![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
In 1997, the two hottest topics in information technology are the Internet and mobile communications. Each one has the enthusiastic attention of the consuming public, investors. and the technical community. In a time of rapid expansion, they both face technical obstacles to meeting the public's high expectations. This situation stimulates a high volume of research in both areas. To bring the Internet into the twenty-first century. the research community focuses on multimedia communications in which integrated systems store, transport. and process many types of information simultaneously. A major challenge is to meet the of each information service. This problem is separate performance requirements especially challenging when a system has to deliver broadband, real-time services such as full-motion video. Meanwhile. the mobile communications research community continues its long term struggle against the triple challenge of mobility. ether. and energy. "Mobility" refers to the changing locations of terminals. When terminals are mobile. networks have to determine their locations and dynamically establish routes for information. The networks also have to rearrange themselves in order to maintain links to terminals with active communications sessions. "Ether" refers to the problems of wireless communications including limited bandwidth. rapidly changing radio propagation conditions. mutual interference of radio signals. and vulnerability of systems to eavesdropping and unauthorized access. "Energy" refers to the fact that portable information devices carry their own power sources. The rate at which the batteries of cellular telephones and portable computers drain their energy has a strong effect on their utility."
This book provides an overview of positioning technologies, applications and services in a format accessible to a wide variety of readers. Readers who have always wanted to understand how satellite-based positioning, wireless network positioning, inertial navigation, and their combinations work will find great value in this book. Readers will also learn about the advantages and disadvantages of different positioning methods, their limitations and challenges. Cognitive positioning, adding the brain to determine which technologies to use at device runtime, is introduced as well. Coverage also includes the use of position information for Location Based Services (LBS), as well as context-aware positioning services, designed for better user experience.
Like the 120 volt standard for electricity, the appearance of standards in network management heralds new opportunities for creativity and achievement. As one example, within the framework of these evolving standards, consider a system of local area networks connecting computing equipment from different vendors. A bridge 1qc. k:8 up because of a transient caused by a repeater failure. The result is a massive disconnecHon of virtual circuits. What is the role of the manager and the network management system in solving the problem? How does the vendor implement the solution? How does the user use it? What measurements should be made? How should they be displayed? How much of the diagnosis and correction should be automated? How does the solution change with different hardware and software? In the IEEE Communications Magazine, I recently reported a timely illustration in the area of problems in fault management. At the workshop hotel, "I was waiting for a room assignment at the reception desk, when my attendant left the counter for a moment. Upon returning, he took one look at his screen and whined an accusatory question at everyone in sight, 'Who logged out my terminal?' Who indeed! It wasn't any of us. It was the system.
In this book, the state-of-the-art and future vision of wireless communications is presented in the form of a number of new services. Wireless personal communications is clearly a different service than today's cellular radio or cordless telephone, but there is an evolutionary connection between the three services. This book addresses questions about what features of personal communication services (PCS) will be met by existing or enhanced digital cellular radio technology. The regulatory and standards aspects of wireless communications are currently in a crucial stage of their formulation. A section of the book is devoted to the opinions of representatives from regulatory agencies and standards organizations on the future of this critical area. One of the most intriguing questions about the future of wireless communications has to do with the choice of multiple access technique. The trade offs between time division multiple access (TDMA) and code division multiple access (CDMA) have been the topic of many a heated discussion amongst members of the wireless community. This book presents a thorough discussion of a number of the topics which are instrumental in making a fair comparison of TDMA and CDMA; these topics include: analytical performance evaluation techniques, capacity studies, equalization requirements, and shared spectrum comparisons. Many of the technologies associated with wireless personal communications are reaching the design stages. This book presents a number of alternatives for designs of both base stations and user terminals. Some of the key questions of equalization, control channel requirements, multi-path diversity and channel allocation strategies have been addressed. Invariably, system designs and performance are tied to the characteristics of the radio channel. This book introduces several novel techniques for predicting propagation and system performance in a variety of indoor and outdoor environments. These techniques include analytical as well as computer simulation algorithms for predicting signal strenghts and other channel parameters based on the local topographical features. This book serves as an excellent reference source and may be used as a text for advanced courses on wireless communications, cellular radio, or digital mobile radio.
