![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
Neurofuzzy and fuzzyneural techniques as tools of studying and analyzing complex problems are relatively new even though neural networks and fuzzy logic systems have been applied as computational intelligence structural e- ments for the last 40 years. Computational intelligence as an independent sci- tific field has grown over the years because of the development of these str- tural elements. Neural networks have been revived since 1982 after the seminal work of J. J. Hopfield and fuzzy sets have found a variety of applications since the pub- cation of the work of Lotfi Zadeh back in 1965. Artificial neural networks (ANN) have a large number of highly interconnected processing elements that usually operate in parallel and are configured in regular architectures. The c- lective behavior of an ANN, like a human brain, demonstrates the ability to learn, recall, and generalize from training patterns or data. The performance of neural networks depends on the computational function of the neurons in the network, the structure and topology of the network, and the learning rule or the update rule of the connecting weights. This concept of trainable neural n- works further strengthens the idea of utilizing the learning ability of neural networks to learn the fuzzy control rules, the membership functions and other parameters of a fuzzy logic control or decision systems, as we will explain later on, and this becomes the advantage of using a neural based fuzzy logic system in our analysis. On the other hand, fuzzy systems are structured numerical est
Following an exchange of correspondence, I met Ross in Adelaide in June 1988. I was approached by the University of Adelaide about being an external examiner for this dissertation and willingly agreed. Upon receiving a copy of this work, what struck me most was the scholarship with which Ross approaches and advances this relatively new field of adaptive data compression. This scholarship, coupled with the ability to express himself clearly using figures, tables, and incisive prose, demanded that Ross's dissertation be given a wider audience. And so this thesis was brought to the attention of Kluwer. The modern data compression paradigm furthered by this work is based upon the separation of adaptive context modelling, adaptive statistics, and arithmetic coding. This work offers the most complete bibliography on this subject I am aware of. It provides an excellent and lucid review of the field, and should be equally as beneficial to newcomers as to those of us already in the field.
The process control industry has seen generations of technology advancement, from pneumatic communication to electrical communication to electronic c- munication, from centralized control to distributed control. At the center of today's distributed control systems are operator workstations. These operator wo- stations provide the connection between those overseeing and running plant operations to the process itself. With each new generation of products the operator workstation has become increasingly more intelligent. Newer applications provide advanced alarming, control, and diagnostics. Behind all of these applications are smarter devices. These smart devices provide greater process insight, reduce en- neering costs, and contribute to improving the overall operational performance of the plant. Smart devices include advanced diagnostics that can report the health of the device and in many cases, the health of the process that the device is connected to. It is not uncommon for smart devices to include diagnostics that can detect plugged lines, burner flame instability, agitator loss, wet gas, orifice wear, leaks, and cavitations. These devices tell the user how well they are operating and when they need maintenance. Improvements in sensor technology and diagnostics have lead to a large variety of smart devices. So how do users connect the capabilities of these smart devices to their existing control system infrastructures? The answer is wireless. Wireless technology has matured to the point that it now can be safely applied in industrial control, monitor, and asset management applications.
Digital Baseband Transmission and Recording provides an integral, in-depth and up-to-date overview of the signal processing techniques that are at the heart of digital baseband transmission and recording systems. The coverage ranges from fundamentals to applications in such areas as digital subscriber loops and magnetic and optical storage. Much of the material presented here has never before appeared in book form. The main features of Digital Baseband Transmission and Recording include: a survey of digital subscriber lines and digital magnetic and optical storage; a review of fundamental transmission and reception limits; an encyclopedic introduction to baseband modulation codes; development of a rich palette of equalization techniques; a coherent treatment of Viterbi detection and many near-optimum detection schemes; an overview of adaptive reception techniques that encompasses adaptive gain and slope control, adaptive detection, and novel forms of zero-forcing adaptation; an in-depth review of timing recovery and PLLs, with an extensive catalog of timing-recovery schemes. . Featuring around 450 figures, 200 examples, 350 problems and exercises, and 750 references, Digital Baseband Transmission and Recording is an essential reference source to engineers and researchers active in telecommunications and digital recording. It will also be useful for advanced courses in digital communications.
