|
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
RFID and Wireless Sensors using Ultra-Wideband Technology explores
how RFID-based technologies are becoming the first choice to
realize the last (wireless) link in the chain between each element
and the Internet due to their low cost and simplicity. Each day,
more and more elements are being connected to the Internet of
Things. In this book, ultra-wideband radio technology (in time
domain) is exploited to realize this wireless link. Chipless,
semi-passive and active RFID systems and wireless sensors and
prototypes are proposed in terms of reader (setup and signal
processing techniques) and tags (design, integration of sensors and
performance). The authors include comprehensive theories, proposals
of advanced techniques, and their implementation to help readers
develop time-domain ultra-wideband radio technology for a variety
of applications. This book is suitable for post-doctoral
candidates, experienced researchers, and engineers developing RFID,
tag antenna designs, chipless RFID, and sensor integration.
Wireless Public Safety Networks, Volume Two: A Systematic Approach
presents the latest advances in the wireless Public Safety Networks
(PSNs) field, the networks established by authorities to either
prepare the population for an eminent catastrophe, or those used
for support during crisis and normalization phases. Maintaining
communication capabilities in a disaster scenario is crucial for
avoiding loss of lives and damages to property. This book examines
past communication failures that have directly contributed to the
loss of lives, giving readers in-depth discussions of the public
networks that impact emergency management, covering social media,
crowdsourcing techniques, wearable wireless sensors, moving-cells
scenarios, mobility management protocols, 5G networks, broadband
networks, data dissemination, and the resources of the frequency
spectrum.
Location-aware computing is a technology that uses the location
(provides granular geographical information) of people and objects
to derive contextual information. Today, one can obtain this
location information free of cost through smartphones. Smartphones
with location enabled applications have revolutionized the ways in
which people perform their activities and get benefits from the
automated services. It especially helps to get details of services
in less time; wherever the user may be and whenever they want. The
need for smartphones and location enabled applications has been
growing year after year. Nowadays no one can leave without their
phone; the phone seemingly becomes one of the parts of the human
body. The individual can now be predicted by their phone and the
identity of the phone becomes the person's identity. Though there
is a tremendous need for location-enabled applications with
smartphones, the debate on privacy and security related to location
data has also been growing. Privacy and Security Challenges in
Location Aware Computing provides the latest research on privacy
enhanced location-based applications development and exposes the
necessity of location privacy preservation, as well as issues and
challenges related to protecting the location data. It also
suggests solutions for enhancing the protection of location privacy
and therefore users' privacy as well. The chapters highlight
important topic areas such as video surveillance in human
tracking/detection, geographical information system design,
cyberspace attacks and warfare, and location aware security
systems. The culmination of these topics creates a book that is
ideal for security analysts, mobile application developers,
practitioners, academicians, students, and researchers.
Meeting People via WiFi and Bluetooth will contain an overview of
how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi)
and Bluetooth 802.15 Radio Frequencies. The content contained here
came from research and materials originally presented at Defcon
Wireless CTF Village in August 2015 entitled "Meeting People Via
Wi-Fi". The book will go over the hardware and software needed in
order to do this tracking, how to use these particular tools in
order to do attribution, and tips for protecting yourself from
being attributed via those signals.
Satellite Soil Moisture Retrieval: Techniques and Applications
offers readers a better understanding of the scientific
underpinnings, development, and application of soil moisture
retrieval techniques and their applications for environmental
modeling and management, bringing together a collection of recent
developments and rigorous applications of soil moisture retrieval
techniques from optical and infrared datasets, such as the
universal triangle method, vegetation indices based approaches,
empirical models, and microwave techniques, particularly by
utilizing earth observation datasets such as IRS III, MODIS,
Landsat7, Landsat8, SMOS, AMSR-e, AMSR2 and the upcoming SMAP.
Through its coverage of a wide variety of soil moisture retrieval
applications, including drought, flood, irrigation scheduling,
weather forecasting, climate change, precipitation forecasting, and
several others, this is the first book to promote synergistic and
multidisciplinary activities among scientists and users working in
the hydrometeorological sciences.
The communication field is evolving rapidly in order to keep up
with society's demands. As such, it becomes imperative to research
and report recent advancements in computational intelligence as it
applies to communication networks. The Handbook of Research on
Recent Developments in Intelligent Communication Application is a
pivotal reference source for the latest developments on emerging
data communication applications. Featuring extensive coverage
across a range of relevant perspectives and topics, such as
satellite communication, cognitive radio networks, and wireless
sensor networks, this book is ideally designed for engineers,
professionals, practitioners, upper-level students, and academics
seeking current information on emerging communication networking
trends.
The implementation of wireless sensor networks has wide-ranging
applications for monitoring various physical and environmental
settings. However, certain limitations with these technologies must
be addressed in order to effectively utilize them. The Handbook of
Research on Advanced Wireless Sensor Network Applications,
Protocols, and Architectures is a pivotal reference source for the
latest research on recent innovations and developments in the field
of wireless sensors. Examining the advantages and challenges
presented by the application of these networks in various areas,
this book is ideally designed for academics, researchers, students,
and IT developers.
Wireless Public Safety Networks, Volume One: Overview and
Challenges presents the latest advances in the wireless Public
Safety Networks (PSNs) field, the networks established by
authorities to either prepare the population for an eminent
catastrophe, or as support during crisis and normalization phases.
