0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (140)
  • R250 - R500 (975)
  • R500+ (10,176)
  • -
Status
Format
Author / Contributor
Publisher

Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications

Handbook of Data Science with Semantic Technologies (Hardcover): Archana Patel, Narayan C Debnath Handbook of Data Science with Semantic Technologies (Hardcover)
Archana Patel, Narayan C Debnath
R8,041 Discovery Miles 80 410 Ships in 10 - 15 working days

As the world has entered the era of big data, there is a need to give a semantic perspective to the data to find unseen patterns, derive meaningful information, and make intelligent decisions. This 2-volume handbook set is a unique, comprehensive, and complete presentation of the current progress and future potential explorations in the field of data science and related topics. Handbook of Data Science with Semantic Technologies provides a roadmap for a new trend and future development of data science with semantic technologies. The first volume serves as an important guide towards applications of data science with semantic technologies for the upcoming generation and thus becomes a unique resource for both academic researchers and industry professionals. The second volume provides a roadmap for the deployment of semantic technologies in the field of data science that enables users to create intelligence through these technologies by exploring the opportunities while eradicating the current and future challenges. The set explores the optimal use of these technologies to provide the maximum benefit to the user under one comprehensive source. This set consisting of two separate volumes can be utilized independently or together as an invaluable resource for students, scholars, researchers, professionals, and practitioners in the field.

Mobile Technologies for Activity-Travel Data Collection and Analysis (Hardcover): Soora Rasouli, Harry Timmermans Mobile Technologies for Activity-Travel Data Collection and Analysis (Hardcover)
Soora Rasouli, Harry Timmermans
R5,690 Discovery Miles 56 900 Ships in 10 - 17 working days

As mobile technologies become ever more pervasive in modern society, users find increasingly innovative methods to take advantage of the newest developments and mobile devices. Data mining, in particular, has seen a vast shift as a result of wireless technologies. Mobile Technologies for Active-Travel Data Collection and Analysis concentrates on one particular and fast-growing application of mobile technologies: data acquisition for the tourism industry. This critical reference source will provide travel agents, visitors, and hosts with the most advanced data mining methods, empirical research findings, and computational analysis techniques necessary to compete effectively in the global tourism industry.

High Voltage Protection for Telecommunications (Hardcover, New): SW Blume High Voltage Protection for Telecommunications (Hardcover, New)
SW Blume
R2,505 Discovery Miles 25 050 Ships in 10 - 17 working days

Sets forth the steps needed to protect critical telecommunications circuits from power faults and lightning in high voltage environments

The need to protect telecommunications circuits from power faults and lightning has never been greater: when power outages or system disturbances occur, reliable telecommunications are essential. With this book as their guide, readers will know what they need to do (and not do) to protect critical telecommunications circuits and equipment located in high voltage environments such as electrical power plants, substations, and power towers. Moreover, the book explains how to get the job done safely, detailing the proper implementation of safety procedures and the use of protective equipment to eliminate or minimize risk.

Setting the foundation, the book begins with an overview of the problem, key issues, industry standards, and safety concerns. Next, it covers: Definitions and fundamentals of electric power systems, with regard to HVPT applicationsCauses, boundary conditions, and calculations of ground potential riseCritical telecommunications circuits that must be protected in high voltage environmentsProtection schemes and equipment to resolve groundpotential rise problemsEffective installation and testing of high voltage interface equipmentPersonal safety for telecommunications personnel working with equipment in high voltage environments

Throughout the book, the author refers to accepted industry standards and best practices. Written by one of the most respected professional trainers in the telecommunications industry, "High Voltage Protection for Telecommunications" can be used for professional training courses or self-study. It will enable readers to protect critical data and voice communications circuits from high voltage events and protect themselves during equipment installation and maintenance.

