0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (129)
  • R250 - R500 (978)
  • R500+ (10,262)
  • -
Status
Format
Author / Contributor
Publisher

Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications

Fog/Edge Computing For Security, Privacy, and Applications (Hardcover, 1st ed. 2021): Wei Chang, Jie Wu Fog/Edge Computing For Security, Privacy, and Applications (Hardcover, 1st ed. 2021)
Wei Chang, Jie Wu
R4,260 Discovery Miles 42 600 Ships in 10 - 15 working days

This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

Flexible Adaptation in Cognitive Radios (Hardcover, 2012): Shujun Li, Miecyslaw Kokar Flexible Adaptation in Cognitive Radios (Hardcover, 2012)
Shujun Li, Miecyslaw Kokar
R3,471 Discovery Miles 34 710 Ships in 10 - 15 working days

This book provides an introduction to software-defined radio and cognitive radio, along with methodologies for applying knowledge representation, semantic web, logic reasoning and artificial intelligence to cognitive radio, enabling autonomous adaptation and flexible signaling. Readers from the wireless communications and software-defined radio communities will use this book as a reference to extend software-defined radio to cognitive radio, using the semantic technology described.

Bispectral Methods of Signal Processing - Applications in Radar, Telecommunications and Digital Image Restoration (Hardcover,... Bispectral Methods of Signal Processing - Applications in Radar, Telecommunications and Digital Image Restoration (Hardcover, Digital original)
Alexander V Totsky, Alexander A Zelensky, Victor F Kravchenko
R5,333 Discovery Miles 53 330 Ships in 10 - 15 working days

By studying applications in radar, telecommunications and digital image restoration, this monograph discusses signal processing techniques based on bispectral methods. Improved robustness against different forms of noise as well as preservation of phase information render this method a valuable alternative to common power-spectrum analysis used in radar object recognition, digital wireless communications, and jitter removal in images.

Spectrum Sharing in Cognitive Radio Networks - Medium Access Control Protocol Based Approach (Hardcover, 1st ed. 2017): Shweta... Spectrum Sharing in Cognitive Radio Networks - Medium Access Control Protocol Based Approach (Hardcover, 1st ed. 2017)
Shweta Pandit, Ghanshyam Singh
R3,873 R3,591 Discovery Miles 35 910 Save R282 (7%) Ships in 10 - 15 working days

This book discusses the use of the spectrum sharing techniques in cognitive radio technology, in order to address the problem of spectrum scarcity for future wireless communications. The authors describe a cognitive radio medium access control (MAC) protocol, with which throughput maximization has been achieved. The discussion also includes use of this MAC protocol for imperfect sensing scenarios and its effect on the performance of cognitive radio systems. The authors also discuss how energy efficiency has been maximized in this system, by applying a simple algorithm for optimizing the transmit power of the cognitive user. The study about the channel fading in the cognitive user and licensed user and power adaption policy in this scenario under peak transmit power and interference power constraint is also present in this book.

Modeling, Simulation, and Optimization (Hardcover, 1st ed. 2018): Pandian Vasant, Igor Litvinchev, Jose Antonio... Modeling, Simulation, and Optimization (Hardcover, 1st ed. 2018)
Pandian Vasant, Igor Litvinchev, Jose Antonio Marmolejo-Saucedo
R3,430 Discovery Miles 34 300 Ships in 10 - 15 working days

This book features selected contributions in the areas of modeling, simulation, and optimization. The contributors discusses requirements in problem solving for modeling, simulation, and optimization. Modeling, simulation, and optimization have increased in demand in exponential ways and how potential solutions might be reached. They describe how new technologies in computing and engineering have reduced the dimension of data coverage worldwide, and how recent inventions in information and communication technology (ICT) have inched towards reducing the gaps and coverage of domains globally. The chapters cover how the digging of information in a large data and soft-computing techniques have contributed to a strength in prediction and analysis, for decision making in computer science, technology, management, social computing, green computing, and telecom. The book provides an insightful reference to the researchers in the fields of engineering and computer science. Researchers, academics, and professionals will benefit from this volume. Features selected expanded papers in modeling, simulation, and optimization from COMPSE 2016; Includes research into soft computing and its application in engineering and technology; Presents contributions from global experts in academia and industry in modeling, simulation, and optimization.

