![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
Defected Ground Structure (DGS) Based Antennas A unique exploration of critical topics in defected ground structures and their applications In Defected Ground Structure (DGS) Based Antennas: Design Physics, Engineering, and Applications, three distinguished authors deliver a comprehensive discussion of key topics related to defected ground structures (DGSs) and their applications to advanced antenna designs, including microstrips, arrays, dielectric resonators, PIFA, and printed monopoles. The book explores major advances in the technology that have occurred since 2006, as well as the fundamentals of the research in the subject. It also presents future possibilities for new researchers to assist in the development of new studies and technologies for practicing engineers and developers. Readers will discover: A thorough introduction to the concept and evolution of defected ground structure-based antennas In-depth examinations of defected ground structures for printed antenna feeds Comprehensive discussions of the use of defected ground structures to control unwanted modes under a microstrip patch for reducing cross-polarized radiation Enlightening descriptions of defected ground structures used to control mutual coupling in arrays and MIMO designs Perfect for students, researchers, and professionals with an interest in wireless communications, Defected Ground Structure (DGS) Based Antennas: Design Physics, Engineering, and Applications will also earn a place in the libraries of engineers and scientists working in space exploration and defense organizations.
This book provides an insight into recent technological trends and innovations in mobility solutions and platforms to improve mobility of visually impaired people. The authors' goal is to help to contribute to the social and societal inclusion of the visually impaired. The book's topics include, but are not limited to, obstacle detection systems, indoor and outdoor navigation, transportation sustainability systems, and hardware/devices to aid visually impaired people. The book has a strong focus on practical applications, tested in a real environment. Applications include city halls, municipalities, and companies that can keep up to date with recent trends in platforms, methodologies and technologies to promote urban mobility. Also discussed are broader realms including education, health, electronics, tourism, and transportation. Contributors include a variety of researchers and practitioners around the world. Features practical, tested applications of technological mobility solutions for visual impaired people; Presents topics such as obstacle detection systems, urban mobility, smart home services, and ambient assisted living; Includes a number of application examples in education, health, electronics, tourism, and transportation.
This book presents advances in the field of optical networks - specifically on research and applications in elastic optical networks (EON). The material reflects the authors' extensive research and industrial activities and includes contributions from preeminent researchers and practitioners in optical networking. The authors discuss the new research and applications that address the issue of increased bandwidth demand due to disruptive, high bandwidth applications, e.g., video and cloud applications. The book also discusses issues with traffic not only increasing but becoming much more dynamic, both in time and direction, and posits immediate, medium, and long-term solutions throughout the text. The book is intended to provide a reference for network architecture and planning, communication systems, and control and management approaches that are expected to steer the evolution of EONs.
The purpose of this cutting-edge collection of essays is threefold: first, it presents the principles of data collection and interpretation or the methodological distinctions of a particular method appropriate to technical communication research. Second, it discusses the foundational principles of the methodologies given the primary discipline in which they were created and applied. Finally, it reflects upon the process of importing and employing these methodologies into the research field of technical communication, and on how technical communication research has contributed to the development and application of these methodologies. Written by many noted scholars in the field and presenting a wide range of research methods, "Research in Technical Communication" combines theory and practice. Both technical communicators and industry researchers who want to learn more about workplace research and methodologies will find it invaluable, as will beginning and advanced scholars, who will find much that is useful in its variety of subjects.
This hands-on reference details statistical methods, estimation algorithms, and design techniques for the measurement of rainfall and cloud cover from space.
The purpose of this book is to review the recent advances in E-health technologies and applications. In particular, the book investigates the recent advancements in physical design of medical devices, signal processing and emergent wireless technologies for E-health. In a second part, novel security and privacy solutions for IoT-based E-health applications are presented. The last part of the book is focused on applications, data mining and data analytics for E-health using artificial intelligence and cloud infrastructure. E-health has been an evolving concept since its inception, due to the numerous technologies that can be adapted to offer new innovative and efficient E-health applications. Recently, with the tremendous advancement of wireless technologies, sensors and wearable devices and software technologies, new opportunities have arisen and transformed the E-health field. Moreover, with the expansion of the Internet of Things, and the huge amount of data that connected E-health devices and applications are generating, it is also mandatory to address new challenges related to the data management, applications management and their security. Through this book, readers will be introduced to all these concepts. This book is intended for all practitioners (industrial and academic) interested in widening their knowledge in wireless communications and embedded technologies applied to E-health, cloud computing, artificial intelligence and big data for E-health applications and security issues in E-health.