Platform Interference in Wireless Systems - Models, Measurement, and Mitigation (Hardcover): Kevin Slattery, Harry Skinner Platform Interference in Wireless Systems - Models, Measurement, and Mitigation (Hardcover)
Kevin Slattery, Harry Skinner
R1,815 Discovery Miles 18 150 Ships in 10 - 15 working days

Intra-system EMC problems are becoming increasingly common in mobile devices, ranging from notebook PCs to cell phones, with RF/wireless capbilities. These issues range from minor annoyances to serious glitches which impede the functioning of the device. This book gives a thourough review of electromagnetic theory (including Maxwell's equations), discusses possible sources and causes of intra-system interference, shows to use models and analysis to discover potential sources of intra-system EMC in a design, how to use appropriate tests and measurements to detect intra-system EMC problems, and finally extensively discusses measures to mitigate or totally eliminate intra-system EMC problems. With more and more mobile devices incorporating wirless capability (often with multiple wireless systems, such as Bluetooth and WiFi), this book should be part of the reference shelf of every RF/wireless engineer and mobile device designer.
*Throughouly describes sources of intra-system interference in RF/wireless devices and how to minimize them for maximum device performance
*Gives proven techniques for interference mitigation, ranging from the simple (component placement and cable routing) to the advanced (such as the use of shielding and signal absorption materials)
*Discusses modeling and analysis methods to predict likely sources of intras-system EMC
*Explains test and measurement techniques to detect intra-system EMC problems.

Sensing Techniques for Next Generation Cognitive Radio Networks (Hardcover): Ashish Bagwari, Jyotshana Bagwari, Geetam Singh... Sensing Techniques for Next Generation Cognitive Radio Networks (Hardcover)
Ashish Bagwari, Jyotshana Bagwari, Geetam Singh Tomar
R5,383 Discovery Miles 53 830 Ships in 10 - 17 working days

The inadequate use of wireless spectrum resources has recently motivated researchers and practitioners to look for new ways to improve resource efficiency. As a result, new cognitive radio technologies have been proposed as an effective solution. Sensing Techniques for Next Generation Cognitive Radio Networks is a pivotal reference source that provides vital research on the application of spectrum sensing techniques. While highlighting topics such as radio identification, compressive sensing, and wavelet transform, this publication explores the standards and the methods of cognitive radio network architecture. This book is ideally designed for IT and network engineers, practitioners, and researchers seeking current research on radio scene analysis for cognitive radios and networks.

How to Cheat at Deploying and Securing RFID (Paperback): Frank Thornton, Paul Sanghera How to Cheat at Deploying and Securing RFID (Paperback)
Frank Thornton, Paul Sanghera
R1,061 Discovery Miles 10 610 Ships in 10 - 15 working days

RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books.
Major companies and countries around the world are adopting or considering whether to adopt RFID technologies. Visa and Wells Fargo are currently running tests with RFID, airports around the world are using RFID to track cargo and run customs departments, universities such as Slippery Rock are providing RFID-enabled cell phones for students to use for campus charges. According to the July 9 CNET article, RFID Tags: Big Brother in Small Packages?, "You should become familiar with RFID technology because you'll be hearing much more about it soon. Retailers adore the concept, and CNET News.com's own Alorie Gilbert wrote last week about how Wal-Mart and the U.K.-based grocery chain Tesco are starting to install "smart shelves" with networked RFID readers. In what will become the largest test of the technology, consumer goods giant Gillette recently said it would purchase 500 million RFID tags from Alien Technology of Morgan Hill, CA."
For security professionals needing to get up and running fast with the topic of RFID, this How to Cheat approach to the topic is the perfect "just what you need to know" book
* For most business organizations, adopting RFID is a matter of when
* The RFID services market is expected to reach $4 billion by 2008
* Covers vulnerabilities and personal privacy--topics identified by major companies as key RFID issues

Wireless Communications and Networking (Hardcover): M.A. Matin Wireless Communications and Networking (Hardcover)
M.A. Matin
R9,496 Discovery Miles 94 960 Ships in 10 - 17 working days

Wireless communications and networks are developing at an accelerated rate. This rapid development has provided individuals with new opportunities for ubiquitous communication accessibility as well as enabled real-time multimedia technologies and their supporting applications. Handbook of Research on Progressive Trends in Wireless Communications and Networking brings together advanced research on diverse topics in wireless communications and networking, including the latest developments in broadband technologies, mobile communications, wireless sensor networks, network security, and cognitive radio networks. This book serves as a comprehensive reference for upper-level students, academicians, and industry professionals interested in uncovering recent advancements in wireless communications and networking.