Maintaining communication capabilities in a disaster scenario is
crucial for avoiding loss of lives and damages to property.
Wireless Public Safety Networks examines past communication
failures that have directly contributed to the loss of lives. This
book will give readers a broad view of the PSNs field, analyzing
the benefits PSNs may bring to society, the main challenges related
to the establishment and maintenance of these networks, the latest
advancements in the field, and future perspectives.
Mobile Ad Hoc Networks (MANETs) are a popular form of network for
data transfer due to the fact that they are dynamic, require no
fixed infrastructure, and are scalable. However, MANETs are
particularly susceptible to several different types of widely
perpetrated cyberattack. One of the most common hacks aimed at
MANETs is the Black Hole attack, in which a particular node within
the network displays itself as having the shortest path for the
node whose packets it wants to intercept. Once the packets are
drawn to the Black Hole, they are then dropped instead of relayed,
and the communication of the MANET is thereby disrupted, without
knowledge of the other nodes in the network. Due to the
sophistication of the Black Hole attack, there has been a lot of
research conducted on how to detect it and prevent it. The authors
of this short format title provide their research results on
providing an effective solution to Black Hole attacks, including
introduction of new MANET routing protocols that can be implemented
in order to improve detection accuracy and network parameters such
as total dropped packets, end-to-end delay, packet delivery ratio,
and routing request overhead.
Body centric wireless networking and communications is an emerging
4G technology for short (1-5 m) and very short (below 1 m) range
communications systems, used to connect devices worn on (or in) the
body, or between two people in close proximity. It has great
potential for applications in healthcare delivery, entertainment,
surveillance, and emergency services. This book brings together
contributions from a multidisciplinary team of researchers in the
field of wireless and mobile communications, signal processing and
medical measurements to present the underlying theory,
implementation challenges and applications of this exciting new
technology. Topics covered include: diversity and cooperative
communications in body area networks; ultra wideband radio channel
characterisation for body-centric wireless communication; sparse
characterisation of body-centric radio channels; antenna / human
body interactions in the 60 GHz band; antennas for ingestible
capsule telemetry; in vivo wireless channel modelling; diversity
and MIMO for efficient front-end design of body-centric wireless
communications devices; on-body antennas and radio channels for GPS
applications; textile substrate integrated waveguide technology for
the next-generation wearable microwave systems; ultra wideband
body-centric networks for localisation and motion capture
application; down scaling to the nano-scale in body-centric
nano-networks; and the road ahead for body-centric wireless
communication and networks.
Bio-inspired computation, especially those based on swarm
intelligence, has become increasingly popular in the last decade.
Bio-Inspired Computation in Telecommunications reviews the latest
developments in bio-inspired computation from both theory and
application as they relate to telecommunications and image
processing, providing a complete resource that analyzes and
discusses the latest and future trends in research directions.
Written by recognized experts, this is a must-have guide for
researchers, telecommunication engineers, computer scientists and
PhD students.
Linearization and efficiency improvements in power amplifiers are
hot, yet complex topics in RF amplifier design; this book will
provide an overview of current efficiency enhancement and
linearization techniques for silicon power amplifier designs. It
examines the latest state of the art technologies and design
techniques to address challenges for RF cellular mobile, base
stations, and RF and mmW WLAN applications. It includes material on
current silicon (CMOS, SiGe) RF and mmW power amplifier designs,
focusing on advantages and disadvantages compared with traditional
GaAs implementations.
With this book you will learn:
oThe principles of linearization and efficiency improvement
techniques
oThe design flow for RF and/or mmW power amplifiers using these
techniques
oArchitectures and techniques allowing the optimum design of
multimode Si RF and mmW power amplifiers
oHow to make designs more efficient by employing new design
techniques such as linearization and efficiency improvement
oLayout considerations
oExamples of schematic, layout, simulation and measurement results.
Addresses the problems of high power generation, faithful
construction of non-constant envelope constellations, and efficient
and well control power radiation from integrated silicon
chips
Demonstrates how silicon technology can solve problems and
trade-offs of power amplifier design, including price, size,
complexity and efficiency
Written and edited by the top contributors to the field"
This book is the first to cover the recently developed MPEG-V
standard, explaining the fundamentals of each part of the
technology and exploring potential applications. Written by an
expert in the field, who was instrumental in the development of the
standard, the book goes beyond the scope of the official standard
documentation, describing how to use the technology in a practical
context and how to combine it with other information such as audio,
video, images, and text. Each chapter follows an easy-to-understand
format, first examining how each part of the standard is composed,
then discussing some intended uses and applications for each
particular effect.
With this book, you will learn how to:
-Use the MPEG-V standard to develop applications
-Develop systems for various use cases using MPEG-V
-Synchronize the virtual world and real world
-Create and render sensory effects for media
-Understand and use MPEG-V for the research of new types of media
related technology and services.
The first book on the new MPEG-V standard, which enables
interoperability between virtual worlds and the real world
Provides the technical foundations for understanding and using
MPEG-V for various virtual world, mirrored world, and mixed world
use cases
Accompanying website features schema files for the standard, with
example XML files, source code from the reference software and
example applications."
|
|