|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
This expanded, revised and updated new edition of Introduction to
RF Stealth covers two major topics: Low Observables and Low
Probability of Intercept (LO and LPI) of radars and data links,
collectively sometimes called Stealth. Each chapter includes
examples, student exercises and references. Worked simulations are
available that illustrate the techniques described. Chapter 1
provides an introduction and history of RF/microwave LPI/LO
techniques and some basic LPI/LO equations, expanded from the first
edition with more information on new and current systems, including
more on infrared and hypersonic missile signatures. Chapter 2 is a
new chapter, covering radiation absorbing materials and shaping,
focused on materials, meta-materials and detailed platform shaping
and structures including ships. Chapter 3 covers interceptability
parameters and analysis with corrections, updates and simulations.
Chapter 4 covers current and future intercept receivers and some of
their limitations with more information and tracking techniques.
Chapter 5 surveys exploitation of both the natural and the threat
environment with extensive threat table updates including Russian
S300, S400, S500 and more information on cellular systems. Chapter
6 deals with LPIS waveforms and pulse compression with new material
and simulations of new codes. Chapter 7 introduces some hardware
techniques associated with LO/LPIS low sidelobe / cross section
antenna and radome design with emphasis on active electronic scan
arrays. Chapter 8 is a new chapter on RCS testing of subsystems and
platforms.
Mobile phones are revolutionised the communication process and
becoming all-in-one magical device for anytime and anywhere
communication. The last decade has seen a flourish in the number of
mobile based agro-advisory service initiatives in the developing
countries and more are added regularly in some part of the world.
Services that started with farmers help-lines accessed through
landlines and messages (SMS) have evolved slowly to multimodal and
multimedia based delivery of advisory and to m-agriculture
applications for smartphones. In this rapidly changing
m-Agriculture scenario, this book is an attempt to document the
evolution of mobile phone based agro-advisory services around the
world. The content of the book comprises of country s on mobile
phone applications for agricultural extension from Asia, Africa,
Latin America and Europe along with s on global review on
m-agriculture initiatives, content generation process and
socio-economic impact of mobile phone based agro-advisory services.
This book delves into the development of mobile phone based
agro-advisory and their content, delivery mode, business model and
utility and provides an insight into the evolution of mobile phones
as an extension tool in different countries across the globe. The
book will provide valuable insights on m-agriculture initiatives
for agricultural extension around the world to agricultural
students, extension professionals, researchers and policy makers
across the globe both for understanding them and working on them.
The lessons from the m-agriculture initiatives can guide the mode
of implementation and evolution of mobile based advisory services
in agriculture.
Wireless sensor networks have gained significant attention
industrially and academically due to their wide range of uses in
various fields. Because of their vast amount of applications,
wireless sensor networks are vulnerable to a variety of security
attacks. The protection of wireless sensor networks remains a
challenge due to their resource-constrained nature, which is why
researchers have begun applying several branches of artificial
intelligence to advance the security of these networks. Research is
needed on the development of security practices in wireless sensor
networks by using smart technologies. Deep Learning Strategies for
Security Enhancement in Wireless Sensor Networks provides emerging
research exploring the theoretical and practical advancements of
security protocols in wireless sensor networks using artificial
intelligence-based techniques. Featuring coverage on a broad range
of topics such as clustering protocols, intrusion detection, and
energy harvesting, this book is ideally designed for researchers,
developers, IT professionals, educators, policymakers,
practitioners, scientists, theorists, engineers, academicians, and
students seeking current research on integrating intelligent
techniques into sensor networks for more reliable security
practices.
Location-aware computing is a technology that uses the location
(provides granular geographical information) of people and objects
to derive contextual information. Today, one can obtain this
location information free of cost through smartphones. Smartphones
with location enabled applications have revolutionized the ways in
which people perform their activities and get benefits from the
automated services. It especially helps to get details of services
in less time; wherever the user may be and whenever they want. The
need for smartphones and location enabled applications has been
growing year after year. Nowadays no one can leave without their
phone; the phone seemingly becomes one of the parts of the human
body. The individual can now be predicted by their phone and the
identity of the phone becomes the person's identity. Though there
is a tremendous need for location-enabled applications with
smartphones, the debate on privacy and security related to location
data has also been growing. Privacy and Security Challenges in
Location Aware Computing provides the latest research on privacy
enhanced location-based applications development and exposes the
necessity of location privacy preservation, as well as issues and
challenges related to protecting the location data. It also
suggests solutions for enhancing the protection of location privacy
and therefore users' privacy as well. The chapters highlight
important topic areas such as video surveillance in human
tracking/detection, geographical information system design,
cyberspace attacks and warfare, and location aware security
systems. The culmination of these topics creates a book that is
ideal for security analysts, mobile application developers,
practitioners, academicians, students, and researchers.
