![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
Intended for technical professional and working engineers, with a minimum of senior undergraduate background, this is a complete guide to understanding and utilizing today's Global Positioning System, a satellite navigation system providing accurate, contiunous, worldwide, three-dimensional position and velocity data. Fifteen expert authors cover all aspects og GPS, from the fundamentals and benefits of satellite navigation systems, to future projections for GPS markets and applications in air, land and marine navigation.
The only integrative approach to chaos and random fractal theory Chaos and random fractal theory are two of the most important theories developed for data analysis. Until now, there has been no single book that encompasses all of the basic concepts necessary for researchers to fully understand the ever-expanding literature and apply novel methods to effectively solve their signal processing problems. Multiscale Analysis of Complex Time Series fills this pressing need by presenting chaos and random fractal theory in a unified manner. Adopting a data-driven approach, the book covers: DNA sequence analysis EEG analysis Heart rate variability analysis Neural information processing Network traffic modeling Economic time series analysis And more Additionally, the book illustrates almost every concept presented through applications and a dedicated Web site is available with source codes written in various languages, including Java, Fortran, C, and MATLAB, together with some simulated and experimental data. The only modern treatment of signal processing with chaos and random fractals unified, this is an essential book for researchers and graduate students in electrical engineering, computer science, bioengineering, and many other fields.
Ground Penetrating Radar: Theory and Practice is a practical guide to using this powerful underground surveying technique. The author uses her wide experience to explain the critical factors in using GPR and how parameters, such as wavelength, attenuation and loss need to be properly considered to obtain good survey results. The first chapter introduces the underlying physics and explains the formation of signal patterning. The next two chapters explain the significance of wavelengths for target detection, probing depths and resolution, and demonstrating the variety of signal presentation. Chapter four discusses why survey results are affected by water and air in the soil, and how this may affect depth readings. Additional chapters discuss a variety of methods for velocity calibration and suggests where they may be useful, challenging soil conditions and potential problem environments, data processing and a suite of useful techniques, amongst other important topics. The book gives a clear and formative guidance on understanding the critical factors in using GPR, as well as a checklist of surveying considerations.
The Second Edition is an updated revision to the authors highly
successful and widely used introduction to the principles and
application of the statistical theory of signal detection. This
book emphasizes those theories that have been found to be
particularly useful in practice including principles applied to
detection problems encountered in digital communications, radar,
and sonar.
Professionals new to the business will appreciate this outstanding introduction to intelligent network (IN) concepts, technology, and applications for use in mobile communications networks. The book helps assure success in bringing new services to market by clearly explaining the technology, relevant standards, marketability concerns, product development issues, and even evolutionary trends.
These proceedings present selected research papers from CSNC2017, held during 23th-25th May in Shanghai, China. The theme of CSNC2017 is Positioning, Connecting All. These papers discuss the technologies and applications of the Global Navigation Satellite System (GNSS), and the latest progress made in the China BeiDou System (BDS) especially. They are divided into 12 topics to match the corresponding sessions in CSNC2017, which broadly covered key topics in GNSS. Readers can learn about the BDS and keep abreast of the latest advances in GNSS techniques and applications.
Offers an understanding of the applications and supporting technologies associated with digital video communications. The text also shows how to provide reliable, flexible and robust video transmission over networks. It begins with a discussion of the new and emerging applications of digital video communications including tele-medicine, videoconferencing and distance learning, and introduces the key systems required to support digital video: the Internet, ATM networks and Broadband ISDN. It also explores near future developments to the Internet that will support real-time video traffic.
Explains the reasons, limitations and trade-offs inherent to communications satellites. The first half deals with link power budgets as well as communications hardware and examples of complete link budgets. Spacecraft technology and a description of the objectives and basic operating methods of each of the major supporting subsystems are covered in the last half. Contains end-of-chapter exercises and solutions.
Energy Management in Wireless Sensor Networks discusses this unavoidable issue in the application of Wireless Sensor Networks (WSN). To guarantee efficiency and durability in a network, the science must go beyond hardware solutions and seek alternative software solutions that allow for better data control from the source to delivery. Data transfer must obey different routing protocols, depending on the application type and network architecture. The correct protocol should allow for fluid information flow, as well as optimizing power consumption and resources - a challenge faced by dense networks. The topics covered in this book provide answers to these needs by introducing and exploring computer-based tools and protocol strategies for low power consumption and the implementation of routing mechanisms which include several levels of intervention, ranging from deployment to network operation.
Optimization of Manufacturing Systems Using the Internet of Things extends the IoT (Internet of Things) into the manufacturing field to develop an IoMT (Internet of Manufacturing Things) architecture with real-time traceability, visibility, and interoperability in production planning, execution, and control. This book is essential reading for anyone interested in the optimization and control of an intelligent manufacturing system. As modern manufacturing shop-floors can create bottlenecks in the capturing and collection of real-time field information, and because paper-based manual systems are time-consuming and prone to errors, this book helps readers understand how to alleviate these issues, assisting them in their decision-making on shop-floors.
