Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
This resource provides comprehensive, up-to-date coverage of the principles, technologies, standards and applications of Dense Wavelength Division Multiplexing (DWDM). The volume is designed to enable the reader to understand how DWDM components, devices and networks operate; examine the configuration and design trade-offs of current DWDM components and systems; assess the latest standards for optical network management; discover recent technological developments; and decide the direction and most promising areas for future research and development in the field.
This reference provides information on electronic intelligence (ELINT) analysis techniques, with coverage of their applications, strengths and limitations. Now refined and updated, this second edition presents new concepts and techniques. The book is intended for newcomers to the field as well as engineers interested in signal analysis, ELINT analysts, and the designers, programmers and operators of radar, ECM, ECCM and ESM systems.
China Satellite Navigation Conference (CSNC 2021) Proceedings presents selected research papers from CSNC 2021 held during 22nd-25th May, 2021 in Nanchang, China. These papers discuss the technologies and applications of the Global Navigation Satellite System (GNSS), and the latest progress made in the China BeiDou System (BDS) especially. They are divided into 10 topics to match the corresponding sessions in CSNC2021 which broadly covered key topics in GNSS. Readers can learn about the BDS and keep abreast of the latest advances in GNSS techniques and applications.
This book analyzes the wireless revolution: from applications to technology, and from economics to system engineering.
This book discusses email spam detection and its challenges such as text classification and categorization. The book proposes an efficient spam detection technique that is a combination of Character Segmentation and Recognition and Classification (CSRC). The author describes how this can detect whether an email (text and image based) is a spam mail or not. The book presents four solutions: first, to extract the text character from the image by segmentation process which includes a combination of Discrete Wavelet Transform (DWT) and skew detection. Second, text characters are via text recognition and visual feature extraction approach which relies on contour analysis with improved Local Binary Pattern (LBP). Third, extracted text features are classified using improvised K-Nearest Neighbor search (KNN) and Support Vector Machine (SVM). Fourth, the performance of the proposed method is validated by the measure of metric named as sensitivity, specificity, precision, recall, F-measure, accuracy, error rate and correct rate. Presents solutions to email spam detection and discusses its challenges such as text classification and categorization; Analyzes the proposed techniques' performance using precision, F-measure, recall and accuracy; Evaluates the limitations of the proposed research thereby recommending future research.
Analogue filters will always be needed for interfacing between digital systems and the 'real' analogue world. In fact, the high frequency integrated analogue filter has become a key component in achieving ubiquitous communication and computing. In recent years, the renewed interest in analogue, mixed-signal and RF circuits due to the need for system-on-chip design and the market for wireless communications has led to a new peak of research into high frequency integrated analogue filters. This book brings together the leading researchers in high frequency analogue filters to highlight recent advances and identify promising directions for future development. Coverage includes Gm-C filters, MOSFET-C filters, active-LC filters, logdomain filters, switched-current filters, adaptive analogue filters and on-chip automatic filter tuning. The topical nature of the book and calibre of the authors ensures that this book will be of great interest to the electronics and communications communities worldwide.
New techniques and technologies for sensors are developing fast and being applied in a wide range of fields for measurement and instrumentation, both for research and commercial purposes. This book aims to provide advanced students and practising engineers with a selective tour of highlights in the topical field of sensors for measurement. The authors provide descriptions of the operation, characteristics and applications of the sensors on which they work, together with recent advances and prospects for the future. The chapters cover both fibre optic and solid state sensing, applied across a wide range of applications. Although primarily aimed at graduate-level students and engineers, the depth of coverage of each sensor type is such that the book will be useful to undergraduates seeking to supplement their knowledge for courses on sensors, measurement and instrumentation.
This book focuses on the characteristics of cooperative control problems for general linear multi-agent systems, including formation control, air traffic control, rendezvous, foraging, role assignment, and cooperative search. On this basis and combined with linear system theory, it introduces readers to the cooperative tracking problem for identical continuous-time multi-agent systems under state-coupled dynamics; the cooperative output regulation for heterogeneous multi-agent systems; and the optimal output regulation for model-free multi-agent systems. In closing, the results are extended to multiple leaders, and cooperative containment control for uncertain multi-agent systems is addressed. Given its scope, the book offers an essential reference guide for researchers and designers of multi-agent systems, as well as a valuable resource for upper-level undergraduate and graduate students.