Wireless Sensor Networks and Ecological Monitoring (Hardcover, 2013 ed.): Subhas C Mukhopadhyay, Joe-Air Jiang Wireless Sensor Networks and Ecological Monitoring (Hardcover, 2013 ed.)
Subhas C Mukhopadhyay, Joe-Air Jiang
R5,686 Discovery Miles 56 860 Ships in 10 - 15 working days

This book presents the state of the art technologies and solutions to tackle the critical challenges faced by the building and development of the WSN and ecological monitoring system but also potential impact on society at social, medical and technological level. This book is dedicated to Sensing systems for Sensors, Wireless Sensor Networks and Ecological Monitoring. The book aims at Master and PhD degree students, researchers, practitioners, especially WSN engineers involved with ecological monitoring. The book will provide an opportunity of a dedicated and a deep approach in order to improve their knowledge in this specific field.

Information Security Practices - Emerging Threats and Perspectives (Hardcover, 1st ed. 2017): Issa Traore, Ahmed Awad, Isaac... Information Security Practices - Emerging Threats and Perspectives (Hardcover, 1st ed. 2017)
Issa Traore, Ahmed Awad, Isaac Woungang
R3,365 Discovery Miles 33 650 Ships in 10 - 15 working days

This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners.

Next Generation Intelligent Environments - Ambient Adaptive Systems (Hardcover, 2nd ed. 2016): Stefan Ultes, Florian Nothdurft,... Next Generation Intelligent Environments - Ambient Adaptive Systems (Hardcover, 2nd ed. 2016)
Stefan Ultes, Florian Nothdurft, Tobias Heinroth, Wolfgang Minker
R4,554 R3,691 Discovery Miles 36 910 Save R863 (19%) Ships in 10 - 15 working days

This book covers key topics in the field of intelligent ambient adaptive systems. It focuses on the results worked out within the framework of the ATRACO (Adaptive and TRusted Ambient eCOlogies) project. The theoretical background, the developed prototypes, and the evaluated results form a fertile ground useful for the broad intelligent environments scientific community as well as for industrial interest groups. The new edition provides: Chapter authors comment on their work on ATRACO with final remarks as viewed in retrospective Each chapter has been updated with follow-up work emerging from ATRACO An extensive introduction to state-of-the-art statistical dialog management for intelligent environments Approaches are introduced on how Trust is reflected during the dialog with the system

In-Vehicle Corpus and Signal Processing for Driver Behavior (Hardcover, 2009 ed.): Kazuya Takeda, Hakan Erdogan, John Hansen, H... In-Vehicle Corpus and Signal Processing for Driver Behavior (Hardcover, 2009 ed.)
Kazuya Takeda, Hakan Erdogan, John Hansen, H useyin Abut
R4,370 Discovery Miles 43 700 Ships in 10 - 15 working days

In-Vehicle Corpus and Signal Processing for Driver Behavior is comprised of expanded papers from the third biennial DSPinCARS held in Istanbul in June 2007. The goal is to bring together scholars working on the latest techniques, standards, and emerging deployment on this central field of living at the age of wireless communications, smart vehicles, and human-machine-assisted safer and comfortable driving. Topics covered in this book include: improved vehicle safety; safe driver assistance systems; smart vehicles; wireless LAN-based vehicular location information processing; EEG emotion recognition systems; and new methods for predicting driving actions using driving signals.

In-Vehicle Corpus and Signal Processing for Driver Behavior is appropriate for researchers, engineers, and professionals working in signal processing technologies, next generation vehicle design, and networks for mobile platforms.

Wireless Vehicular Networks for Car Collision Avoidance (Hardcover, 2013): Rola Naja Wireless Vehicular Networks for Car Collision Avoidance (Hardcover, 2013)
Rola Naja
R4,378 Discovery Miles 43 780 Ships in 10 - 15 working days

Wireless Vehicular Networks for Car Collision Avoidance focuses on the development of the ITS (Intelligent Transportation Systems) in order to minimize vehicular accidents. The book presents and analyses a range of concrete accident scenarios while examining the causes of vehicular collision and proposing countermeasures based on wireless vehicular networks.The book also describes the vehicular network standards and quality of service mechanisms focusing on improving critical dissemination of safety information. With recommendations on techniques and protocols to consider when improving road safety policies in order to minimize crashes and collision risks.