The Integrated Services Digital Network (ISDN) represents the current position in about a hundred years of evolutionary growth of the worldwide telecommunications infrastructure. This evolution is by no means complete and the next few years will see the emergence of a "Broad-band" ISDN as the next stage of evolutionary development. It is important to appreciate the evolutionary nature of the telecommunications infrastructure if one is to properly understand much of the thinking that lies behind the current ISDN proposals. This book therefore begins with a number of chapters devoted to a study of the various developments which have eventually led to the concept of an integrated digital network. These include the development of digital transmission of speech using PCM and the development of digital switching techniques based on stored program control. The book then turns to a consideration of those features of the existing telecommunications network which need to be modified in order to make ISDN a realizable practicality. Of particular importance is the digitization of transmission over the links between the user and the local exchange. Next we look at the current practice and proposals for ISDN based on the technology presently in use in the telephone network. Finally, we look at the proposals for a broadband ISDN likely to become widely available by the turn of the century.
This thesis discusses the privacy issues in speech-based applications such as biometric authentication, surveillance, and external speech processing services. Author Manas A. Pathak presents solutions for privacy-preserving speech processing applications such as speaker verification, speaker identification and speech recognition. The author also introduces some of the tools from cryptography and machine learning and current techniques for improving the efficiency and scalability of the presented solutions. Experiments with prototype implementations of the solutions for execution time and accuracy on standardized speech datasets are also included in the text. Using the framework proposed may now make it possible for a surveillance agency to listen for a known terrorist without being able to hear conversation from non-targeted, innocent civilians."
Delivers a conceptual overview of call centres - the products that support them, the designs that make them work and the ongoing management that is required for their successful operation.
China Satellite Navigation Conference (CSNC) 2015 Proceedings presents selected research papers from CSNC2015, held during 13th-15th May in Xian, China. The theme of CSNC2015 is Opening-up, Connectivity and Win-win. These papers discuss the technologies and applications of the Global Navigation Satellite System (GNSS), and the latest progress made in the China BeiDou System (BDS) especially. They are divided into 10 topics to match the corresponding sessions in CSNC2015, which broadly covered key topics in GNSS. Readers can learn about the BDS and keep abreast of the latest advances in GNSS techniques and applications. SUN Jiadong is the Chief Designer of the Compass/ BDS, and the academician of Chinese Academy of Sciences (CAS); LIU Jingnan is a professor at Wuhan University. FAN Shiwei is a researcher at China Satellite Navigation Office; LU Xiaochun is an academician of Chinese Academy of Sciences (CAS).
In response to the increasing interest in developing photonic switching fabrics, this book gives an overview of the many technologies from a systems designer's perspective. Optically transparent devices, optical logic devices, and optical hardware are all discussed in detail and set into a systems context. Comprehensive, up-to-date, and profusely illustrated, the work will provide a foundation for the field, especially as broadband services are more fully developed.
Steganography, a means by which two or more parties may communicate using "invisible" or "subliminal" communication, and watermarking, a means of hiding copyright data in images, are becoming necessary components of commercial multimedia applications that are subject to illegal use. This is a comprehensive survey of steganography and watermarking and their application to modern communications and multimedia. It helps the reader to understand steganography, the history of this previously neglected element of cryptography, the hurdles of international law on strong cryptographic techniques, and a description of the methods you can use to hide information in modern media. Included in this discussion is an overview of "steganalysis", methods which can be used to break stenographic communication. This resource also includes an introduction to and survey of watermarking methods, and discusses this method's similarities to and differences from steganography. The reader should gain a working knowledge of watermarking's pros and cons, and learn the legal implications of watermarking and copyright issues on the Internet.