Three-Tier Shared Spectrum, Shared Infrastructure, and a Path to 5G (Hardcover): Preston Marshall Three-Tier Shared Spectrum, Shared Infrastructure, and a Path to 5G (Hardcover)
Preston Marshall
R3,653 Discovery Miles 36 530 Ships in 10 - 15 working days

Written by a leading expert in the field, this unique book describes the technical requirements for three-tier shared spectrum as well as key policy rationale and the impact for 5G. Detail is provided on the inception of the concept and its implementation in the US Citizens Broadband Radio Service (CBRS), along with descriptions of standards for deployment, algorithms required for implementation, and the broader consequences for wireless network and service architectures. The economic and innovation incentives offered by three-tier spectrum are described, along with potential outcomes such as widely deployed neutral host networks. There is also detailed technical analysis of the unique challenges introduced by three-tier spectrum, such as co-existence among non-cooperating networks. Covering a wide range of spectrum bands, International Telecommunication Union (ITU) international allocations, and rule structures that can be adapted for different regimes, this is ideal for an international readership of communications engineers, policy-makers, regulators, and industry strategic planners.

Advanced Mobile Technologies for Secure Transaction Processing - Emerging Research and Opportunities (Hardcover): Raghvendra... Advanced Mobile Technologies for Secure Transaction Processing - Emerging Research and Opportunities (Hardcover)
Raghvendra Kumar, Preeta Sharan, Aruna Devi
R3,252 Discovery Miles 32 520 Ships in 10 - 17 working days

The development of mobile applications has created numerous opportunities across different industries. With these advances, the management of data has been optimized to allow a broader scope of potential uses. Advanced Mobile Technologies for Secure Transaction Processing: Emerging Research and Opportunities is an innovative reference source for the latest academic material on the application of mobile computing for secure payment transactions. Highlighting a range of relevant topics such as information security, electronic money, and online banking, this book is ideally designed for professionals, researchers, practitioners, students, and professionals interested in novel perspectives on mobile technologies and data management.

Random Processes with Applications to Circuits and Communications (Hardcover, 1st ed. 2020): Bernard C. Levy Random Processes with Applications to Circuits and Communications (Hardcover, 1st ed. 2020)
Bernard C. Levy
R2,742 Discovery Miles 27 420 Ships in 10 - 15 working days

This textbook is based on 20 years of teaching a graduate-level course in random processes to a constituency extending beyond signal processing, communications, control, and networking, and including in particular circuits, RF and optics graduate students. In order to accommodate today's circuits students' needs to understand noise modeling, while covering classical material on Brownian motion, Poisson processes, and power spectral densities, the author has inserted discussions of thermal noise, shot noise, quantization noise and oscillator phase noise. At the same time, techniques used to analyze modulated communications and radar signals, such as the baseband representation of bandpass random signals, or the computation of power spectral densities of a wide variety of modulated signals, are presented. This book also emphasizes modeling skills, primarily through the inclusion of long problems at the end of each chapter, where starting from a description of the operation of a system, a model is constructed and then analyzed. Provides semester-length coverage of random processes, applicable to the analysis of electrical and computer engineering systems; Designed to be accessible to students with varying backgrounds in undergraduate mathematics and engineering; Includes solved examples throughout the discussion, as well as extensive problem sets at the end of every chapter; Develops and reinforces student's modeling skills, with inclusion of modeling problems in every chapter; Solutions for instructors included.

Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover): Information R Management Association Research Anthology on Securing Mobile Technologies and Applications, VOL 1 (Hardcover)
Information R Management Association
R5,768 Discovery Miles 57 680 Ships in 10 - 17 working days
RF and Wireless Technologies: Know It All (Paperback): Bruce A. Fette, Roberto Aiello Ph D, Praphul Chandra, Daniel M. Dobkin,... RF and Wireless Technologies: Know It All (Paperback)
Bruce A. Fette, Roberto Aiello Ph D, Praphul Chandra, Daniel M. Dobkin, Alan Bensky, …
R1,584 Discovery Miles 15 840 Ships in 10 - 15 working days

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf!
RF (radio frequency) and wireless technologies drive communication today. This technology and its applications enable wireless phones, portable device roaming, and short-range industrial and commercial application communication such as the supply chain management wonder, RFID. Up-to-date information regarding software defined RF, using frequencies smarter, and, using more of the spectrum, with ultrawideband technology is detailed.
Chapter 1: Survey of RF and Wireless Technology
Chapter 2: Communications Protocols and Modulation
Chapter 3: Transmitters
Chapter 4: Receivers
Chapter 5: Radio Propagation
Chapter 6: Antenna Fundamentals I
Chapter 7: Antenna Fundamentals II.
Chapter 8: Basics of Wireless Local Area Networks
Chapter 9: Outdoor Networks.
Chapter 10: Voice Over Wi-Fi and Other Wireless Technologies
Chapter 11: Security in Wireless Local Area Networks
Chapter 12: System Planning
Chapter 13: System Implementation, Testing, and Optimization
Chapter 14: Next Generation Wireless Networks
Chapter 15: Mobile Ad Hoc Networks
Chapter 16: Wireless Sensor Networks
Chapter 17: Reliable Wireless Networks for Industrial Networks
Chapter 18: Software-Defined Radio
Chapter 19: The Basics of Radio Frequency Identification (RFID) Technology
Chapter 20: UWB Spectrum and Regulation
Chapter 21: Interference and Coexistence
Chapter 22: Direct Sequence UWB
Chapter 23: "Multiband Approach to UWB
Chapter 24: History and Background of Cognitive Radio
Chapter 25: The Software Defined Radio as a Platform for Cognitive Radio
Chapter 26: Cognitive Radio: The Technologies
Chapter 27: Spectrum Awareness
Chapter 28: Direct Sequence and Frequency Hopping Spread Spectrum
Chapter 29: RF Power Amplifiers
Chapter 30: Phase Locked Loop Techniques in Modern Communications Systems
Chapter 31 Orthogonal Frequency Division Multiplexing (OFDM)
*A 360 degree view from best-selling authors including Roberto Aiello, Bruce Fette, and Praphul Chandra
*Hot topics covered including ultrawideband and cognitive radio technologies
*The ultimate hard-working desk reference: all the essential information, techniques, and tricks of the trade in one volume

Research Anthology on Securing Mobile Technologies and Applications, VOL 2 (Hardcover): Information R Management Association Research Anthology on Securing Mobile Technologies and Applications, VOL 2 (Hardcover)
Information R Management Association
R5,773 Discovery Miles 57 730 Ships in 10 - 17 working days
Co-Clustering (Hardcover): G Govaert Co-Clustering (Hardcover)
G Govaert
R3,767 Discovery Miles 37 670 Ships in 10 - 17 working days

