Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
This book is offers a comprehensive overview of information theory and error control coding, using a different approach then in existed literature. The chapters are organized according to the Shannon system model, where one block affects the others. A relatively brief theoretical introduction is provided at the beginning of every chapter, including a few additional examples and explanations, but without any proofs. And a short overview of some aspects of abstract algebra is given at the end of the corresponding chapters. The characteristic complex examples with a lot of illustrations and tables are chosen to provide detailed insights into the nature of the problem. Some limiting cases are presented to illustrate the connections with the theoretical bounds. The numerical values are carefully selected to provide in-depth explanations of the described algorithms. Although the examples in the different chapters can be considered separately, they are mutually connected and the conclusions for one considered problem relate to the others in the book.
This book features a collection of high-quality, peer-reviewed research papers presented at the 7th International Conference on Innovations in Computer Science & Engineering (ICICSE 2019), held at Guru Nanak Institutions, Hyderabad, India, on 16-17 August 2019. Written by researchers from academia and industry, the book discusses a wide variety of industrial, engineering, and scientific applications of the emerging techniques in the field of computer science.
This book presents advances in the field of optical networks - specifically on research and applications in elastic optical networks (EON). The material reflects the authors' extensive research and industrial activities and includes contributions from preeminent researchers and practitioners in optical networking. The authors discuss the new research and applications that address the issue of increased bandwidth demand due to disruptive, high bandwidth applications, e.g., video and cloud applications. The book also discusses issues with traffic not only increasing but becoming much more dynamic, both in time and direction, and posits immediate, medium, and long-term solutions throughout the text. The book is intended to provide a reference for network architecture and planning, communication systems, and control and management approaches that are expected to steer the evolution of EONs.
A guide to the emerging technologies now being considered for use in tomorrow's fibre subscriber loop systems, this book provides a rundown on what the technologies are, describes how they work, and then shows how to apply them to increase system performance, cut design time and lower costs. "Optical Transmission for the Subscriber Loop": presents basic concepts and technologies of network topology, multiplexing methods, access methods and transfer modes; describes the most important components for optical transmission - including optical fibres, cables, splices, connectors, laser diodes, photodiodes, fibre couplers, wavelength division multiplex (WDM), and subcarrier multiplex (SCM) devices; offers comprehensive coverage of fibre connections in fibre communications engineering; covers bidirectional transmission systems and presents several approaches for economical transceivers that can be used in these systems; and explains WDM- and SCM-based multi-chanel systems.
The purpose of this cutting-edge collection of essays is threefold: first, it presents the principles of data collection and interpretation or the methodological distinctions of a particular method appropriate to technical communication research. Second, it discusses the foundational principles of the methodologies given the primary discipline in which they were created and applied. Finally, it reflects upon the process of importing and employing these methodologies into the research field of technical communication, and on how technical communication research has contributed to the development and application of these methodologies. Written by many noted scholars in the field and presenting a wide range of research methods, "Research in Technical Communication" combines theory and practice. Both technical communicators and industry researchers who want to learn more about workplace research and methodologies will find it invaluable, as will beginning and advanced scholars, who will find much that is useful in its variety of subjects.
This book discusses computational complexity of High Efficiency Video Coding (HEVC) encoders with coverage extending from the analysis of HEVC compression efficiency and computational complexity to the reduction and scaling of its encoding complexity. After an introduction to the topic and a review of the state-of-the-art research in the field, the authors provide a detailed analysis of the HEVC encoding tools compression efficiency and computational complexity. Readers will benefit from a set of algorithms for scaling the computational complexity of HEVC encoders, all of which take advantage from the flexibility of the frame partitioning structures allowed by the standard. The authors also provide a set of early termination methods based on data mining and machine learning techniques, which are able to reduce the computational complexity required to find the best frame partitioning structures. The applicability of the proposed methods is finally exemplified with an encoding time control system that employs the best complexity reduction and scaling methods presented throughout the book. The methods presented in this book are especially useful in power-constrained, portable multimedia devices to reduce energy consumption and to extend battery life. They can also be applied to portable and non-portable multimedia devices operating in real time with limited computational resources.