This book describes the physical layer of UMTS (Universal Mobile Telecommunication System) which is one of the five members of the IMT-2000 family of standards. It compiles in a clear fashion the main technical features of the physical layer standard together with a description of the basics of digital communications and spread spectrum technology on which UMTS relies. In addition the test cases specified in the standard are described together with their implications on any practical front-end design. The reader will benefit from the standard description which frees him from studying lots of standardization documents. Additional explanations of the standard and especially the test cases will help to better understand the effects on any front-end system design. Many references are provided for readers interested in in-depth treatments of certain topics.
The first radio links, wireless telegraphy, were established at the beginnings of the twentieth century by Marconi, who drew upon the theory developed by Maxwell and upon the experimental researches conducted by Hertz. In France, such renown scientists, mathematicians, physicists and experimenters as Poincare, Blondel and the General Ferrie played a crucial role in the development of radiocommunications, more particularly through theoretical and experimental researches which contributed to a better understanding of the different propagation media. Following the Second World War, the researchers and engineers of the newly created Centre National d'Etudes des Telecommunications (CNET), among whom may be mentioned Jean Voge, Francois du Castel, Andre Spizzichino or Lucien Boithias, made decisive contributions to the understanding of the propagation of radio waves, in particular in the context of their application to telecommunications. Although the CNET has now become France Telecom Recherche & Developpement, the present book is in keeping with this approach, which has been going on for more than half a century. By providing the reader with some of the most recent researches in this field, Herve Sizun offers here an essential complement to the work by Lucien Boithias Radiowave Propagation, first published in 1983 in the Collection Technique et Scientifique des Telecommunications, and published in an English version in 1987 by McGraw- Hill."
Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This is a comprehensive survey of steganography and watermarking and their application to modern communications and multimedia. It helps the reader to understand steganography, the history of this previously neglected element of cryptography, the hurdles of international law on strong cryptographic techniques, and a description of the methods you can use to hide information in modern media. Included in this discussion is an overview of "steganalysis", methods which can be used to break stenographic communication. This resource also includes an introduction to and survey of watermarking methods, and discusses this method's similarities to and differences from steganography. The reader should gain a working knowledge of watermarking's pros and cons, and learn the legal implications of watermarking and copyright issues on the Internet.
Wireless personal communications, or wireless as it is now being called, has arrived. The hype is starting to fade, and the hard work of deploying new systems and services for personal communications is underway. In the United States, the FCC propelled the wireless era from infancy to mainstream with a $7.7 billion auction of 60 MHz of radio spectrum in the 180011900 MHz band. With the largest single sale of public property in the history of mankind mostly complete, the resources of the entire world are being called upon to develop inexpensive, rapidly deployable wireless systems and sub scriber units for an industry that is adding subscribers at greater than 50% annual rate. This growth is commonplace for wireless service companies throughout the world, and in the U.S., where as many as 7 licensed wireless service providers may be competing for cellularfPCS customers within the next couple of years, differentiators in cost, qual ity, service, and coverage will become critical to customer acceptance and use. Many of these issues are discussed in the papers included in this book."
The book describes a method for modeling systems architecture, particularly of telecom networks and systems, although a large part can be used in a wider context. The method is called Sysnet Modeling and is based on a new modeling language, AML (Abstract systems Modeling Language), which is also described in the book. By applying Sysnet Modeling and AML, a formal model of the system is created. That model can be used for systems analysis as well as for communicating system knowledge to a broader audience of engineers in development projects. Inherent in sysnet modeling is the potential for considerable reduction in time spent on system implementation through the possibilities for code- and test-case generation.
Faithful communication is a necessary precondition for large-scale quantum information processing and networking, irrespective of the physical platform. Thus, the problems of quantum-state transfer and quantum-network engineering have attracted enormous interest over the last years, and constitute one of the most active areas of research in quantum information processing. The present volume introduces the reader to fundamental concepts and various aspects of this exciting research area, including links to other related areas and problems. The implementation of state-transfer schemes and the engineering of quantum networks are discussed in the framework of various quantum optical and condensed matter systems, emphasizing the interdisciplinary character of the research area. Each chapter is a review of theoretical or experimental achievements on a particular topic, written by leading scientists in the field. The volume aims at both newcomers as well as experienced researchers.
