![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
As the world has entered the era of big data, there is a need to give a semantic perspective to the data to find unseen patterns, derive meaningful information, and make intelligent decisions. This 2-volume handbook set is a unique, comprehensive, and complete presentation of the current progress and future potential explorations in the field of data science and related topics. Handbook of Data Science with Semantic Technologies provides a roadmap for a new trend and future development of data science with semantic technologies. The first volume serves as an important guide towards applications of data science with semantic technologies for the upcoming generation and thus becomes a unique resource for both academic researchers and industry professionals. The second volume provides a roadmap for the deployment of semantic technologies in the field of data science that enables users to create intelligence through these technologies by exploring the opportunities while eradicating the current and future challenges. The set explores the optimal use of these technologies to provide the maximum benefit to the user under one comprehensive source. This set consisting of two separate volumes can be utilized independently or together as an invaluable resource for students, scholars, researchers, professionals, and practitioners in the field.
As mobile technologies become ever more pervasive in modern society, users find increasingly innovative methods to take advantage of the newest developments and mobile devices. Data mining, in particular, has seen a vast shift as a result of wireless technologies. Mobile Technologies for Active-Travel Data Collection and Analysis concentrates on one particular and fast-growing application of mobile technologies: data acquisition for the tourism industry. This critical reference source will provide travel agents, visitors, and hosts with the most advanced data mining methods, empirical research findings, and computational analysis techniques necessary to compete effectively in the global tourism industry.
Sets forth the steps needed to protect critical telecommunications circuits from power faults and lightning in high voltage environments The need to protect telecommunications circuits from power faults and lightning has never been greater: when power outages or system disturbances occur, reliable telecommunications are essential. With this book as their guide, readers will know what they need to do (and not do) to protect critical telecommunications circuits and equipment located in high voltage environments such as electrical power plants, substations, and power towers. Moreover, the book explains how to get the job done safely, detailing the proper implementation of safety procedures and the use of protective equipment to eliminate or minimize risk. Setting the foundation, the book begins with an overview of the problem, key issues, industry standards, and safety concerns. Next, it covers: Definitions and fundamentals of electric power systems, with regard to HVPT applicationsCauses, boundary conditions, and calculations of ground potential riseCritical telecommunications circuits that must be protected in high voltage environmentsProtection schemes and equipment to resolve groundpotential rise problemsEffective installation and testing of high voltage interface equipmentPersonal safety for telecommunications personnel working with equipment in high voltage environments Throughout the book, the author refers to accepted industry standards and best practices. Written by one of the most respected professional trainers in the telecommunications industry, "High Voltage Protection for Telecommunications" can be used for professional training courses or self-study. It will enable readers to protect critical data and voice communications circuits from high voltage events and protect themselves during equipment installation and maintenance.
Intra-system EMC problems are becoming increasingly common in
mobile devices, ranging from notebook PCs to cell phones, with
RF/wireless capbilities. These issues range from minor annoyances
to serious glitches which impede the functioning of the device.
This book gives a thourough review of electromagnetic theory
(including Maxwell's equations), discusses possible sources and
causes of intra-system interference, shows to use models and
analysis to discover potential sources of intra-system EMC in a
design, how to use appropriate tests and measurements to detect
intra-system EMC problems, and finally extensively discusses
measures to mitigate or totally eliminate intra-system EMC
problems. With more and more mobile devices incorporating wirless
capability (often with multiple wireless systems, such as Bluetooth
and WiFi), this book should be part of the reference shelf of every
RF/wireless engineer and mobile device designer.
The inadequate use of wireless spectrum resources has recently motivated researchers and practitioners to look for new ways to improve resource efficiency. As a result, new cognitive radio technologies have been proposed as an effective solution. Sensing Techniques for Next Generation Cognitive Radio Networks is a pivotal reference source that provides vital research on the application of spectrum sensing techniques. While highlighting topics such as radio identification, compressive sensing, and wavelet transform, this publication explores the standards and the methods of cognitive radio network architecture. This book is ideally designed for IT and network engineers, practitioners, and researchers seeking current research on radio scene analysis for cognitive radios and networks.
RFID is a method of remotely storing and receiving data using
devices called RFID tags. RFID tags can be small adhesive stickers
containing antennas that receive and respond to transmissions from
RFID transmitters. RFID tags are used to identify and track
everything from Exxon EZ pass to dogs to beer kegs to library
books.
Wireless communications and networks are developing at an accelerated rate. This rapid development has provided individuals with new opportunities for ubiquitous communication accessibility as well as enabled real-time multimedia technologies and their supporting applications. Handbook of Research on Progressive Trends in Wireless Communications and Networking brings together advanced research on diverse topics in wireless communications and networking, including the latest developments in broadband technologies, mobile communications, wireless sensor networks, network security, and cognitive radio networks. This book serves as a comprehensive reference for upper-level students, academicians, and industry professionals interested in uncovering recent advancements in wireless communications and networking.