This book discusses the challenges in the convergence of technologies as the Internet of Things (IoT) evolves. These include sensing, computing, information processing, networking, and controlling intelligent technologies. The contributors first provide a survey of various assessment and evaluation approaches available for successful convergence. They then go on to cover several operational ideas to apply. The contributors then discuss the challenges involved bridging gaps in computation and the communication process, hidden networks, intelligent decision making, human-to-machine perception and large-scale IoT environments. The contributors aim to provide the reader an overview of trends in IoT in terms of performability and traffic modeling and efforts that can be spent in assessing the graceful degradation in IoT paradigms. Provides a survey of IoT assessment and evaluation approaches; Covers new and innovative operational ideas that apply to the IoT industry and the industries it affects; Includes chapters from researchers and industry leaders in IoT from around the world.
This book presents physical-layer security as a promising paradigm for achieving the information-theoretic secrecy required for wireless networks. It explains how wireless networks are extremely vulnerable to eavesdropping attacks and discusses a range of security techniques including information-theoretic security, artificial noise aided security, security-oriented beamforming, and diversity assisted security approaches. It also provides an overview of the cooperative relaying methods for wireless networks such as orthogonal relaying, non-orthogonal relaying, and relay selection.Chapters explore the relay-selection designs for improving wireless secrecy against eavesdropping in time-varying fading environments and a joint relay and jammer selection for wireless physical-layer security, where a relay is used to assist the transmission from the source to destination and a friendly jammer is employed to transmit an artificial noise for confusing the eavesdropper. Additionally, the security-reliability tradeoff (SRT) is mathematically characterized for wireless communications and two main relay-selection schemes, the single-relay and multi-relay selection, are devised for the wireless SRT improvement. In the single-relay selection, only the single best relay is chosen for assisting the wireless transmission, while the multi-relay selection invokes multiple relays for simultaneously forwarding the source transmission to the destination.Physical-Layer Security for Cooperative Relay Networks is designed for researchers and professionals working with networking or wireless security. Advanced-level students interested in networks, wireless, or privacy will also find this book a useful resource.
The most important theoretical aspects of Image and Signal Processing (ISP) for both deterministic and random signals, the theory being supported by exercises and computer simulations relating to real applications. More than 200 programs and functions are provided in the MATLAB(R) language, with useful comments and guidance, to enable numerical experiments to be carried out, thus allowing readers to develop a deeper understanding of both the theoretical and practical aspects of this subject. Following on from the first volume, this second installation takes a more practical stance, providing readers with the applications of ISP.
This in-depth technical guide is an essential resource for anyone
involved in the development of "smart" mobile wireless technology,
including devices, infrastructure, and applications. Written by
researchers active in both academic and industry settings, it
offers both a big-picture introduction to the topic and detailed
insights into the technical details underlying all of the key
trends. "Smart Phone and Next-Generation Mobile Computing" shows
you how the field has evolved, its real and potential current
capabilities, and the issues affecting its future direction. It
lays a solid foundation for the decisions you face in your work,
whether you're a manager, engineer, designer, or entrepreneur.
A critical appraisal of broadband systems for high-speed Internet systems. It offers a demystifying overview of existing and future mobile and fixed systems that use gigahertz or terahertz frequencies, and serves as a reference for information on most high-speed Internet systems that are currently in use or that will come into use before 2015. Making extensive use of photographs of actual systems, diagrams, and graphs depicting market developments and important system characteristics, the book supplies real-world information provided by commercial sources that helps the reader understand the realm of broadband carriers and their technologies. It also explains how these technologies interact using digital signalling in gigahertz and terahertz frequencies.
