![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
Wireless technology and handheld devices are dramatically changing the degrees of interaction throughout the world, further creating a ubiquitous network society. The emergence of advanced wireless telecommunication technologies and devices in today's society has increased accuracy and access rate, all of which are increasingly essential as the volume of information handled by users expands at an accelerated pace. The requirement for mobility leads to increasing pressure for applications and wireless systems to revolve around the concept of continuous communication with anyone, anywhere, and anytime. With the wireless technology and devices come ?exibility in network design and quicker deployment time. Over the past decades, numerous wireless telecommu- cation topics have received increasing attention from industry professionals, a- demics, and government agencies. Among these topics are the wireless Internet; multimedia; 3G/4G wireless networks and systems; mobile and wireless network security; wireless network modeling, algorithms, and simulation; satellite based s- tems; 802.11x; RFID; and broadband wireless access.
Digital signal processing is commonplace in most electronics
including MP3 players, HDTVs, and phones, just to name a few of the
applications. The engineers creating these devices are in need of
essential information at a moment's notice. The Instant Access
Series provides all the critical content that a signal or
communications engineer needs in his or her daily work.
This book focuses on broadband distribution and systems
architecture and concentrates on practical concepts that will allow
the reader to do their own design, improvement, and troubleshooting
work. The objective is to enhance the skill sets of a large
population that designs and builds broadband cable plants, as well
as those maintaining and troubleshooting it. A large cross-section
of technical personnel who need to learn these skills design,
maintain, and service HFC systems from signal creation through
transmission to reception and processing at the customer end point.
In addition, data/voice and video specialists need to master and
reference the basics of HFC design and distribution before
contending with the intricacies of their own unique services. This
book serves as an essential reference to all cable engineers-those
who specifically design and maintain the HFC distribution plant as
well as those primarily concerned with data/voice technology as
well as video technology. Included is an online component
consisting of spreadsheets that were used in developing the
material presented in the book.
This book examines recent developments in semantic systems that can respond to situations and environments and events. The contributors to this book cover how to design, implement and utilize disruptive technologies. The editor discusses the two fundamental sets of disruptive technologies: the development of semantic technologies including description logics, ontologies and agent frameworks; and the development of semantic information rendering and graphical forms of displays of high-density time-sensitive data to improve situational awareness. Beyond practical illustrations of emerging technologies, the editor proposes to utilize an incremental development method called knowledge scaffolding -a proven educational psychology technique for learning a subject matter thoroughly. The goal of this book is to help readers learn about managing information resources, from the ground up and reinforcing the learning as they read on.
The Newnes Know It All Series takes the best of what our authors
have written to create hard-working desk references that will be an
engineer's first port of call for key information, design
techniques and rules of thumb. Guaranteed not to gather dust on a
shelf
Instructs advanced and important analysis methods which are frequently used for researchers, engineers and students who work on applications of electromagnetic waves to microwave devices and antennas. The book also includes various numerical techniques.
The spread-spectrum technique is becoming increasingly important in wireless communication systems. In this work, the main advantages of this techniques are outlined, describing its key elements, presenting important code acquisition strategies for direct sequences (DS) and frequency hopping (FH) systems, comparing various code tracking loop systems, and detailing receiver configurations based on CCD, SAW and DSP matched filters. The authors also examine system capacity issues related to the CDMA cellular network, and explain the CDMA overlay, packetized transmission in CDMA networks, and the problems of multiuser detection.
Wireless sensor networks are currently being employed in a variety of applications ranging from medical to military, and from home to industry. Wireless Sensor Networks and Applications aims to provide a reference tool for the increasing number of scientists who depend upon sensor networks in some way. The topics covered include network design and modeling, network management, data management, security and applications. The topic covered in each chapter is given expository but also scholarly treatment, covering the history of the topic, reviewing state-of-the-art thinking relative to the topic, and discussing currently unsolved problems of special interest.
IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations.
Network processors are the basic building blocks of today's
high-speed, high-demand, quality-oriented communication networks.