Written by a leading expert in the field, this unique book describes the technical requirements for three-tier shared spectrum as well as key policy rationale and the impact for 5G. Detail is provided on the inception of the concept and its implementation in the US Citizens Broadband Radio Service (CBRS), along with descriptions of standards for deployment, algorithms required for implementation, and the broader consequences for wireless network and service architectures. The economic and innovation incentives offered by three-tier spectrum are described, along with potential outcomes such as widely deployed neutral host networks. There is also detailed technical analysis of the unique challenges introduced by three-tier spectrum, such as co-existence among non-cooperating networks. Covering a wide range of spectrum bands, International Telecommunication Union (ITU) international allocations, and rule structures that can be adapted for different regimes, this is ideal for an international readership of communications engineers, policy-makers, regulators, and industry strategic planners.
The development of mobile applications has created numerous opportunities across different industries. With these advances, the management of data has been optimized to allow a broader scope of potential uses. Advanced Mobile Technologies for Secure Transaction Processing: Emerging Research and Opportunities is an innovative reference source for the latest academic material on the application of mobile computing for secure payment transactions. Highlighting a range of relevant topics such as information security, electronic money, and online banking, this book is ideally designed for professionals, researchers, practitioners, students, and professionals interested in novel perspectives on mobile technologies and data management.
This textbook is based on 20 years of teaching a graduate-level course in random processes to a constituency extending beyond signal processing, communications, control, and networking, and including in particular circuits, RF and optics graduate students. In order to accommodate today's circuits students' needs to understand noise modeling, while covering classical material on Brownian motion, Poisson processes, and power spectral densities, the author has inserted discussions of thermal noise, shot noise, quantization noise and oscillator phase noise. At the same time, techniques used to analyze modulated communications and radar signals, such as the baseband representation of bandpass random signals, or the computation of power spectral densities of a wide variety of modulated signals, are presented. This book also emphasizes modeling skills, primarily through the inclusion of long problems at the end of each chapter, where starting from a description of the operation of a system, a model is constructed and then analyzed. Provides semester-length coverage of random processes, applicable to the analysis of electrical and computer engineering systems; Designed to be accessible to students with varying backgrounds in undergraduate mathematics and engineering; Includes solved examples throughout the discussion, as well as extensive problem sets at the end of every chapter; Develops and reinforces student's modeling skills, with inclusion of modeling problems in every chapter; Solutions for instructors included.
The Newnes Know It All Series takes the best of what our authors
have written to create hard-working desk references that will be an
engineer's first port of call for key information, design
techniques and rules of thumb. Guaranteed not to gather dust on a
shelf!
Cluster or co-cluster analyses are important tools in a variety of scientific areas. The introduction of this book presents a state of the art of already well-established, as well as more recent methods of co-clustering. The authors mainly deal with the two-mode partitioning under different approaches, but pay particular attention to a probabilistic approach. Chapter 1 concerns clustering in general and the model-based clustering in particular. The authors briefly review the classical clustering methods and focus on the mixture model. They present and discuss the use of different mixtures adapted to different types of data. The algorithms used are described and related works with different classical methods are presented and commented upon. This chapter is useful in tackling the problem of co-clustering under the mixture approach. Chapter 2 is devoted to the latent block model proposed in the mixture approach context. The authors discuss this model in detail and present its interest regarding co-clustering. Various algorithms are presented in a general context. Chapter 3 focuses on binary and categorical data. It presents, in detail, the appropriated latent block mixture models. Variants of these models and algorithms are presented and illustrated using examples. Chapter 4 focuses on contingency data. Mutual information, phi-squared and model-based co-clustering are studied. Models, algorithms and connections among different approaches are described and illustrated. Chapter 5 presents the case of continuous data. In the same way, the different approaches used in the previous chapters are extended to this situation. Contents 1. Cluster Analysis. 2. Model-Based Co-Clustering. 3. Co-Clustering of Binary and Categorical Data. 4. Co-Clustering of Contingency Tables. 5. Co-Clustering of Continuous Data. About the Authors Gerard Govaert is Professor at the University of Technology of Compiegne, France. He is also a member of the CNRS Laboratory Heudiasyc (Heuristic and diagnostic of complex systems). His research interests include latent structure modeling, model selection, model-based cluster analysis, block clustering and statistical pattern recognition. He is one of the authors of the MIXMOD (MIXtureMODelling) software. Mohamed Nadif is Professor at the University of Paris-Descartes, France, where he is a member of LIPADE (Paris Descartes computer science laboratory) in the Mathematics and Computer Science department. His research interests include machine learning, data mining, model-based cluster analysis, co-clustering, factorization and data analysis. Cluster Analysis is an important tool in a variety of scientific areas. Chapter 1 briefly presents a state of the art of already well-established as well more recent methods. The hierarchical, partitioning and fuzzy approaches will be discussed amongst others. The authors review the difficulty of these classical methods in tackling the high dimensionality, sparsity and scalability. Chapter 2 discusses the interests of coclustering, presenting different approaches and defining a co-cluster. The authors focus on co-clustering as a simultaneous clustering and discuss the cases of binary, continuous and co-occurrence data. The criteria and algorithms are described and illustrated on simulated and real data. Chapter 3 considers co-clustering as a model-based co-clustering. A latent block model is defined for different kinds of data. The estimation of parameters and co-clustering is tackled under two approaches: maximum likelihood and classification maximum likelihood. Hard and soft algorithms are described and applied on simulated and real data. Chapter 4 considers co-clustering as a matrix approximation. The trifactorization approach is considered and algorithms based on update rules are described. Links with numerical and probabilistic approaches are established. A combination of algorithms are proposed and evaluated on simulated and real data. Chapter 5 considers a co-clustering or bi-clustering as the search for coherent co-clusters in biological terms or the extraction of co-clusters under conditions. Classical algorithms will be described and evaluated on simulated and real data. Different indices to evaluate the quality of coclusters are noted and used in numerical experiments.