In recent years, modern society has experienced an increased use of
online discourse. Due to continuous advances in technology, the
ongoing transition away from face-to-face communications has
steadily caused the communication gap to widen. Solutions for
High-Touch Communications in a High-Tech World is a pivotal source
of research for identifying new approaches for face-to-face
communication, opportunities to create social bonding and social
capital, and taking advantage of the full communication cycle.
Featuring extensive coverage across a range of relevant
perspectives and topics, such as social networking theory, conflict
resolution, and interpersonal communications, this book is ideally
designed for professionals, managers, researchers, students and
academicians interested in perspectives on communication in the
digital age.
Knowledge Management is the process by which an organization
identifies, creates, manages and delivers information to enhance
workforce performance.KM is a discipline that promotes an
integrated approach to identifying, capturing, evaluating,
retrieving, and sharing all of an enterprise's information assets.
These assets may include databases, documents, policies,
procedures, and previously un-captured expertise and experience in
individual workers. All these issues are covered in thirty three s
in the book broadly divided into the following five sections.
Fundamentals of Knowledge Management, Latest Tools and Techniques
for Knowledge Management, Databases, Data mining, Knowledge
Discovery in Biotechnology and Bioinformatics, Data mining and
Knowledge Discovery in Agriculture and Allied Fields, Indigenous
Knowledge Protection and IPR Issues The book contains original
research and case studies by academic and research contributors on
strategies, tools, techniques and technologies for Knowledge
Management. The focus of this book is on the identification of
innovative KM strategies and the application of theoretical
concepts to real-world situations. This first serves as a complete
introduction to the concepts and principles of KM, starting with
basics of data, information, knowledge and wisdom. Clarified
differences among Explicit, Implicit and Tacit Knowledge. The book
also covers traditional KM approaches as well as emerging topics
such as cloud computing, Semantic Web, Rough Computing, Fuzzy
logic, Artificial intelligence, Machine learning, social networks,
Tools and Techniques for Geo Spatial Data Knowledge Discovery. The
focus of the book is on how KM impacts organizations and
individuals and steps that should be taken to maximize benefits,
including directions for how to select, develop, and evaluate KM
systems.
The integration of sliding mode in engineering systems has been a
focus of research for many years. However, the use of this method
in non-engineering systems still requires a better understanding.
Sliding Mode in Intellectual Control and Communication: Emerging
Research and Opportunities is a pivotal reference source that
intends to fill the gap of available knowledge on characteristics
of sliding mode in non-engineering contexts. Highlighting a range
of pertinent topics such as information processing, intelligent
agents, and virtual communications, this book is ideally designed
for researchers, academics, students, and professionals interested
in the latest developments in sliding mode techniques and
applications.
Primary and secondary school students, college students, and
corporate employees are all engaging more and more in some form of
online or blended online/face-to-face education. Given the large
number of pedagogical and design choices that we must make,
however, where do we begin when designing new environments? This
book argues that it is important for us to consider how
technological design choices interact with pedagogical choices and
cognitive states to affect learning behaviors. Specifically, this
book focuses on synchronous, text-based chat and asks two
questions: first, since research has often reported that chat
environments promote conversational equity, which features of this
technology seem to help create conversational equity; and second,
how this change impacts the content of small group discussions.
Using ethnographic-style observations and quasi-experimental
studies, this book shows how changing conversational media
influences (or does not) the resulting discussion among students.
Based on these findings, Chatting to Learn examines the broader
implications for the design of conversational environments, whether
for educational or business use.
This comprehensive compendium describes the basic modeling
techniques for silicon-based semiconductor devices, introduces the
basic concepts of silicon-based passive and active devices, and
provides its state-of-the-art modeling and equivalent circuit
parameter extraction methods.The unique reference text benefits
practicing engineers, technicians, senior undergraduate and
first-year graduate students working in the areas of RF, microwave
and solid-state device, and integrated circuit design.
Intelligent agent and distributed AI (DAI) approaches attach
specific conditions to cooperative exchanges between intelligent
systems, that go far beyond simple functional interoperability.