In our increasingly mobile world the ability to access information on demand at any time and place can satisfy people's information needs as well as confer on them a competitive advantage. The emergence of battery-operated, low-cost and portable computers such as palmtops and PDAs, coupled with the availability and exploitation of wireless networks, have made possible the potential for ubiquitous computing. Through the wireless networks, portable equipments will become an integrated part of existing distributed computing environments, and mobile users can have access to data stored at information servers located at the static portion of the network even while they are on the move. Traditionally, information is retrieved following a request-response model. However, this model is no longer adequate in a wireless computing environment. First, the wireless channel is unreliable and the bandwidth is low compared to the wired counterpart. Second, the environment is essentially asymmetric with a large number of mobile users accessing a small number of servers. Third, battery-operated portable devices can typically operate only for a short time because of the short battery lifespan. Thus, clients are expected to be disconnected most of the time. To overcome these limitations, there has been a proliferation of research efforts on designing data delivery mechanisms to support wireless computing more effectively. Data Dissemination in Wireless Computing Environments focuses on such mechanisms. The purpose is to provide a thorough and comprehensive review of recent advances on energy-efficient data delivery protocols, efficient wireless channel bandwidth utilization, reliable broadcasting and cache invalidation strategies for clients with long disconnection time. Besides surveying existing methods, this book also compares and evaluates some of the more promising schemes.
Herb Caen, a popular columnist for the San Francisco Chronicle, recently quoted a Voice of America press release as saying that it was reorganizing in order to "eliminate duplication and redundancy. " This quote both states a goal of data compression and illustrates its common need: the removal of duplication (or redundancy) can provide a more efficient representation of data and the quoted phrase is itself a candidate for such surgery. Not only can the number of words in the quote be reduced without losing informa tion, but the statement would actually be enhanced by such compression since it will no longer exemplify the wrong that the policy is supposed to correct. Here compression can streamline the phrase and minimize the em barassment while improving the English style. Compression in general is intended to provide efficient representations of data while preserving the essential information contained in the data. This book is devoted to the theory and practice of signal compression, i. e., data compression applied to signals such as speech, audio, images, and video signals (excluding other data types such as financial data or general purpose computer data). The emphasis is on the conversion of analog waveforms into efficient digital representations and on the compression of digital information into the fewest possible bits. Both operations should yield the highest possible reconstruction fidelity subject to constraints on the bit rate and implementation complexity."
Wireless Local Loop (WLL) is now widely recognized as an economically viable technology for provision of telecommunication services to subscribers in sparsely populated as well as highly congested areas. However, the preparation of the business case, choice of a suitable technology, deployment planning, and radio and network system design for a WLL system depend on a range of technical and strategic planning variables. The scope of the book includes a systems level coverage of the following topics: Introduction to WLL systems; Fundamentals of Radio Systems; Key cellular and cordless technologies; WLL systems design system components and interfaces; WLL systems design radio aspects; Planning and deployment of WLL systems; Examples of commercially available WLL systems; and Broadband applications and services.
The book is a compilation of high-quality scientific papers presented at the 3rd International Conference on Computer & Communication Technologies (IC3T 2016). The individual papers address cutting-edge technologies and applications of soft computing, artificial intelligence and communication. In addition, a variety of further topics are discussed, which include data mining, machine intelligence, fuzzy computing, sensor networks, signal and image processing, human-computer interaction, web intelligence, etc. As such, it offers readers a valuable and unique resource.
This book presents a selection of expanded research papers from the Fourth IFIP Workshop on the Performance Modelling and Evaluation of ATM Networks. It provides a fundamental source of reference on the latest research techniques and tools concerning ATM networks worldwide. A number of important topics are featured including: traffic modelling and characterisation, models of ATM switches, network management, high speed LANs and MANs and routing and optimization.
