![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
Professionals new to the business will appreciate this outstanding introduction to intelligent network (IN) concepts, technology, and applications for use in mobile communications networks. The book helps assure success in bringing new services to market by clearly explaining the technology, relevant standards, marketability concerns, product development issues, and even evolutionary trends.
The Second Edition is an updated revision to the authors highly
successful and widely used introduction to the principles and
application of the statistical theory of signal detection. This
book emphasizes those theories that have been found to be
particularly useful in practice including principles applied to
detection problems encountered in digital communications, radar,
and sonar.
These proceedings present selected research papers from CSNC2017, held during 23th-25th May in Shanghai, China. The theme of CSNC2017 is Positioning, Connecting All. These papers discuss the technologies and applications of the Global Navigation Satellite System (GNSS), and the latest progress made in the China BeiDou System (BDS) especially. They are divided into 12 topics to match the corresponding sessions in CSNC2017, which broadly covered key topics in GNSS. Readers can learn about the BDS and keep abreast of the latest advances in GNSS techniques and applications.
Offers an understanding of the applications and supporting technologies associated with digital video communications. The text also shows how to provide reliable, flexible and robust video transmission over networks. It begins with a discussion of the new and emerging applications of digital video communications including tele-medicine, videoconferencing and distance learning, and introduces the key systems required to support digital video: the Internet, ATM networks and Broadband ISDN. It also explores near future developments to the Internet that will support real-time video traffic.
Explains the reasons, limitations and trade-offs inherent to communications satellites. The first half deals with link power budgets as well as communications hardware and examples of complete link budgets. Spacecraft technology and a description of the objectives and basic operating methods of each of the major supporting subsystems are covered in the last half. Contains end-of-chapter exercises and solutions.
Energy Management in Wireless Sensor Networks discusses this unavoidable issue in the application of Wireless Sensor Networks (WSN). To guarantee efficiency and durability in a network, the science must go beyond hardware solutions and seek alternative software solutions that allow for better data control from the source to delivery. Data transfer must obey different routing protocols, depending on the application type and network architecture. The correct protocol should allow for fluid information flow, as well as optimizing power consumption and resources - a challenge faced by dense networks. The topics covered in this book provide answers to these needs by introducing and exploring computer-based tools and protocol strategies for low power consumption and the implementation of routing mechanisms which include several levels of intervention, ranging from deployment to network operation.
This work makes major contributions to the thriving area of social, communication, and distributed networks by introducing novel methodologies and tools toward the study of the evolutionary behaviors of these networks, as well as their computational complexity and rates of convergence. By departing from the classical approaches and results in the literature, this work shows that it is possible to handle more complex and realistic nonlinear models where either the traditional approaches fail or lead to weak results. The author also develops several easily implementable algorithms, delivering excellent performance guarantees while running faster than those that exist in the literature. The study undertaken and the approaches adopted enable the analysis of the evolution of several different types of social and distributed networks, with the potential to apply to and resolve several other outstanding issues in such networks.
These proceedings present the latest information on intelligent- transportation technologies and their applications in real-world cases. The Second International Conference on Intelligent Transportation was held in Chengdu, China on November 25-27, 2015, to present the latest research in the field, including intelligent-transportation management, intelligent vehicles, rail transportation systems, traffic transportation networks, as well as road traffic element simulations and their industrial development. The aim of conference was to bring together academics, researchers, engineers and students from across the world to discuss state-of-the-art technologies related to intelligent transportation.
Written by the pioneer and foremost authority on the subject, this new book is both a comprehensive university textbook and professional/research reference on the finite-difference time-domain (FD-TD) computational solution method for Maxwell's equations. It presents in-depth discussions of: The revolutionary Berenger PML absorbing boundary condition; FD-TD modelling of nonlinear, dispersive, and gain optical materials used in lasers and optical microchips; unstructured FD-TD meshes for modelling of complex systems; 2.5-dimensional body-of-revolution FD-TD algorithms; Linear and nonlinear electronic circuit models, including a seamless tie-in to SPICE; Digital signal postprocessing of FD-TD data; FD-TD modelling of microlaser cavities; and FD-TD software development for the latest Intel and Cray massively parallel computers.
Implementing IP and Ethernet on the 4G Mobile Network delves into the 4G mobile network that allows an IP packet transmitted by a mobile to be transported to its gateway, reciprocally using the following networks: MPLS-VPN, VPLS and OTN. The mechanisms for the implementation of quality of service (QoS) on the EPS, IP, Ethernet and MPLS networks are presented, as is the security for the LTE radio interface, the NAS messages and the links of the transport (IPSec). In addition, readers will find discussions of the aspects relating to the synchronization of the eNB entities, including SyncE and IEEE 1588 mechanisms.