Cognitive Radio Mobile Ad Hoc Networks (Hardcover, 2011): F. Richard Yu Cognitive Radio Mobile Ad Hoc Networks (Hardcover, 2011)
F. Richard Yu
R4,440 Discovery Miles 44 400 Ships in 10 - 15 working days

Cognitive radios (CR) technology is capable of sensing its surrounding environment and adapting its internal states by making corresponding changes in certain operating parameters. CR is envisaged to solve the problems of the limited available spectrum and the inefficiency in the spectrum usage. CR has been considered in mobile ad hoc networks (MANETs), which enable wireless devices to dynamically establish networks without necessarily using a fixed infrastructure. The changing spectrum environment and the importance of protecting the transmission of the licensed users of the spectrum mainly differentiate classical MANETs from CR-MANETs. The cognitive capability and re-configurability of CR-MANETs have opened up several areas of research which have been explored extensively and continue to attract research and development. The book will describe CR-MANETs concepts, intrinsic properties and research challenges of CR-MANETs. Distributed spectrum management functionalities, such as spectrum sensing and sharing, will be presented. The design, optimization and performance evaluation of security issues and upper layers in CR-MANETs, such as transport and application layers, will be investigated.

Practical Antenna Design - 2nd Edition (Hardcover): Kevin Owen Shoemaker Practical Antenna Design - 2nd Edition (Hardcover)
Kevin Owen Shoemaker
R2,661 Discovery Miles 26 610 Ships in 10 - 15 working days
Acoustic Echo and Noise Control - A Practical Approach (Hardcover): E. Hansler Acoustic Echo and Noise Control - A Practical Approach (Hardcover)
E. Hansler
R4,164 Discovery Miles 41 640 Ships in 10 - 15 working days

Authors are well known and highly recognized by the "acoustic echo and noise community."
Presents a detailed description of practical methods to control echo and noise
Develops a statistical theory for optimal control parameters and presents practical estimation and approximation methods

Noise Tolerant Data Authentication for Wireless Communication (Hardcover, 1st ed. 2018): Obaid Ur-Rehman, Natasa Zivic Noise Tolerant Data Authentication for Wireless Communication (Hardcover, 1st ed. 2018)
Obaid Ur-Rehman, Natasa Zivic
R1,615 Discovery Miles 16 150 Ships in 10 - 15 working days

This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms - for wired devices - are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book. Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication; Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data; Features authentication methods based on the usage of authentication tags as well as digital watermarks.

Networks for Pervasive Services - Six Ways to Upgrade the Internet (Hardcover, 2011 ed.): Antonio Liotta, George Exarchakos Networks for Pervasive Services - Six Ways to Upgrade the Internet (Hardcover, 2011 ed.)
Antonio Liotta, George Exarchakos
R2,871 Discovery Miles 28 710 Ships in 10 - 15 working days

Readers will progress from an understanding of what the Internet is now towards an understanding of the motivations and techniques that will drive its future.

Fundamentals of Brooks-Iyengar Distributed Sensing Algorithm - Trends, Advances, and Future Prospects (Hardcover, 1st ed.... Fundamentals of Brooks-Iyengar Distributed Sensing Algorithm - Trends, Advances, and Future Prospects (Hardcover, 1st ed. 2020)
Pawel Sniatala, M. Hadi Amini, Kianoosh G. Boroojeni
R3,376 Discovery Miles 33 760 Ships in 10 - 15 working days

This book provides a comprehensive analysis of Brooks-Iyengar Distributed Sensing Algorithm, which brings together the power of Byzantine Agreement and sensor fusion in building a fault-tolerant distributed sensor network. The authors analyze its long-term impacts, advances, and future prospects. The book starts by discussing the Brooks-Iyengar algorithm, which has made significant impact since its initial publication in 1996. The authors show how the technique has been applied in many domains such as software reliability, distributed systems and OS development, etc. The book exemplifies how the algorithm has enhanced new real-time features by adding fault-tolerant capabilities for many applications. The authors posit that the Brooks-Iyengar Algorithm will to continue to be used where fault-tolerant solutions are needed in redundancy system scenarios. This book celebrates S.S. Iyengar's accomplishments that led to his 2019 Institute of Electrical and Electronics Engineers' (IEEE) Cybermatics Congress "Test of Time Award" for his work on creating Brooks-Iyengar Algorithm and its impact in advancing modern computing.