This comprehensive study examines the case of AM stereo and subsequent technologies to demonstrate the FCC's evolution from stern to reluctant regulator. It also examines emerging technologies, such as multichannel television sound, digital audio broadcasting, and high definition television, and discusses their impact on the evolution of broadcast regulation. In the 1980s the tension between governmental control and the marketplace resulted in the FCC's deregulation of TV and radio, electing to set only technical operating parameters and allowing legal operation of any system that meets those minimal standards. Huff argues that this approach is likely to influence regulatory approaches to other new developments in broadcast technologies. The extensive overview of the industry and the study of the interrelationships between the technologies will appeal to communication scholars in the fields of radio and television as well as interest industry professionals.
The objective of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012) is to facilitate an exchange of information on best practices for the latest research advances in the area of communications, networks and intelligence applications. These mainly involve computer science and engineering, informatics, communications and control, electrical engineering, information computing, and business intelligence and management. "Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012)" will focus on green information technology and applications, which will provide in-depth insights for engineers and scientists in academia, industry, and government. The book addresses the most innovative research developments including technical challenges, social and economic issues, and presents and discusses the authors' ideas, experiences, findings, and current projects on all aspects of advanced green information technology and applications. Yuhang Yang is a professor at the Department of Electronic Engineering, Shanghai Jiao Tong University. Maode Ma is an associate professor at the School of Electrical & Electronic Engineering, Nanyang Technological University.
This is a guide to the design and application of elliptical dielectric waveguides and fibers. Written by one of the pioneers of optical fiber technology, it shows the theoretical basis of the technology, demonstrates the practical uses for elliptical fibers, guides the reader through design criteria and trade-offs, and gives immediate access to collected data and references on the topic. "Elliptical Fiber Waveguides" begins with an historical overview, and then provides detailed coverage of specific waveguide and fiber modes, including all relevant specifications and data currently available. The book examines the use of elliptical fibers for a wide variety of recent applications, including sensors, rare-earth-doped fiber sources, and amplifiers. With its 278 equations, 161 figures, and nearly 200 references to the literature, "Elliptical Fiber Waveguides" brings together in one source the complete body of information currently available on this promising technology.
This book provides a detailed review of power amplifiers, including classes and topologies rarely covered in books, and supplies sufficient information to allow the reader to design an entire amplifier system, and not just the power amplification stage. A central aim is to furnish readers with ideas on how to simplify the design process for a preferred power amplifier stage by introducing software-based routines in a programming language of their choice. The book is in two parts, the first focusing on power amplifier theory and the second on EDA concepts. Readers will gain enough knowledge of RF and microwave transmission theory, principles of active and passive device design and manufacturing, and power amplifier design concepts to allow them to quickly create their own programs, which will help to accelerate the transceiver design process. All circuit designers facing the challenge of designing an RF or microwave power amplifier for frequencies from 2 to 18 GHz will find this book to be a valuable asset.
This book focuses on techniques that can be applied at the physical and data-link layers of communication systems in order to secure transmissions against eavesdroppers. It discusses topics ranging from information theory-based security to coding for security and cryptography, and presents cutting-edge research and innovative findings from leading researchers. The characteristic feature of all the contributions in this book is their relevance for the practical application of security principles to a variety of widely used communication techniques, including: multiantenna systems, ultra-wide-band communication systems, power line communications, and quantum key distribution techniques. A further distinctive aspect is the attention paid to both unconditional and computational security techniques, building a bridge between two usually distinct worlds. The book gathers extended versions of contributions delivered at the Second Workshop on Communication Security, held in Paris, France, in April 2017 and affiliated with the conference EUROCRYPT 2017.
This book describes both theoretical and practical aspects of advanced broadband patch antennas, providing a comprehensive review of the state of the art in the field. Modern antenna techniques are discussed for single patches, dual linear and circular polarizations designs, and arrays used in mobile communications. Includes 88 equations, 115 figures, and 200 references.