Designing and implementing network processors requires a new
programming paradigm and an in-depth understanding of network
processing requirements. This book leads the reader through the
requirements and the underlying theory of networks, network
processing, and network processors. It covers implementation of
network processors and intergrates EZchip Microcode Development
Environment so that you can gain hands-on experience in writing
high-speed networking applications. By the end of the book, the
reader will be able to write and test applications on a simulated
network processor.
Strengthen your understanding of fast-moving WDMA optical network technology, and learn how to better select and design reliable all-optical telecom networks with this practical book. It will help expand your knowledge of LLN, Manhattan, Shuffle, De Bruijn, Gemmet, Matrix, Swift, and Starnet and will show you how to employ an effective method of network organization based on traffic demands.
Learn how to quickly solve electromagnetic scattering problems using the Moment Method with this unique book. Software Included! Accompanying software featuring FORTRAN source code allows you to modify the book's examples and understand how simple and complex shapes scatter waves. One 3.5" IBM PC-compatible diskette.
Anyone who has ever shopped for a new smart phone, laptop, or other tech gadget knows that staying connected is crucial. There is a lot of discussion over which service provider offers the best coverage-enabling devices to work anywhere and at any time-with 4G and LTE becoming a pervasive part of our everyday language. The Handbook of Research on Next Generation Mobile Communication Systems offers solutions for optimal connection of mobile devices. From satellite signals to cloud technologies, this handbook focuses on the ways communication is being revolutionized, providing a crucial reference source for consumers, researchers, and business professionals who want to be on the frontline of the next big development in wireless technologies. This publication features a wide variety of research-based articles that discuss the future of topics such as bandwidth, energy-efficient power, device-to-device communication, network security and privacy, predictions for 5G communication systems, spectrum sharing and connectivity, and many other relevant issues that will influence our everyday use of technology.
Multisensor fusion systems are only practical if the algorithms used are practical and effective, and if there is efficient database support. The first part of this book discusses a wide range of issues related to the development of robust, context-sensitive, and efficient data fusion algorithms. The second part addresses database requirements, structures, and issues related to achieving overall computational efficiency. Featuring highly accessible notation, the processing model and database issues presented in the text are aimed at system developers working in sensor fusion, automatic target recognition, multiple-target tracking, robotic control, automated image understanding, and large-scale integration and fabrication.
The World Fantasy Award-winning third volume of the Lyonesse trilogy brings attention to the faerie changeling Madouc. Where princess Suldrun once meekly endured the proprieties of Castle Haidion, Madouc defends herself with mischief. Vexed, King Casmir and Queen Sollace arrange a contest to marry her off. However, Madouc has other ideas, and leaves with the stableboy " Sir Pom-pom" on a quest to learn the identity of her father, encountering swindlers, faeries, trolls, ogres, a knight in search of his youth, and a relatively pedestrian item known as the Holy Grail. As the sorcerers Shimrod and Murgen investigate dire portents in the world of magic, Casmir schemes to murder prince Dhrun of Troicinet and bring all the lands under his iron rule; however, his ambitions will be complicated by one small but important oversight -- he's failed to allow for Madouc
Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a collection of defense mechanisms that operate at the lower-layers of the protocol stack and can defend wireless systems before the effects of attacks propagate up to higher-level applications and services. The book will focus on fundamental security problems that involve properties unique to wireless systems, such as the characteristics of radio propagation, or the location of communicating entities, or the properties of the medium access control layer. Specifically, the book provides detection mechanisms and highlights defense strategies that cope with threats to wireless localization infrastructure, attacks on wireless networks that exploit entity identity (i.e. spoofing attacks), jamming and radio interference that can undermine the availability of wireless communications, and privacy threats where an adversary seeks to infer spatial and temporal contextual information surrounding wireless communications. Additionally, the authors explore new paradigms of physical layer security for wireless systems, which can support authentication and confidentiality services by exploiting fading properties unique to wireless communications.
Spacecraft TT&C and Information Transmission Theory and Technologies introduces the basic theory of spacecraft TT&C (telemetry, track and command) and information transmission. Combining TT&C and information transmission, the book presents several technologies for continuous wave radar including measurements for range, range rate and angle, analog and digital information transmissions, telecommand, telemetry, remote sensing and spread spectrum TT&C. For special problems occurred in the channels for TT&C and information transmission, the book represents radio propagation features and its impact on orbit measurement accuracy, and the effects caused by rain attenuation, atmospheric attenuation and multi-path effect, and polarization composition technology. This book can benefit researchers and engineers in the field of spacecraft TT&C and communication systems. Liu Jiaxing is a professor at The 10th Institute of China Electronics Technology Group Corporation.
