![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
Based on cutting-edge research projects in the field, this comprehensive 4-volume book series provides the latest details and covers the most impactful aspects of mobile, wireless, and broadband communications development. These books present key systems and enabling technologies in a clear and accessible manner, offering you a detailed roadmap the future evolution of next generation communications. Drawing upon the insights of leading experts in the field, each of the four volumes is dedicated to an area of critical importance, including Radio Interfaces; Networks, Services and Applications; Reconfigurability; and Ad Hoc Networks.
Providing up-to-date information on sensors and tracking, this text presents practical, innovative design solutions for single and multiple sensor systems, as well as biomedical applications for automated cell motility study systems. It also discusses innovations and applications in multitarget tracking.
China Satellite Navigation Conference (CSNC 2021) Proceedings presents selected research papers from CSNC 2021 held during 22nd-25th May, 2021 in Nanchang, China. These papers discuss the technologies and applications of the Global Navigation Satellite System (GNSS), and the latest progress made in the China BeiDou System (BDS) especially. They are divided into 10 topics to match the corresponding sessions in CSNC2021 which broadly covered key topics in GNSS. Readers can learn about the BDS and keep abreast of the latest advances in GNSS techniques and applications.
This book provides theoretical perspectives and practical experiences on smart governance for smart cities. It presents a balanced linkage between research, policies and practices on this area. The authors discuss the sustainability challenges raised by rapid urbanization, challenges with smart governance models in various countries, and a new governance paradigm seen as a capable approach able to overcome social, economic and environmental sustainability problems. The authors include case studies on transformation, adaption and transfers; and country, regional, municipal contextualization. Also included are best practices on monitoring and evaluating smart governance and impact assessment. The book features contributions from researchers, academics, and practitioners in the field. Analyzes smart governance for cities from a variety of perspectives and a variety of sectors - both in theory and in practice Features information on the linkage between United Nations Sustainable Development Goals and smart governance Covers the connection between research, policies and practice in smart governance for smart cities
This book offers a comprehensive overview of fading and shadowing in wireless channels. A number of statistical models including simple, hybrid, compound and cascaded ones are presented along with a detailed discussion of diversity techniques employed to mitigate the effects of fading and shadowing. The effects of co-channel interference before and after the implementation of diversity are also analyzed. To facilitate easy understanding of the models and the analysis, the background on probability and random variables is presented with relevant derivations of densities of the sums, products, ratios as well as order statistics of random variables. The book also provides material on digital modems of interest in wireless systems. The updated edition expands the background materials on probability by offering sections on Laplace and Mellin transforms, parameter estimation, statistical testing and receiver operating characteristics. Newer models for fading, shadowing and shadowed fading are included along with the analysis of diversity combining algorithms. In addition, this edition contains a new chapter on Cognitive Radio. Based on the response from readers of the First Edition, detailed Matlab scripts used in the preparation of this edition are provided. Wherever necessary, Maple scripts used are also provided.
A thorough update to the classic Modern Radar Systems Analysis, this reference is a comprehensive and cohesive introduction to radar systems design and performance estimation. It offers professionals the knowledge they need to specify, evaluate, or apply radar technology in civilian or military systems. This unique resource provides radar engineers with time-saving and effective techniques for their work in such defense-related applications as weapon systems design and electronic warfare. The book presents accurate detection range equations for realistically estimating radar performance in a variety of practical situations. As radar systems evolve, designers, engineers, and analysts can turn to this book again and again to calculate and evaluate systems performance to keep up with the latest advances in radar technology. CD-ROM Included! The accompanying disc contains example calculations, exercise problems, and analysis programs written in MathCad 11 and HTML.
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.
In a face-to-face conversation, only 10 % of the message is conveyed by words, the remaining 90 % is carried via vocal pitch, emphasis, facial expressions, body language, and other related factors. The challenge for future telecommunication systems will be to bridge the shortcomings of our current voice-orientated systems. Video conferencing and live chats are replacing our traditional forms of communication. Worldwide telecommunications networks are being redesigned to provide new multimedia services. The goal of this book is to bring together end users, service providers and researchers from academia as well as the communications industry to share state-of-the-art information on projects, products, services, and processes for future virtual reality (VR) telecommunications systems. Virtual Reality Technologies for Future Telecommunications Systems features:
Mobile Commerce is an emerging phenomenon based on quickly growing applications of wireless technologies and mobile communications. Mobile communication is becoming as essential need for individuals and businesses in their daily actions. Using mobile commerce, organizations can offer customers services that are easily accessed by a mobile device anytime and anywhere. Wireless Communications and Mobile Commerce collects holistic perspectives contributed by leading professionals to explore strategic considerations regarding potential opportunities and issues in mobile commerce. These professionals' discussions and contributions focus on providing a comprehensive understanding surrounding business strategies, models, management paradigms, architectures, infrastructure, strengths and weaknesses.