The gripping, behind-the scenes story of one of the most sophisticated surveillance weapons ever created – and an existential threat to democracy and human rights. Pegasus is widely regarded as the most powerful cyber-surveillance system on the market – available to any government that can afford its multimillion-dollar price tag. The system’s creator, the NSO group, a private corporation headquartered in Israel, boasts about its ability to thwart terrorists and criminals. But the Pegasus system doesn’t only catch terrorists and criminals. Pegasus has been used by repressive regimes to spy on thousands of innocent people around the world: heads of state, diplomats, human rights defenders, lawyers, political opponents, and journalists. Virtually undetectable, the system can track a person’s daily movement in real time, gain control of the device’s microphones and cameras at will, and capture all videos, photos, emails, texts, and passwords – encrypted or not. Its full reach is not even known. This is the gripping story of how Pegasus was uncovered, written by Laurent Richard and Sandrine Rigaud, the two intrepid reporters who revealed the scandal in collaboration with an international consortium of journalists. Their findings shook the world. Tense and compelling, Pegasus reveals how thousands of lives have been turned upside down by this unprecedented threat, and exposes the chilling new ways governments and corporations are laying waste to human rights – and silencing innocent citizens.
The book highlights three types of technologies being developed for autonomous solution of navigation problems. These technologies are based on the polarization structure, ultra-broadband and the fluctuation characteristics (slow and fast) of the radiolocation signals. The book presents the problems of intrinsic thermal radio emission polarization and change in radio waves polarization when they are reflected from objects with non-linear properties. The purpose of this book is to develop the foundations for creating autonomous radionavigation systems to provide aviation with navigation systems that will substantially increase its capabilities, specifically acting where satellite technologies do not work. The book is intended for specialists involved in the development and operation of aviation-technical complexes, as well as for specialists of national aviation regulators and ICAO experts dealing with the problems of improving flight safety.
Exploring Screen Culture via Apple's Mobile Devices: Life through the Looking Glass explores the role of mobile technologies in everyday life via the extended case study of Apple's mobile operating system (iOS) for the iPhone, iPad, and iPod. Via a detailed application (including numerous extended examples) of the experiences associated with Apple's iOS devices, Charles Soukup examines contemporary screen culture and how individuals navigate it via mobile technologies. Mobile devices provide a lifeline that sifts through, limits, and simplifies the complexities of rapid, vast, circulating information in postmodern culture. Particularly, simple, game-like applications with clear rules and numerical outcomes exceptionally focus, frame, and filter an overwhelming media-saturated culture. Rather than merely outlining the problems associated with a world dominated by digital screens, Exploring Screen Culture via Apple's Mobile Devices offers a means for understanding screen culture as well as viable solutions to the challenges facing contemporary social life.
* Clear, practical tutorial style text with real-world applications
This book explores categories of applications and driving factors surrounding the Smart City phenomenon. The contributing authors provide perspective on the Smart Cities, covering numerous applications and classes of applications. The book uses a top-down exploration of the driving factors in Smart Cities, by including focal areas including "Smart Healthcare," "Public Safety & Policy Issues," and "Science, Technology, & Innovation." Contributors have direct and substantive experience with important aspects of Smart Cities and discuss issues with technologies & standards, roadblocks to implementation, innovations that create new opportunities, and other factors relevant to emerging Smart City infrastructures. Features an exploration of Smart City issues and solutions from a variety of stakeholders in the evolving field Presents conversational, nuanced, and forward thinking perspectives on Smart Cities, their implications, limitations, obstacles, and opportunities Includes contributions from industry insiders who have direct, relevant experience with their respective subjects as well as positioning and corporate stature
|
You may like...
Chemical Modelling - Volume 17
Hilke Bahmann, Jean Christophe Tremblay
Hardcover
R11,222
Discovery Miles 112 220
Macromolecular Crystallography…
Mark R. Sanderson, Jane V. Skelly
Hardcover
R2,284
Discovery Miles 22 840
|