![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
OQAM/FBMC for Future Wireless Communications: Principles, Technologies and Applications introduces the concepts and key technologies of OQAM/FBMC, which has been regarded as the potential physical layer technique in future wireless communication systems. It comprises 10 chapters that provide an overview of wireless communications, introduce wireless channels, single carrier and multicarrier modulations, and three types of FBMC systems, also comparing OQAM/FBMC with OFDM. Other chapters introduce the OQAM/FBMC communication system model, the FFT implementation, CP insertion, PSD analysis, prototype filter optimization, joint PAPR reduction and sidelobe suppression, overhead reduction with virtual symbols, time and frequency domain channel estimations, block-wise SFBC for MIMO OQAM/FBMC, and much more.
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.
The increasing business use of wireless and mobile technologies on a variety of devices has accelerated the need for a better understanding of the technologies involved. ""Business Data Communications and Networking: A Research Perspective"" addresses the key issues for businesses utilizing data communications and the increasing importance of networking technologies in business. ""Business Data Communications and Networking: A Research Perspective"" covers a series of technical advances in the field while highlighting their respective contributions to business or organizational goals, and centers on the issues of network-based applications, mobility, wireless networks, and network security.
This book traces the pedagogical evolution of technical communication in America as it grew out of Engineering English requirements from roughly the turn of the century to 1950. This study examines specific curricular patterns, texts, and writers on the subject of technical communication, while also tracing engineering educational patterns as they emerge from the proceedings of the society for the promotion of engineering education. Unique to the second edition of the book is a new preface by the recent past ATTW series editor, Jimmie Killingsworth, a new introduction by Elizabeth Tebeaux, and an epilogue by Katherine Staples. Writing in a Milieu of Utility concludes that technical writing, as we teach it today, likely found its roots in engineering composition pedagogy, when, at approximately the turn of the century, engineering educators recognized that writing about science and technology not only made sense in an academic milieu that emphasized utility, but that such writing could also contribute to the professional success of engineering students. Existing somewhat tenuously as engineering itself sought academic status, technical communication emerged ultimately as a re-conceptualized composition course, after early to mid twentieth century calls for English and engineering cooperation made traditional composition offerings less relevant. Academic writing on environmental communication proliferated in the 1990's. A few of us had been calling for such work and making initial investigations throughout the 1980's, but the momentum in the field built slowly. Spurred by coverage in the mass media, academic publishers finally caught the wave of interest. In this exciting new volume, the editors demonstrate more fully than ever before how environmental rhetoric and technical communication go hand in hand. The key link that they and their distinguished group of contributors have discovered is the ancient concern of communication scholars with public deliberation. Environmental issues present technical communicators with some of their greatest challenges, above all, how to make the highly specialized and inscrutably difficult technical information generated by environmental scientists and engineers usable in public decision making. The editors encourage us to accept the challenge of contributing to environmentally conscious decision making by integrating technical knowledge and human values. For technical communicators who accept the challenge of working toward solutions by opening access to crucial information and by engaging in critical thinking on ecological issues, the research and theory offered in this volume provide a strong foundation for future practice.
This book details some of the major developments in the implementation of compressive sensing in radio applications for electronic defense and warfare communication use. It provides a comprehensive background to the subject and at the same time describes some novel algorithms. It also investigates application value and performance-related parameters of compressive sensing in scenarios such as direction finding, spectrum monitoring, detection, and classification.
This monograph presents new theories and methods for fixed-time cooperative control of multi-agent systems. Fundamental concepts of fixed-time stability and stabilization are introduced with insightful understanding. This book presents solutions for several problems of fixed-time cooperative control using systematic design methods. The book compares fixed-time cooperative control with asymptotic cooperative control, demonstrating how the former can achieve better closed-loop performance and disturbance rejection properties. It also discusses the differences from finite-time control, and shows how fixed-time cooperative control can produce the faster rate of convergence and provide an explicit estimate of the settling time independent of initial conditions. This monograph presents multiple applications of fixed-time control schemes, including to distributed optimization of multi-agent systems, making it useful to students, researchers and engineers alike.
This book focuses on conceptual frameworks that are helpful in understanding the basics of electronics - what the feedback system is, the principle of an oscillator, the operational working of an amplifier, and other relevant topics. It also provides an overview of the technologies supporting electronic systems, like OP-AMP, transistor, filter, ICs, and diodes. It consists of seven chapters, written in an easy and understandable language, and featuring relevant block diagrams, circuit diagrams, valuable and interesting solved examples, and important test questions. Further, the book includes up-to-date illustrations, exercises, and numerous worked examples to illustrate the theory and to demonstrate their use in practical designs.