This book explains the advantages of fiber optics over conventional coaxial cables when routing microwave signals.
This book covers control theory signal processing and relevant applications in a unified manner. It introduces the area, takes stock of advances, and describes open problems and challenges in order to advance the field. The editors and contributors to this book are pioneers in the area of active sensing and sensor management, and represent the diverse communities that are targeted.
Thewritingofthisbookhasbeeninspiredbytheexperienceofteachinga courseonDetectionandSignalProcessingtograduatestudentsoveraperiod ofmanyyears. Itwasstrikingthatstudentswerenotonlyfascinatedbythe variousdetectionprinciplesandtechnicalperformancesofpracticalsystems, butalsobytheprofessionalismoftheinvolved typical physicalengine- ing. Usuallystudentsarethoroughlytaughtindi?erentcoursesofphysics, whicharemostlystudiedasisolated?elds. Thecourseondetectionands- nalprocessingisbasedontypicalresultsthatwereestablishedindi?erent disciplines like optics, solid state physics, thermodynamics, mathematical statistics,Fouriertransforms,andelectroniccircuitry. Theirsimultaneousand interdependentapplicationbroadenstheinsightofmutualrelationsinthev- ious?elds. Forinstancethe?uctuationsofthermalbackgroundradiationcan bederivedeitherwiththeblackbodytheoryorindependentlywithther- dynamicstoarriveatthesameresult. AlsotheappliedFourierrelationsin thefrequencyandtimedomainsarenolongerabstractmathematicalman- ulationsbutpracticaltoolsandprobablyeasiertounderstandintheapplied technique. Estimatesoftheorderofmagnitudeswithcomparisonofrelevant physicale?ectsnecessarybydesigningadeviceareveryinstructive. Ingeneral theachievementsofvariousdisciplinesarebroughttogethertodesignandto evaluatequantitativelythetechnicalperformancesofdetectiontechniques. Thustheinterestfordetectionandsignalprocessingisbothtolearnthe knowledgefordesigningpracticaldetectionsystemsandtogetacquainted withthethinkingofphysicalengineering. The?rstpartofthebookisdevotedtonoisephenomenaandradiation detectors. Fundamentaldescriptionswithquantitativeanalysesoftheund- lyingphysicalprocessesofbothdetectorsandaccompanyingnoiseleadto understandthepotentialswithrespecttosensitivityandoperatingfrequency domain. Thesecondpartdealswithampli?cationproblemsandtherecovery ofrepetitivesignalsburiedinnoise. Thelastpartisdevotedtosolvingthe problemsconnectedwithreachingtheultimatedetectionlimitorquantum limit. Thisisdoneforheterodynedetectionandphotoncounting. Although VIII Preface heterodynedetectionyieldstheultimatesensitivity,itsspatialmodesel- tivityand,ingeneral,thelowspectralpowerdensityofthesignalrequire sophisticatedprovisions. Thisisdiscussedindetail. Theinherentproblemsare analyzedandappropriatetechnicalsolutionsaredescribedtoreachtheul- matesensitivityfordetectingincoherentradiationandcommunicationsignals thatarerandomlyDopplershifted. Theresultsareillustratedwithexamples ofspacecommunication. Hengelo(O),January2006 W. J. Witteman Contents 1 RandomFluctuations...1 1. 1 Introduction...1 1. 2 ThermalNoiseofResistance...2 1. 3 ShotNoise...5 1. 3. 1 SpectralDistribution ...6 1. 3. 2 Photons...10 1. 4 FlickerNoise...10 1. 5 Generation-RecombinationNoise...10 1. 6 ThermalRadiationandItsFluctuations...13 1. 7 TemperatureFluctuationsofSmallBodies...18 1. 7. 1 AbsorptionandEmissionFluctuations...20 2 Signal-NoiseRelations...21 2. 1 SignalLimitation...22 2. 2 BackgroundLimitation...22 2. 2. 1 IdealDetection...24 2. 3 JohnsonNoise...27 2. 4 DarkCurrentNoise...27 2. 5 NoiseandSensitivity...28 2. 6 Ampli?erNoiseandMismatching...28 3 ThermalDetectors...31 3. 1 ThermocoupleandThermopile...31 3. 2 Bolometer...36 3. 2. 1 MetallicBolometer...39 3. 2. 2 Thermistor...40 3. 3 PyroelectricDetector...44 4 VacuumPhotodetectors...51 4. 1 VacuumPhotodiode...52 4. 2 Photomultiplier...56 X Contents 5 SemiconductorPhotodetectors...61 5. 1 Photoconductors...6 1 5. 1. 1 AnalysisoftheDetectionProcess...64 5. 1. 2 FrequencyResponse ...69 5. 2 Photodiodes...69 5. 2. 1 P-NJunction...70 5. 2. 2 Current-VoltageCharacteristic...72 5. 2. 3 PhotonExcitation...75 5. 2. 4 OperationalModes...79 5. 2. 5 OpenCircuit ...80 5. 2. 6 CurrentCircuit...82 5. 2. 7 Reverse-BiasedCircuit...83 5. 3 AvalanchePhotodiodes...
