![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
OQAM/FBMC for Future Wireless Communications: Principles, Technologies and Applications introduces the concepts and key technologies of OQAM/FBMC, which has been regarded as the potential physical layer technique in future wireless communication systems. It comprises 10 chapters that provide an overview of wireless communications, introduce wireless channels, single carrier and multicarrier modulations, and three types of FBMC systems, also comparing OQAM/FBMC with OFDM. Other chapters introduce the OQAM/FBMC communication system model, the FFT implementation, CP insertion, PSD analysis, prototype filter optimization, joint PAPR reduction and sidelobe suppression, overhead reduction with virtual symbols, time and frequency domain channel estimations, block-wise SFBC for MIMO OQAM/FBMC, and much more.
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.
One of the crucial challenges for future smart cities is to devise a citywide network infrastructure capable of effectively guaranteeing resource-efficient and reliable communications while managing the complexity of heterogeneous devices and access technologies. This edited book highlights and showcases state of the art research and innovations in 5G and beyond wireless communications technologies for connected smart cities. The main objectives of this work include the exploration of recent advances and application potentials of various communication technologies as promising enablers for future networked smart cities, the investigation of design-specific issues for the integration of different architectural components of smart cities, and addressing various challenges and identifying opportunities in terms of interoperability of potential solutions. The book is aimed at a core and interdisciplinary audience of engineers, researchers and professionals working on smart cities concepts and supporting the integration of next-generation information, communication, networking and sensing technologies. It will also be a very useful ancillary for advanced students and other professionals working on next-generation communication networks.
Mobile Commerce Applications addresses and explores the critical architectural issues in constructing m-commerce applications and in applying mobile technologies in different areas, including methodologies, enabling technologies, models, paradigms, architectures, standards and innovations.
This two-volume set focuses on fundamental concepts and design goals (i.e., a switch/router's key features), architectures, and practical applications of switch/routers in IP networks. The discussion includes practical design examples to illustrate how switch/routers are designed and how the key features are implemented. Designing Switch/Routers: Fundamental Concepts, Design Methods, Architectures, and Applications begins by providing an introductory level discussion that covers the functions and architectures of the switch/router. The first book considers the switch/router as a generic Layer 2 and Layer 3 forwarding device without placing emphasis on any particular manufacturer's device. The underlining concepts and design methods are not only positioned to be applicable to this generic switch/router, but also to the typical switch/router seen in the industry. The discussion provides a better insight into the protocols, methods, processes, and tools that go into designing switch/routers. The second volume explains the design and architectural considerations, as well as, the typical processes and steps used to build practical switch/routers. It then discusses the advantages of using Ethernet in today's networks and why Ethernet continues to play a bigger role in Local Area Network (LAN), Metropolitan Area Network (MAN), and Wide Area Network (WAN) design. This book set provides a discussion of the design of switch/routers and is written in a style to appeal to undergraduate and graduate-level students, engineers, and researchers in the networking and telecoms industry, as well as academics and other industry professionals. The material and discussion are structured in such a way that they could serve as standalone teaching material for networking and telecom courses and/or supplementary material for such courses.
This book focuses on conceptual frameworks that are helpful in understanding the basics of electronics - what the feedback system is, the principle of an oscillator, the operational working of an amplifier, and other relevant topics. It also provides an overview of the technologies supporting electronic systems, like OP-AMP, transistor, filter, ICs, and diodes. It consists of seven chapters, written in an easy and understandable language, and featuring relevant block diagrams, circuit diagrams, valuable and interesting solved examples, and important test questions. Further, the book includes up-to-date illustrations, exercises, and numerous worked examples to illustrate the theory and to demonstrate their use in practical designs.
Phased-Array Radar Design is a text-reference designed for electrical engineering graduate students in colleges and universities as well as for corporate in-house training programs for radar design engineers, especially systems engineers and analysts who would like to gain hands-on, practical knowledge and skills in radar design fundamentals, advanced radar concepts, trade-offs for radar design and radar performance analysis. This book is a concise yet complete treatment of the relationship between mission-level requirements and specific hardware and software requirements and capabilities. Although focusing on surface-based radars, the material is general enough to serve as a useful addition to books currently available for this purpose. It covers all phases of design and development, including the development of initial concepts and overall system requirements, system architecture, hardware and software subsystem requirements, detailed algorithms and system integration and test. This book provides a wealth of information rarely covered in one book. It is unique in that it provides a hands on and how to perspective on applying radar theory to design and analysis. Rather than being a theory and derivations-type, this book is applications-oriented making it different from other published works on this subject.