This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.
This book focuses on the modelling methodology of microstrip interconnects, discussing various structures of single-input multiple-output (SIMO) tree interconnects for signal integrity (SI) engineering. Further, it describes lumped and distributed transmission line elements based on single-input single-output (SIMO) models of symmetric and asymmetric trees, and investigates more complicated phenomenon, such as interbranch coupling. The modelling approaches are based on the analytical methods using the Z-, Y- and T-matrices. The established method enables the S-parameters and voltage transfer function of SIMO tree to be determined. Providing illustrative results with frequency and time domain analyses for each tree interconnect structure, the book is a valuable resource for researchers, engineers, and graduate students in fields of analogue, RF/microwave, digital and mixed circuit design, SI and manufacturing engineering.
This book aimed at bringing an insight to the ICN network, particularly various architectures, issues and challenges in the new networking paradigm. The book starts with an introduction to the new promising concept of ICN and its origin along with the reason behind this interesting innovation. Different architectures proposed so far in support of implementing the ICN is also discussed in details. Few of the challenges of ICN implementation are enlisted as caching, naming, routing, and security. Each of these challenges with recent development is covered in individual chapters. Moreover, integration of current trends in communication and computing like software defined networking and machine learning approach are another area that this book is focusing. All these chapters highlight the recent developments reported in the area and also discusses the future trends. The book provides an overview of the recent developments in future internet technologies, bringing together the advancements that have been made in ICN. The book includes three unique chapters in the field of ICN research. The first, is the SDN framework for implementing ICN by decoupling data and control plan. The machine learning models for predicting future trends in network traffic and other management activities is another important chapter. This chapter includes the possibilities of using machine learning models for trend prediction to help network administrators and service providers to take care of unexpected sudden change traffic pattern and user behaviour. The third most vital chapter is the security issues in ICN. This chapter includes various facts that influences the security of ICN. Issues involved in naming, caching and routing are discussed separately along with few recent works in these areas. Various types of attacks in ICN are also part of the discussion. The stated book would be useful for researchers in this area and will work as a reference for future work. Moreover, the content of the book would also be suitable as a supporting material for undergraduate and graduate level courses in computer science and electrical engineering.
This textbook details the architecture of a digital coherent optical system and describes its main digital signal processing (DSP) algorithms. The authors first show how the combination of advanced modulation techniques, DSP and coherent detection has led to significant gains in capacity and ease of operation. The authors follow the path of the information from its generation in the transmitter, to propagation through the fiber and processing by the DSP algorithms in the receiver. The work summarizes academic results and presents them in a didactic way to students and practitioners working on the area of optical communications. A full suite of classroom materials is included for easy integration into a curriculum, containing theoretic and simulation problems, and off-the-shelf Matlab/Octave functions.
This book presents vehicular ad-hoc networks (VANETs) from the their onset, gradually going into technical details, providing a clear understanding of both theoretical foundations and more practical investigation. The editors gathered top-ranking authors to provide comprehensiveness and timely content; the invited authors were carefully selected from a list of who's who in the respective field of interest: there are as many from Academia as from Standardization and Industry sectors from around the world. The covered topics are organized around five Parts starting from an historical overview of vehicular communications and standardization/harmonization activities (Part I), then progressing to the theoretical foundations of VANETs and a description of the day-one standard-compliant solutions (Part II), hence going into details of vehicular networking and security (Part III) and to the tools to study VANETs, from mobility and channel models, to network simulators and field trial methodologies (Part IV), and finally looking into the future of VANETs by investigating alternative, complementary communication technologies, innovative networking paradigms and visionary applications (Part V). The way the content is organized, with a differentiated level of technical details, makes the book a valuable reference for a large pool of target readers ranging from undergraduate, graduate and PhD students, to wireless scientists and engineers, to service providers and stakeholders in the automotive, ITS, ICT sectors.