This book objectively represents the status quo and trends of world Internet development in 2021, systematically summarizes Internet development in major countries and regions, and deeply analyzes new development condition and trends in key fields of Internet, in terms of eight aspects, i.e., information infrastructure, information technology, digital economy, e-government, cyber media, cybersecurity, cyberlaws, and international cyberspace governance. This book maintains the index system of world Internet development, optimizes some indexes, and comprehensively evaluates Internet development in major countries and regions in the world, in order to better demonstrate the strength and characteristics of Internet development in various countries and mirror the overall trend in world Internet development in a comprehensive, accurate, and objective way. This book collects the latest research results in world Internet development. With diverse subjects and detailed discussion, this book possesses great significance for these engaged in Internet field in governmental departments, Internet enterprises, scientific research institutions, and universities, who hope to fully understand world Internet development.
Mobile Commerce Applications addresses and explores the critical architectural issues in constructing m-commerce applications and in applying mobile technologies in different areas, including methodologies, enabling technologies, models, paradigms, architectures, standards and innovations.
As Cavalli and Sarma astutely remarked in the introduction to this volume, it is quite remarkable that SDL '97 may have the first participant younger than SDL itself. SDL '97 provides the opportunity to reflect the course SDL has taken and why it has been successful over two decades where other languages addressing the same market have failed. SDL now also has a permanent companion in MSC (Message Sequence Charts). MSC today is a language in its own right and has its areas of application both in conjunction with SDL and independently or in combination with other techniques. MSC has strong structuring concepts to specify message sequences for large systems and can be used to develop scenarios, which is extremely useful for test and design environments. The SDL Forum today really is the SDL and MSC Forum.
This book provides insights into the First International Conference on Communication, Devices and Computing (ICCDC 2017), which was held in Haldia, India on November 2-3, 2017. It covers new ideas, applications and the experiences of research engineers, scientists, industrialists, scholars and students from around the globe. The proceedings highlight cutting-edge research on communication, electronic devices and computing, and address diverse areas such as 5G communication, spread spectrum systems, wireless sensor networks, signal processing for secure communication, error control coding, printed antennas, analysis of wireless networks, antenna array systems, analog and digital signal processing for communication systems, frequency selective surfaces, radar communication, and substrate integrated waveguide and microwave passive components, which are key to state-of-the-art innovations in communication technologies.
This classroom-tested textbook describes the design and implementation of software for distributed real-time systems, using a bottom-up approach. The text addresses common challenges faced in software projects involving real-time systems, and presents a novel method for simply and effectively performing all of the software engineering steps. Each chapter opens with a discussion of the core concepts, together with a review of the relevant methods and available software. This is then followed with a description of the implementation of the concepts in a sample kernel, complete with executable code. Topics and features: introduces the fundamentals of real-time systems, including real-time architecture and distributed real-time systems; presents a focus on the real-time operating system, covering the concepts of task, memory, and input/output management; provides a detailed step-by-step construction of a real-time operating system kernel, which is then used to test various higher level implementations; describes periodic and aperiodic scheduling, resource management, and distributed scheduling; reviews the process of application design from high-level design methods to low-level details of design and implementation; surveys real-time programming languages and fault tolerance techniques; includes end-of-chapter review questions, extensive C code, numerous examples, and a case study implementing the methods in real-world applications; supplies additional material at an associated website. Requiring only a basic background in computer architecture and operating systems, this practically-oriented work is an invaluable study aid for senior undergraduate and graduate-level students of electrical and computer engineering, and computer science. The text will also serve as a useful general reference for researchers interested in real-time systems.
Finding ways to interfere with or jam communication signals is an essential area of electronic warfare (EW). In modern EW systems, anti-jam technology has been employed to overcome signal jamming. Recently, electronic warfare R&D has focused on creating methods to disrupt these anti-jam systems. This newly revised and greatly expanded edition of the popular Artech House book, "Modern Communications Jamming Principles and Techniques", provides an up-to-date, exhaustive treatment of the techniques and methods available to create countermeasures against anti-jam, over-the-air communications. The Second Edition features a wealth of new material on urban warfare, including a computer simulation of EW architecture alternatives for land-based forces based on urban constraints. This unique resource is dedicated to showing professionals how to design and build jammers specifically targeted at anti-jam communications. Moreover, practitioners find assistance in evaluating the expected performance of jamming systems against modern communications systems.
Because the wireless industry is less capital intensive than others sectors in the telecommunications marketplace, it is expected to enjoy continued profitability. With survival at stake, telecommunications companies must ready themselves for battle to win access and operations rights in the wireless communications spectrum. This book maps out the strategies required to fight this battle by explaining how a telecommunications company should structure its entry and operations in the spectrum.
This text deals with signal processing as an important aspect of
electronic communications in its role of transmitting information,
and the language of its expression. It develops the required
mathematics in an interesting and informative way, leading to
confidence on the part of the reader. The first part of the book
focuses on continuous-time models, and contains chapters on signals
and linear systems, and on system responses. Fourier methods, so
vital in the study of information theory, are developed prior to a
discussion of methods for the design of analogue filters. The
second part of the book is directed towards discrete-time signals
and systems. There is full development of the z- and discrete
Fourier transforms to support the chapter on digital filter design.
