering, computational intelligence, system security, computer systems and networks, performance modeling and analysis, distributed and parallel systems, bioinformatics, computer vision and significant applications such as medical informatics and imaging. The 29th International Symposium on Computer and Information Sciences (ISCIS 2014) took place in Krakow Old City, Poland on October, 27-8, 2014.
This book highlights cooperative coverage control approaches of multi-agent systems in uncertain environments and their applications in various fields. A novel theoretical formulation of multi-agent coverage is proposed to fulfill the coverage task via divide-and-conquer scheme. By taking workload partition and sweeping operations simultaneously, a distributed sweep coverage algorithm of multi-agent systems is developed to cooperatively complete the workload on the given region, and its input-to-state stability is guaranteed in theory. Moreover, the coverage performance is evaluated by estimating the error between the actual coverage time and the optimal time. Three application scenarios are presented to demonstrate the advantages of cooperative coverage control approaches in missile interception, intelligent transportation systems and environment monitoring, respectively.
"LTE-Advanced relay technology and standardization" provides a
timely reference work for relay technology with the finalizing of
LTE Release 10 specifications. LTE-Advanced is quickly becoming the
global standard for 4G cellular communications. The relay
technology, as one of the key features in LTE-Advanced, helps not
only to improve the system coverage and capacity, but also to save
the costs of laying wireline backhaul. As a leading researcher in
the field of LTE-Advanced standards, the author provides an
in-depth description of LTE-A relay technology, and explains in
detail the standard specification and design principles. Dr. Yifei Yuan is theTechnical Director at the Standards Department of ZTE Inc."
"Signal Conditioning" is a comprehensive introduction to electronic signal processing. The book presents the mathematical basics including the implications of various transformed domain representations in signal synthesis and analysis in an understandable and lucid fashion and illustrates the theory through many applications and examples from communication systems. The ease to learn is supported by well-chosen exercises which give readers the flavor of the subject. Supplementary electronic material is available on http://extras.springer.com including MATLAB codes illuminating applications in the domain of one dimensional electrical signal processing, image processing, and speech processing. The book is an introduction for students with a basic understanding in engineering or natural sciences.
Learn how to quickly solve electromagnetic scattering problems using the Moment Method with this unique book. Software Included! Accompanying software featuring FORTRAN source code allows you to modify the book's examples and understand how simple and complex shapes scatter waves. One 3.5" IBM PC-compatible diskette.
Intra-system EMC problems are becoming increasingly common in
mobile devices, ranging from notebook PCs to cell phones, with
RF/wireless capbilities. These issues range from minor annoyances
to serious glitches which impede the functioning of the device.
This book gives a thourough review of electromagnetic theory
(including Maxwell's equations), discusses possible sources and
causes of intra-system interference, shows to use models and
analysis to discover potential sources of intra-system EMC in a
design, how to use appropriate tests and measurements to detect
intra-system EMC problems, and finally extensively discusses
measures to mitigate or totally eliminate intra-system EMC
problems. With more and more mobile devices incorporating wirless
capability (often with multiple wireless systems, such as Bluetooth
and WiFi), this book should be part of the reference shelf of every
RF/wireless engineer and mobile device designer.
The book provides a complete and detailed description of the recent wireless technologies including Wi-Fi, Bluetooth, ZigBee and WiMAX. These technologies are considered to be important topics in the telecommunication industry in the next decade. Some critical subjects are particularly developed such as security, quality of service, roaming and power conservation. The book also includes some chapters on practical aspects.
Wireless technology and handheld devices are dramatically changing the degrees of interaction throughout the world, further creating a ubiquitous network society. The emergence of advanced wireless telecommunication technologies and devices in today's society has increased accuracy and access rate, all of which are increasingly essential as the volume of information handled by users expands at an accelerated pace. The requirement for mobility leads to increasing pressure for applications and wireless systems to revolve around the concept of continuous communication with anyone, anywhere, and anytime. With the wireless technology and devices come ?exibility in network design and quicker deployment time. Over the past decades, numerous wireless telecommu- cation topics have received increasing attention from industry professionals, a- demics, and government agencies. Among these topics are the wireless Internet; multimedia; 3G/4G wireless networks and systems; mobile and wireless network security; wireless network modeling, algorithms, and simulation; satellite based s- tems; 802.11x; RFID; and broadband wireless access.
