![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
This proceeding features papers discussing big data innovation for sustainable cognitive computing. The papers feature detail on cognitive computing and its self-learning systems that use data mining, pattern recognition and natural language processing (NLP) to mirror the way the human brain works. This international conference focuses on cognitive computing technologies, from knowledge representation techniques and natural language processing algorithms to dynamic learning approaches. Topics covered include Data Science for Cognitive Analysis, Real-Time Ubiquitous Data Science, Platform for Privacy Preserving Data Science, and Internet-Based Cognitive Platform. The EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (BDCC 2018), took place on 13 - 15 December 2018 in Coimbatore, India.
This book discusses the design and implementation aspects of ultra-low power biosignal acquisition platforms that exploit analog-assisted and algorithmic approaches for power savings.The authors describe an approach referred to as "analog-and-algorithm-assisted" signal processing.This enables significant power consumption reductions by implementing low power biosignal acquisition systems, leveraging analog preprocessing and algorithmic approaches to reduce the data rate very early in the signal processing chain.They demonstrate savings for wearable sensor networks (WSN) and body area networks (BAN), in the sensors' stimulation power consumption, as well in the power consumption of the digital signal processing and the radio link. Two specific implementations, an adaptive sampling electrocardiogram (ECG) acquisition and a compressive sampling (CS) photoplethysmogram (PPG) acquisition system, are demonstrated. First book to present the so called, "analog-and-algorithm-assisted" approaches for ultra-low power biosignal acquisition and processing platforms; Covers the recent trend of "beyond Nyquist rate" signal acquisition and processing in detail, including adaptive sampling and compressive sampling paradigms; Includes chapters on compressed domain feature extraction, as well as acquisition of photoplethysmogram, an emerging optical sensing modality, including compressive sampling based PPG readout with embedded feature extraction; Discusses emerging trends in sensor fusion for improving the signal integrity, as well as lowering the power consumption of biosignal acquisition systems.
This book provides probabilistic, deterministic and geolocation-aware approaches for adaptive connectivity, robust security and privacy-aware communications for vehicular cyber physical systems (CPS). It presents mathematical models and numerical results obtained from experiments and simulations, and a trade-off between connectivity, security and privacy for vehicular communications. Connectivity between vehicles is crucial for vehicular CPS. Intelligent vehicular CPS provides not only road safety and traffic efficiency by exchanging information among vehicles, but also offers infotainment services to passengers using a variety of wireless technologies to forward the traffic/trajectory information with Vehicle-to-Vehicle (V2V), vehicular ad hoc network (VANET), and Vehicle-to-Roadside-to-Vehicle (V2R2V) communications. The book covers how to ensure that the message received from other vehicles is secure and trustworthy, rather than malicious. Further, it reveals how to make sure that the privacy of participants is not revealed while validating the received message. Researchers and professionals working with vehicular networks, smart systems, cyber physical systems, and mobile privacy will find this book valuable.
The essence of cryptology is the making and breaking of codes and ciphers. This is the second volume of articles (the first was titled Cryptologia yesterday, today and tomorrow ) culled from Cryptologia (Rose-Hulman Institute of Technology, Terre Haute, IN). The articles are divided into five sectio
This book presents the design of delay-efficient packet schedulers for heterogeneous M2M uplink traffic classified into several classes, based on packet delay requirements, payload size, arrival process, etc. Specifically, the authors use tools from queuing theory to determine the delay-optimal scheduling policy. The proposed packet schedulers are designed for a generic M2M architecture and thus equally applicable to any M2M application. Additionally, due to their low implementation complexity and excellent delay-performance, they authors show how they are also well-suited for practical M2M systems. The book pertains primarily to real-time process scheduler experts in industry/academia and graduate students whose research deals with designing Quality-of-Service-aware packet schedulers for M2M packet schedulers over existing and future cellular infrastructure. Presents queuing theoretic analysis and optimization techniques used to design proposed packet scheduling strategies; Provides utility functions to precisely model diverse delay requirements, which lends itself to formulation of utility-maximization problems for determining the delay- or utility-optimal packet scheduler; Includes detail on low implementation complexity of the proposed scheduler by using iterative and distributed optimization techniques.
Space-time adaptive processing (STAP) is a technology for advanced radar systems that allows for significant performance enhancements over conventional approaches. Based on a course taught in industry, government and academia, this is a practical introduction to STAP concepts and methods, placing emphasis on implementation in real-world systems. It addresses the needs of radar engineers who are seeking to apply effective STAP techniques to their systems, and can also be used as a reference by non-radar specialists with an interest in the signal processing applications of STAP. The authors aim to explain critical topics in a manner that should be understandable to anyone with a basic background in radar and signal processing.
