![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
Wireless communication has emerged as an independent discipline in the past decades. Everything from cellular voice telephony to wireless data transmission using wireless sensor networks has profoundly impacted the safety, production, and productivity of industries and our lifestyle as well. After a decade of exponential growth, the wireless industry is one of the largest industries in the world. Therefore, it would be an injustice if the wireless communication is not explored for mining industry. Underground mines, which are characterized by their tough working conditions and hazardous environments, require fool-proof mine-wide communication systems for smooth functioning of mine workings and ensuring better safety. Proper and re- able communication systems not only save the machine breakdown time but also help in immediate passing of messages from the vicinity of underground working area to the surface for day-to-day normal mining operations as well as for speedy rescue operations in case of disaster. Therefore, a reliable and effective commu- cation system is an essential requisite for safe working, and maintaining requisite production and productivity of underground mines. Most of the existing systems generally available in underground mines are based on line (wired) communication principle, hence these are unable to withstand in the disaster conditions and dif?cult to deploy in inaccessible places. Therefore, wireless communication is an indispe- able, reliable, and convenient system and essential in case of day-to-day normal duty or disaster situations.
It is certain that, over the next few years, data traffic will dwarf voice traffic on telecommunications networks. Growth in data-traffic volumes far exceeds that for voice, and is driven by increased use of applications such as e-mail attachments, remote printing and fileserver access, and the now omnipresent World Wide Web. The growth of data networking to connect computers with each other and with their peripheral devices began in earnest in the 1970s, took off in the 1980s and exploded in the 1990s. The early 21st century will see ever faster, more cost effective networks providing flexible data access into ever more businesses and homes. Since the 1970s there have been great advances in technology. For the past twenty years the processing power of computers has continued to grow with no hint of slowing - recall the oft-cited Moore's Law claiming that this power doubles every 18 months. Advances in the data networking equipment required to support the data traffic generated have been enormous. The pace of development from early X. 25 and modem technology through to some of the advanced equipment functionality now available is breathtaking - it is sometimes hard to believe that the practical router is barely ten years old This book provides an overview of the advanced data networking field by bringing together chapters on local area networks, wide area networks and their application."
This book provides an in-depth treatment of both linear fiber-optic systems and their key enabling devices. It presents a concise but rigorous treatment of the theory and practice of analog (linear) fiber-optics links and systems that constitute the foundation of Hybrid Fiber Coax infrastructure in present-day CATV distribution and cable modem Internet access. Emerging applications in remote fiber-optic feed for free-space millimeter wave enterprise campus networks are also described. Issues such as dispersion and interferometric noise are treated quantitatively, and means for mitigating them are explained. This broad but concise text will thus be invaluable not only to students of fiber-optics communication but also to practicing engineers. To the second edition of this book important new aspects of linear fiber-optic transmission technologies are added, such as high level system architectural issues, algorithms for deriving the optimal frequency assignment, directly modulated or externally modulated laser transmitters and the use of Erbium-doped fiber amplifier (EDFA) in linear fiber optic systems. Significant examples of field deployed military systems enabled by linear fiber optic links are described in an appendix.
This authoritative book focuses on the vital aspects of cellular radio system modeling and performance analysis.
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yesterday, today and tomorrow ) culled from Cryptologia (Rose-Hulman Institute of Technology, Terre Haute, IN). The articles are divided into five sectio
The authors combine relevant and cutting-edge information on existing and future use of videoconferencing technology in the field of education.
It is a complete training in digital communications in the same book with all the aspects involved in such training: courses, tutorials with many typical problems targeted with detailed solutions, practical work concretely illustrating various aspects of technical implementation implemented. It breaks down into three parts. The Theory of information itself, which concerns both the sources of information and the channels of its transmission, taking into account the errors they introduce in the transmission of information and the means of protect by the use of appropriate coding methods. Then for the technical aspects of transmission, first the baseband transmission is presented with the important concept and fundamental technique of equalization. The performance evaluation in terms of probability of errors is systematically developed and detailed as well as the online codes used. Finally, the third part presents the Transmissions with digital modulation of carriers used in radio transmissions but also on electric cables. A second important aspect in learning a learner's knowledge and skills is this book. It concerns the "Directed Work" aspect of a training. This is an ordered set of 33 typical problems with detailed solutions covering the different parts of the course with practical work. Finally, the last aspect concerns the practical aspects in the proper sense of the term, an essential complement to training going as far as know-how. We propose here a set of 5 practical works.