With the steady stream of new web based information technologies being introduced to organizations, the need for network and communication technologies to provide an easy integration of knowledge and information sharing is essential. Network and Communication Technology Innovations for Web and IT Advancement presents studies on trends, developments, and methods on information technology advancements through network and communication technology. This collection brings together integrated approaches for communication technology and usage for web and IT advancements.
This proceeding features papers discussing big data innovation for sustainable cognitive computing. The papers feature detail on cognitive computing and its self-learning systems that use data mining, pattern recognition and natural language processing (NLP) to mirror the way the human brain works. This international conference focuses on cognitive computing technologies, from knowledge representation techniques and natural language processing algorithms to dynamic learning approaches. Topics covered include Data Science for Cognitive Analysis, Real-Time Ubiquitous Data Science, Platform for Privacy Preserving Data Science, and Internet-Based Cognitive Platform. The EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (BDCC 2018), took place on 13 - 15 December 2018 in Coimbatore, India.
This book discusses the design and implementation aspects of ultra-low power biosignal acquisition platforms that exploit analog-assisted and algorithmic approaches for power savings.The authors describe an approach referred to as "analog-and-algorithm-assisted" signal processing.This enables significant power consumption reductions by implementing low power biosignal acquisition systems, leveraging analog preprocessing and algorithmic approaches to reduce the data rate very early in the signal processing chain.They demonstrate savings for wearable sensor networks (WSN) and body area networks (BAN), in the sensors' stimulation power consumption, as well in the power consumption of the digital signal processing and the radio link. Two specific implementations, an adaptive sampling electrocardiogram (ECG) acquisition and a compressive sampling (CS) photoplethysmogram (PPG) acquisition system, are demonstrated. First book to present the so called, "analog-and-algorithm-assisted" approaches for ultra-low power biosignal acquisition and processing platforms; Covers the recent trend of "beyond Nyquist rate" signal acquisition and processing in detail, including adaptive sampling and compressive sampling paradigms; Includes chapters on compressed domain feature extraction, as well as acquisition of photoplethysmogram, an emerging optical sensing modality, including compressive sampling based PPG readout with embedded feature extraction; Discusses emerging trends in sensor fusion for improving the signal integrity, as well as lowering the power consumption of biosignal acquisition systems.
This book provides probabilistic, deterministic and geolocation-aware approaches for adaptive connectivity, robust security and privacy-aware communications for vehicular cyber physical systems (CPS). It presents mathematical models and numerical results obtained from experiments and simulations, and a trade-off between connectivity, security and privacy for vehicular communications. Connectivity between vehicles is crucial for vehicular CPS. Intelligent vehicular CPS provides not only road safety and traffic efficiency by exchanging information among vehicles, but also offers infotainment services to passengers using a variety of wireless technologies to forward the traffic/trajectory information with Vehicle-to-Vehicle (V2V), vehicular ad hoc network (VANET), and Vehicle-to-Roadside-to-Vehicle (V2R2V) communications. The book covers how to ensure that the message received from other vehicles is secure and trustworthy, rather than malicious. Further, it reveals how to make sure that the privacy of participants is not revealed while validating the received message. Researchers and professionals working with vehicular networks, smart systems, cyber physical systems, and mobile privacy will find this book valuable.
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yesterday, today and tomorrow ) culled from Cryptologia (Rose-Hulman Institute of Technology, Terre Haute, IN). The articles are divided into five sectio
This book presents the design of delay-efficient packet schedulers for heterogeneous M2M uplink traffic classified into several classes, based on packet delay requirements, payload size, arrival process, etc. Specifically, the authors use tools from queuing theory to determine the delay-optimal scheduling policy. The proposed packet schedulers are designed for a generic M2M architecture and thus equally applicable to any M2M application. Additionally, due to their low implementation complexity and excellent delay-performance, they authors show how they are also well-suited for practical M2M systems. The book pertains primarily to real-time process scheduler experts in industry/academia and graduate students whose research deals with designing Quality-of-Service-aware packet schedulers for M2M packet schedulers over existing and future cellular infrastructure. Presents queuing theoretic analysis and optimization techniques used to design proposed packet scheduling strategies; Provides utility functions to precisely model diverse delay requirements, which lends itself to formulation of utility-maximization problems for determining the delay- or utility-optimal packet scheduler; Includes detail on low implementation complexity of the proposed scheduler by using iterative and distributed optimization techniques.