Finding ways to interfere with or jam communication signals is an essential area of electronic warfare (EW). In modern EW systems, anti-jam technology has been employed to overcome signal jamming. Recently, electronic warfare R&D has focused on creating methods to disrupt these anti-jam systems. This newly revised and greatly expanded edition of the popular Artech House book, "Modern Communications Jamming Principles and Techniques", provides an up-to-date, exhaustive treatment of the techniques and methods available to create countermeasures against anti-jam, over-the-air communications. The Second Edition features a wealth of new material on urban warfare, including a computer simulation of EW architecture alternatives for land-based forces based on urban constraints. This unique resource is dedicated to showing professionals how to design and build jammers specifically targeted at anti-jam communications. Moreover, practitioners find assistance in evaluating the expected performance of jamming systems against modern communications systems.
This book objectively represents the status quo and trends of world Internet development in 2021, systematically summarizes Internet development in major countries and regions, and deeply analyzes new development condition and trends in key fields of Internet, in terms of eight aspects, i.e., information infrastructure, information technology, digital economy, e-government, cyber media, cybersecurity, cyberlaws, and international cyberspace governance. This book maintains the index system of world Internet development, optimizes some indexes, and comprehensively evaluates Internet development in major countries and regions in the world, in order to better demonstrate the strength and characteristics of Internet development in various countries and mirror the overall trend in world Internet development in a comprehensive, accurate, and objective way. This book collects the latest research results in world Internet development. With diverse subjects and detailed discussion, this book possesses great significance for these engaged in Internet field in governmental departments, Internet enterprises, scientific research institutions, and universities, who hope to fully understand world Internet development.
Starting from voice services with simple terminals, today a mobile device is nothing sort of a small PC in the form of smart-phones. The result has been a huge increase in data-services giving mobile communication access to critical aspects of human society / life. This has led to standardization of SAE/LTE (System Architecture Evolution / Long Term Evolution) by 3GPP and IEEE 802.16e / WiMAX. Together with penetration of mobile communications and new standardization come new security issues and thus the need for new security solutions. This book provides a fresh look at those security aspects, with main focus on the latest security developments of 3GPP SAE/LTE and WiMAX. SAE/LTE is also known as Evolved Packet System (EPS).The intended audience for this book is mobile network and device architects, designers, researchers and students. The goal of the authors, who have a combined experience of more than 25 years in mobile security standardization, architecture, research, and education, is to provide the book?s readers with a fresh and up-to-date look at the architecture and challenges of EPS and WiMAX security. This book includes 6 chapters, where the first 3 chapters are intended to be introductory ones, and the remaining 3 chapters provide more in-depth discussions. The book starts with Chapter 1 where we give a background of Next Generation Mobile Networks (NGMN) activity and requirements. Following explanation of NGMN, Chapter 2 provides an overview of security, telecommunication systems and their requirements. Chapter 3 provides some background on standardization. Chapter 4 discusses the EPS (or SAE/LTE) security architecture developed by 3GPP. In particular, this chapter covers the authentication and key agreement method for SAE/LTE together with newly defined key hierarchy. This chapter also addresses the challenging aspects of SAE/LTE interworking and mobility with UMTS together with the necessary key-exchange technologies. The focus of Chapter 5 is WiMAX (IEEE 802.16) security. Chapter 5 provides an in-depth discussion of the WiMAX security requirements, the authentication aspects of PKMv2, and the overall WiMAX network security aspects. In Chapter 6 we briefly cover security for (i) Home(evolved)NodeB (H(e)NB) is the Femto solution from 3GPP), (ii) Machine-to-Machine (M2M) security and (iii) Multimedia Broadcast and Multicast Service (MBMS) and Group Key Management.
Because the wireless industry is less capital intensive than others sectors in the telecommunications marketplace, it is expected to enjoy continued profitability. With survival at stake, telecommunications companies must ready themselves for battle to win access and operations rights in the wireless communications spectrum. This book maps out the strategies required to fight this battle by explaining how a telecommunications company should structure its entry and operations in the spectrum.
Drawing upon his experience in building the first major CDMA network in North America, Samuel Yang explains the essentials of CDMA wireless technology, helping the reader acquire the knowledge needed to engineer and implement an IS-95 based CDMA system. Examining both the theoretical and practical side of CDMA engineering, this guide is designed for practicing RF and system engineers who should find the modular-oriented chapters on spread-spectrum multiple access technique, design and performance engineering, CDMA traffic engineering, and regulatory implications especially useful.