This book elaborates the science and engineering basis for energy-efficient driving in conventional and autonomous cars. After covering the physics of energy-efficient motion in conventional, hybrid, and electric powertrains, the book chiefly focuses on the energy-saving potential of connected and automated vehicles. It reveals how being connected to other vehicles and the infrastructure enables the anticipation of upcoming driving-relevant factors, e.g. hills, curves, slow traffic, state of traffic signals, and movements of nearby vehicles. In turn, automation allows vehicles to adjust their motion more precisely in anticipation of upcoming events, and to save energy. Lastly, the energy-efficient motion of connected and automated vehicles could have a harmonizing effect on mixed traffic, leading to additional energy savings for neighboring vehicles. Building on classical methods of powertrain modeling, optimization, and optimal control, the book further develops the theory of energy-efficient driving. In addition, it presents numerous theoretical and applied case studies that highlight the real-world implications of the theory developed. The book is chiefly intended for undergraduate and graduate engineering students and industry practitioners with a background in mechanical, electrical, or automotive engineering, computer science or robotics.
The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016. The areas covered in the book are sustainable computing and security, sustainable systems and technologies, sustainable methodologies and applications, sustainable networks applications and solutions, user-centered services and systems and mobile data management. The novel and recent technologies presented in the book are going to be helpful for researchers and industries in their advanced works.
What we profoundly witness these days is a growing number of human-centric systems and a genuine interest in a comprehensive understanding of their underlying paradigms and the development of solid and efficient design practices. We are indeed in the midst of the next information revolution, which very likely brings us into a completely new world of ubiquitous and invisible computing, Ambient Intelligent (AMI), and wearable hardware. This requires a totally new way of thinking in which cognitive aspects of design, cognitive system engineering and distributed approach play a pivotal role. This book fully addresses these timely needs by filling a gap between the two well-established disciplines of cognitive sciences and cognitive systems engineering. As we put succinctly in the preface, with the psychological perspective of human cognition in mind, the book explores the computational models of reasoning, learning, planning and multi-agent coordination and control of the human moods . This is an excellent, up to the point description of the book. The treatise is focused on the underlying fundamentals, spans across a vast territory embracing logic perspectives of human cognition, distributed models, parallel computing, expert systems, and intelligent robotics."
As the telecommunication industry introduces new sophisticated technologies, the nature of services and the volume of demands have changed. Indeed, a broad range of new services for users appear, combining voice, data, graphics, video, etc. This implies new planning issues. Fiber transmission systems that can carry large amounts of data on a few strands of wire were introduced. These systems have such a large bandwidth that the failure of even a single transmission link: in the network can create a severe service loss to customers. Therefore, a very high level of service reliability is becoming imperative for both system users and service providers. Since equipment failures and accidents cannot be avoided entirely, networks have to be designed so as to "survive" failures. This is done by judiciously installing spare capacity over the network so that all traffic interrupted by a failure may be diverted around that failure by way of this spare or reserve capacity. This of course translates into huge investments for network operators. Designing such survivable networks while minimizing spare capacity costs is, not surprisingly, a major concern of operating companies which gives rise to very difficult combinatorial problems. In order to make telecommunication networks survivable, one can essentially use two different strategies: protection or restoration. The protection approach preas signs spare capacity to protect each element of the network independently, while the restoration approach spreads the redundant capacity over the whole network and uses it as required in order to restore the disrupted traffic."
Granular Computing is concerned with constructing and processing carried out at the level of information granules. Using information granules, we comprehend the world and interact with it, no matter which intelligent endeavor this may involve. The landscape of granular computing is immensely rich and involves set theory (interval mathematics), fuzzy sets, rough sets, random sets linked together in a highly synergetic environment. This volume is a first comprehensive treatment of this emerging paradigm and embraces its fundamentals, underlying methodological framework, and a sound algorithmic environment. The panoply of applications covered includes system identification, telecommunications, linguistics and music processing. Written by experts in the field, this volume will appeal to all developing intelligent systems, either working at the methodological level or interested in detailed system realization.
