![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
An introduction to telephone exchange software, its functions and architectures. With continuous reference to the problems and realities of existing systems, this book analyzes hardware and software architectures adopted for the control of telecommunication switching exchanges.
This is a guide for the system designers and installers faced with
the day-to-day issues of achieving EMC, and will be found valuable
across a wide range of roles and sectors, including process
control, manufacturing, medical, IT and building management. The
EMC issues covered will also make this book essential reading for
product manufacturers and suppliers - and highly relevant for
managers as well as technical staff. EMC for Systems and Installations is designed to complement Tim
Williams' highly successful EMC for Product Designers.
What we profoundly witness these days is a growing number of human-centric systems and a genuine interest in a comprehensive understanding of their underlying paradigms and the development of solid and efficient design practices. We are indeed in the midst of the next information revolution, which very likely brings us into a completely new world of ubiquitous and invisible computing, Ambient Intelligent (AMI), and wearable hardware. This requires a totally new way of thinking in which cognitive aspects of design, cognitive system engineering and distributed approach play a pivotal role. This book fully addresses these timely needs by filling a gap between the two well-established disciplines of cognitive sciences and cognitive systems engineering. As we put succinctly in the preface, with the psychological perspective of human cognition in mind, the book explores the computational models of reasoning, learning, planning and multi-agent coordination and control of the human moods . This is an excellent, up to the point description of the book. The treatise is focused on the underlying fundamentals, spans across a vast territory embracing logic perspectives of human cognition, distributed models, parallel computing, expert systems, and intelligent robotics."
It is certain that, over the next few years, data traffic will dwarf voice traffic on telecommunications networks. Growth in data-traffic volumes far exceeds that for voice, and is driven by increased use of applications such as e-mail attachments, remote printing and fileserver access, and the now omnipresent World Wide Web. The growth of data networking to connect computers with each other and with their peripheral devices began in earnest in the 1970s, took off in the 1980s and exploded in the 1990s. The early 21st century will see ever faster, more cost effective networks providing flexible data access into ever more businesses and homes. Since the 1970s there have been great advances in technology. For the past twenty years the processing power of computers has continued to grow with no hint of slowing - recall the oft-cited Moore's Law claiming that this power doubles every 18 months. Advances in the data networking equipment required to support the data traffic generated have been enormous. The pace of development from early X. 25 and modem technology through to some of the advanced equipment functionality now available is breathtaking - it is sometimes hard to believe that the practical router is barely ten years old This book provides an overview of the advanced data networking field by bringing together chapters on local area networks, wide area networks and their application."
This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used "against" users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. The information on denial of service attacks has been thoroughly updated for the new edition. Also, a major addition to this edition is a section discussing software defined radio and open source tools for mobile phones.
The aim of this book is to provide comprehensive coverage of current state of the art theoretical and technological aspects of broadband mobile and wireless networks focusing on Long Term Evolution Network. The presentation starts from basic principles, and proceeds to the most advanced topics. Provided schemes are developed and oriented in the context of actual closed standards of the IEEE working groups and the 3 GPPP LTE. Also this book will focus on the understanding of the LTE technology as well as the study of its performance in terms of mobility, quality of service, security, resource allocation.
Granular Computing is concerned with constructing and processing carried out at the level of information granules. Using information granules, we comprehend the world and interact with it, no matter which intelligent endeavor this may involve. The landscape of granular computing is immensely rich and involves set theory (interval mathematics), fuzzy sets, rough sets, random sets linked together in a highly synergetic environment. This volume is a first comprehensive treatment of this emerging paradigm and embraces its fundamentals, underlying methodological framework, and a sound algorithmic environment. The panoply of applications covered includes system identification, telecommunications, linguistics and music processing. Written by experts in the field, this volume will appeal to all developing intelligent systems, either working at the methodological level or interested in detailed system realization.
As the telecommunication industry introduces new sophisticated technologies, the nature of services and the volume of demands have changed. Indeed, a broad range of new services for users appear, combining voice, data, graphics, video, etc. This implies new planning issues. Fiber transmission systems that can carry large amounts of data on a few strands of wire were introduced. These systems have such a large bandwidth that the failure of even a single transmission link: in the network can create a severe service loss to customers. Therefore, a very high level of service reliability is becoming imperative for both system users and service providers. Since equipment failures and accidents cannot be avoided entirely, networks have to be designed so as to "survive" failures. This is done by judiciously installing spare capacity over the network so that all traffic interrupted by a failure may be diverted around that failure by way of this spare or reserve capacity. This of course translates into huge investments for network operators. Designing such survivable networks while minimizing spare capacity costs is, not surprisingly, a major concern of operating companies which gives rise to very difficult combinatorial problems. In order to make telecommunication networks survivable, one can essentially use two different strategies: protection or restoration. The protection approach preas signs spare capacity to protect each element of the network independently, while the restoration approach spreads the redundant capacity over the whole network and uses it as required in order to restore the disrupted traffic."
