![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
The Newnes Know It All Series takes the best of what our authors
have written to create hard-working desk references that will be an
engineer's first port of call for key information, design
techniques and rules of thumb. Guaranteed not to gather dust on a
shelf
Instructs advanced and important analysis methods which are frequently used for researchers, engineers and students who work on applications of electromagnetic waves to microwave devices and antennas. The book also includes various numerical techniques.
The spread-spectrum technique is becoming increasingly important in wireless communication systems. In this work, the main advantages of this techniques are outlined, describing its key elements, presenting important code acquisition strategies for direct sequences (DS) and frequency hopping (FH) systems, comparing various code tracking loop systems, and detailing receiver configurations based on CCD, SAW and DSP matched filters. The authors also examine system capacity issues related to the CDMA cellular network, and explain the CDMA overlay, packetized transmission in CDMA networks, and the problems of multiuser detection.
Wireless sensor networks are currently being employed in a variety of applications ranging from medical to military, and from home to industry. Wireless Sensor Networks and Applications aims to provide a reference tool for the increasing number of scientists who depend upon sensor networks in some way. The topics covered include network design and modeling, network management, data management, security and applications. The topic covered in each chapter is given expository but also scholarly treatment, covering the history of the topic, reviewing state-of-the-art thinking relative to the topic, and discussing currently unsolved problems of special interest.
IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations.
Network processors are the basic building blocks of today's
high-speed, high-demand, quality-oriented communication networks.
Designing and implementing network processors requires a new
programming paradigm and an in-depth understanding of network
processing requirements. This book leads the reader through the
requirements and the underlying theory of networks, network
processing, and network processors. It covers implementation of
network processors and intergrates EZchip Microcode Development
Environment so that you can gain hands-on experience in writing
high-speed networking applications. By the end of the book, the
reader will be able to write and test applications on a simulated
network processor.
Strengthen your understanding of fast-moving WDMA optical network technology, and learn how to better select and design reliable all-optical telecom networks with this practical book. It will help expand your knowledge of LLN, Manhattan, Shuffle, De Bruijn, Gemmet, Matrix, Swift, and Starnet and will show you how to employ an effective method of network organization based on traffic demands.
Learn how to quickly solve electromagnetic scattering problems using the Moment Method with this unique book. Software Included! Accompanying software featuring FORTRAN source code allows you to modify the book's examples and understand how simple and complex shapes scatter waves. One 3.5" IBM PC-compatible diskette.
Anyone who has ever shopped for a new smart phone, laptop, or other tech gadget knows that staying connected is crucial. There is a lot of discussion over which service provider offers the best coverage-enabling devices to work anywhere and at any time-with 4G and LTE becoming a pervasive part of our everyday language. The Handbook of Research on Next Generation Mobile Communication Systems offers solutions for optimal connection of mobile devices. From satellite signals to cloud technologies, this handbook focuses on the ways communication is being revolutionized, providing a crucial reference source for consumers, researchers, and business professionals who want to be on the frontline of the next big development in wireless technologies. This publication features a wide variety of research-based articles that discuss the future of topics such as bandwidth, energy-efficient power, device-to-device communication, network security and privacy, predictions for 5G communication systems, spectrum sharing and connectivity, and many other relevant issues that will influence our everyday use of technology.
Multisensor fusion systems are only practical if the algorithms used are practical and effective, and if there is efficient database support. The first part of this book discusses a wide range of issues related to the development of robust, context-sensitive, and efficient data fusion algorithms. The second part addresses database requirements, structures, and issues related to achieving overall computational efficiency. Featuring highly accessible notation, the processing model and database issues presented in the text are aimed at system developers working in sensor fusion, automatic target recognition, multiple-target tracking, robotic control, automated image understanding, and large-scale integration and fabrication.