Complex Orthogonal Space-Time Processing in Wireless Communications (Hardcover, 2006 ed.): Le Chung Tran, Tadeusz A. Wysocki,... Complex Orthogonal Space-Time Processing in Wireless Communications (Hardcover, 2006 ed.)
Le Chung Tran, Tadeusz A. Wysocki, Alfred Mertins, Jennifer Seberry
R4,499 Discovery Miles 44 990 Ships in 10 - 15 working days

Complex Orthogonal Space-Time Processing in Wireless Communications incorporates orthogonal space-time processing using STBCs in MIMO wireless communication systems. Complex Orthogonal STBCs (CO STBCs) are given emphasis because they can be used for PSK/QAM modulation schemes and are more practical than real STBCs.

The overall coverage provides general knowledge about space-time processing and its applications for broad audiences. It also includes the most up-to-date review of the literature on space-time processing in general, and space-time block processing in particular. The authors also examine open issues and problems for future research in this area.

Software Defined Radio for 3G (Hardcover): Paul Burns Software Defined Radio for 3G (Hardcover)
Paul Burns
R2,729 Discovery Miles 27 290 Ships in 10 - 15 working days

This practical resource is essential reading for wireless communications engineers whose projects involve the use of cutting-edge software radio technology. It covers all aspects of systems design and explains various options for hardware, including a look at current and state of the art silicon technologies. The book places special emphasis on how software radio technology can solve many of the problems faced by professionals designing third-generation cellular mobile systems. The book concludes with an overview of engineering design assistance software tools that are becoming so important for the successful development of embedded radio products.

System-Level Design Methodologies for Telecommunication (Hardcover, 2014 ed.): Nicolas Sklavos, Michael Hubner, Diana... System-Level Design Methodologies for Telecommunication (Hardcover, 2014 ed.)
Nicolas Sklavos, Michael Hubner, Diana Goehringer, Paris Kitsos
R4,050 R3,481 Discovery Miles 34 810 Save R569 (14%) Ships in 10 - 15 working days

This book provides a comprehensive overview of modern networks design, from specifications and modeling to implementations and test procedures, including the design and implementation of modern networks on chip, in both wireless and mobile applications. Topical coverage includes algorithms and methodologies, telecommunications, hardware (including networks on chip), security and privacy, wireless and mobile networks and a variety of modern applications, such as VoLTE and the internet of things.

Digital Synthesizers and Transmitters for Software Radio (Hardcover, 2005 ed.): Jouko Vankka Digital Synthesizers and Transmitters for Software Radio (Hardcover, 2005 ed.)
Jouko Vankka
R4,572 Discovery Miles 45 720 Ships in 10 - 15 working days

The approach adopted in Digital Synthesizers and Transmitters for Software Radio will provide an understanding of key areas in the field of digital synthesizers and transmitters. It is easy to include different digital techniques in the digital synthesizers and transmitters by using digital signal processing methods, because the signal is in digital form. By programming the digital synthesizers and transmitters, adaptive channel bandwidths, modulation formats, frequency hopping and data rates are easily achieved. Techniques such as digital predistortion for power amplifier linearization, digital compensation methods for analog I/Q modulator nonlinearities and digital power control and ramping are presented in this book. The flexibility of the digital synthesizers and transmitters makes them ideal as signal generators for software radio. Software radios represent a major change in the design paradigm for radios in which a large portion of the functionality is implemented through programmable signal processing devices, giving the radio the ability to change its operating parameters to accommodate new features and capabilities. A software radio approach reduces the content of radio frequency (RF) and other analog components of traditional radios and emphasizes digital signal processing to enhance overall transmitter flexibility. Software radios are emerging in commercial and military infrastructure.

Disaster Recovery Planning for Telecommunications (Hardcover): Leo A. Wrobel Disaster Recovery Planning for Telecommunications (Hardcover)
Leo A. Wrobel
R2,311 Discovery Miles 23 110 Ships in 10 - 15 working days

A book offering advice on how to safeguard a company's telecommunication and computer networks against natural disaster, sabotage and human error. It aims to help identify the vulnerabilities of a system and describes specific risk avoidance measures.