OQAM/FBMC for Future Wireless Communications: Principles, Technologies and Applications introduces the concepts and key technologies of OQAM/FBMC, which has been regarded as the potential physical layer technique in future wireless communication systems. It comprises 10 chapters that provide an overview of wireless communications, introduce wireless channels, single carrier and multicarrier modulations, and three types of FBMC systems, also comparing OQAM/FBMC with OFDM. Other chapters introduce the OQAM/FBMC communication system model, the FFT implementation, CP insertion, PSD analysis, prototype filter optimization, joint PAPR reduction and sidelobe suppression, overhead reduction with virtual symbols, time and frequency domain channel estimations, block-wise SFBC for MIMO OQAM/FBMC, and much more.
Designed for microwave and RF engineers, this is a presentation of nonlinear microwave and RF circuits. It offers an understanding of the theory of nonlinear circuit analysis that they need for their work in the field. There is guidance on designing nonlinear circuits and modelling solid-state devices for nonlinear circuit analysis by computer, showing how characteristics of such models affect the analysis of these circuits. This second edition features new material, including critical discussions on nonlinear analysis of oscillators and design issues relating to RF (radio frequency) and wireless technology. More than 120 illustrations support key topics throughout the text.
TETRA is the new digital standard designed for the professional mobile radio communications market. Unlike its counterpart GSM, in the personal telecommunications market, TETRA includes a wide range of features tailored for professional user requirements. It makes the best possible use of the radio spectrum through sharing of radio resources among users, on demand, and exploits the advantages of digital transmission. For professional user groups (e.g. police forces, emergency services, utility plants, transport etc.) TETRA provides a secured, reliable and cost effective means of communication with its capability of handling multimedia transmissions. As a comprehensive introduction to TETRA, this timely publication includes:
Finding ways to interfere with or jam communication signals is an essential area of electronic warfare (EW). In modern EW systems, anti-jam technology has been employed to overcome signal jamming. Recently, electronic warfare R&D has focused on creating methods to disrupt these anti-jam systems. This newly revised and greatly expanded edition of the popular Artech House book, "Modern Communications Jamming Principles and Techniques", provides an up-to-date, exhaustive treatment of the techniques and methods available to create countermeasures against anti-jam, over-the-air communications. The Second Edition features a wealth of new material on urban warfare, including a computer simulation of EW architecture alternatives for land-based forces based on urban constraints. This unique resource is dedicated to showing professionals how to design and build jammers specifically targeted at anti-jam communications. Moreover, practitioners find assistance in evaluating the expected performance of jamming systems against modern communications systems.
This book traces the pedagogical evolution of technical communication in America as it grew out of Engineering English requirements from roughly the turn of the century to 1950. This study examines specific curricular patterns, texts, and writers on the subject of technical communication, while also tracing engineering educational patterns as they emerge from the proceedings of the society for the promotion of engineering education. Unique to the second edition of the book is a new preface by the recent past ATTW series editor, Jimmie Killingsworth, a new introduction by Elizabeth Tebeaux, and an epilogue by Katherine Staples. Writing in a Milieu of Utility concludes that technical writing, as we teach it today, likely found its roots in engineering composition pedagogy, when, at approximately the turn of the century, engineering educators recognized that writing about science and technology not only made sense in an academic milieu that emphasized utility, but that such writing could also contribute to the professional success of engineering students. Existing somewhat tenuously as engineering itself sought academic status, technical communication emerged ultimately as a re-conceptualized composition course, after early to mid twentieth century calls for English and engineering cooperation made traditional composition offerings less relevant. Academic writing on environmental communication proliferated in the 1990's. A few of us had been calling for such work and making initial investigations throughout the 1980's, but the momentum in the field built slowly. Spurred by coverage in the mass media, academic publishers finally caught the wave of interest. In this exciting new volume, the editors demonstrate more fully than ever before how environmental rhetoric and technical communication go hand in hand. The key link that they and their distinguished group of contributors have discovered is the ancient concern of communication scholars with public deliberation. Environmental issues present technical communicators with some of their greatest challenges, above all, how to make the highly specialized and inscrutably difficult technical information generated by environmental scientists and engineers usable in public decision making. The editors encourage us to accept the challenge of contributing to environmentally conscious decision making by integrating technical knowledge and human values. For technical communicators who accept the challenge of working toward solutions by opening access to crucial information and by engaging in critical thinking on ecological issues, the research and theory offered in this volume provide a strong foundation for future practice.