The World Fantasy Award-winning third volume of the Lyonesse trilogy brings attention to the faerie changeling Madouc. Where princess Suldrun once meekly endured the proprieties of Castle Haidion, Madouc defends herself with mischief. Vexed, King Casmir and Queen Sollace arrange a contest to marry her off. However, Madouc has other ideas, and leaves with the stableboy " Sir Pom-pom" on a quest to learn the identity of her father, encountering swindlers, faeries, trolls, ogres, a knight in search of his youth, and a relatively pedestrian item known as the Holy Grail. As the sorcerers Shimrod and Murgen investigate dire portents in the world of magic, Casmir schemes to murder prince Dhrun of Troicinet and bring all the lands under his iron rule; however, his ambitions will be complicated by one small but important oversight -- he's failed to allow for Madouc
Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a collection of defense mechanisms that operate at the lower-layers of the protocol stack and can defend wireless systems before the effects of attacks propagate up to higher-level applications and services. The book will focus on fundamental security problems that involve properties unique to wireless systems, such as the characteristics of radio propagation, or the location of communicating entities, or the properties of the medium access control layer. Specifically, the book provides detection mechanisms and highlights defense strategies that cope with threats to wireless localization infrastructure, attacks on wireless networks that exploit entity identity (i.e. spoofing attacks), jamming and radio interference that can undermine the availability of wireless communications, and privacy threats where an adversary seeks to infer spatial and temporal contextual information surrounding wireless communications. Additionally, the authors explore new paradigms of physical layer security for wireless systems, which can support authentication and confidentiality services by exploiting fading properties unique to wireless communications.
Spacecraft TT&C and Information Transmission Theory and Technologies introduces the basic theory of spacecraft TT&C (telemetry, track and command) and information transmission. Combining TT&C and information transmission, the book presents several technologies for continuous wave radar including measurements for range, range rate and angle, analog and digital information transmissions, telecommand, telemetry, remote sensing and spread spectrum TT&C. For special problems occurred in the channels for TT&C and information transmission, the book represents radio propagation features and its impact on orbit measurement accuracy, and the effects caused by rain attenuation, atmospheric attenuation and multi-path effect, and polarization composition technology. This book can benefit researchers and engineers in the field of spacecraft TT&C and communication systems. Liu Jiaxing is a professor at The 10th Institute of China Electronics Technology Group Corporation.
This book explains the advantages of fiber optics over conventional coaxial cables when routing microwave signals.
This book covers control theory signal processing and relevant applications in a unified manner. It introduces the area, takes stock of advances, and describes open problems and challenges in order to advance the field. The editors and contributors to this book are pioneers in the area of active sensing and sensor management, and represent the diverse communities that are targeted.