Internet traffic is increasing at a rate of at least 200% per year. The worlda (TM)s largest Internet Service Provider has recently stated that it expects traffic capacity on its regional trunks to grow to a 1-10 petabit range over the next four to five years. Wavelength division multiplexing (WDM), long-haul fiber-optic links and high-capacity all-optical circuit switches are now being employed at the Internet core to process such massive traffic, consequently creating a demand for novel high-performance packet switching technologies (IP routers, ATM switches, and Ethernet Switches) which feed the optical core. Over the last ten years, tremendous technological advances have taken place in order to achieve these objectives. High-performance Packet Switching Architectures is the first book to cover these advances in a comprehensive one-volume survey. The booka (TM)s editors have brought together contributions from leading researchers in industry and universities, yielding an integrated coverage of the state-of-the-art in packet-switching technologies. A mix of theoretical and practical material allows the book to act an essential reference for researchers in academia as well as industrial engineers.
In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.
The first maritime surveillance radars in World War II quickly discovered that returns from the sea, soon to be known as sea clutter, were often the limiting factor when attempting to detect small targets while controlling false alarms. This remains true for modern radars, where the detection of small, slow moving targets on a rough sea surface remains one of the main drivers for maritime radar design, particularly in the development of detection processing. The design, development and testing of radar signal processing for maritime surveillance requires a very detailed understanding of the characteristics of radar sea clutter and of the combined target and clutter returns. This book provides an updated and comprehensive review of the latest research into radar sea clutter and detection methods for targets in sea clutter. The emphasis is on understanding the characteristics of radar sea clutter as observed with different radars, viewing geometries and environmental conditions. This understanding is assisted by the development of mathematical models that are used in the radar design process. In recent years there has been an increased interest in operating at higher altitudes, resulting in the sea surface being illuminated with larger grazing angles than used in traditional airborne surveillance platforms or ground-based systems. There has also been significant research into bistatic operation, including passive radars using illuminators of opportunity. The use of coherent and multi-aperture systems in maritime radar are also of increasing interest and these new application areas are also covered in this book.
This book highlights the rightful role of citizens as per the constitution of the country for participation in Governance of a smart city using electronic means such as high speed fiber optic networks, the internet, and mobile computing as well as Internet of Things that have the ability to transform the dominant role of citizens and technology in smart cities. These technologies can transform the way in which business is conducted, the interaction of interface with citizens and academic institutions, and improve interactions between business, industry, and city government.
A comprehensive reference book codifying the various standards releases for High Speed Packet Access (HSPA) wireless technology HSPA evolution has maintained its prominence through Releases 7-11 but the evolution is coming to an end with Release 12, with the focus moving to LTE. However, HSPA network and terminal sales will continue for many years: HSPA is expected to remain as the number one radio access technology from the sales point of view far beyond 2015. This timely book examines the complete HSPA evolution, and will be the ultimate long term reference for HSPA evolution. Headed by the successful editing team of Holma, Toskala and Tapia, industry experts look at HSPA evolution including complete Release 11 and the main additions in Release 12. They describe 3GPP definitions, field measurement, expected performance, practical optimization guidelines and the implications to the devices and to the networks. The book also covers MIMO antenna solutions and multicarrier evolution to provide higher data rates. Dedicated chapters include Continuous Packet Connectivity and High Speed Common Channels which provide major improvement to the smartphone capacity, end user performance and power consumption. The book assumes basic understanding of mobile communications yet the material is presented in an understandable way which can be enjoyed without any pre-information about MIMO or other technology solutions. * A comprehensive reference book codifying the various standards releases for High Speed Packet Access (HSPA) wireless technology * Leading editor and contributor team focusing their expertise on 3GPP features and performance, including Self Organizing Networks, LTE Interworking, Smartphone Optimization and Voice Evolution * Dedicated chapter covering VoIP over HSPA, recognizing that telephony will continue to bring most of the revenues to mobile operators in the near future * Includes tables, figures and plots illustrating the concepts or simulation results, to aid readers understanding of the topic An essential resource for R&D engineers by network, terminal and chip set vendors, network engineers with operators, application developers, regulators.