This book presents the basics and applications of superconducting devices in quantum optics. Over the past decade, superconducting devices have risen to prominence in the arena of quantum optics and quantum information processing. Superconducting detectors provide unparalleled performance for the detection of infrared photons in quantum cryptography, enable fundamental advances in quantum optics, and provide a direct route to on-chip optical quantum information processing. Superconducting circuits based on Josephson junctions provide a blueprint for scalable quantum information processing as well as opening up a new regime for quantum optics at microwave wavelengths. The new field of quantum acoustics allows the state of a superconducting qubit to be transmitted as a phonon excitation. This volume, edited by two leading researchers, provides a timely compilation of contributions from top groups worldwide across this dynamic field, anticipating future advances in this domain.
This book provides the details of developing a digital pedestrian map construction system over the intermittently connected mobile network. Over the past couple of decades, countries across the world, both developing and developed, have witnessed a significant number of disasters. Thus, it has become mandatory for each of the disaster-prone countries to equip themselves with appropriate measures to cope with the challenges of providing post-disaster services. Some of the serious challenges are incapacitated communication infrastructure, unstable power supply and inaccessible road networks. Out of these challenges, the destruction of road networks, especially in developing countries, acts as a major hindrance to effective disaster management. To be more specific, the success of a disaster response operation generally depends on the speed of evacuation and transportation of adequate amount of relief materials at the right time to the disaster-affected areas. Hence, map-based navigation support is a primary requirement for post-disaster relief operations. This book also provides the solution of the two other important post-disaster management services such as situational awareness and resource allocation. Both of these services are invariably dependent on the existence of navigation support. Finally, in order to offer such services, the other challenge is to address the problem of incapacitated communication infrastructure. This book also deals with such challenges in post-disaster scenarios and develops automated post-disaster management services.
Details an overall process that provides a logical and structured framework for the subject of transmission performance. This work bridges the gap between industry-oriented books and academic books. It delivers in-depth coverage on transmission performance with a broad industry perspective.
This book presents high-quality papers from the Fourth International Conference on Microelectronics, Computing & Communication Systems (MCCS 2019). It discusses the latest technological trends and advances in MEMS and nanoelectronics, wireless communication, optical communication, instrumentation, signal processing, image processing, bioengineering, green energy, hybrid vehicles, environmental science, weather forecasting, cloud computing, renewable energy, RFID, CMOS sensors, actuators, transducers, telemetry systems, embedded systems and sensor network applications. It includes papers based on original theoretical, practical and experimental simulations, development, applications, measurements and testing. The applications and solutions discussed here provide excellent reference material for future product development.
Mobile and Wireless Systems Beyond 3G: Managing New Business Opportunities explores new business opportunities and critical issue related to mobile and wireless systems beyond 3G. This book identifies motivations and barriers to the adoption of 3G mobile multimedia services and provides an end-user perspective on mobile multimedia services that are likely to emerge with the roll out of Third Generation Mobile Services (3G). Mobile and Wireless Systems beyond 3G: Managing New Business Opportunities presents a single source of up-to-date information about mobile commerce including the technology (hardware and software) involved, security issues and factors driving demand adoption (consumer and business). This book provides researchers and practitioners with a source of knowledge related to this emerging area of business, while also facilitating managers and business leaders' understanding of the industrial evolutionary processes.
This book offers the first comprehensive view on integrated circuit and system design for the Internet of Things (IoT), and in particular for the tiny nodes at its edge. The authors provide a fresh perspective on how the IoT will evolve based on recent and foreseeable trends in the semiconductor industry, highlighting the key challenges, as well as the opportunities for circuit and system innovation to address them. This book describes what the IoT really means from the design point of view, and how the constraints imposed by applications translate into integrated circuit requirements and design guidelines. Chapter contributions equally come from industry and academia. After providing a system perspective on IoT nodes, this book focuses on state-of-the-art design techniques for IoT applications, encompassing the fundamental sub-systems encountered in Systems on Chip for IoT: ultra-low power digital architectures and circuits low- and zero-leakage memories (including emerging technologies) circuits for hardware security and authentication System on Chip design methodologies on-chip power management and energy harvesting ultra-low power analog interfaces and analog-digital conversion short-range radios miniaturized battery technologies packaging and assembly of IoT integrated systems (on silicon and non-silicon substrates). As a common thread, all chapters conclude with a prospective view on the foreseeable evolution of the related technologies for IoT. The concepts developed throughout the book are exemplified by two IoT node system demonstrations from industry. The unique balance between breadth and depth of this book: enables expert readers quickly to develop an understanding of the specific challenges and state-of-the-art solutions for IoT, as well as their evolution in the foreseeable future provides non-experts with a comprehensive introduction to integrated circuit design for IoT, and serves as an excellent starting point for further learning, thanks to the broad coverage of topics and selected references makes it very well suited for practicing engineers and scientists working in the hardware and chip design for IoT, and as textbook for senior undergraduate, graduate and postgraduate students ( familiar with analog and digital circuits).
