|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
The lack of clear communication, especially internationally,
plagues the modern world in a variety of fields. Researchers and
practitioners within the modern networking and communication
industries strive to discover new and innovative ways for humans to
better contact one another. Strategic Innovations and
Interdisciplinary Perspectives in Telecommunications and Networking
provides emerging research exploring the theoretical and practical
aspects of network management and security, as well as applications
within computer science, mobile and wireless computing, and
multimedia technology. Featuring coverage on a broad range of
topics such as coding theory, mobile devices, and contextual
advertising, this book is ideal for students, researchers, social
media marketers, brand managers, networking professionals, and
engineers seeking current research on cross-disciplinary
applications of electrical engineering, computer science, and
information technology.
This expanded, revised and updated new edition of Introduction to
RF Stealth covers two major topics: Low Observables and Low
Probability of Intercept (LO and LPI) of radars and data links,
collectively sometimes called Stealth. Each chapter includes
examples, student exercises and references. Worked simulations are
available that illustrate the techniques described. Chapter 1
provides an introduction and history of RF/microwave LPI/LO
techniques and some basic LPI/LO equations, expanded from the first
edition with more information on new and current systems, including
more on infrared and hypersonic missile signatures. Chapter 2 is a
new chapter, covering radiation absorbing materials and shaping,
focused on materials, meta-materials and detailed platform shaping
and structures including ships. Chapter 3 covers interceptability
parameters and analysis with corrections, updates and simulations.
Chapter 4 covers current and future intercept receivers and some of
their limitations with more information and tracking techniques.
Chapter 5 surveys exploitation of both the natural and the threat
environment with extensive threat table updates including Russian
S300, S400, S500 and more information on cellular systems. Chapter
6 deals with LPIS waveforms and pulse compression with new material
and simulations of new codes. Chapter 7 introduces some hardware
techniques associated with LO/LPIS low sidelobe / cross section
antenna and radome design with emphasis on active electronic scan
arrays. Chapter 8 is a new chapter on RCS testing of subsystems and
platforms.
The digital transformation of healthcare delivery is in full swing.
Health monitoring is increasingly becoming more effective,
efficient, and timely through mobile devices that are now widely
available. This, as well as wireless technology, is essential to
assessing, diagnosing, and treating medical ailments. However,
systems and applications that boost wellness must be properly
designed and regulated in order to protect the patient and provide
the best care. Optimizing Health Monitoring Systems With Wireless
Technology is an essential publication that focuses on critical
issues related to the design, development, and deployment of
wireless technology solutions for healthcare and wellness.
Highlighting a broad range of topics including solution evaluation,
privacy and security, and policy and regulation, this book is
ideally designed for clinicians, hospital directors, hospital
managers, consultants, health IT developers, healthcare providers,
engineers, software developers, policymakers, researchers,
academicians, and students.
The proliferation of wireless communications has led to mobile
computing, a new era in data communication and processing allowing
people to access information anywhere and anytime using lightweight
computer devices. Aligned with this phenomenon, a vast number of
mobile solutions, systems, and applications have been continuously
developed. However, despite the opportunities, there exist
constraints, challenges, and complexities in realizing the full
potential of mobile computing, requiring research and
experimentation. Algorithms, Methods, and Applications in Mobile
Computing and Communications is a critical scholarly publication
that examines the various aspects of mobile computing and
communications from engineering, business, and organizational
perspectives. The book details current research involving mobility
challenges that hinder service applicability, mobile money transfer
services and anomaly detection, and mobile fog environments. As a
resource rich in information about mobile devices, wireless
broadcast databases, and machine communications, it is an ideal
source for computer scientists, IT specialists, service providers,
information technology professionals, academicians, and researchers
interested in the field of mobile computing.
As a popular and powerful medium, mobile use has increased
significantly across the world. The effects of these communication
devices have not only transformed how we communicate but also how
we gather and distribute information in a variety of industries
including healthcare, business, and education. Impacts of Mobile
Use and Experience on Contemporary Society provides
cross-disciplinary research that examines mobile use and its impact
through 16 different stages of life, ranging from pre-birth through
after-death. Featuring research on topics such as academic
application, economic value, and mobile learning, scholars from
different disciplines identify the crucial implications behind one
of the leading communication tools from all over the world.
Included amongst the targeted audience are educators, policymakers,
healthcare professionals, managers, academicians, researchers, and
practitioners.
Smart City and sensing platforms are considered some of the most
significant topics in the Internet of Things (IoT). Sensors are at
the heart of the IoT, and their development is a key issue if such
concepts are to achieve their full potential. This book addresses
the major challenges in realizing smart city and sensing platforms
in the era of the IoT and the Cloud. Challenges vary from cost and
energy efficiency to availability and service quality. To tackle
these challenges, sensors must meet certain expectations and
requirements such as size constraints, manufacturing costs and
resistance to environmental factors. This book focuses on both the
design and implementation aspects for smart city and sensing
applications that are enabled and supported by IoT paradigms.
Attention is also given to data delivery approaches and performance
aspects.