This book presents design methods and considerations for digitally-assisted wideband millimeter-wave transmitters. It addresses comprehensively both RF design and digital implementation simultaneously, in order to design energy- and cost-efficient high-performance transmitters for mm-wave high-speed communications. It covers the complete design flow, from link budget assessment to the transistor-level design of different RF front-end blocks, such as mixers and power amplifiers, presenting different alternatives and discussing the existing trade-offs. The authors also analyze the effect of the imperfections of these blocks in the overall performance, while describing techniques to correct and compensate for them digitally. Well-known techniques are revisited, and some new ones are described, giving examples of their applications and proving them in real integrated circuits.
This book brings the reader up-to-date on all aspects concerning ECCM at the antenna level. It is a reference tool for professionals seeking quick answers to on-the-job problems. This text delivers an accurate description of working principles, processing schemes and performance evaluation techniques. In addition, it provides engineering details on the newest digital techiques for sidelobe jamming cancellation and digital beamforming (DFB).
This volume presents the second part of the proceedings of the Mediterranean Conference on Information & Communication Technologies (MedICT 2015), which was held at Saidia, Morocco during 7-9 May, 2015. MedICT provides an excellent international forum to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development. The conference has also a special focus on enabling technologies for societal challenges, and seeks to address multidisciplinary challenges in Information & Communication Technologies such as health, demographic change, wellbeing, security and sustainability issues. The proceedings publish high quality papers which are closely related to the various theories, as well as emerging and practical applications of particular interest to the ICT community. This second volume provides a compact yet broad view of recent developments in Data, Systems, Services and Education, and covers recent research areas in the field including Control Systems, Software Engineering, Data Mining and Big Data, ICT for Education and Support Activities, Networking, Cloud Computing and Security, ICT Based Services and Applications, Mobile Agent Systems, Software Engineering, Data Mining and Big Data, Online Experimentation & Artificial Intelligence in Education, Networking, Cloud Computing and Security, ICT Based Education and Services ICT Challenges and Applications, Advances in ICT Modeling and Design ICT Developments.
In recent years, technology has permeated every aspect of daily life and has drastically increased accessibility and empowerment for all demographics. Smart technologies and mobile applications now have the ability to promote and protect the basic rights of children, women, and men alike. A child's right to education and mental growth or a woman's socio-economic stability and protection from physical, sexual, and emotional abuse can all be attributed to these advancements. Mobile Devices and Smart Gadgets in Human Rights provides emerging research exploring the theoretical and practical applications of technology in relation to human ethical treatment and interactions. Featuring coverage on a broad range of topics such as public safety, augmented reality, and safety apps, this book is ideally designed for researchers, students, activists, academicians, policymakers, and government officials seeking current research on the influence of portable technologies in human rights and ethics.
This book explores the ways in which the broad range of technologies that make up the smart city infrastructure can be harnessed to incorporate more playfulness into the day-to-day activities that take place within smart cities, making them not only more efficient but also more enjoyable for the people who live and work within their confines. The book addresses various topics that will be of interest to playable cities stakeholders, including the human-computer interaction and game designer communities, computer scientists researching sensor and actuator technology in public spaces, urban designers, and (hopefully) urban policymakers. This is a follow-up to another book on Playable Cities edited by Anton Nijholt and published in 2017 in the same book series, Gaming Media and Social Effects.
This book introduces the development of self-interference (SI)-cancellation techniques for full-duplex wireless communication systems. The authors rely on estimation theory and signal processing to develop SI-cancellation algorithms by generating an estimate of the received SI and subtracting it from the received signal. The authors also cover two new SI-cancellation methods using the new concept of active signal injection (ASI) for full-duplex MIMO-OFDM systems. The ASI approach adds an appropriate cancelling signal to each transmitted signal such that the combined signals from transmit antennas attenuate the SI at the receive antennas. The authors illustrate that the SI-pre-cancelling signal does not affect the data-bearing signal. This book is for researchers and professionals working in wireless communications and engineers willing to understand the challenges of deploying full-duplex and practical solutions to implement a full-duplex system. Advanced-level students in electrical engineering and computer science studying wireless communications will also find this book useful as a secondary textbook.
This book presents state-of-the-art research on robust resource allocation in current and future wireless networks. The authors describe the nominal resource allocation problems in wireless networks and explain why introducing robustness in such networks is desirable. Then, depending on the objectives of the problem, namely maximizing the social utility or the per-user utility, cooperative or competitive approaches are explained and their corresponding robust problems are considered in detail. For each approach, the costs and benefits of robust schemes are discussed and the algorithms for reducing their costs and improving their benefits are presented. Considering the fact that such problems are inherently non-convex and intractable, a taxonomy of different relaxation techniques is presented, and applications of such techniques are shown via several examples throughout the book. Finally, the authors argue that resource allocation continues to be an important issue in future wireless networks, and propose specific problems for future research.
This book demonstrates the use of a wide range of strategic engineering concepts, theories and applied case studies to improve the safety, security and sustainability of complex and large-scale engineering and computer systems. It first details the concepts of system design, life cycle, impact assessment and security to show how these ideas can be brought to bear on the modeling, analysis and design of information systems with a focused view on cloud-computing systems and big data analytics. This informative book is a valuable resource for graduate students, researchers and industry-based practitioners working in engineering, information and business systems as well as strategy.