Thewritingofthisbookhasbeeninspiredbytheexperienceofteachinga courseonDetectionandSignalProcessingtograduatestudentsoveraperiod ofmanyyears. Itwasstrikingthatstudentswerenotonlyfascinatedbythe variousdetectionprinciplesandtechnicalperformancesofpracticalsystems, butalsobytheprofessionalismoftheinvolved typical physicalengine- ing. Usuallystudentsarethoroughlytaughtindi?erentcoursesofphysics, whicharemostlystudiedasisolated?elds. Thecourseondetectionands- nalprocessingisbasedontypicalresultsthatwereestablishedindi?erent disciplines like optics, solid state physics, thermodynamics, mathematical statistics,Fouriertransforms,andelectroniccircuitry. Theirsimultaneousand interdependentapplicationbroadenstheinsightofmutualrelationsinthev- ious?elds. Forinstancethe?uctuationsofthermalbackgroundradiationcan bederivedeitherwiththeblackbodytheoryorindependentlywithther- dynamicstoarriveatthesameresult. AlsotheappliedFourierrelationsin thefrequencyandtimedomainsarenolongerabstractmathematicalman- ulationsbutpracticaltoolsandprobablyeasiertounderstandintheapplied technique. Estimatesoftheorderofmagnitudeswithcomparisonofrelevant physicale?ectsnecessarybydesigningadeviceareveryinstructive. Ingeneral theachievementsofvariousdisciplinesarebroughttogethertodesignandto evaluatequantitativelythetechnicalperformancesofdetectiontechniques. Thustheinterestfordetectionandsignalprocessingisbothtolearnthe knowledgefordesigningpracticaldetectionsystemsandtogetacquainted withthethinkingofphysicalengineering. The?rstpartofthebookisdevotedtonoisephenomenaandradiation detectors. Fundamentaldescriptionswithquantitativeanalysesoftheund- lyingphysicalprocessesofbothdetectorsandaccompanyingnoiseleadto understandthepotentialswithrespecttosensitivityandoperatingfrequency domain. Thesecondpartdealswithampli?cationproblemsandtherecovery ofrepetitivesignalsburiedinnoise. Thelastpartisdevotedtosolvingthe problemsconnectedwithreachingtheultimatedetectionlimitorquantum limit. Thisisdoneforheterodynedetectionandphotoncounting. Although VIII Preface heterodynedetectionyieldstheultimatesensitivity,itsspatialmodesel- tivityand,ingeneral,thelowspectralpowerdensityofthesignalrequire sophisticatedprovisions. Thisisdiscussedindetail. Theinherentproblemsare analyzedandappropriatetechnicalsolutionsaredescribedtoreachtheul- matesensitivityfordetectingincoherentradiationandcommunicationsignals thatarerandomlyDopplershifted. Theresultsareillustratedwithexamples ofspacecommunication. Hengelo(O),January2006 W. J. Witteman Contents 1 RandomFluctuations...1 1. 1 Introduction...1 1. 2 ThermalNoiseofResistance...2 1. 3 ShotNoise...5 1. 3. 1 SpectralDistribution ...6 1. 3. 2 Photons...10 1. 4 FlickerNoise...10 1. 5 Generation-RecombinationNoise...10 1. 6 ThermalRadiationandItsFluctuations...13 1. 7 TemperatureFluctuationsofSmallBodies...18 1. 7. 1 AbsorptionandEmissionFluctuations...20 2 Signal-NoiseRelations...21 2. 1 SignalLimitation...22 2. 2 BackgroundLimitation...22 2. 2. 1 IdealDetection...24 2. 3 JohnsonNoise...27 2. 4 DarkCurrentNoise...27 2. 5 NoiseandSensitivity...28 2. 6 Ampli?erNoiseandMismatching...28 3 ThermalDetectors...31 3. 1 ThermocoupleandThermopile...31 3. 2 Bolometer...36 3. 2. 1 MetallicBolometer...39 3. 2. 2 Thermistor...40 3. 3 PyroelectricDetector...44 4 VacuumPhotodetectors...51 4. 1 VacuumPhotodiode...52 4. 2 Photomultiplier...56 X Contents 5 SemiconductorPhotodetectors...61 5. 1 Photoconductors...6 1 5. 1. 1 AnalysisoftheDetectionProcess...64 5. 1. 2 FrequencyResponse ...69 5. 2 Photodiodes...69 5. 2. 1 P-NJunction...70 5. 2. 2 Current-VoltageCharacteristic...72 5. 2. 3 PhotonExcitation...75 5. 2. 4 OperationalModes...79 5. 2. 5 OpenCircuit ...80 5. 2. 6 CurrentCircuit...82 5. 2. 7 Reverse-BiasedCircuit...83 5. 3 AvalanchePhotodiodes...
This book provides significant knowledge on innovative radio resource management schemes for satellite communication systems that exploit lower layer adaptivity and the knowledge of layer 3 IP QoS support and transport layer behavior. The book integrates competencies considering all the parts of system design: propagation aspects, radio resource management, access protocols, network protocols, transport layer protocols, and more, to cover both broadband and mobile satellite systems.