This volume publishes new trends and findings in hot topics related to ubiquitous computing/networking. It is the outcome of UNet - ainternational scientific event that took place on September 08-10, 2015, in the fascinating city of Casablanca, Morocco. UNet'15 is technically sponsored by IEEE Morocco Section and IEEE COMSOC Morocco Chapter.
This book focuses on a wide range of innovations related to Cybersecurity Education which include: curriculum development, faculty and professional development, laboratory enhancements, community outreach, and student learning. The book includes topics such as: Network Security, Biometric Security, Data Security, Operating Systems Security, Security Countermeasures, Database Security, Cloud Computing Security, Industrial Control and Embedded Systems Security, Cryptography, and Hardware and Supply Chain Security. The book introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity specialists and educators for keeping current their security knowledge. Further, it provides a glimpse of future directions where cybersecurity techniques, policies, applications, and theories are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity experts in the listed fields and edited by prominent cybersecurity researchers and specialists.
This book addresses space science and communication - one of the main pillars of space science sustainability, an area that has recently become of great importance. In this regard, research and development play a crucial role in sustainability development. However, obtaining essential data in the physical world to interpret the universe and to predict what could happen in the future is a challenging undertaking. Accordingly, providing valid information to understand trends, evaluate needs, and create sustainable development policies and programs in the best interest of all the people is indispensable. This book was prepared in conjunction with the fifth meeting of the 2017 International Conference on Space Science and Communication (IconSpace2017), held in Kuala Lumpur, Malaysia on 3-5 May 2017 to introduce graduate stuandents, researchers, lecturers, engineers, geospatialists, meteorologists, climatologists, astronomers and practitioners to the latest applications of space science, telecommunications, meteorology, remote sensing and related fields. The individual papers discuss a broad range of space science and technology applications, e.g. the formation of global warming from space, environmental and remote sensing, communication systems, and smart materials for space applications.
This book presents a first-ever detailed analysis of the complex notation of 2-D and 3-D signals and describes how you can apply it to image processing, modulation, and other fields. It helps you significantly reduce your literature research time, better enables you to simulate signals and communication systems, and helps you to design compatible single-sideband systems.
The purpose of this book is to review the recent advances in E-health technologies and applications. In particular, the book investigates the recent advancements in physical design of medical devices, signal processing and emergent wireless technologies for E-health. In a second part, novel security and privacy solutions for IoT-based E-health applications are presented. The last part of the book is focused on applications, data mining and data analytics for E-health using artificial intelligence and cloud infrastructure. E-health has been an evolving concept since its inception, due to the numerous technologies that can be adapted to offer new innovative and efficient E-health applications. Recently, with the tremendous advancement of wireless technologies, sensors and wearable devices and software technologies, new opportunities have arisen and transformed the E-health field. Moreover, with the expansion of the Internet of Things, and the huge amount of data that connected E-health devices and applications are generating, it is also mandatory to address new challenges related to the data management, applications management and their security. Through this book, readers will be introduced to all these concepts. This book is intended for all practitioners (industrial and academic) interested in widening their knowledge in wireless communications and embedded technologies applied to E-health, cloud computing, artificial intelligence and big data for E-health applications and security issues in E-health. |
You may like...
The COVID-19 Pandemic and the…
Floribert Patrick Calvain Endong
Hardcover
R6,143
Discovery Miles 61 430
Community Engagement in the Online Space
Michelle Dennis, James H Albert
Hardcover
R5,631
Discovery Miles 56 310
|