In 1997, the two hottest topics in information technology are the Internet and mobile communications. Each one has the enthusiastic attention of the consuming public, investors. and the technical community. In a time of rapid expansion, they both face technical obstacles to meeting the public's high expectations. This situation stimulates a high volume of research in both areas. To bring the Internet into the twenty-first century. the research community focuses on multimedia communications in which integrated systems store, transport. and process many types of information simultaneously. A major challenge is to meet the of each information service. This problem is separate performance requirements especially challenging when a system has to deliver broadband, real-time services such as full-motion video. Meanwhile. the mobile communications research community continues its long term struggle against the triple challenge of mobility. ether. and energy. "Mobility" refers to the changing locations of terminals. When terminals are mobile. networks have to determine their locations and dynamically establish routes for information. The networks also have to rearrange themselves in order to maintain links to terminals with active communications sessions. "Ether" refers to the problems of wireless communications including limited bandwidth. rapidly changing radio propagation conditions. mutual interference of radio signals. and vulnerability of systems to eavesdropping and unauthorized access. "Energy" refers to the fact that portable information devices carry their own power sources. The rate at which the batteries of cellular telephones and portable computers drain their energy has a strong effect on their utility."
This book provides an overview of positioning technologies, applications and services in a format accessible to a wide variety of readers. Readers who have always wanted to understand how satellite-based positioning, wireless network positioning, inertial navigation, and their combinations work will find great value in this book. Readers will also learn about the advantages and disadvantages of different positioning methods, their limitations and challenges. Cognitive positioning, adding the brain to determine which technologies to use at device runtime, is introduced as well. Coverage also includes the use of position information for Location Based Services (LBS), as well as context-aware positioning services, designed for better user experience.
In this book, the state-of-the-art and future vision of wireless communications is presented in the form of a number of new services. Wireless personal communications is clearly a different service than today's cellular radio or cordless telephone, but there is an evolutionary connection between the three services. This book addresses questions about what features of personal communication services (PCS) will be met by existing or enhanced digital cellular radio technology. The regulatory and standards aspects of wireless communications are currently in a crucial stage of their formulation. A section of the book is devoted to the opinions of representatives from regulatory agencies and standards organizations on the future of this critical area. One of the most intriguing questions about the future of wireless communications has to do with the choice of multiple access technique. The trade offs between time division multiple access (TDMA) and code division multiple access (CDMA) have been the topic of many a heated discussion amongst members of the wireless community. This book presents a thorough discussion of a number of the topics which are instrumental in making a fair comparison of TDMA and CDMA; these topics include: analytical performance evaluation techniques, capacity studies, equalization requirements, and shared spectrum comparisons. Many of the technologies associated with wireless personal communications are reaching the design stages. This book presents a number of alternatives for designs of both base stations and user terminals. Some of the key questions of equalization, control channel requirements, multi-path diversity and channel allocation strategies have been addressed. Invariably, system designs and performance are tied to the characteristics of the radio channel. This book introduces several novel techniques for predicting propagation and system performance in a variety of indoor and outdoor environments. These techniques include analytical as well as computer simulation algorithms for predicting signal strenghts and other channel parameters based on the local topographical features. This book serves as an excellent reference source and may be used as a text for advanced courses on wireless communications, cellular radio, or digital mobile radio.
The Integrated Services Digital Network (ISDN) represents the current position in about a hundred years of evolutionary growth of the worldwide telecommunications infrastructure. This evolution is by no means complete and the next few years will see the emergence of a "Broad-band" ISDN as the next stage of evolutionary development. It is important to appreciate the evolutionary nature of the telecommunications infrastructure if one is to properly understand much of the thinking that lies behind the current ISDN proposals. This book therefore begins with a number of chapters devoted to a study of the various developments which have eventually led to the concept of an integrated digital network. These include the development of digital transmission of speech using PCM and the development of digital switching techniques based on stored program control. The book then turns to a consideration of those features of the existing telecommunications network which need to be modified in order to make ISDN a realizable practicality. Of particular importance is the digitization of transmission over the links between the user and the local exchange. Next we look at the current practice and proposals for ISDN based on the technology presently in use in the telephone network. Finally, we look at the proposals for a broadband ISDN likely to become widely available by the turn of the century.