This classroom-tested textbook describes the design and implementation of software for distributed real-time systems, using a bottom-up approach. The text addresses common challenges faced in software projects involving real-time systems, and presents a novel method for simply and effectively performing all of the software engineering steps. Each chapter opens with a discussion of the core concepts, together with a review of the relevant methods and available software. This is then followed with a description of the implementation of the concepts in a sample kernel, complete with executable code. Topics and features: introduces the fundamentals of real-time systems, including real-time architecture and distributed real-time systems; presents a focus on the real-time operating system, covering the concepts of task, memory, and input/output management; provides a detailed step-by-step construction of a real-time operating system kernel, which is then used to test various higher level implementations; describes periodic and aperiodic scheduling, resource management, and distributed scheduling; reviews the process of application design from high-level design methods to low-level details of design and implementation; surveys real-time programming languages and fault tolerance techniques; includes end-of-chapter review questions, extensive C code, numerous examples, and a case study implementing the methods in real-world applications; supplies additional material at an associated website. Requiring only a basic background in computer architecture and operating systems, this practically-oriented work is an invaluable study aid for senior undergraduate and graduate-level students of electrical and computer engineering, and computer science. The text will also serve as a useful general reference for researchers interested in real-time systems.
The increasing business use of wireless and mobile technologies on a variety of devices has accelerated the need for a better understanding of the technologies involved. ""Business Data Communications and Networking: A Research Perspective"" addresses the key issues for businesses utilizing data communications and the increasing importance of networking technologies in business. ""Business Data Communications and Networking: A Research Perspective"" covers a series of technical advances in the field while highlighting their respective contributions to business or organizational goals, and centers on the issues of network-based applications, mobility, wireless networks, and network security.
For scientists, research engineers, physicists and postgraduate students, this work introduces the essential aspects of electromagnetic waves in chiral and bi-isotropic media, to give the practical working knowledge necessary for new application development. It includes sections on effective methods of measurement, how chiral and BI media affect electromagnetic fields and wave propagation, and how to apply the theory to basic problems in waveguide, antenna and scattering analysis.
This book covers ideas, methods, algorithms, and tools for the in-depth study of the performance and reliability of dependable fault-tolerant systems. The chapters identify the current challenges that designers and practitioners must confront to ensure the reliability, availability, and performance of systems, with special focus on their dynamic behaviors and dependencies. Topics include network calculus, workload and scheduling; simulation, sensitivity analysis and applications; queuing networks analysis; clouds, federations and big data; and tools. This collection of recent research exposes system researchers, performance analysts, and practitioners to a spectrum of issues so that they can address these challenges in their work.
This book presents design methods and considerations for digitally-assisted wideband millimeter-wave transmitters. It addresses comprehensively both RF design and digital implementation simultaneously, in order to design energy- and cost-efficient high-performance transmitters for mm-wave high-speed communications. It covers the complete design flow, from link budget assessment to the transistor-level design of different RF front-end blocks, such as mixers and power amplifiers, presenting different alternatives and discussing the existing trade-offs. The authors also analyze the effect of the imperfections of these blocks in the overall performance, while describing techniques to correct and compensate for them digitally. Well-known techniques are revisited, and some new ones are described, giving examples of their applications and proving them in real integrated circuits.
Aims to teach the reader of the underlying principles and practical applications of digital A/V, and to show where technology is heading in the 21st century. The book shows how to screen and select A/V system components, and how to choose the best design approaches for a particular system. Broadcast and computer system-design engineers should find this a useful text for an understanding of analogue-digital conversion, video cameras, digital transmission and processing, compression, recording and storage, post-production, and more.
This detailed volume and accompanying CD-ROM focus on the set electronic transaction (SET) system and review the fundamentals through to practical instruction on how to develop and implement the entire SET system. Topics addressed include: electronic commerce and the various payment and security systems that have led to online credit card commerce; cryptographic extensions utilized by the SET system; and the technical details behind SET, from purchase initiation, through certificate management, to data transport protocols. Actual programming examples and computer code to construct and roll out the SET system are also included. The book should be of interest to business executives as well as engineers.
Addressing the vulnerabilities in today's critical infrastructure to natural disasters and terrorism, this practical book describes what public safety and other officials need to do to protect should be doing to pipelines, power plants, telecommunications, and other essential services before the unthinkable happens. The book explains how to maintain command and control in any disaster, and how to predict the probability of those disasters. Written by two highly regarded experts in the field, this one-of-a-kind guidebook shows how to simplify risk assessments and emergency response procedures to disasters affecting our critical national and local infrastructure.
A self-study tutorial which presents the fundamental principles and rigorous numerical validations of a major contemporary branch in frequency-domain computational electromagnetics.
The development of mobile technology has experienced exponential growth in recent years. Mobile devices are ubiquitous in modern society, impacting both our personal and professional lives. Mobile Application Development, Usability, and Security provides a thorough overview on the different facets of mobile technology management and its integration into modern society. Highlighting issues related to analytics, cloud computing, and different types of application development, this book is a pivotal reference source for professionals, researchers, upper-level students, and practitioners actively involved in the area of mobile computing. |
You may like...
What To Do When You Don't Know What To…
David Jeremiah
Paperback
(2)
|