This book provides an in-depth treatment of both linear fiber-optic systems and their key enabling devices. It presents a concise but rigorous treatment of the theory and practice of analog (linear) fiber-optics links and systems that constitute the foundation of Hybrid Fiber Coax infrastructure in present-day CATV distribution and cable modem Internet access. Emerging applications in remote fiber-optic feed for free-space millimeter wave enterprise campus networks are also described. Issues such as dispersion and interferometric noise are treated quantitatively, and means for mitigating them are explained. This broad but concise text will thus be invaluable not only to students of fiber-optics communication but also to practicing engineers. To the second edition of this book important new aspects of linear fiber-optic transmission technologies are added, such as high level system architectural issues, algorithms for deriving the optimal frequency assignment, directly modulated or externally modulated laser transmitters and the use of Erbium-doped fiber amplifier (EDFA) in linear fiber optic systems. Significant examples of field deployed military systems enabled by linear fiber optic links are described in an appendix.
Multicarrier Modulation with Low PAR: Applications to DSL and Wireless provides the first comprehensive formulation of the PAR problem for multicarrier modulation and proposes three new methods for PAR reduction. The information in this book will be vital to practicing engineers, industrial researchers, scientists, graduate and postgraduate researchers, and others working in multicarrier transmission and communication theory. Multicarrier Modulation with Low PAR: Applications to DSL and Wireless serves as a valuable reference to both design engineers and communications theorists, and can also be used for advanced courses on the subject.
The authors combine relevant and cutting-edge information on existing and future use of videoconferencing technology in the field of education.
It is a complete training in digital communications in the same book with all the aspects involved in such training: courses, tutorials with many typical problems targeted with detailed solutions, practical work concretely illustrating various aspects of technical implementation implemented. It breaks down into three parts. The Theory of information itself, which concerns both the sources of information and the channels of its transmission, taking into account the errors they introduce in the transmission of information and the means of protect by the use of appropriate coding methods. Then for the technical aspects of transmission, first the baseband transmission is presented with the important concept and fundamental technique of equalization. The performance evaluation in terms of probability of errors is systematically developed and detailed as well as the online codes used. Finally, the third part presents the Transmissions with digital modulation of carriers used in radio transmissions but also on electric cables. A second important aspect in learning a learner's knowledge and skills is this book. It concerns the "Directed Work" aspect of a training. This is an ordered set of 33 typical problems with detailed solutions covering the different parts of the course with practical work. Finally, the last aspect concerns the practical aspects in the proper sense of the term, an essential complement to training going as far as know-how. We propose here a set of 5 practical works.
There has continuously been a massive growth of Internet traffic for these years despite the "bubble burst" in year 2000. As the telecom market is gradually picking up, it would be a consensus in telecom and data-com industries that the CAPEX (Capital Expenditures) to rebuild the network infrastructure to cope with this traffic growth would be imminent, while the OPEX (Operational Expenditures) has to be within a tight constraint. Therefore, the newly built 2r DEGREES-century network has to fully evolve from voice-oriented legacy networks, not only by increasing the transmission capacity of WDM links but also by introducing switching technologies in optical domain to provide full-connectivity to support a wide variety of services. This book stems from the technical contributions presented at the Optical Networks and Technology Conference (OpNeTec), inaugurated this year 2004 in Pisa, Italy, and collects innovations of optical network technologies toward the 2V DEGREES century network. High-quality recent research results on optical networks and related technologies are presented, including IP over WDM integration, burst and packet switchings, control and managements, operation, metro- and access networks, and components and devices in the perspective of network application. An effort has been made throughout the conference, hopefully reflected at least partially in this book, to bring together researchers, scientists, and engineers working both academia and industries to discuss the relative impact of networks on technologies and vice versa, with a vision of the fut
This book elaborates the science and engineering basis for energy-efficient driving in conventional and autonomous cars. After covering the physics of energy-efficient motion in conventional, hybrid, and electric powertrains, the book chiefly focuses on the energy-saving potential of connected and automated vehicles. It reveals how being connected to other vehicles and the infrastructure enables the anticipation of upcoming driving-relevant factors, e.g. hills, curves, slow traffic, state of traffic signals, and movements of nearby vehicles. In turn, automation allows vehicles to adjust their motion more precisely in anticipation of upcoming events, and to save energy. Lastly, the energy-efficient motion of connected and automated vehicles could have a harmonizing effect on mixed traffic, leading to additional energy savings for neighboring vehicles. Building on classical methods of powertrain modeling, optimization, and optimal control, the book further develops the theory of energy-efficient driving. In addition, it presents numerous theoretical and applied case studies that highlight the real-world implications of the theory developed. The book is chiefly intended for undergraduate and graduate engineering students and industry practitioners with a background in mechanical, electrical, or automotive engineering, computer science or robotics.