This thesis discusses the privacy issues in speech-based applications such as biometric authentication, surveillance, and external speech processing services. Author Manas A. Pathak presents solutions for privacy-preserving speech processing applications such as speaker verification, speaker identification and speech recognition. The author also introduces some of the tools from cryptography and machine learning and current techniques for improving the efficiency and scalability of the presented solutions. Experiments with prototype implementations of the solutions for execution time and accuracy on standardized speech datasets are also included in the text. Using the framework proposed may now make it possible for a surveillance agency to listen for a known terrorist without being able to hear conversation from non-targeted, innocent civilians."
This book tells the story of the scientific talent and technological prowess of two nations that joined forces to connect themselves with a communications cable that would change the world. In 1855 an American visionary named Cyrus West Field, who knew nothing about telegraphy, sought to establish a monopoly on telegraphic revenues between North America and Europe. Field and the wealthy New Yorkers who formed the first Atlantic cable-laying company never suspected that spanning the vast and stormy Atlantic would require 11 years of frustration and horrific financial sacrifice. The enterprise would eventually engage some of the most brilliant minds in England, Scotland, and the United States, attracting men of science, men of wealth, and men of curiosity. Message time would be cut from more than four weeks to about two minutes. Such a feat would not have been possible without the massive ship the Great Eastern, designed by Isambard Kingdom Brunel, Britain's foremost engineer, or the financial backing of Thomas Brassey, the era's greatest builder of railroads. Despite four failed attempts and the enmity that developed between the Union and Great Britain during America's Civil War, Field never stopped urging his British friends to perfect a cable that could function in water as deep as two and a half miles. Without the unified effort of this small cadre of determined engineers, decades may have passed before submarine cables became reliable. This is the story of these men, their ships, and the technology that made it all possible. Behind the scenes were tough and worthy competitors who tried to beat them to the punch, adding a sense of urgency to their monumental task. Some called theAtlantic cable the greatest feat of the 19th century--with good reason. It perfected transoceanic communications and connected the world with circuits in the sea.
Includes full color and black and white illustrations, This handbook is designed to aid electronic warfare and radar systems engineers in making general estimations regarding capabilities of systems. This handbook is sponsored by the NAVAIR Director of Electronic Warfare / Combat Systems. Chapters include: Fundamentals; Antennas; Radar Equations; Radar and Receiver Characteristics and Test; Microwave / RF Components; Electro-optics an IR; Aircraft Dynamics Considerations; Date Transfer Busses; Glossary; Abbreviations and Acronyms.
China Satellite Navigation Conference (CSNC) 2015 Proceedings presents selected research papers from CSNC2015, held during 13th-15th May in Xian, China. The theme of CSNC2015 is Opening-up, Connectivity and Win-win. These papers discuss the technologies and applications of the Global Navigation Satellite System (GNSS), and the latest progress made in the China BeiDou System (BDS) especially. They are divided into 10 topics to match the corresponding sessions in CSNC2015, which broadly covered key topics in GNSS. Readers can learn about the BDS and keep abreast of the latest advances in GNSS techniques and applications. SUN Jiadong is the Chief Designer of the Compass/ BDS, and the academician of Chinese Academy of Sciences (CAS); LIU Jingnan is a professor at Wuhan University. FAN Shiwei is a researcher at China Satellite Navigation Office; LU Xiaochun is an academician of Chinese Academy of Sciences (CAS).
Foundations of Digital Signal Processing: Theory, algorithms and hardware design starts by introducing the mathematical foundations of DSP, assuming little prior knowledge of the subject from the reader, and moves on to discuss more complex topics such as Fourier, Laplace and digital filtering. It provides detailed information on off-line, real-time and DSP programming, and guides the reader through advanced topics such as DSP hardware design, FIR and IIR filter design and difference equation manipulation. A CD accompanies the book. It provides the reader with programs that demonstrate equations discussed in the text and source codes to enable the reader to incorporate algorithms into their own DSP programs.