Space-time adaptive processing (STAP) is a technology for advanced radar systems that allows for significant performance enhancements over conventional approaches. Based on a course taught in industry, government and academia, this is a practical introduction to STAP concepts and methods, placing emphasis on implementation in real-world systems. It addresses the needs of radar engineers who are seeking to apply effective STAP techniques to their systems, and can also be used as a reference by non-radar specialists with an interest in the signal processing applications of STAP. The authors aim to explain critical topics in a manner that should be understandable to anyone with a basic background in radar and signal processing.
This book presents design methods and considerations for digitally-assisted wideband millimeter-wave transmitters. It addresses comprehensively both RF design and digital implementation simultaneously, in order to design energy- and cost-efficient high-performance transmitters for mm-wave high-speed communications. It covers the complete design flow, from link budget assessment to the transistor-level design of different RF front-end blocks, such as mixers and power amplifiers, presenting different alternatives and discussing the existing trade-offs. The authors also analyze the effect of the imperfections of these blocks in the overall performance, while describing techniques to correct and compensate for them digitally. Well-known techniques are revisited, and some new ones are described, giving examples of their applications and proving them in real integrated circuits.
This book brings the reader up-to-date on all aspects concerning ECCM at the antenna level. It is a reference tool for professionals seeking quick answers to on-the-job problems. This text delivers an accurate description of working principles, processing schemes and performance evaluation techniques. In addition, it provides engineering details on the newest digital techiques for sidelobe jamming cancellation and digital beamforming (DFB).
This volume presents the second part of the proceedings of the Mediterranean Conference on Information & Communication Technologies (MedICT 2015), which was held at Saidia, Morocco during 7-9 May, 2015. MedICT provides an excellent international forum to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development. The conference has also a special focus on enabling technologies for societal challenges, and seeks to address multidisciplinary challenges in Information & Communication Technologies such as health, demographic change, wellbeing, security and sustainability issues. The proceedings publish high quality papers which are closely related to the various theories, as well as emerging and practical applications of particular interest to the ICT community. This second volume provides a compact yet broad view of recent developments in Data, Systems, Services and Education, and covers recent research areas in the field including Control Systems, Software Engineering, Data Mining and Big Data, ICT for Education and Support Activities, Networking, Cloud Computing and Security, ICT Based Services and Applications, Mobile Agent Systems, Software Engineering, Data Mining and Big Data, Online Experimentation & Artificial Intelligence in Education, Networking, Cloud Computing and Security, ICT Based Education and Services ICT Challenges and Applications, Advances in ICT Modeling and Design ICT Developments.
In recent years, technology has permeated every aspect of daily life and has drastically increased accessibility and empowerment for all demographics. Smart technologies and mobile applications now have the ability to promote and protect the basic rights of children, women, and men alike. A child's right to education and mental growth or a woman's socio-economic stability and protection from physical, sexual, and emotional abuse can all be attributed to these advancements. Mobile Devices and Smart Gadgets in Human Rights provides emerging research exploring the theoretical and practical applications of technology in relation to human ethical treatment and interactions. Featuring coverage on a broad range of topics such as public safety, augmented reality, and safety apps, this book is ideally designed for researchers, students, activists, academicians, policymakers, and government officials seeking current research on the influence of portable technologies in human rights and ethics.
This book explores the ways in which the broad range of technologies that make up the smart city infrastructure can be harnessed to incorporate more playfulness into the day-to-day activities that take place within smart cities, making them not only more efficient but also more enjoyable for the people who live and work within their confines. The book addresses various topics that will be of interest to playable cities stakeholders, including the human-computer interaction and game designer communities, computer scientists researching sensor and actuator technology in public spaces, urban designers, and (hopefully) urban policymakers. This is a follow-up to another book on Playable Cities edited by Anton Nijholt and published in 2017 in the same book series, Gaming Media and Social Effects. |
You may like...
Teaching and Learning Secondary School…
Ann Kajander, Jennifer Holm, …
Hardcover
R4,686
Discovery Miles 46 860
Random Ordinary Differential Equations…
Xiaoying Han, Peter E. Kloeden
Hardcover
R4,012
Discovery Miles 40 120
Corey Hates Covid!
Ronnette Jean Smith-Powell, Destiny S Powell
Hardcover
|