Power consumption becomes the most important design goal in a wide range of electronic systems. There are two driving forces towards this trend: continuing device scaling and ever increasing demand of higher computing power. First, device scaling continues to satisfy Moore's law via a conventional way of scaling (More Moore) and a new way of exploiting the vertical integration (More than Moore). Second, mobile and IT convergence requires more computing power on the silicon chip than ever. Cell phones are now evolving towards mobile PC. PCs and data centers are becoming commodities in house and a must in industry. Both supply enabled by device scaling and demand triggered by the convergence trend realize more computation on chip (via multi-core, integration of diverse functionalities on mobile SoCs, etc.) and finally more power consumption incurring power-related issues and constraints. "Energy-Aware System Design: Algorithms and Architectures" provides state-of-the-art ideas for low power design methods from circuit, architecture to software level andoffers design case studies in three fast growing areas of mobile storage, biomedical and security. Important topics and features: - Describes very recent advanced issues and methods for energy-aware design at each design level from circuit andarchitecture toalgorithm level, and also covering important blocks including low power main memory subsystem and on-chip network at architecture level - Explains efficient power conversion and delivery which is becoming important as heterogeneous power sources are adopted for digital and non-digital parts - Investigates 3D die stacking emphasizing temperature awareness for better perspective on energy efficiency - Presents three practical energy-aware design case studies; novel storage device (e.g., solid state disk), biomedical electronics (e.g., cochlear and retina implants), and wireless surveillance camera systems. Researchers and engineers in the field of hardware and software design will find this book an excellent starting point to catch up with the state-of-the-art ideas of low power design.
Intra-system EMC problems are becoming increasingly common in
mobile devices, ranging from notebook PCs to cell phones, with
RF/wireless capbilities. These issues range from minor annoyances
to serious glitches which impede the functioning of the device.
This book gives a thourough review of electromagnetic theory
(including Maxwell's equations), discusses possible sources and
causes of intra-system interference, shows to use models and
analysis to discover potential sources of intra-system EMC in a
design, how to use appropriate tests and measurements to detect
intra-system EMC problems, and finally extensively discusses
measures to mitigate or totally eliminate intra-system EMC
problems. With more and more mobile devices incorporating wirless
capability (often with multiple wireless systems, such as Bluetooth
and WiFi), this book should be part of the reference shelf of every
RF/wireless engineer and mobile device designer.
Over the past decade, the world has witnessed an explosion in the
development and deployment of new wireless network technologies.
From cellular mobile telephony to the ubiquitous "WiFi" networks in
coffee-shops and airports, to the emerging WiMAX wireless broadband
access networks, the menu of wireless access systems has become so
comprehensive that wireline access to user devices may soon become
a relic of the past. Wireless Networking serves as a one-stop view
of cellular, WiFi, and WiMAX networks, as well as the emerging
wireless ad hoc and sensor networks. Rather than provide
descriptive accounts of these technologies and standards, the book
emphasizes conceptual perspectives on the modeling, analysis,
design and optimization of such networks. Furthermore, the authors
present wireless networking within the unifying framework of
resource allocation, using simple abstractions of the underlying
physical wireless communication. In short, Wireless Networking is
an in-depth, exhaustive, and invaluable asset to anyone working in
this rapidly evolving field.
This book addresses the emerging technology for Orthogonal Frequency Division Multiple Access (OFDMA), covering OFDMA physical layer as well as network technology. The book also includes information on IEEE 802.16e and WiMAX networks and also offers a comparison with other OFDMA technologies. OFDMA is the fastest growing area in the wireless marketplace, and the backbone of systems used in WiMAX. WiMAX is the technology that enables wireless users to communicate at any time from any location without having to find a WiFi hotspot.
Over the past decades, fault diagnosis (FDI) and fault tolerant control strategies (FTC) have been proposed based on different techniques for linear and nonlinear systems. Indeed a considerable attention is deployed in order to cope with diverse damages resulting in faults occurrence.
|
You may like...
Introduction To Communication Studies
George Angelopulo, Elizabeth Lubinga
Paperback
R458
Discovery Miles 4 580
Microwave Active Circuit Analysis and…
Clive Poole, Izzat Darwazeh
Hardcover
RF / Microwave Circuit Design for…
Ulrich L. Rohde, Matthias Rudolph
Hardcover
R4,952
Discovery Miles 49 520
MIMO Wireless Networks - Channels…
Bruno Clerckx, Claude Oestges
Hardcover
R2,237
Discovery Miles 22 370
Wireless Sensor and Actuator Networks…
Roberto Verdone, Davide Dardari, …
Hardcover
R2,237
Discovery Miles 22 370
|