This book examines recent developments in semantic systems that can respond to situations and environments and events. The contributors to this book cover how to design, implement and utilize disruptive technologies. The editor discusses the two fundamental sets of disruptive technologies: the development of semantic technologies including description logics, ontologies and agent frameworks; and the development of semantic information rendering and graphical forms of displays of high-density time-sensitive data to improve situational awareness. Beyond practical illustrations of emerging technologies, the editor proposes to utilize an incremental development method called knowledge scaffolding -a proven educational psychology technique for learning a subject matter thoroughly. The goal of this book is to help readers learn about managing information resources, from the ground up and reinforcing the learning as they read on.
"Proceedings of the 3rd China Satellite Navigation Conference (CSNC2012)" presents selected research papers from CSNC2012, held on 15-19 May in Guanzhou, China. These papers discuss the technologies and applications of the Global Navigation Satellite System (GNSS), and the latest progress made in the China BeiDou system especially. They are divided into 9 topics to match the corresponding sessions in CSNC2012, which broadly covered key topics in GNSS. Readers can learn about the BeiDou system and keep abreast of the latest advances in GNSS techniques and applications. SUN Jiadong is the Chief Designer of the Compass/BeiDou system, and the Academician of Chinese Academy of Sciences; LIU Jingnan is a professor at Wuhan University, and the Academician of Chinese Academy of Engineering; YANG Yuanxi is a professor at China National Administration of GNSS and Applications, and the Academician of Chinese Academy of Sciences; FAN Shiwei is a researcher on satellite navigation.
The spread-spectrum technique is becoming increasingly important in wireless communication systems. In this work, the main advantages of this techniques are outlined, describing its key elements, presenting important code acquisition strategies for direct sequences (DS) and frequency hopping (FH) systems, comparing various code tracking loop systems, and detailing receiver configurations based on CCD, SAW and DSP matched filters. The authors also examine system capacity issues related to the CDMA cellular network, and explain the CDMA overlay, packetized transmission in CDMA networks, and the problems of multiuser detection.
This state-of-the-art edition of a radar classic brings the reader up-to-date on new developments in clutter measurement and modelling, and features a wealth of new information. Authored by a recognized expert in the field, the book covers everything from basic concepts of radar reflectivity to space-time clutter amplitude and bistatic clutter. New radar engineers should find this to be a valuable, all-encompassing, well-illustrated survey of radar reflectivity fundamentals. Veteran engineers and systems designers should appreciate the book's new coverage of: effects of frequency agility; spatial averages for terrain; graphs from GIT clutter models; land and sea echo at extremely low grazing angles; compound statistics including the K and the Rayleigh modulated by Wiebull distributions; super sea echo events and sea spikes; bistatic land and sea clutter; and more.
This book presents a synthesis of the research carried out in the Laboratory of Signal Processing and Communications (LaPSyC), CONICET, Universidad Nacional del Sur, Argentina, since 2003. It presents models and techniques widely used by the signal processing community, focusing on low-complexity methodologies that are scalable to different applications. It also highlights measures of the performance and impact of each compensation technique. The book is divided into three parts: 1) basic models 2) compensation techniques and 3) applications in advanced technologies. The first part addresses basic architectures of transceivers, their component blocks and modulation techniques. It also describes the performance to be taken into account, regardless of the distortions that need to be compensated. In the second part, several schemes of compensation and/or reduction of imperfections are explored, including linearization of power amplifiers, compensation of the characteristics of analog-to- digital converters and CFO compensation for OFDM modulation. The third and last part demonstrates the use of some of these techniques in modern wireless-communication systems, such as full-duplex transmission, massive MIMO schemes and Internet of Things applications.