It is a complete training in digital communications in the same book with all the aspects involved in such training: courses, tutorials with many typical problems targeted with detailed solutions, practical work concretely illustrating various aspects of technical implementation implemented. It breaks down into three parts. The Theory of information itself, which concerns both the sources of information and the channels of its transmission, taking into account the errors they introduce in the transmission of information and the means of protect by the use of appropriate coding methods. Then for the technical aspects of transmission, first the baseband transmission is presented with the important concept and fundamental technique of equalization. The performance evaluation in terms of probability of errors is systematically developed and detailed as well as the online codes used. Finally, the third part presents the Transmissions with digital modulation of carriers used in radio transmissions but also on electric cables. A second important aspect in learning a learner's knowledge and skills is this book. It concerns the "Directed Work" aspect of a training. This is an ordered set of 33 typical problems with detailed solutions covering the different parts of the course with practical work. Finally, the last aspect concerns the practical aspects in the proper sense of the term, an essential complement to training going as far as know-how. We propose here a set of 5 practical works.
The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016. The areas covered in the book are sustainable computing and security, sustainable systems and technologies, sustainable methodologies and applications, sustainable networks applications and solutions, user-centered services and systems and mobile data management. The novel and recent technologies presented in the book are going to be helpful for researchers and industries in their advanced works.
The first maritime surveillance radars in World War II quickly discovered that returns from the sea, soon to be known as sea clutter, were often the limiting factor when attempting to detect small targets while controlling false alarms. This remains true for modern radars, where the detection of small, slow moving targets on a rough sea surface remains one of the main drivers for maritime radar design, particularly in the development of detection processing. The design, development and testing of radar signal processing for maritime surveillance requires a very detailed understanding of the characteristics of radar sea clutter and of the combined target and clutter returns. This book provides an updated and comprehensive review of the latest research into radar sea clutter and detection methods for targets in sea clutter. The emphasis is on understanding the characteristics of radar sea clutter as observed with different radars, viewing geometries and environmental conditions. This understanding is assisted by the development of mathematical models that are used in the radar design process. In recent years there has been an increased interest in operating at higher altitudes, resulting in the sea surface being illuminated with larger grazing angles than used in traditional airborne surveillance platforms or ground-based systems. There has also been significant research into bistatic operation, including passive radars using illuminators of opportunity. The use of coherent and multi-aperture systems in maritime radar are also of increasing interest and these new application areas are also covered in this book.
Internet traffic is increasing at a rate of at least 200% per year. The worlda (TM)s largest Internet Service Provider has recently stated that it expects traffic capacity on its regional trunks to grow to a 1-10 petabit range over the next four to five years. Wavelength division multiplexing (WDM), long-haul fiber-optic links and high-capacity all-optical circuit switches are now being employed at the Internet core to process such massive traffic, consequently creating a demand for novel high-performance packet switching technologies (IP routers, ATM switches, and Ethernet Switches) which feed the optical core. Over the last ten years, tremendous technological advances have taken place in order to achieve these objectives. High-performance Packet Switching Architectures is the first book to cover these advances in a comprehensive one-volume survey. The booka (TM)s editors have brought together contributions from leading researchers in industry and universities, yielding an integrated coverage of the state-of-the-art in packet-switching technologies. A mix of theoretical and practical material allows the book to act an essential reference for researchers in academia as well as industrial engineers.