The Digital Dividend of Terrestrial Broadcasting (Hardcover, 2012): Roland Beutler The Digital Dividend of Terrestrial Broadcasting (Hardcover, 2012)
Roland Beutler
R2,865 Discovery Miles 28 650 Ships in 10 - 15 working days

The "digital revolution" of the last two decades has pervaded innumerable aspects of our daily lives and changed our planet irreversibly. The shift from analog to digital broadcasting has facilitated a seemingly infinite variety of new applications-audience interactivity being but one example. The greater efficiency and compression of digital media have endowed broadcasters with a "digital dividend" of spare transmission capacity over and above the requirements of terrestrial broadcasting. The question is, who will use it, and how? Comparing the European experience with that of broadcasters elsewhere in the world, the author sketches the current status of international frequency management, quantifies the value of the "dividend" itself, analyzes the details of the analog-to-digital switchovers already completed, and posits what the future holds for the sector. As we grapple with new devices, inconceivable a mere generation ago, that allow us to access digital media instantly, anywhere and at any time of day, this book is a potent reminder that what we have witnessed so far may be just the first wavering steps along a road whose destination we can only guess at.

Analysis and Design for Networked Teleoperation System (Hardcover, 1st ed. 2019): Changchun Hua, Yana Yang, Xian Yang, Xinping... Analysis and Design for Networked Teleoperation System (Hardcover, 1st ed. 2019)
Changchun Hua, Yana Yang, Xian Yang, Xinping Guan
R2,895 Discovery Miles 28 950 Ships in 10 - 15 working days

This book presents cutting-edge results on stability analysis and control scheme designs for networked teleoperation systems. It highlights new research on commonly encountered nonlinear teleoperation systems, including the stability analysis of teleoperation systems with asymmetric time-varying delays, stability analysis of teleoperation systems with interval time delays, and so on. Moreover, the book presents several high-performance control scheme designs for teleoperation systems when the velocity is available and unavailable, and for systems with nonlinear input. The results presented here mark a substantial contribution to nonlinear teleoperation system theory, robotic control theory and networked control system theory. As such, the book will be of interest to university researchers, R&D engineers and graduate students in control theory and control engineering who wish to learn about the core principles, methods, algorithms, and applications of networked teleoperation systems, robotic systems and nonlinear control systems.

Smart Card Security and Applications (Hardcover): Mike Hendry Smart Card Security and Applications (Hardcover)
Mike Hendry
R3,082 Discovery Miles 30 820 Ships in 10 - 15 working days

Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, allowing them to be programmed to perform specific duties. This extensively updated, second edition of the popular Artech House book, Smart Card Security and Applications, offers a current overview of the ways smart cards address the computer security issues of today's varied applications. Brand new discussions on multi-application operating systems, computer networks, and the Internet are included to keep technical and business professionals abreast of the very latest developments in this field. The book provides technical details on the newest protection mechanisms, features a discussion on the effects of recent attacks, and presents a clear methodology for solving unique security problems.

Regularized Radial Basis Function Networks - Theory & Applications (Hardcover): PV Yee Regularized Radial Basis Function Networks - Theory & Applications (Hardcover)
PV Yee
R4,209 Discovery Miles 42 090 Ships in 10 - 15 working days

Simon Haykin is a well-known author of books on neural networks.
* An authoritative book dealing with cutting edge technology.
* This book has no competition.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Battles and Leaders of the Civil War…
Robert Underwood Johnson Paperback R556 Discovery Miles 5 560
Protein Structural Biology in Biomedical…
C Woodward Hardcover R3,142 Discovery Miles 31 420
The Amazing Spider-Man
Stan Lee, Steve Ditko Paperback R788 R682 Discovery Miles 6 820
The Bloody Chamber
Angela Carter Paperback  (2)
R246 R226 Discovery Miles 2 260
Fluid Dynamics - Part 2: Asymptotic…
Anatoly I. Ruban Hardcover R2,496 Discovery Miles 24 960
The Passion of the Immortals
C V Nor Hardcover R477 Discovery Miles 4 770
Integral Methods in Science and…
Christian Constanda, Matteo Dalla Riva, … Hardcover R3,687 Discovery Miles 36 870
Swing Trading - Simplified - The…
Mark Lowe Hardcover R620 R564 Discovery Miles 5 640
Muhammad - The slave, the messenger, the…
Prof Mamdouh Mohamed Hardcover R757 R702 Discovery Miles 7 020
Kinders se Spinnekoppe van Suider-Afrika
Rudi Steenkamp Paperback R190 R165 Discovery Miles 1 650

 

Partners