Starting from voice services with simple terminals, today a mobile device is nothing sort of a small PC in the form of smart-phones. The result has been a huge increase in data-services giving mobile communication access to critical aspects of human society / life. This has led to standardization of SAE/LTE (System Architecture Evolution / Long Term Evolution) by 3GPP and IEEE 802.16e / WiMAX. Together with penetration of mobile communications and new standardization come new security issues and thus the need for new security solutions. This book provides a fresh look at those security aspects, with main focus on the latest security developments of 3GPP SAE/LTE and WiMAX. SAE/LTE is also known as Evolved Packet System (EPS).The intended audience for this book is mobile network and device architects, designers, researchers and students. The goal of the authors, who have a combined experience of more than 25 years in mobile security standardization, architecture, research, and education, is to provide the book?s readers with a fresh and up-to-date look at the architecture and challenges of EPS and WiMAX security. This book includes 6 chapters, where the first 3 chapters are intended to be introductory ones, and the remaining 3 chapters provide more in-depth discussions. The book starts with Chapter 1 where we give a background of Next Generation Mobile Networks (NGMN) activity and requirements. Following explanation of NGMN, Chapter 2 provides an overview of security, telecommunication systems and their requirements. Chapter 3 provides some background on standardization. Chapter 4 discusses the EPS (or SAE/LTE) security architecture developed by 3GPP. In particular, this chapter covers the authentication and key agreement method for SAE/LTE together with newly defined key hierarchy. This chapter also addresses the challenging aspects of SAE/LTE interworking and mobility with UMTS together with the necessary key-exchange technologies. The focus of Chapter 5 is WiMAX (IEEE 802.16) security. Chapter 5 provides an in-depth discussion of the WiMAX security requirements, the authentication aspects of PKMv2, and the overall WiMAX network security aspects. In Chapter 6 we briefly cover security for (i) Home(evolved)NodeB (H(e)NB) is the Femto solution from 3GPP), (ii) Machine-to-Machine (M2M) security and (iii) Multimedia Broadcast and Multicast Service (MBMS) and Group Key Management.
This book provides insights into the First International Conference on Communication, Devices and Computing (ICCDC 2017), which was held in Haldia, India on November 2-3, 2017. It covers new ideas, applications and the experiences of research engineers, scientists, industrialists, scholars and students from around the globe. The proceedings highlight cutting-edge research on communication, electronic devices and computing, and address diverse areas such as 5G communication, spread spectrum systems, wireless sensor networks, signal processing for secure communication, error control coding, printed antennas, analysis of wireless networks, antenna array systems, analog and digital signal processing for communication systems, frequency selective surfaces, radar communication, and substrate integrated waveguide and microwave passive components, which are key to state-of-the-art innovations in communication technologies.
Defected Ground Structure (DGS) Based Antennas A unique exploration of critical topics in defected ground structures and their applications In Defected Ground Structure (DGS) Based Antennas: Design Physics, Engineering, and Applications, three distinguished authors deliver a comprehensive discussion of key topics related to defected ground structures (DGSs) and their applications to advanced antenna designs, including microstrips, arrays, dielectric resonators, PIFA, and printed monopoles. The book explores major advances in the technology that have occurred since 2006, as well as the fundamentals of the research in the subject. It also presents future possibilities for new researchers to assist in the development of new studies and technologies for practicing engineers and developers. Readers will discover: A thorough introduction to the concept and evolution of defected ground structure-based antennas In-depth examinations of defected ground structures for printed antenna feeds Comprehensive discussions of the use of defected ground structures to control unwanted modes under a microstrip patch for reducing cross-polarized radiation Enlightening descriptions of defected ground structures used to control mutual coupling in arrays and MIMO designs Perfect for students, researchers, and professionals with an interest in wireless communications, Defected Ground Structure (DGS) Based Antennas: Design Physics, Engineering, and Applications will also earn a place in the libraries of engineers and scientists working in space exploration and defense organizations.