A comprehensive reference book codifying the various standards releases for High Speed Packet Access (HSPA) wireless technology HSPA evolution has maintained its prominence through Releases 7-11 but the evolution is coming to an end with Release 12, with the focus moving to LTE. However, HSPA network and terminal sales will continue for many years: HSPA is expected to remain as the number one radio access technology from the sales point of view far beyond 2015. This timely book examines the complete HSPA evolution, and will be the ultimate long term reference for HSPA evolution. Headed by the successful editing team of Holma, Toskala and Tapia, industry experts look at HSPA evolution including complete Release 11 and the main additions in Release 12. They describe 3GPP definitions, field measurement, expected performance, practical optimization guidelines and the implications to the devices and to the networks. The book also covers MIMO antenna solutions and multicarrier evolution to provide higher data rates. Dedicated chapters include Continuous Packet Connectivity and High Speed Common Channels which provide major improvement to the smartphone capacity, end user performance and power consumption. The book assumes basic understanding of mobile communications yet the material is presented in an understandable way which can be enjoyed without any pre-information about MIMO or other technology solutions. * A comprehensive reference book codifying the various standards releases for High Speed Packet Access (HSPA) wireless technology * Leading editor and contributor team focusing their expertise on 3GPP features and performance, including Self Organizing Networks, LTE Interworking, Smartphone Optimization and Voice Evolution * Dedicated chapter covering VoIP over HSPA, recognizing that telephony will continue to bring most of the revenues to mobile operators in the near future * Includes tables, figures and plots illustrating the concepts or simulation results, to aid readers understanding of the topic An essential resource for R&D engineers by network, terminal and chip set vendors, network engineers with operators, application developers, regulators.
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yesterday, today and tomorrow ) culled from Cryptologia (Rose-Hulman Institute of Technology, Terre Haute, IN). The articles are divided into five sectio
This book comprises peer-reviewed contributions presented at the 5th International Conference on Electronics, Communications and Networks (CECNet 2015), held in Shanghai, China, 12-15 December, 2015. It includes new multi-disciplinary topics spanning a unique depth and breadth of cutting-edge research areas in Electronic Engineering, Communications and Networks, and Computer Technology. More generally, it is of interest to academics, students and professionals involved in Consumer Electronics Technology, Communication Engineering and Technology, Wireless Communication Systems and Technology, and Computer Engineering and Technology.
This book highlights the rightful role of citizens as per the constitution of the country for participation in Governance of a smart city using electronic means such as high speed fiber optic networks, the internet, and mobile computing as well as Internet of Things that have the ability to transform the dominant role of citizens and technology in smart cities. These technologies can transform the way in which business is conducted, the interaction of interface with citizens and academic institutions, and improve interactions between business, industry, and city government.
This authoritative book focuses on the vital aspects of cellular radio system modeling and performance analysis.
This book offers means to handle interference as a central problem of operating wireless networks. It investigates centralized and decentralized methods to avoid and handle interference as well as approaches that resolve interference constructively. The latter type of approach tries to solve the joint detection and estimation problem of several data streams that share a common medium. In fact, an exciting insight into the operation of networks is that it may be beneficial, in terms of an overall throughput, to actively create and manage interference. Thus, when handled properly, "mixing" of data in networks becomes a useful tool of operation rather than the nuisance as which it has been treated traditionally. With the development of mobile, robust, ubiquitous, reliable and instantaneous communication being a driving and enabling factor of an information centric economy, the understanding, mitigation and exploitation of interference in networks must be seen as a centrally important task.
Based on the author's real-world design experience in this key emerging area, this comprehensive guide examines and compares all major RF power amplifier linearization techniques in detail. Featuring practical tips, more than 250 illustrations, and over 600 verified equations, the book seeks to save the reader valuable design time whilst helping them avoid costly design errors. It covers the modelling and measurement of amplifier non-linearity, and describes the main methods for overcoming non-linearity in a wide range of applications, including: base stations using feedforward and predistortion; mobile communications systems and handsets using RF or digital predistortion, cartesian loop, LINC and envelope elimination and restoration (EECR); and satellite systems. |
You may like...
Cross-Layer Resource Allocation in…
Ana I. Perez-Neira, Marc Realp Campalans
Hardcover
R1,930
Discovery Miles 19 300
RF / Microwave Circuit Design for…
Ulrich L. Rohde, Matthias Rudolph
Hardcover
R4,952
Discovery Miles 49 520
Android Boot Camp for Developers Using…
Corinne Hoisington
Paperback
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright
Paperback
R1,491
Discovery Miles 14 910
Handbook of Research on Evolving Designs…
Kandarpa Kumar Sarma, Navajit Saikia, …
Hardcover
R9,271
Discovery Miles 92 710
Microwave Active Circuit Analysis and…
Clive Poole, Izzat Darwazeh
Hardcover
MIMO Wireless Networks - Channels…
Bruno Clerckx, Claude Oestges
Hardcover
R2,237
Discovery Miles 22 370
|