This book provides significant knowledge on innovative radio resource management schemes for satellite communication systems that exploit lower layer adaptivity and the knowledge of layer 3 IP QoS support and transport layer behavior. The book integrates competencies considering all the parts of system design: propagation aspects, radio resource management, access protocols, network protocols, transport layer protocols, and more, to cover both broadband and mobile satellite systems.
Power consumption becomes the most important design goal in a wide range of electronic systems. There are two driving forces towards this trend: continuing device scaling and ever increasing demand of higher computing power. First, device scaling continues to satisfy Moore's law via a conventional way of scaling (More Moore) and a new way of exploiting the vertical integration (More than Moore). Second, mobile and IT convergence requires more computing power on the silicon chip than ever. Cell phones are now evolving towards mobile PC. PCs and data centers are becoming commodities in house and a must in industry. Both supply enabled by device scaling and demand triggered by the convergence trend realize more computation on chip (via multi-core, integration of diverse functionalities on mobile SoCs, etc.) and finally more power consumption incurring power-related issues and constraints. "Energy-Aware System Design: Algorithms and Architectures" provides state-of-the-art ideas for low power design methods from circuit, architecture to software level andoffers design case studies in three fast growing areas of mobile storage, biomedical and security. Important topics and features: - Describes very recent advanced issues and methods for energy-aware design at each design level from circuit andarchitecture toalgorithm level, and also covering important blocks including low power main memory subsystem and on-chip network at architecture level - Explains efficient power conversion and delivery which is becoming important as heterogeneous power sources are adopted for digital and non-digital parts - Investigates 3D die stacking emphasizing temperature awareness for better perspective on energy efficiency - Presents three practical energy-aware design case studies; novel storage device (e.g., solid state disk), biomedical electronics (e.g., cochlear and retina implants), and wireless surveillance camera systems. Researchers and engineers in the field of hardware and software design will find this book an excellent starting point to catch up with the state-of-the-art ideas of low power design.
Intra-system EMC problems are becoming increasingly common in
mobile devices, ranging from notebook PCs to cell phones, with
RF/wireless capbilities. These issues range from minor annoyances
to serious glitches which impede the functioning of the device.
This book gives a thourough review of electromagnetic theory
(including Maxwell's equations), discusses possible sources and
causes of intra-system interference, shows to use models and
analysis to discover potential sources of intra-system EMC in a
design, how to use appropriate tests and measurements to detect
intra-system EMC problems, and finally extensively discusses
measures to mitigate or totally eliminate intra-system EMC
problems. With more and more mobile devices incorporating wirless
capability (often with multiple wireless systems, such as Bluetooth
and WiFi), this book should be part of the reference shelf of every
RF/wireless engineer and mobile device designer. |
You may like...
Using Data for Monitoring and Target…
Ian McCallum, Ray Sumner
Paperback
R3,771
Discovery Miles 37 710
|