The business of telecommunications is undergoing a period of change driven by changes in regulation, increasing demands for services and the development of new access technologies. The market structure of telecommunications is evolving rapidly as new and existing players strive to compete in an increasingly volatile market, while the advent of new data services is placing greater demands on the network as operators strive to offer new broadband services. Underpinning much of this change is the access technology itself, not only in the transitional form of copper twisted pairs, but also increasingly through the use of new fibre, radio and copper systems. The dominant cost of most telecommunication networks is the access network itself, which typically can demand up to 80% of the total investment required. This book presents an overview of the access network and discusses the technologies that are available. It begins with an introductory chapter defining terms and technologies and goes on to discuss each technology in turn, not only from a technology viewpoint but with a view on how it might be best deployed. Chapters are also included on planning systems, network management, DSL, fibre access networks, optical access networks, fixed wireless access, broadband, wireless LANs, UMTS, and SDH in the access network.
This is a practical source on recent developments in coherent and nonlinear lightwave communications. The book systematically presents up-to-date explanations of all the relevant physical principles and recent research in this emerging area. Providing an unparallelled engineering-level treatment (with 700 equations), this reference also describes the progression of coherent and nonlinear technology from yesterday's experimental field to today's practical applications tool. This work is intended as a tool for research telecommunication engineers, applications engineers working with broadband telecom systems and networks, and postgraduate students.
The authors capture defining research on all aspects and implications of the accelerated progress of mobile multimedia technologies, including fundamental network infrastructures, modern communication features such as wireless and mobile multimedia protocols, personal communication systems, mobility and resource management, and security and privacy issues.
This volume presents the first part of the proceedings of the Mediterranean Conference on Information & Communication Technologies (MedICT 2015), which was held at Saidia, Morocco during 7-9 May, 2015. MedICT provides an excellent international forum to the researchers and practitioners from both academia as well as industry to meet and share cutting-edge development. The conference has also a special focus on enabling technologies for societal challenges, and seeks to address multidisciplinary challenges in Information & Communication Technologies such as health, demographic change, wellbeing, security and sustainability issues. The proceedings publish high quality papers which are closely related to the various theories, as well as emerging and practical applications of particular interest to the ICT community. This first volume provides a compact yet broad view of recent developments in devices, technologies and processing, and covers recent research areas in the field including Microwave Devices and Printed Antennas, Advances in Optical and RF Devices and Applications, Signal Processing and Information Theory, Wireless and Optical Technologies and Techniques, Computer Vision, Optimization and Modeling in Wireless Communication Systems, Modeling, Identification and Biomedical Signal Processing, Photovoltaic Cell & Systems, RF Devices and Antennas for Wireless Applications, RFID, Ad Hoc and Networks Issues.
This book views multiple target tracking as a Bayesian inference problem. Within this framework it develops the theory of single target tracking, multiple target tracking, and likelihood ratio detection and tracking. In addition to providing a detailed description of a basic particle filter that implements the Bayesian single target recursion, this resource provides numerous examples that involve the use of particle filters. With these examples illustrating the developed concepts, algorithms, and approaches -- the book helps radar engineers track when observations are nonlinear functions of target site, when the target state distributions or measurement error distributions are not Gaussian, in low data rate and low signal to noise ratio situations, and when notions of contact and association are merged or unresolved among more than one target.
A desktop reference for designers of military communication systems using spread-spectrum techniques to achieve a low probability of intercept. Shows how to evaluate the detectability of candidate signal structures mathematically, and to select signal parameters that minimize the probability of dete
This handbook serves as a comprehensive, systematic reference to the major mathematical models used in radio engineering and communications, and presents computer simulation algorithms to help the reader estimate parameters of radio systems. It provides the technical details necessary to design and analyze radar, communication, radio navigation, radio control, electronic intelligence and electronic warfare systems. Mathcad routines, cited in the handbook, should help the reader to optimize radar system performance analysis, and can be used to create custom-made software that better answers specific needs.
Designed for information systems professionals, including IS, DP, MIS, LAN, and systems managers, this text provides a source of introductory information for those involved with decision-making processes related to information systems. Suitable as a University course text in MIS programs, the book also covers the subject in sufficient detail for the more technically orientated. This text describes how to reap the benefits of improved efficiency and productivity through the use of document imaging systems that reduce access time and enhance document integrity.
An exploration of telecommunications law in the USA. It offers a jargon-free discussion of how electronic media and telecommunications companies are required to price their services, interconnect with customers and other service providers, and respond to competition. This revised edition includes a comprehensive look at the Telecommunications Act of 1996, its sweeping reforms, and the short-term increase in TC regulation complexity resulting from its passage. The volume also covers how the rapid advance of telecommunications technology has drastically altered regulations first developed when TC meant fixed networks, copper wire and mechanical switches. |
You may like...
Pilgrim Journey John Henry Newman 1801
Vincent Ferrer Blehl S. J.
Hardcover
R1,083
Discovery Miles 10 830
|