Ideally, systems that pursue local or global goals, coordinate
their actions, share knowledge, and resolve conflicts during their
interactions within groups of similar or dissimilar agents can be
viewed as cooperative coarse-grained systems. The infrastructure of
telecommunications is a world in transition. There are a number of
trends that contribute to this: convergence of traditional
telephony and data network worlds, blurring of boundaries between
public and private networks, complementary evolution of wireline,
wireless, and cable network infrastructures, the emergence of
integrated broadband multimedia networks and, of course, the
information superhighway. Up to now, despite the effort that has
gone into this area, the field of intelligent agents research has
not yet led to many fielded systems. Telecommunications
applications pose strong requirements to agents such as:
reliability, real-time performance, openness, security management
and other integrated management, and mobility. In order to fulfil
their promise, intelligent agents need to be fully dependable and
typically require an integrated set of capabilities. This is the
challenge that exists for intelligent agents technology in this
application domain.
The second in the Women Securing the Future with TIPPSS series,
this book provides insight and expert advice from seventeen women
leaders in technology, healthcare and policy to address the
challenges of Trust, Identity, Privacy, Protection, Safety and
Security (TIPPSS) for connected healthcare, and the growing
Internet of Medical Things (IoMT) ecosystem. The ten chapters in
this book delve into trust, security and privacy risks in connected
healthcare for patients, medical devices, personal and clinical
data, healthcare providers and institutions, and provide practical
approaches to manage and protect the data, devices, and humans.
Cybersecurity, technology and legal experts discuss risks, from
data and device hacks to ransomware, and propose approaches to
address the challenges including new frameworks for architecting
and evaluating medical device and connected hospital cybersecurity.
We all need to be aware of the TIPPSS challenges in connected
healthcare, and we call upon engineers, device manufacturers,
system developers and healthcare providers to ensure trust and
manage the risk. Featuring contributions from prominent female
experts and role models in technology, cybersecurity, engineering,
computer science, data science, business, healthcare,
accessibility, research, law, privacy and policy, this book sets
the stage to improve security and safety in our increasingly
connected world.
This book gives a review of the principles, methods and techniques
of important and emerging research topics and technologies in
Channel Coding, including theory, algorithms, and applications.
Edited by leading people in the field who, through their
reputation, have been able to commission experts to write on a
particular topic. With this reference source you will: Quickly
grasp a new area of research Understand the underlying principles
of a topic and its applications Ascertain how a topic relates to
other areas and learn of the research issues yet to be resolved
The first book to combine satellite and terrestrial positioning
techniques - vital for the understanding and development of new
technologies Written and edited by leading experts in the field,
with contributors belonging to the European Commission's FP7
Network of Excellence NEWCOM++ Applications to a wide range of
fields, including sensor networks, emergency services, military
use, location-based billing, location-based advertising,
intelligent transportation, and leisure Location-aware personal
devices and location-based services have become ever more prominent
in the past few years, thanks to the significant advances in
position location technology. Sensor networks, geographic
information, emergency services, location management,
location-based billing, location-based advertising, intelligent
transportation, and leisure applications are just some of the
potential applications that can be enabled by these techniques.
Increasingly, satellite and terrestrial positioning techniques are
being combined for maximum performance; to produce the next wave of
location-based devices and services, engineers need to combine both
components. This book is the first to present a holistic view,
covering all aspects of positioning: both terrestrial and
satellite, both theory and practice, both performance bounds and
signal processing techniques. It will provide a valuable resource
for product developers and R&D engineers, allowing them to
improve existing location techniques and develop future approaches
for new systems.
Presenting the new IEEE 802.16m standard, this is the first book to
take a systematic, top-down approach to describing Mobile WiMAX and
its next generation, giving detailed algorithmic descriptions
together with explanations of the principles behind the operation
of individual air-interface protocols and network components.
Features: A systematic and detailed, top-down approach to the
design of 4G cellular systems based on IEEE 802.16m and 3GPP
LTE/LTE-Advanced technologies A systematic approach to
understanding IEEE 802.16m radio access network and mobile WiMAX
network architecture and protocols The first comprehensive
technical reference on the design, development and performance
evaluation of IMT-Advanced systems, including the theoretical
background and design principles as well as implementation
considerations About the author: The author, chief architect and
technical lead of the IEEE 802.16m project at Intel Corporation,
initiated and masterminded the development of the IEEE 802.16m
standard and has been one of the leading technical drivers in its
standardization process in IEEE. The author was also a leading
technical contributor to the definition and development of
requirements and evaluation methodology for the IMT-Advanced
systems in ITU-R. Reflecting the author's 20+ years expertise and
experience, the book provides an in-depth, systematic and
structured technical reference for professional engineers,
researchers, and graduate students working in cellular
communication systems, radio air-interface technologies, cellular
communications protocols, advanced radio access technologies for 4G
systems, and broadband cellular standards.
|
|