For scientists, research engineers, physicists and postgraduate students, this work introduces the essential aspects of electromagnetic waves in chiral and bi-isotropic media, to give the practical working knowledge necessary for new application development. It includes sections on effective methods of measurement, how chiral and BI media affect electromagnetic fields and wave propagation, and how to apply the theory to basic problems in waveguide, antenna and scattering analysis.
This book covers ideas, methods, algorithms, and tools for the in-depth study of the performance and reliability of dependable fault-tolerant systems. The chapters identify the current challenges that designers and practitioners must confront to ensure the reliability, availability, and performance of systems, with special focus on their dynamic behaviors and dependencies. Topics include network calculus, workload and scheduling; simulation, sensitivity analysis and applications; queuing networks analysis; clouds, federations and big data; and tools. This collection of recent research exposes system researchers, performance analysts, and practitioners to a spectrum of issues so that they can address these challenges in their work.
Starting from voice services with simple terminals, today a mobile device is nothing sort of a small PC in the form of smart-phones. The result has been a huge increase in data-services giving mobile communication access to critical aspects of human society / life. This has led to standardization of SAE/LTE (System Architecture Evolution / Long Term Evolution) by 3GPP and IEEE 802.16e / WiMAX. Together with penetration of mobile communications and new standardization come new security issues and thus the need for new security solutions. This book provides a fresh look at those security aspects, with main focus on the latest security developments of 3GPP SAE/LTE and WiMAX. SAE/LTE is also known as Evolved Packet System (EPS).The intended audience for this book is mobile network and device architects, designers, researchers and students. The goal of the authors, who have a combined experience of more than 25 years in mobile security standardization, architecture, research, and education, is to provide the book?s readers with a fresh and up-to-date look at the architecture and challenges of EPS and WiMAX security. This book includes 6 chapters, where the first 3 chapters are intended to be introductory ones, and the remaining 3 chapters provide more in-depth discussions. The book starts with Chapter 1 where we give a background of Next Generation Mobile Networks (NGMN) activity and requirements. Following explanation of NGMN, Chapter 2 provides an overview of security, telecommunication systems and their requirements. Chapter 3 provides some background on standardization. Chapter 4 discusses the EPS (or SAE/LTE) security architecture developed by 3GPP. In particular, this chapter covers the authentication and key agreement method for SAE/LTE together with newly defined key hierarchy. This chapter also addresses the challenging aspects of SAE/LTE interworking and mobility with UMTS together with the necessary key-exchange technologies. The focus of Chapter 5 is WiMAX (IEEE 802.16) security. Chapter 5 provides an in-depth discussion of the WiMAX security requirements, the authentication aspects of PKMv2, and the overall WiMAX network security aspects. In Chapter 6 we briefly cover security for (i) Home(evolved)NodeB (H(e)NB) is the Femto solution from 3GPP), (ii) Machine-to-Machine (M2M) security and (iii) Multimedia Broadcast and Multicast Service (MBMS) and Group Key Management.
This book features research related to computational intelligence and energy and thermal aware management of computing resources. The authors publish original and timely research in current areas of power, energy, temperature, and environmental engineering as and advances in computational intelligence that are benefiting the fields. Topics include signal processing architectures, algorithms, and applications; biomedical informatics and computation; artificial intelligence and machine learning; green technologies in information; and more. The book includes contributions from a wide range of researchers, academicians, and industry professionals. The book is made up both of extended papers presented at the International Conference on Intelligent Computing and Sustainable System (ICICSS 2018), September 20-21, 2018, and other accepted papers on R&D and original research work related to the practice and theory of technologies to enable and support Intelligent Computing applications.
A self-study tutorial which presents the fundamental principles and rigorous numerical validations of a major contemporary branch in frequency-domain computational electromagnetics. |
You may like...
Cross-Layer Resource Allocation in…
Ana I. Perez-Neira, Marc Realp Campalans
Hardcover
R1,930
Discovery Miles 19 300
Microwave Active Circuit Analysis and…
Clive Poole, Izzat Darwazeh
Hardcover
Android Boot Camp for Developers Using…
Corinne Hoisington
Paperback
RF / Microwave Circuit Design for…
Ulrich L. Rohde, Matthias Rudolph
Hardcover
R4,952
Discovery Miles 49 520
MIMO Wireless Networks - Channels…
Bruno Clerckx, Claude Oestges
Hardcover
R2,237
Discovery Miles 22 370
Wireless Sensor and Actuator Networks…
Roberto Verdone, Davide Dardari, …
Hardcover
R2,237
Discovery Miles 22 370
|