Next-generation high-speed Internet backbone networks will be required to support a broad range of emerging applications which may not only require significant bandwidth, but may also have strict quality of service (QoS) requirements. Furthermore, the traffic from such applications are expected to be highly bursty in nature. For such traffic, the allocation of static fixed-bandwidth circuits may lead to the over-provisioning of bandwidth resources in order to meet QoS requirements. Optical burst switching (OBS) is a promising new technique which attempts to address the problem of efficiently allocating resources for bursty traffic. In OBS, incoming data is assembled into bursts at the edges of the network, and when the burst is ready to be sent, resources in the network are reserved only for the duration of the burst. The reservation of resources is typically made by an out-of-band one-way control message which precedes the burst by some offset time. By reserving resources only for the duration of the burst, a greater degree of utilization may be achieved in the network. This book provides an overview of optical burst switching. Design and research issues involved in the development of OBS networks are discussed, and approaches to providing QoS in OBS networks are presented. Topics include: - Optical burst switching node and network architectures - Burst assembly - Signaling protocols - Contention resolution - Burst scheduling - Quality of service in OBS networks
Roadside Networks for Vehicular Communications: Architectures, Applications, and Test Fields attempts to close the gap between science and technology in the field of roadside backbones for VCNs. This collection will be useful not only for researchers and engineers at universities, but for students in the fields of wireless communication networks, especially vehicular communication networks, and backbone networks as well.
This book tells the story of the scientific talent and technological prowess of two nations that joined forces to connect themselves with a communications cable that would change the world. In 1855 an American visionary named Cyrus West Field, who knew nothing about telegraphy, sought to establish a monopoly on telegraphic revenues between North America and Europe. Field and the wealthy New Yorkers who formed the first Atlantic cable-laying company never suspected that spanning the vast and stormy Atlantic would require 11 years of frustration and horrific financial sacrifice. The enterprise would eventually engage some of the most brilliant minds in England, Scotland, and the United States, attracting men of science, men of wealth, and men of curiosity. Message time would be cut from more than four weeks to about two minutes. Such a feat would not have been possible without the massive ship the Great Eastern, designed by Isambard Kingdom Brunel, Britain's foremost engineer, or the financial backing of Thomas Brassey, the era's greatest builder of railroads. Despite four failed attempts and the enmity that developed between the Union and Great Britain during America's Civil War, Field never stopped urging his British friends to perfect a cable that could function in water as deep as two and a half miles. Without the unified effort of this small cadre of determined engineers, decades may have passed before submarine cables became reliable. This is the story of these men, their ships, and the technology that made it all possible. Behind the scenes were tough and worthy competitors who tried to beat them to the punch, adding a sense of urgency to their monumental task. Some called theAtlantic cable the greatest feat of the 19th century--with good reason. It perfected transoceanic communications and connected the world with circuits in the sea.
The demand for wireless access to network services is growing in virtually all communications and computing applications. Once accustomed to unteathered opera tion, users resent being tied to a desk or a fixed location, but will endure it when there is some substantial benefit, such as higher resolution or bandwidth. Recent technolog ical advances, however, such as the scaling of VLSI, the development of low-power circuit design techniques and architectures, increasing battery energy capacity, and advanced displays, are rapidly improving the capabilities of wireless devices. Many of the technological advances contributing to this revolution pertain to the wireless medium itself. There are two viable media: radio and optical. In radio, spread-spectrum techniques allow different users and services to coexist in the same bandwidth, and new microwave frequencies with plentiful bandwidth become viable as the speed of the supporting low-cost electronics increases. Radio has the advantage of being available ubiquitously indoors and outdoors, with the possibility of a seam less system infrastructure that allows users to move between the two. There are unan swered (but likely to be benign) biological effects of microwave radiation at higher power densities. Optical communications is enhanced by advances in photonic devices, such as semiconductor lasers and detectors. Optical is primarily an indoor technology - where it need not compete with sunlight - and offers advantages such as the immediate availability of a broad bandwidth without the need for regulatory approval."
Designed for non-specialists, this easy-to-read new edition provides a comprehensive and coherent account of static electric phenomena and concepts based on a mathematical-physical approach. It has been updated to include new and expanded material ranging from charge decay to electrostatic measurements.
Predicting noise in RF systems at the design stage is extremely important. This book concentrates on developing noise simulation techniques for RF circuits. The authors present a novel approach of performing noise analysis for RF circuits.