This book offers means to handle interference as a central problem of operating wireless networks. It investigates centralized and decentralized methods to avoid and handle interference as well as approaches that resolve interference constructively. The latter type of approach tries to solve the joint detection and estimation problem of several data streams that share a common medium. In fact, an exciting insight into the operation of networks is that it may be beneficial, in terms of an overall throughput, to actively create and manage interference. Thus, when handled properly, "mixing" of data in networks becomes a useful tool of operation rather than the nuisance as which it has been treated traditionally. With the development of mobile, robust, ubiquitous, reliable and instantaneous communication being a driving and enabling factor of an information centric economy, the understanding, mitigation and exploitation of interference in networks must be seen as a centrally important task.
Based on the author's real-world design experience in this key emerging area, this comprehensive guide examines and compares all major RF power amplifier linearization techniques in detail. Featuring practical tips, more than 250 illustrations, and over 600 verified equations, the book seeks to save the reader valuable design time whilst helping them avoid costly design errors. It covers the modelling and measurement of amplifier non-linearity, and describes the main methods for overcoming non-linearity in a wide range of applications, including: base stations using feedforward and predistortion; mobile communications systems and handsets using RF or digital predistortion, cartesian loop, LINC and envelope elimination and restoration (EECR); and satellite systems.
Multicarrier Modulation with Low PAR: Applications to DSL and Wireless provides the first comprehensive formulation of the PAR problem for multicarrier modulation and proposes three new methods for PAR reduction. The information in this book will be vital to practicing engineers, industrial researchers, scientists, graduate and postgraduate researchers, and others working in multicarrier transmission and communication theory. Multicarrier Modulation with Low PAR: Applications to DSL and Wireless serves as a valuable reference to both design engineers and communications theorists, and can also be used for advanced courses on the subject.
T. Ito, International Space University, Strasbourg Central Campus, 1 Rue Jean Dominique Cassini, Parc d'Innovation, 67400 lllkirch-Graffenstaden, France e-mail: ito@isu. isunet. edu M. J. Rycroft, CAESAR Consultancy, 35 Millington Road, Cambridge CB3 9HW, UK e-mail: Michael. J. Rycroft (R)ukgateway. net As Symposium Committee Chair for the 2003 International Space University (ISU) Symposium, and Editor of this Proceedings volume, respectively, we write this introduction. The success of previous ISU symposia suggests that the ISU has developed a unique and winning formula for a novel type of symposium. The characteristics of ISU symposia are that they: * Adopt a broad, and interdisciplinary, perspective * Address all aspects of the subject, ranging from policy, business, organisational, and legal issues to technical and scientific topics * Foster a constructive dialogue among very different sectors of the space community, and * Allow ample time for interactive discussions. The present Symposium is no exception. It considers the very timely topic of space-based systems for global positioning and navigation, ranging from the GPS system developed by the US military to the Russian GLONASS system, and on to the future European Galileo system. Other nations are planning regional augmentation systems.
Digital signal processing (DSP) covers a wide range of applications such as signal acquisition, analysis, transmission, storage, and synthesis. Special attention is needed for the VLSI (very large scale integration) implementation of high performance DSP systems with examples from video and radar applications. This book provides basic architectures for VLSI implementations of DSP tasks covering architectures for application specific circuits and programmable DSP circuits. It fills an important gap in the literature by focusing on the transition from algorithms specification to architectures for VLSI implementations. Areas covered include:
|
You may like...
Cross-Layer Resource Allocation in…
Ana I. Perez-Neira, Marc Realp Campalans
Hardcover
R1,930
Discovery Miles 19 300
RF / Microwave Circuit Design for…
Ulrich L. Rohde, Matthias Rudolph
Hardcover
R4,952
Discovery Miles 49 520
Android Boot Camp for Developers Using…
Corinne Hoisington
Paperback
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright
Paperback
R1,491
Discovery Miles 14 910
Microwave Active Circuit Analysis and…
Clive Poole, Izzat Darwazeh
Hardcover
MIMO Wireless Networks - Channels…
Bruno Clerckx, Claude Oestges
Hardcover
R2,237
Discovery Miles 22 370
|