Cluster or co-cluster analyses are important tools in a variety of scientific areas. The introduction of this book presents a state of the art of already well-established, as well as more recent methods of co-clustering. The authors mainly deal with the two-mode partitioning under different approaches, but pay particular attention to a probabilistic approach. Chapter 1 concerns clustering in general and the model-based clustering in particular. The authors briefly review the classical clustering methods and focus on the mixture model. They present and discuss the use of different mixtures adapted to different types of data. The algorithms used are described and related works with different classical methods are presented and commented upon. This chapter is useful in tackling the problem of co-clustering under the mixture approach. Chapter 2 is devoted to the latent block model proposed in the mixture approach context. The authors discuss this model in detail and present its interest regarding co-clustering. Various algorithms are presented in a general context. Chapter 3 focuses on binary and categorical data. It presents, in detail, the appropriated latent block mixture models. Variants of these models and algorithms are presented and illustrated using examples. Chapter 4 focuses on contingency data. Mutual information, phi-squared and model-based co-clustering are studied. Models, algorithms and connections among different approaches are described and illustrated. Chapter 5 presents the case of continuous data. In the same way, the different approaches used in the previous chapters are extended to this situation. Contents 1. Cluster Analysis. 2. Model-Based Co-Clustering. 3. Co-Clustering of Binary and Categorical Data. 4. Co-Clustering of Contingency Tables. 5. Co-Clustering of Continuous Data. About the Authors Gerard Govaert is Professor at the University of Technology of Compiegne, France. He is also a member of the CNRS Laboratory Heudiasyc (Heuristic and diagnostic of complex systems). His research interests include latent structure modeling, model selection, model-based cluster analysis, block clustering and statistical pattern recognition. He is one of the authors of the MIXMOD (MIXtureMODelling) software. Mohamed Nadif is Professor at the University of Paris-Descartes, France, where he is a member of LIPADE (Paris Descartes computer science laboratory) in the Mathematics and Computer Science department. His research interests include machine learning, data mining, model-based cluster analysis, co-clustering, factorization and data analysis. Cluster Analysis is an important tool in a variety of scientific areas. Chapter 1 briefly presents a state of the art of already well-established as well more recent methods. The hierarchical, partitioning and fuzzy approaches will be discussed amongst others. The authors review the difficulty of these classical methods in tackling the high dimensionality, sparsity and scalability. Chapter 2 discusses the interests of coclustering, presenting different approaches and defining a co-cluster. The authors focus on co-clustering as a simultaneous clustering and discuss the cases of binary, continuous and co-occurrence data. The criteria and algorithms are described and illustrated on simulated and real data. Chapter 3 considers co-clustering as a model-based co-clustering. A latent block model is defined for different kinds of data. The estimation of parameters and co-clustering is tackled under two approaches: maximum likelihood and classification maximum likelihood. Hard and soft algorithms are described and applied on simulated and real data. Chapter 4 considers co-clustering as a matrix approximation. The trifactorization approach is considered and algorithms based on update rules are described. Links with numerical and probabilistic approaches are established. A combination of algorithms are proposed and evaluated on simulated and real data. Chapter 5 considers a co-clustering or bi-clustering as the search for coherent co-clusters in biological terms or the extraction of co-clusters under conditions. Classical algorithms will be described and evaluated on simulated and real data. Different indices to evaluate the quality of coclusters are noted and used in numerical experiments.

Advanced Telecommunications Engineering (Hardcover): Bernhard Ekman Advanced Telecommunications Engineering (Hardcover)
Bernhard Ekman
R3,170 R2,872 Discovery Miles 28 720 Save R298 (9%) Ships in 10 - 17 working days
Wireless Communications, Networking and Signal Processing (Hardcover): Grant Harper Wireless Communications, Networking and Signal Processing (Hardcover)
Grant Harper
R3,264 R2,954 Discovery Miles 29 540 Save R310 (9%) Ships in 10 - 17 working days
Pegasus - The Secret Technology That Threatens The End Of Privacy And Democracy (Paperback): Laurent Richard, Sandrine Rigaud Pegasus - The Secret Technology That Threatens The End Of Privacy And Democracy (Paperback)
Laurent Richard, Sandrine Rigaud
R299 R271 Discovery Miles 2 710 Save R28 (9%) Ships in 5 - 10 working days

The gripping, behind-the scenes story of one of the most sophisticated surveillance weapons ever created – and an existential threat to democracy and human rights.