Focusing on connection technologies used for both single-mode and multimode fibers, this book explains multifiber connections such as mass-fusion splice and multifiber connectors. Information on fluoride glass fibers, doped fibers (EDFA), and components is included.
This book discusses opportunities for broadcasters that arise with the advent of broadband networks, both fixed and mobile. It discusses how the traditional way of distributing audio-visual content over broadcasting networks has been complemented by the usage of broadband networks. The author shows how this also gives the possibility to offer new types of interactive or so-called nonlinear services. The book illustrates how change in distribution technology is accelerating the need for broadcasters around the world to adapt their content distribution strategy and how it will impact the portfolios of content they offer.
Motion Coordination for VTOL Unmanned Aerial Vehicles develops new control design techniques for the distributed coordination of a team of autonomous unmanned aerial vehicles. In particular, it provides new control design approaches for the attitude synchronization of a formation of rigid body systems. In addition, by integrating new control design techniques with some concepts from nonlinear control theory and multi-agent systems, it presents a new theoretical framework for the formation control of a class of under-actuated aerial vehicles capable of vertical take-off and landing. Several practical problems related to the systems' inputs, states measurements, and restrictions on the interconnection topology between the aerial vehicles in the team are addressed. Worked examples with sufficient details and simulation results are provided to illustrate the applicability and effectiveness of the theoretical results discussed in the book. The material presented is primarily intended for researchers and industrial engineers from robotics, control engineering and aerospace communities. It also serves as a complementary reading for graduate students involved in research related to flying robotics, aerospace, control of under-actuated systems, and nonlinear control theory
Cyber-physical systems (CPS) are characterized as a combination of physical (physical plant, process, network) and cyber (software, algorithm, computation) components whose operations are monitored, controlled, coordinated, and integrated by a computing and communicating core. The interaction between both physical and cyber components requires tools allowing analyzing and modeling both the discrete and continuous dynamics. Therefore, many CPS can be modeled as hybrid dynamic systems in order to take into account both discrete and continuous behaviors as well as the interactions between them. Guaranteeing the security and safety of CPS is a challenging task because of the inherent interconnected and heterogeneous combination of behaviors (cyber/physical, discrete/continuous) in these systems. This book presents recent and advanced approaches and tech-niques that address the complex problem of analyzing the diagnosability property of cyber physical systems and ensuring their security and safety against faults and attacks. The CPS are modeled as hybrid dynamic systems using different model-based and data-driven approaches in different application domains (electric transmission networks, wireless communication networks, intrusions in industrial control systems, intrusions in production systems, wind farms etc.). These approaches handle the problem of ensuring the security of CPS in presence of attacks and verifying their diagnosability in presence of different kinds of uncertainty (uncertainty related to the event occurrences, to their order of occurrence, to their value etc.).
This book introduces the fundamentals of DCS, and shows how to include wireless technology in their design while guaranteeing the desired operation characteristics. The text also presents insights and results gained from extensive practical experience in implementing and testing systems within a specific industrial setting. Features: examines the operations that the DCS implements, covering human-machine interfaces, diagnostics and maintenance interfaces, and controllers; discusses industrial control system and wireless network protocols; reviews scheduling in wireless sensor networks; describes a latency model for heterogeneous DCS with wired and wireless parts, that predicts monitoring, command, and closed loop latencies; explains how to plan operation timings systematically; introduces measures and metrics for performance monitoring and debugging, and describes how to add these to a system; presents experimental results to validate the planning approach, based on an application test-bed.
This book provides a detailed review of power amplifiers, including classes and topologies rarely covered in books, and supplies sufficient information to allow the reader to design an entire amplifier system, and not just the power amplification stage. A central aim is to furnish readers with ideas on how to simplify the design process for a preferred power amplifier stage by introducing software-based routines in a programming language of their choice. The book is in two parts, the first focusing on power amplifier theory and the second on EDA concepts. Readers will gain enough knowledge of RF and microwave transmission theory, principles of active and passive device design and manufacturing, and power amplifier design concepts to allow them to quickly create their own programs, which will help to accelerate the transceiver design process. All circuit designers facing the challenge of designing an RF or microwave power amplifier for frequencies from 2 to 18 GHz will find this book to be a valuable asset.