Foundations of Digital Signal Processing: Theory, algorithms and hardware design starts by introducing the mathematical foundations of DSP, assuming little prior knowledge of the subject from the reader, and moves on to discuss more complex topics such as Fourier, Laplace and digital filtering. It provides detailed information on off-line, real-time and DSP programming, and guides the reader through advanced topics such as DSP hardware design, FIR and IIR filter design and difference equation manipulation. A CD accompanies the book. It provides the reader with programs that demonstrate equations discussed in the text and source codes to enable the reader to incorporate algorithms into their own DSP programs.
Rapid Prototyping of Application Specific Signal Processors presents leading-edge research that focuses on design methodology, infrastructure support and scalable architectures developed by the 150 million dollar DARPA United States Department of Defense RASSP Program. The contributions to this edited work include an introductory overview chapter that explains the origin, concepts and status of this effort. The RASSP Program is a multi-year DARPA/Tri-Service initiative intended to dramatically improve the process by which complex digital systems, particularly embedded signal processors, are designed, manufactured, upgraded and supported. This program was originally driven by military applications for signal processing. The requirements of military applications for real-time signal processing are typically more demanding than those of commercial applications, but the time gap between technology employed in advanced military prototypes and commercial products is narrowing rapidly. The research on methodologies, infrastructure and architectures presented in this book is applicable to commercial signal processing systems that are in design now, or will be developed before the end of the decade. Rapid Prototyping of Application Specific Signal Processors is a valuable reference for developers of embedded digital systems, particularly systems engineers for signal processing systems (such as digital TV, biomedical image processing systems and telecommunications) and for military contractors who are developing signal processing systems. This book will also be of interest to managers who are charged with responsibility for creating and maintaining environments and infrastructures for developing large embedded digital systems. The chief value for managers will be the defining of methods and processes that reduce development time and cost.
DSP System Design presents the investigation of special type of IIR polyphase filter structures combined with frequency transformation techniques used for fast, multi-rate filtering, and their application for custom fixed-point implementation. Detailed theoretical analysis of the polyphase IIR structure has been presented for two and three coefficients in the two-path arrangement. This was then generalized for arbitrary filter order and any number of paths. The use of polyphase IIR structures in decimation and interpolation is being presented and performance assessed in terms of the number of calculations required for the given filter specification and the simplicity of implementation. Specimen decimation filter designs to be used in Sigma-Delta lowpass and bandpass A/D converters are presented which prove to outperform other traditional approaches. New frequency transformation types have been suggested for both real and complex situations. A new exact multi-point frequency transformation approach for arbitrary frequency choice has been suggested and evaluated. Applying such transformations to the existing filter allows to change their frequency response in an intuitive manner without the need of re-designing them, thus simplifying the designer's job when the specification changes during the prototyping and testing. A new bit-flipping' algorithm has been developed to aid in filter design where the coefficient word length is constraint. Also, the standard Downhill Simplex Method (floating-point) was modified to operate with the constrained coefficient word length. Performance of both these advances is being evaluated on a number of filter cases. Novel decimation and interpolation structures have been proposed, which can be implemented very efficiently. These allow an arbitrary order IIR anti-aliasing filter to operate at the lower rate of the decimator/interpolator. Similar structures for polyphase IIR decimator/interpolator structures are being discussed too. A new approach to digital filter design and implementation has been suggested which speeds-up silicon implementation of designs developed in Matlab. The Simulink block description is converted automatically into a bit-to-bit equivalent VHDL description. This in turn can be compiled, simulated, synthesized and fabricated without the need to go through the design process twice, first algorithmic/structural design and then the implementation. The book is full of design and analysis techniques. It contains sufficient introductory material enabling non-expert readers to understand the material given in it. DSP System Design may be of interest to graduate students, researchers, and professionals circuit designers, who would require fast and low-complexity digital filters for both single and multi-rate applications, especially those with low-power specification. |
You may like...
FIFA Women's World Cup Australia/New…
Catherine Etoe, Natalia Sollohub
Paperback
Ward 11, Precinct 1, City of Boston…
Boston Election Department
Paperback
R727
Discovery Miles 7 270
|