This textbook introduces Wireless Powered Communication Networks (WPCNs) as a promising paradigm to overcome the energy bottleneck suffered by traditional wireless communication networks, as well as emerging Internet-of-Things networks. It selectively spans a coherent spectrum of fundamental aspects in WPCNs, such as wireless energy transfer (WEH) techniques, radio frequency (RF) energy harvesting receiver model, simultaneous wireless information and power transfer (SWIPT), as well as the rate-energy tradeoff arising from the joint transmission of information and energy using the same waveform. It covers network models for WPCNs, including the baseline and dual-hop WPCN models and a variety of related extensions. This book further examines the key factors including throughput, fairness, and security that must be taken into account for impeccable operation of WPCNs. The new IoT applications are targeted as a key element in those factors. It will also include exercises and examples throughout the book, as well as their PLS solutions. This is the first textbook examining the current research to provide a unified view of wireless power transfer (WPT) and information transmission in WPCNs from a physical layer security (PLS) perspective. Focused on designing efficient secure transmission schemes, analyzing energy evolvement process, and evaluating secrecy outage performance under different channel state information (CSI), the results presented in this book shed light on how to best balance security and throughput with prudent use of harvested energy in WCNs. It also provides an overview of the WPCNs by introducing the background of WPT, followed by a summary of the research conducted in the field. The authors describe the physical-layer security (PLS) problem in WPCNs, including the causes and the impacts of the problem on the performance of WPCNs. The authors extend the discussions by introducing the applications of WPCNs in the IoT. From the Internet of Things (IoT) point of view, this textbook reviews the opportunities and challenges for the lately-emerged WPCN to seamlessly integrate into the IoT ecosystem. It specifically addresses the maximization problem of uplink and downlink sum-throughout in a dual-hop WPCN, while taking fairness among WPCN users as a constraint. The results provided in this book reveal valuable insights into improving the design and deployment of future WPCNs in the upcoming IoT environment. This textbook targets advanced-level students studying wireless communications and research engineers working in this field. Industry engineers in mobile device and network development business with an interest in WPCNs and IoT, as well as their PLS solutions, will also find this book useful.
These proceedings present the latest information on intelligent- transportation technologies and their applications in real-world cases. The Second International Conference on Intelligent Transportation was held in Chengdu, China on November 25-27, 2015, to present the latest research in the field, including intelligent-transportation management, intelligent vehicles, rail transportation systems, traffic transportation networks, as well as road traffic element simulations and their industrial development. The aim of conference was to bring together academics, researchers, engineers and students from across the world to discuss state-of-the-art technologies related to intelligent transportation.
This work makes major contributions to the thriving area of social, communication, and distributed networks by introducing novel methodologies and tools toward the study of the evolutionary behaviors of these networks, as well as their computational complexity and rates of convergence. By departing from the classical approaches and results in the literature, this work shows that it is possible to handle more complex and realistic nonlinear models where either the traditional approaches fail or lead to weak results. The author also develops several easily implementable algorithms, delivering excellent performance guarantees while running faster than those that exist in the literature. The study undertaken and the approaches adopted enable the analysis of the evolution of several different types of social and distributed networks, with the potential to apply to and resolve several other outstanding issues in such networks.
Written by the pioneer and foremost authority on the subject, this new book is both a comprehensive university textbook and professional/research reference on the finite-difference time-domain (FD-TD) computational solution method for Maxwell's equations. It presents in-depth discussions of: The revolutionary Berenger PML absorbing boundary condition; FD-TD modelling of nonlinear, dispersive, and gain optical materials used in lasers and optical microchips; unstructured FD-TD meshes for modelling of complex systems; 2.5-dimensional body-of-revolution FD-TD algorithms; Linear and nonlinear electronic circuit models, including a seamless tie-in to SPICE; Digital signal postprocessing of FD-TD data; FD-TD modelling of microlaser cavities; and FD-TD software development for the latest Intel and Cray massively parallel computers.
Implementing IP and Ethernet on the 4G Mobile Network delves into the 4G mobile network that allows an IP packet transmitted by a mobile to be transported to its gateway, reciprocally using the following networks: MPLS-VPN, VPLS and OTN. The mechanisms for the implementation of quality of service (QoS) on the EPS, IP, Ethernet and MPLS networks are presented, as is the security for the LTE radio interface, the NAS messages and the links of the transport (IPSec). In addition, readers will find discussions of the aspects relating to the synchronization of the eNB entities, including SyncE and IEEE 1588 mechanisms.
This proceeding features papers discussing big data innovation for sustainable cognitive computing. The papers feature detail on cognitive computing and its self-learning systems that use data mining, pattern recognition and natural language processing (NLP) to mirror the way the human brain works. This international conference focuses on cognitive computing technologies, from knowledge representation techniques and natural language processing algorithms to dynamic learning approaches. Topics covered include Data Science for Cognitive Analysis, Real-Time Ubiquitous Data Science, Platform for Privacy Preserving Data Science, and Internet-Based Cognitive Platform. The EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (BDCC 2018), took place on 13 - 15 December 2018 in Coimbatore, India.