Spacecraft TT&C and Information Transmission Theory and Technologies introduces the basic theory of spacecraft TT&C (telemetry, track and command) and information transmission. Combining TT&C and information transmission, the book presents several technologies for continuous wave radar including measurements for range, range rate and angle, analog and digital information transmissions, telecommand, telemetry, remote sensing and spread spectrum TT&C. For special problems occurred in the channels for TT&C and information transmission, the book represents radio propagation features and its impact on orbit measurement accuracy, and the effects caused by rain attenuation, atmospheric attenuation and multi-path effect, and polarization composition technology. This book can benefit researchers and engineers in the field of spacecraft TT&C and communication systems. Liu Jiaxing is a professor at The 10th Institute of China Electronics Technology Group Corporation.
During the last one and a half decades, wireless sensor networks have witnessed significant growth and tremendous development in both academia and industry. A large number of researchers, including computer scientists and engineers, have been interested in solving challenging problems that span all the layers of the protocol stack of sensor networking systems. Several venues, such as journals, conferences, and workshops, have been launched to cover innovative research and practice in this promising and rapidly advancing field. Because of these trends, I thought it would be beneficial to provide our sensor networks community with a comprehensive reference on as much of the findings as possible on a variety of topics in wireless sensor networks. As this area of research is in continuous progress, it does not seem to be a reasonable solution to keep delaying the publication of such reference any more. This book relates to the second volume and focuses on the advanced topics and applications of wireless sensor networks. Our rationale is that the second volume has all application-specific and non-conventional sensor networks, emerging techniques and advanced topics that are not as matured as what is covered in the first volume. Thus, the second volume deals with three-dimensional, underground, underwater, body-mounted, and societal networks. Following Donald E. Knuth's above-quoted elegant strategy to focus on several important fields (The Art of Computer Programming: Fundamental Algorithms, 1997), all the book chapters in this volume include up-to-date research work spanning various topics, such as stochastic modeling, barrier and spatiotemporal coverage, tracking, estimation, counting, coverage and localization in three-dimensional sensor networks, topology control and routing in three-dimensional sensor networks, underground and underwater sensor networks, multimedia and body sensor networks, and social sensing. Most of these major topics can be covered in an advanced course on wireless sensor networks. This book will be an excellent source of information for graduate students majoring in computer science, computer engineering, electrical engineering, or any related discipline. Furthermore, computer scientists, researchers, and practitioners in both academia and industry will find this book useful and interesting.
Instructs advanced and important analysis methods which are frequently used for researchers, engineers and students who work on applications of electromagnetic waves to microwave devices and antennas. The book also includes various numerical techniques.
Multisensor fusion systems are only practical if the algorithms used are practical and effective, and if there is efficient database support. The first part of this book discusses a wide range of issues related to the development of robust, context-sensitive, and efficient data fusion algorithms. The second part addresses database requirements, structures, and issues related to achieving overall computational efficiency. Featuring highly accessible notation, the processing model and database issues presented in the text are aimed at system developers working in sensor fusion, automatic target recognition, multiple-target tracking, robotic control, automated image understanding, and large-scale integration and fabrication.
This book presents cutting-edge research contributions that address various aspects of network design, optimization, implementation, and application of cognitive radio technologies. It demonstrates how to make better utilization of the available spectrum, cognitive radios and spectrum access to achieve effective spectrum sharing between licensed and unlicensed users. The book provides academics and researchers essential information on current developments and future trends in cognitive radios for possible integration with the upcoming 5G networks. In addition, it includes a brief introduction to cognitive radio networks for newcomers to the field.
IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations. |
![]() ![]() You may like...
Cherokee Narratives - A Linguistic Study
Durbin Feeling, William Pulte, …
Hardcover
R1,005
Discovery Miles 10 050
Don't Upset ooMalume - A Guide To…
Hombakazi Mercy Nqandeka
Paperback
|