Pegasus is widely regarded as the most powerful cyber-surveillance system on the market – available to any government that can afford its multimillion-dollar price tag. The system’s creator, the NSO group, a private corporation headquartered in Israel, boasts about its ability to thwart terrorists and criminals.

But the Pegasus system doesn’t only catch terrorists and criminals.

Pegasus has been used by repressive regimes to spy on thousands of innocent people around the world: heads of state, diplomats, human rights defenders, lawyers, political opponents, and journalists.

Virtually undetectable, the system can track a person’s daily movement in real time, gain control of the device’s microphones and cameras at will, and capture all videos, photos, emails, texts, and passwords – encrypted or not. Its full reach is not even known.

This is the gripping story of how Pegasus was uncovered, written by Laurent Richard and Sandrine Rigaud, the two intrepid reporters who revealed the scandal in collaboration with an international consortium of journalists. Their findings shook the world.

Tense and compelling, Pegasus reveals how thousands of lives have been turned upside down by this unprecedented threat, and exposes the chilling new ways governments and corporations are laying waste to human rights – and silencing innocent citizens.

The Political Structure of UK Broadcasting 1949 - 1999 (Hardcover): David Elstein The Political Structure of UK Broadcasting 1949 - 1999 (Hardcover)
David Elstein
R1,123 Discovery Miles 11 230 Ships in 10 - 15 working days
Introduction to the Theory of Radiopolarimetric Navigation Systems (Hardcover, 1st ed. 2020): Kozlov A.I., Logvin A.I.,... Introduction to the Theory of Radiopolarimetric Navigation Systems (Hardcover, 1st ed. 2020)
Kozlov A.I., Logvin A.I., Sarychev V.A., Shatrakov Y.G., Zavalishin O.I.
R4,064 Discovery Miles 40 640 Ships in 10 - 17 working days

The book highlights three types of technologies being developed for autonomous solution of navigation problems. These technologies are based on the polarization structure, ultra-broadband and the fluctuation characteristics (slow and fast) of the radiolocation signals. The book presents the problems of intrinsic thermal radio emission polarization and change in radio waves polarization when they are reflected from objects with non-linear properties. The purpose of this book is to develop the foundations for creating autonomous radionavigation systems to provide aviation with navigation systems that will substantially increase its capabilities, specifically acting where satellite technologies do not work. The book is intended for specialists involved in the development and operation of aviation-technical complexes, as well as for specialists of national aviation regulators and ICAO experts dealing with the problems of improving flight safety.

Exploring Screen Culture via Apple's Mobile Devices - Life through the Looking Glass (Hardcover): Charles Soukup Exploring Screen Culture via Apple's Mobile Devices - Life through the Looking Glass (Hardcover)
Charles Soukup
R2,222 Discovery Miles 22 220 Ships in 10 - 15 working days

Exploring Screen Culture via Apple's Mobile Devices: Life through the Looking Glass explores the role of mobile technologies in everyday life via the extended case study of Apple's mobile operating system (iOS) for the iPhone, iPad, and iPod. Via a detailed application (including numerous extended examples) of the experiences associated with Apple's iOS devices, Charles Soukup examines contemporary screen culture and how individuals navigate it via mobile technologies. Mobile devices provide a lifeline that sifts through, limits, and simplifies the complexities of rapid, vast, circulating information in postmodern culture. Particularly, simple, game-like applications with clear rules and numerical outcomes exceptionally focus, frame, and filter an overwhelming media-saturated culture. Rather than merely outlining the problems associated with a world dominated by digital screens, Exploring Screen Culture via Apple's Mobile Devices offers a means for understanding screen culture as well as viable solutions to the challenges facing contemporary social life.