This book discusses the design and implementation aspects of ultra-low power biosignal acquisition platforms that exploit analog-assisted and algorithmic approaches for power savings.The authors describe an approach referred to as "analog-and-algorithm-assisted" signal processing.This enables significant power consumption reductions by implementing low power biosignal acquisition systems, leveraging analog preprocessing and algorithmic approaches to reduce the data rate very early in the signal processing chain.They demonstrate savings for wearable sensor networks (WSN) and body area networks (BAN), in the sensors' stimulation power consumption, as well in the power consumption of the digital signal processing and the radio link. Two specific implementations, an adaptive sampling electrocardiogram (ECG) acquisition and a compressive sampling (CS) photoplethysmogram (PPG) acquisition system, are demonstrated. First book to present the so called, "analog-and-algorithm-assisted" approaches for ultra-low power biosignal acquisition and processing platforms; Covers the recent trend of "beyond Nyquist rate" signal acquisition and processing in detail, including adaptive sampling and compressive sampling paradigms; Includes chapters on compressed domain feature extraction, as well as acquisition of photoplethysmogram, an emerging optical sensing modality, including compressive sampling based PPG readout with embedded feature extraction; Discusses emerging trends in sensor fusion for improving the signal integrity, as well as lowering the power consumption of biosignal acquisition systems.
This book provides probabilistic, deterministic and geolocation-aware approaches for adaptive connectivity, robust security and privacy-aware communications for vehicular cyber physical systems (CPS). It presents mathematical models and numerical results obtained from experiments and simulations, and a trade-off between connectivity, security and privacy for vehicular communications. Connectivity between vehicles is crucial for vehicular CPS. Intelligent vehicular CPS provides not only road safety and traffic efficiency by exchanging information among vehicles, but also offers infotainment services to passengers using a variety of wireless technologies to forward the traffic/trajectory information with Vehicle-to-Vehicle (V2V), vehicular ad hoc network (VANET), and Vehicle-to-Roadside-to-Vehicle (V2R2V) communications. The book covers how to ensure that the message received from other vehicles is secure and trustworthy, rather than malicious. Further, it reveals how to make sure that the privacy of participants is not revealed while validating the received message. Researchers and professionals working with vehicular networks, smart systems, cyber physical systems, and mobile privacy will find this book valuable.
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yesterday, today and tomorrow ) culled from Cryptologia (Rose-Hulman Institute of Technology, Terre Haute, IN). The articles are divided into five sectio
In recent years, technology has permeated every aspect of daily life and has drastically increased accessibility and empowerment for all demographics. Smart technologies and mobile applications now have the ability to promote and protect the basic rights of children, women, and men alike. A child's right to education and mental growth or a woman's socio-economic stability and protection from physical, sexual, and emotional abuse can all be attributed to these advancements. Mobile Devices and Smart Gadgets in Human Rights provides emerging research exploring the theoretical and practical applications of technology in relation to human ethical treatment and interactions. Featuring coverage on a broad range of topics such as public safety, augmented reality, and safety apps, this book is ideally designed for researchers, students, activists, academicians, policymakers, and government officials seeking current research on the influence of portable technologies in human rights and ethics.
This book presents the design of delay-efficient packet schedulers for heterogeneous M2M uplink traffic classified into several classes, based on packet delay requirements, payload size, arrival process, etc. Specifically, the authors use tools from queuing theory to determine the delay-optimal scheduling policy. The proposed packet schedulers are designed for a generic M2M architecture and thus equally applicable to any M2M application. Additionally, due to their low implementation complexity and excellent delay-performance, they authors show how they are also well-suited for practical M2M systems. The book pertains primarily to real-time process scheduler experts in industry/academia and graduate students whose research deals with designing Quality-of-Service-aware packet schedulers for M2M packet schedulers over existing and future cellular infrastructure. Presents queuing theoretic analysis and optimization techniques used to design proposed packet scheduling strategies; Provides utility functions to precisely model diverse delay requirements, which lends itself to formulation of utility-maximization problems for determining the delay- or utility-optimal packet scheduler; Includes detail on low implementation complexity of the proposed scheduler by using iterative and distributed optimization techniques.
Space-time adaptive processing (STAP) is a technology for advanced radar systems that allows for significant performance enhancements over conventional approaches. Based on a course taught in industry, government and academia, this is a practical introduction to STAP concepts and methods, placing emphasis on implementation in real-world systems. It addresses the needs of radar engineers who are seeking to apply effective STAP techniques to their systems, and can also be used as a reference by non-radar specialists with an interest in the signal processing applications of STAP. The authors aim to explain critical topics in a manner that should be understandable to anyone with a basic background in radar and signal processing.
This book brings the reader up-to-date on all aspects concerning ECCM at the antenna level. It is a reference tool for professionals seeking quick answers to on-the-job problems. This text delivers an accurate description of working principles, processing schemes and performance evaluation techniques. In addition, it provides engineering details on the newest digital techiques for sidelobe jamming cancellation and digital beamforming (DFB). |
You may like...
The Lifecycle of Trust in Education…
Benjamin Kutsyuruba, Keith D Walker
Hardcover
R2,941
Discovery Miles 29 410
|