This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic security, artificial noise aided security, security-oriented beamforming, and diversity assisted security approaches. It also provides an overview of the cooperative relaying methods for wireless networks such as orthogonal relaying, non-orthogonal relaying, and relay selection.Chapters explore the relay-selection designs for improving wireless secrecy against eavesdropping in time-varying fading environments and a joint relay and jammer selection for wireless physical-layer security, where a relay is used to assist the transmission from the source to destination and a friendly jammer is employed to transmit an artificial noise for confusing the eavesdropper. Additionally, the security-reliability tradeoff (SRT) is mathematically characterized for wireless communications and two main relay-selection schemes, the single-relay and multi-relay selection, are devised for the wireless SRT improvement. In the single-relay selection, only the single best relay is chosen for assisting the wireless transmission, while the multi-relay selection invokes multiple relays for simultaneously forwarding the source transmission to the destination.Physical-Layer Security for Cooperative Relay Networks is designed for researchers and professionals working with networking or wireless security. Advanced-level students interested in networks, wireless, or privacy will also find this book a useful resource.
This text offers a comprehensive treatment of the entire GSM network and the signalling methods of its terrestrial interfaces. It introduces all the interfaces between the GSM subsystems, starting with the Abis- and Air-Interface and continuing on to VLRs, HLRs and MSCs within the NSS. The reader learns about the various signalling standards or methods used in GSM, including TCAP and MAP, and how to apply this knowledge when working with GSM networks. The glossary explains abbreviations, terms, parameters, counters and messages frequently encountered when working with GSM. In addition, it features numerous figures, tables, lists, statistical formulas, real-life examples and everyday comparisons.
From traditional techniques such as FSK, BPSK, QPSK and QAM to state-of-the-art techniques such as MSK, CPM and MHPM and more, this text covers the complete range of digital modulation methods. It discusses the historical background of digital modulation, and examines operation principles, symbol and bit error performance, and spectral characteristics. It also includes block diagrams and/or circuits of modulators, demodulators, carrier recovery, clock recovery and comparison with other schemes. In its comprehensive overview of digital modulation applications, it seeks to offer a practical understanding of conventional, fixed microwave terrestrial communications, mobile wireless, and mobile satellite communications.
This work describes all aspects of service provision, from the definition of customer need to the day-to-day techniques of managing customer satisfaction. It includes guidelines for negotiating a service level agreement, methods for understanding the customer's requirements, and the identification of key issues associated with help-desks and customer assistance centres. The book is intended for IT and telecommunications managers, service suppliers, system architects, designers and help-desk staff in businesses using networks and communications services to achieve high level services.
This book is supposed to serve as a comprehensive and instructive guide through the new world of digital communication. On the physical layer optical and electrical cabling technology are described as well as wireless communication technologies. On the data link layer local area networks (LANs) are introduced together with the most popular LAN technologies such as Ethernet, Token Ring, FDDI, and ATM as well as wireless LAN technologies including IEEE 802.x, Bluetooth, or ZigBee. A wide range of WAN technologies are covered including contemporary high speed technologies like PDH and SDH up to high speed wireless WANs (WiMAX) and 4th generation wireless telephone networks LTE. Routing technologies conclude the treatment of the data link layer. Next, there is the Internet layer with the Internet protocol IP that establishes a virtual uniform network out of the net of heterogeneous networks. In detail, both versions, IPv4 as well as the successor IPv6 are covered in detail as well as ICMP, NDP, and Mobile IP. In the subsequent transport layer protocol functions are provided to offer a connection-oriented and reliable transport service on the basis of the simple and unreliable IP. The basic protocols TCP and UDP are introduced as well as NAT, the network address translation. Beside transport layer security protocols like SSL and TLS are presented. On the upmost application layer popular Internet application protocols are described like DNS, SMTP, PGP, (S)FTP, NFS, SSH, DHCP, SNMP, RTP, RTCP, RTSP, and World Wide Web.
This book contains selected papers from the 9th International Conference on Information Science and Applications (ICISA 2018) and provides a snapshot of the latest issues encountered in technical convergence and convergences of security technology. It explores how information science is core to most current research, industrial and commercial activities and consists of contributions covering topics including Ubiquitous Computing, Networks and Information Systems, Multimedia and Visualization, Middleware and Operating Systems, Security and Privacy, Data Mining and Artificial Intelligence, Software Engineering, and Web Technology. The proceedings introduce the most recent information technology and ideas, applications and problems related to technology convergence, illustrated through case studies, and reviews converging existing security techniques. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies of convergence security. The intended readership includes researchers in academia, industry and other research institutes focusing on information science and technology.