In response to the increasing interest in developing photonic switching fabrics, this book gives an overview of the many technologies from a systems designer's perspective. Optically transparent devices, optical logic devices, and optical hardware are all discussed in detail and set into a systems context. Comprehensive, up-to-date, and profusely illustrated, the work will provide a foundation for the field, especially as broadband services are more fully developed.
In our increasingly mobile world the ability to access information on demand at any time and place can satisfy people's information needs as well as confer on them a competitive advantage. The emergence of battery-operated, low-cost and portable computers such as palmtops and PDAs, coupled with the availability and exploitation of wireless networks, have made possible the potential for ubiquitous computing. Through the wireless networks, portable equipments will become an integrated part of existing distributed computing environments, and mobile users can have access to data stored at information servers located at the static portion of the network even while they are on the move. Traditionally, information is retrieved following a request-response model. However, this model is no longer adequate in a wireless computing environment. First, the wireless channel is unreliable and the bandwidth is low compared to the wired counterpart. Second, the environment is essentially asymmetric with a large number of mobile users accessing a small number of servers. Third, battery-operated portable devices can typically operate only for a short time because of the short battery lifespan. Thus, clients are expected to be disconnected most of the time. To overcome these limitations, there has been a proliferation of research efforts on designing data delivery mechanisms to support wireless computing more effectively. Data Dissemination in Wireless Computing Environments focuses on such mechanisms. The purpose is to provide a thorough and comprehensive review of recent advances on energy-efficient data delivery protocols, efficient wireless channel bandwidth utilization, reliable broadcasting and cache invalidation strategies for clients with long disconnection time. Besides surveying existing methods, this book also compares and evaluates some of the more promising schemes.
Herb Caen, a popular columnist for the San Francisco Chronicle, recently quoted a Voice of America press release as saying that it was reorganizing in order to "eliminate duplication and redundancy. " This quote both states a goal of data compression and illustrates its common need: the removal of duplication (or redundancy) can provide a more efficient representation of data and the quoted phrase is itself a candidate for such surgery. Not only can the number of words in the quote be reduced without losing informa tion, but the statement would actually be enhanced by such compression since it will no longer exemplify the wrong that the policy is supposed to correct. Here compression can streamline the phrase and minimize the em barassment while improving the English style. Compression in general is intended to provide efficient representations of data while preserving the essential information contained in the data. This book is devoted to the theory and practice of signal compression, i. e., data compression applied to signals such as speech, audio, images, and video signals (excluding other data types such as financial data or general purpose computer data). The emphasis is on the conversion of analog waveforms into efficient digital representations and on the compression of digital information into the fewest possible bits. Both operations should yield the highest possible reconstruction fidelity subject to constraints on the bit rate and implementation complexity."
Wireless Local Loop (WLL) is now widely recognized as an economically viable technology for provision of telecommunication services to subscribers in sparsely populated as well as highly congested areas. However, the preparation of the business case, choice of a suitable technology, deployment planning, and radio and network system design for a WLL system depend on a range of technical and strategic planning variables. The scope of the book includes a systems level coverage of the following topics: Introduction to WLL systems; Fundamentals of Radio Systems; Key cellular and cordless technologies; WLL systems design system components and interfaces; WLL systems design radio aspects; Planning and deployment of WLL systems; Examples of commercially available WLL systems; and Broadband applications and services.
The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource. |
You may like...
Glaucoma: A Neurodegenerative Disease of…
Giacinto Bagetta, Carlo Nucci
Hardcover
R6,177
Discovery Miles 61 770
Rhino War - A General's Bold Strategy In…
Johan Jooste, Tony Park
Paperback
(2)
Nonlinear Approaches in Engineering…
Liming Dai, Reza N. Jazar
Hardcover
R2,770
Discovery Miles 27 700
Mining the Sky - Proceedings of the…
A.J. Banday, S. Zaroubi, …
Hardcover
R4,402
Discovery Miles 44 020
Southern African Moths & Their…
Hermann Staude, Mike Picker, …
Paperback
|