Trusted Platform Module Basics - Using TPM in Embedded Systems (Paperback): Steven L. Kinney Trusted Platform Module Basics - Using TPM in Embedded Systems (Paperback)
Steven L. Kinney
R1,784 Discovery Miles 17 840 Ships in 10 - 15 working days

* Clear, practical tutorial style text with real-world applications
* First book on TPM for embedded designers
* Provides a sound foundation on the TPM, helping designers take advantage of hardware security based on sound TCG standards
* Covers all the TPM basics, discussing in detail the TPM Key Hierarchy and the Trusted Platform
Module specification
* Presents a methodology to enable designers and
developers to successfully integrate the TPM into an embedded design and verify the TPM's operation on a specific platform
* Includes an accompanying CD-ROM that contains the full source code, which can be customized and used in embedded designs-an extremely useful tool and timesaver for embedded developers!
- This sound foundation on the TPM provides clear, practical tutorials with detailed real-world application examples
- The author is reknowned for training embedded systems developers to successfully implement the TPM worldwide
- CD-ROM includes source code which can be customized for different embedded applications

Smart Cities in Application - Healthcare, Policy, and Innovation (Hardcover, 1st ed. 2020): Stan McClellan Smart Cities in Application - Healthcare, Policy, and Innovation (Hardcover, 1st ed. 2020)
Stan McClellan
R2,202 Discovery Miles 22 020 Ships in 10 - 17 working days

This book explores categories of applications and driving factors surrounding the Smart City phenomenon. The contributing authors provide perspective on the Smart Cities, covering numerous applications and classes of applications. The book uses a top-down exploration of the driving factors in Smart Cities, by including focal areas including "Smart Healthcare," "Public Safety & Policy Issues," and "Science, Technology, & Innovation." Contributors have direct and substantive experience with important aspects of Smart Cities and discuss issues with technologies & standards, roadblocks to implementation, innovations that create new opportunities, and other factors relevant to emerging Smart City infrastructures. Features an exploration of Smart City issues and solutions from a variety of stakeholders in the evolving field Presents conversational, nuanced, and forward thinking perspectives on Smart Cities, their implications, limitations, obstacles, and opportunities Includes contributions from industry insiders who have direct, relevant experience with their respective subjects as well as positioning and corporate stature

Innovations in Ultra-Wideband Technologies (Hardcover): Albert Sabban Innovations in Ultra-Wideband Technologies (Hardcover)
Albert Sabban
R3,071 Discovery Miles 30 710 Ships in 10 - 17 working days
Radio Wave Propagation in Ionosphere (Hardcover): Kevin Merriman Radio Wave Propagation in Ionosphere (Hardcover)
Kevin Merriman
R3,062 R2,778 Discovery Miles 27 780 Save R284 (9%) Ships in 10 - 17 working days
Mobile Computing (Hardcover): Jesus Hamilton Ortiz Mobile Computing (Hardcover)
Jesus Hamilton Ortiz
R3,076 Discovery Miles 30 760 Ships in 10 - 17 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Business Principles for Landscape…
Steven Cohan Hardcover R4,223 Discovery Miles 42 230
Hagfish Biology
Susan L. Edwards, Gregory G. Goss Paperback R1,573 Discovery Miles 15 730
Best Value in Construction
J. Kelly Paperback R1,618 Discovery Miles 16 180
Transgenic Fish
C.L. Hew, G.L. Fletcher Hardcover R3,101 Discovery Miles 31 010
Annual Reports on Computational…
David A Dixon Hardcover R5,566 Discovery Miles 55 660
Introduction to Plasma Spectroscopy
Hans-Joachim Kunze Hardcover R4,038 Discovery Miles 40 380
Chemical Modelling - Volume 17
Hilke Bahmann, Jean Christophe Tremblay Hardcover R11,222 Discovery Miles 112 220
Internal Photoemission Spectroscopy…
Valeri V Afanas'ev Hardcover R3,206 Discovery Miles 32 060
Macromolecular Crystallography…
Mark R. Sanderson, Jane V. Skelly Hardcover R2,284 Discovery Miles 22 840
Buddy Holly / Royal Philharmonic…
Buddy Holly / Royal Philharmon CD R139 R116 Discovery Miles 1 160

 

Partners