This book is a collection of selected peer-reviewed papers presented at the International Conference on Signal Processing and Communication (ICSC 2018). It covers current research and developments in the fields of communications, signal processing, VLSI circuits and systems, and embedded systems. The book offers in-depth discussions and analyses of latest problems across different sub-fields of signal processing and communications. The contents of this book will prove to be useful for students, researchers, and professionals working in electronics and electrical engineering, as well as other allied fields.
Motion Coordination for VTOL Unmanned Aerial Vehicles develops new control design techniques for the distributed coordination of a team of autonomous unmanned aerial vehicles. In particular, it provides new control design approaches for the attitude synchronization of a formation of rigid body systems. In addition, by integrating new control design techniques with some concepts from nonlinear control theory and multi-agent systems, it presents a new theoretical framework for the formation control of a class of under-actuated aerial vehicles capable of vertical take-off and landing. Several practical problems related to the systems' inputs, states measurements, and restrictions on the interconnection topology between the aerial vehicles in the team are addressed. Worked examples with sufficient details and simulation results are provided to illustrate the applicability and effectiveness of the theoretical results discussed in the book. The material presented is primarily intended for researchers and industrial engineers from robotics, control engineering and aerospace communities. It also serves as a complementary reading for graduate students involved in research related to flying robotics, aerospace, control of under-actuated systems, and nonlinear control theory
This book investigates the coordinated power management of multi-tenant data centers that account for a large portion of the data center industry. The authors include discussion of their quick growth and their electricity consumption, which has huge economic and environmental impacts. This book covers the various coordinated management solutions in the existing literature focusing on efficiency, sustainability, and demand response aspects. First, the authors provide a background on the multi-tenant data center covering the stake holders, components, power infrastructure, and energy usage. Then, each power management mechanism is described in terms of motivation, problem formulation, challenges and solution.
To operate future generation multimedia communications systems high data rate transmission needs to be guaranteed with a high quality of service. For instance, the third generation cellular mobile systems should offer a high data rate up to 2 Mbit/s for video, audio, speech and data transmission. The important challenge for these cellular systems will be the choice of an appropriate multiple access scheme. The advantages of the spread spectrum technique are: High immunity against multipath distortion, no need for frequency planning, high flexibility and easier variable rate transmission etc. On the other hand, the technique of multi-carrier transmission has recently been receiving wide interest for high data rate applications. The advantages of multi-carrier transmission are the robustness in the case of frequency selective fading channels, in particular the reduced signal processing complexity by equalization in the frequency domain, and in the capability of narrow-band interference rejection. The advantages and success of multi-carrier (MC) modulation and the spread spectrum (SS) technique has led to the combination of MCM with SS, known as multi-carrier spread-spectrum (MC-SS) for cellular systems. This combination, benefits from the advantages of both schemes: Higher flexibility, higher spectral efficiency, simpler detection techniques, narrow band interference rejection capability, etc. Multicarrier-Spread-Spectrum comprises a collection of papers which collectively provide a state-of-the-art overview of this emerging multiple access scheme. It will be a valuable reference for all researchers and practitioners working on the area of wireless communications and networking.
As lifestyles in personal and public spheres become more fast-paced and hectic, the need for reliable mobile technologies becomes increasingly important. Insights into the various impacts of mobile applications pave the way for future advances and developments in communication and interaction. Critical Socio-Technical Issues Surrounding Mobile Computing is a pivotal reference source for research-based perspectives on the use and application of mobile technology in modern society. Featuring extensive research on a variety of topics relating to the social, technical, and behavioral perspectives of mobile applications, this book is an essential reference source for mobile application developers, instructors, practitioners, and students interested in current research on the impact of mobile devices on individuals and society as a whole. |
You may like...
Community Engagement in the Online Space
Michelle Dennis, James H Albert
Hardcover
R5,631
Discovery Miles 56 310
The COVID-19 Pandemic and the…
Floribert Patrick Calvain Endong
Hardcover
R6,143
Discovery Miles 61 430
A Modern Guide to the Digitalization of…
Juan Montero, Matthias Finger
Hardcover
R3,939
Discovery Miles 39 390
Algorithms, Methods, and Applications in…
Agustinus Borgy Waluyo
Hardcover
R5,372
Discovery Miles 53 720
Experimental Wireless Stations - Their…
Philip E 1894-1984 Edelman
Hardcover
R990
Discovery Miles 9 900
|