Wireless sensor networks have gained significant attention
industrially and academically due to their wide range of uses in
various fields. Because of their vast amount of applications,
wireless sensor networks are vulnerable to a variety of security
attacks. The protection of wireless sensor networks remains a
challenge due to their resource-constrained nature, which is why
researchers have begun applying several branches of artificial
intelligence to advance the security of these networks. Research is
needed on the development of security practices in wireless sensor
networks by using smart technologies. Deep Learning Strategies for
Security Enhancement in Wireless Sensor Networks provides emerging
research exploring the theoretical and practical advancements of
security protocols in wireless sensor networks using artificial
intelligence-based techniques. Featuring coverage on a broad range
of topics such as clustering protocols, intrusion detection, and
energy harvesting, this book is ideally designed for researchers,
developers, IT professionals, educators, policymakers,
practitioners, scientists, theorists, engineers, academicians, and
students seeking current research on integrating intelligent
techniques into sensor networks for more reliable security
practices.
The gripping, behind-the scenes story of one of the most sophisticated surveillance weapons ever created – and an existential threat to democracy and human rights.
Pegasus is widely regarded as the most powerful cyber-surveillance system on the market – available to any government that can afford its multimillion-dollar price tag. The system’s creator, the NSO group, a private corporation headquartered in Israel, boasts about its ability to thwart terrorists and criminals.
But the Pegasus system doesn’t only catch terrorists and criminals.
Pegasus has been used by repressive regimes to spy on thousands of innocent people around the world: heads of state, diplomats, human rights defenders, lawyers, political opponents, and journalists.
Virtually undetectable, the system can track a person’s daily movement in real time, gain control of the device’s microphones and cameras at will, and capture all videos, photos, emails, texts, and passwords – encrypted or not. Its full reach is not even known.
This is the gripping story of how Pegasus was uncovered, written by Laurent Richard and Sandrine Rigaud, the two intrepid reporters who revealed the scandal in collaboration with an international consortium of journalists. Their findings shook the world.
Tense and compelling, Pegasus reveals how thousands of lives have been turned upside down by this unprecedented threat, and exposes the chilling new ways governments and corporations are laying waste to human rights – and silencing innocent citizens.
The second in the Women Securing the Future with TIPPSS series,
this book provides insight and expert advice from seventeen women
leaders in technology, healthcare and policy to address the
challenges of Trust, Identity, Privacy, Protection, Safety and
Security (TIPPSS) for connected healthcare, and the growing
Internet of Medical Things (IoMT) ecosystem. The ten chapters in
this book delve into trust, security and privacy risks in connected
healthcare for patients, medical devices, personal and clinical
data, healthcare providers and institutions, and provide practical
approaches to manage and protect the data, devices, and humans.
Cybersecurity, technology and legal experts discuss risks, from
data and device hacks to ransomware, and propose approaches to
address the challenges including new frameworks for architecting
and evaluating medical device and connected hospital cybersecurity.
We all need to be aware of the TIPPSS challenges in connected
healthcare, and we call upon engineers, device manufacturers,
system developers and healthcare providers to ensure trust and
manage the risk. Featuring contributions from prominent female
experts and role models in technology, cybersecurity, engineering,
computer science, data science, business, healthcare,
accessibility, research, law, privacy and policy, this book sets
the stage to improve security and safety in our increasingly
connected world.
Location-aware computing is a technology that uses the location
(provides granular geographical information) of people and objects
to derive contextual information. Today, one can obtain this
location information free of cost through smartphones. Smartphones
with location enabled applications have revolutionized the ways in
which people perform their activities and get benefits from the
automated services. It especially helps to get details of services
in less time; wherever the user may be and whenever they want. The
need for smartphones and location enabled applications has been
growing year after year. Nowadays no one can leave without their
phone; the phone seemingly becomes one of the parts of the human
body. The individual can now be predicted by their phone and the
identity of the phone becomes the person's identity. Though there
is a tremendous need for location-enabled applications with
smartphones, the debate on privacy and security related to location
data has also been growing. Privacy and Security Challenges in
Location Aware Computing provides the latest research on privacy
enhanced location-based applications development and exposes the
necessity of location privacy preservation, as well as issues and
challenges related to protecting the location data. It also
suggests solutions for enhancing the protection of location privacy
and therefore users' privacy as well. The chapters highlight
important topic areas such as video surveillance in human
tracking/detection, geographical information system design,
cyberspace attacks and warfare, and location aware security
systems. The culmination of these topics creates a book that is
ideal for security analysts, mobile application developers,
practitioners, academicians, students, and researchers.
In recent years, modern society has experienced an increased use of
online discourse. Due to continuous advances in technology, the
ongoing transition away from face-to-face communications has
steadily caused the communication gap to widen. Solutions for
High-Touch Communications in a High-Tech World is a pivotal source
of research for identifying new approaches for face-to-face
communication, opportunities to create social bonding and social
capital, and taking advantage of the full communication cycle.
Featuring extensive coverage across a range of relevant
perspectives and topics, such as social networking theory, conflict
resolution, and interpersonal communications, this book is ideally
designed for professionals, managers, researchers, students and
academicians interested in perspectives on communication in the
digital age.
The integration of sliding mode in engineering systems has been a
focus of research for many years. However, the use of this method
in non-engineering systems still requires a better understanding.
Sliding Mode in Intellectual Control and Communication: Emerging
Research and Opportunities is a pivotal reference source that
intends to fill the gap of available knowledge on characteristics
of sliding mode in non-engineering contexts. Highlighting a range
of pertinent topics such as information processing, intelligent
agents, and virtual communications, this book is ideally designed
for researchers, academics, students, and professionals interested
in the latest developments in sliding mode techniques and
applications.
|
Multiplexing
(Hardcover)
Somayeh Mohammady
|
R3,442
R3,214
Discovery Miles 32 140
Save R228 (7%)
|
Ships in 10 - 15 working days
|
|
|
|