Strategies and Policies in Digital Convergence is the authoritative reference source describing issues in business strategy and public policy rising from digital convergence. Cutting-edge descriptions of mobile communications, broadband networks, and digital multimedia broadcast services are provided. This Premier Reference Source presents new business opportunities generated by digital convergence, and raises governance issues caused by this union. It provides a comprehensive overview of the technological aspects of digital convergence and the resulting business strategies and public policies.
This book focuseson protocols and constructions that make good use of the building blocks for symmetric cryptography. The book brings under one roof, several esoteric strategies of utilizing symmetric cryptographic blocks. The specific topics addressed by the book include various key distribution strategies for unicast, broadcast and multicast security and strategies for constructing efficient digests of dynamic databases using binary hash trees."
The book presents research that contributes to the development of intelligent dialog systems to simplify diverse aspects of everyday life, such as medical diagnosis and entertainment. Covering major thematic areas: machine learning and artificial neural networks; algorithms and models; and social and biometric data for applications in human-computer interfaces, it discusses processing of audio-visual signals for the detection of user-perceived states, the latest scientific discoveries in processing verbal (lexicon, syntax, and pragmatics), auditory (voice, intonation, vocal expressions) and visual signals (gestures, body language, facial expressions), as well as algorithms for detecting communication disorders, remote health-status monitoring, sentiment and affect analysis, social behaviors and engagement. Further, it examines neural and machine learning algorithms for the implementation of advanced telecommunication systems, communication with people with special needs, emotion modulation by computer contents, advanced sensors for tracking changes in real-life and automatic systems, as well as the development of advanced human-computer interfaces. The book does not focus on solving a particular problem, but instead describes the results of research that has positive effects in different fields and applications.
This book is supposed to serve as a comprehensive and instructive guide through the new world of digital communication. On the physical layer optical and electrical cabling technology are described as well as wireless communication technologies. On the data link layer local area networks (LANs) are introduced together with the most popular LAN technologies such as Ethernet, Token Ring, FDDI, and ATM as well as wireless LAN technologies including IEEE 802.x, Bluetooth, or ZigBee. A wide range of WAN technologies are covered including contemporary high speed technologies like PDH and SDH up to high speed wireless WANs (WiMAX) and 4th generation wireless telephone networks LTE. Routing technologies conclude the treatment of the data link layer. Next, there is the Internet layer with the Internet protocol IP that establishes a virtual uniform network out of the net of heterogeneous networks. In detail, both versions, IPv4 as well as the successor IPv6 are covered in detail as well as ICMP, NDP, and Mobile IP. In the subsequent transport layer protocol functions are provided to offer a connection-oriented and reliable transport service on the basis of the simple and unreliable IP. The basic protocols TCP and UDP are introduced as well as NAT, the network address translation. Beside transport layer security protocols like SSL and TLS are presented. On the upmost application layer popular Internet application protocols are described like DNS, SMTP, PGP, (S)FTP, NFS, SSH, DHCP, SNMP, RTP, RTCP, RTSP, and World Wide Web. |
You may like...
Dugard's International Law: A South…
John Dugard, Max Du Plessis, …
Paperback
World Court Digest - Volume 3: 1996…
N. Krisch, K. Oellers-Frahm, …
Hardcover
R1,732
Discovery Miles 17 320
The International Tribunal for the Law…
Kriangsak Kittichaisaree
Hardcover
R2,906
Discovery Miles 29 060
The European Court of Human Rights…
Jonas Christoffersen, Mikael Rask Madsen
Hardcover
R4,142
Discovery Miles 41 420
Transforming International Criminal…
Mark Findlay, Ralph Henham
Paperback
R1,526
Discovery Miles 15 260
|