This classroom-tested textbook describes the design and implementation of software for distributed real-time systems, using a bottom-up approach. The text addresses common challenges faced in software projects involving real-time systems, and presents a novel method for simply and effectively performing all of the software engineering steps. Each chapter opens with a discussion of the core concepts, together with a review of the relevant methods and available software. This is then followed with a description of the implementation of the concepts in a sample kernel, complete with executable code. Topics and features: introduces the fundamentals of real-time systems, including real-time architecture and distributed real-time systems; presents a focus on the real-time operating system, covering the concepts of task, memory, and input/output management; provides a detailed step-by-step construction of a real-time operating system kernel, which is then used to test various higher level implementations; describes periodic and aperiodic scheduling, resource management, and distributed scheduling; reviews the process of application design from high-level design methods to low-level details of design and implementation; surveys real-time programming languages and fault tolerance techniques; includes end-of-chapter review questions, extensive C code, numerous examples, and a case study implementing the methods in real-world applications; supplies additional material at an associated website. Requiring only a basic background in computer architecture and operating systems, this practically-oriented work is an invaluable study aid for senior undergraduate and graduate-level students of electrical and computer engineering, and computer science. The text will also serve as a useful general reference for researchers interested in real-time systems.
This book details some of the major developments in the implementation of compressive sensing in radio applications for electronic defense and warfare communication use. It provides a comprehensive background to the subject and at the same time describes some novel algorithms. It also investigates application value and performance-related parameters of compressive sensing in scenarios such as direction finding, spectrum monitoring, detection, and classification.
This book features research related to computational intelligence and energy and thermal aware management of computing resources. The authors publish original and timely research in current areas of power, energy, temperature, and environmental engineering as and advances in computational intelligence that are benefiting the fields. Topics include signal processing architectures, algorithms, and applications; biomedical informatics and computation; artificial intelligence and machine learning; green technologies in information; and more. The book includes contributions from a wide range of researchers, academicians, and industry professionals. The book is made up both of extended papers presented at the International Conference on Intelligent Computing and Sustainable System (ICICSS 2018), September 20-21, 2018, and other accepted papers on R&D and original research work related to the practice and theory of technologies to enable and support Intelligent Computing applications.
Mobile Commerce Applications addresses and explores the critical architectural issues in constructing m-commerce applications and in applying mobile technologies in different areas, including methodologies, enabling technologies, models, paradigms, architectures, standards and innovations.
This book covers ideas, methods, algorithms, and tools for the in-depth study of the performance and reliability of dependable fault-tolerant systems. The chapters identify the current challenges that designers and practitioners must confront to ensure the reliability, availability, and performance of systems, with special focus on their dynamic behaviors and dependencies. Topics include network calculus, workload and scheduling; simulation, sensitivity analysis and applications; queuing networks analysis; clouds, federations and big data; and tools. This collection of recent research exposes system researchers, performance analysts, and practitioners to a spectrum of issues so that they can address these challenges in their work. |
![]() ![]() You may like...
Microwave Active Circuit Analysis and…
Clive Poole, Izzat Darwazeh
Hardcover
Academic Press Library in Signal…
Sergios Theodoridis, Rama Chellappa
Hardcover
R4,214
Discovery Miles 42 140
Role of 6g Wireless Networks in AI and…
Malaya Dutta Borah, Steven A. Wright, …
Hardcover
R6,849
Discovery Miles 68 490
MIMO Wireless Networks - Channels…
Bruno Clerckx, Claude Oestges
Hardcover
R2,309
Discovery Miles 23 090
Cross-Layer Resource Allocation in…
Ana I. Perez-Neira, Marc Realp Campalans
Hardcover
R1,989
Discovery Miles 19 890
Wireless Sensor and Actuator Networks…
Roberto Verdone, Davide Dardari, …
Hardcover
R2,309
Discovery Miles 23 090
|