![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
Over the past decade, the world has witnessed an explosion in the
development and deployment of new wireless network technologies.
From cellular mobile telephony to the ubiquitous "WiFi" networks in
coffee-shops and airports, to the emerging WiMAX wireless broadband
access networks, the menu of wireless access systems has become so
comprehensive that wireline access to user devices may soon become
a relic of the past. Wireless Networking serves as a one-stop view
of cellular, WiFi, and WiMAX networks, as well as the emerging
wireless ad hoc and sensor networks. Rather than provide
descriptive accounts of these technologies and standards, the book
emphasizes conceptual perspectives on the modeling, analysis,
design and optimization of such networks. Furthermore, the authors
present wireless networking within the unifying framework of
resource allocation, using simple abstractions of the underlying
physical wireless communication. In short, Wireless Networking is
an in-depth, exhaustive, and invaluable asset to anyone working in
this rapidly evolving field.
This book addresses the emerging technology for Orthogonal Frequency Division Multiple Access (OFDMA), covering OFDMA physical layer as well as network technology. The book also includes information on IEEE 802.16e and WiMAX networks and also offers a comparison with other OFDMA technologies. OFDMA is the fastest growing area in the wireless marketplace, and the backbone of systems used in WiMAX. WiMAX is the technology that enables wireless users to communicate at any time from any location without having to find a WiFi hotspot.
Over the past decades, fault diagnosis (FDI) and fault tolerant control strategies (FTC) have been proposed based on different techniques for linear and nonlinear systems. Indeed a considerable attention is deployed in order to cope with diverse damages resulting in faults occurrence.
This book presents bond graph model-based fault detection with a focus on hybrid system models. The book addresses model design, simulation, control and model-based fault diagnosis of multidisciplinary engineering systems. The text beings with a brief survey of the state-of-the-art, then focuses on hybrid systems. The author then uses different bond graph approaches throughout the text and provides case studies.
"Signal Conditioning" is a comprehensive introduction to electronic signal processing. The book presents the mathematical basics including the implications of various transformed domain representations in signal synthesis and analysis in an understandable and lucid fashion and illustrates the theory through many applications and examples from communication systems. The ease to learn is supported by well-chosen exercises which give readers the flavor of the subject. Supplementary electronic material is available on http://extras.springer.com including MATLAB codes illuminating applications in the domain of one dimensional electrical signal processing, image processing, and speech processing. The book is an introduction for students with a basic understanding in engineering or natural sciences.
During the last one and a half decades, wireless sensor networks have witnessed significant growth and tremendous development in both academia and industry. A large number of researchers, including computer scientists and engineers, have been interested in solving challenging problems that span all the layers of the protocol stack of sensor networking systems. Several venues, such as journals, conferences, and workshops, have been launched to cover innovative research and practice in this promising and rapidly advancing field. Because of these trends, I thought it would be beneficial to provide our sensor networks community with a comprehensive reference on as much of the findings as possible on a variety of topics in wireless sensor networks. As this area of research is in continuous progress, it does not seem to be a reasonable solution to keep delaying the publication of such reference any more. This book relates to the second volume and focuses on the advanced topics and applications of wireless sensor networks. Our rationale is that the second volume has all application-specific and non-conventional sensor networks, emerging techniques and advanced topics that are not as matured as what is covered in the first volume. Thus, the second volume deals with three-dimensional, underground, underwater, body-mounted, and societal networks. Following Donald E. Knuth's above-quoted elegant strategy to focus on several important fields (The Art of Computer Programming: Fundamental Algorithms, 1997), all the book chapters in this volume include up-to-date research work spanning various topics, such as stochastic modeling, barrier and spatiotemporal coverage, tracking, estimation, counting, coverage and localization in three-dimensional sensor networks, topology control and routing in three-dimensional sensor networks, underground and underwater sensor networks, multimedia and body sensor networks, and social sensing. Most of these major topics can be covered in an advanced course on wireless sensor networks. This book will be an excellent source of information for graduate students majoring in computer science, computer engineering, electrical engineering, or any related discipline. Furthermore, computer scientists, researchers, and practitioners in both academia and industry will find this book useful and interesting.
Securing communications is a challenging task. A ?rst attempt at security involves learning basic cryptography, and applying encryption algorithms to make messages unintelligible to adversaries. However, rarely is the task of securing a message - changesosimple.Whenonestepsbackandcontemplateshowtosecuretheexchange of communications, one realizes that the challenge is fundamentally one of bui- ing a complete solution. For example, one must ensure that all entities involved have proper and authenticated cryptographic material, or one must ensure that one veri?ably knows to whom one is communicating, or one must understand how the communication process takes place so as to make certain there are no vulnerabilities introduced by the communication process itself. Thislastissue, namelythatsecuritymethodsareoftenbuiltwithoutconsideration to how communication takes place, represents a fundamental gap where much of modern security research has fallen short.The security literature is ?lled with a mass of articles on cryptographic primitives and, although there are still many theoretical hurdlestobeovercomebythecryptographiccommunity,mostoftheseshortcomings areacademicandtherearenownumeroustextbooksoncryptographythatcanprovide thebasicintroductionneededtoemploycryptographicprimitives. Ontheothersideof thecoin,thesecurityliteratureisalso?lledwithamassofarticlesdevotedtobuilding secure protocols and, similarly, there are now numerous textbooks on computer securitythatprovidetheinstructionneededtodesignsecureprotocols.Unfortunately, the issue of how communication takes place or, more speci?cally, whether there are any speci?c issues that might arise or be circumvented because message exchanges aretakingplaceononemediumversusanother(e.g., wirelesscommunicationversus wired communication), is generally neglected.
Sealed Lead Acid...Nickel Cadmium...Lithium Ion...
In the last two decades, the field of time-frequency analysis has evolved into a widely recognized and applied discipline of signal processing. Besides linear time-frequency representations such as the short-time Fourier transform, the Gabor transform, and the wavelet transform, an important contribution to this development has undoubtedly been the Wigner distribution (WD) which holds an exceptional position within the field of bilinear/quadratic time-frequency representations. The WD was first defined in quantum mechanics as early as 1932 by the later Nobel laureate E. Wigner. In 1948, J. Ville introduced this concept in signal analysis. Based on investigations of its mathematical structure and properties by N.G. de Bruijn in 1967, the WD was brought to the attention of a larger signal processing community in 1980. The WD was soon recognized to be important for two reasons: firstly, it provides a powerful theoretical basis for quadratic time-frequency analysis; secondly, its discrete-time form (supplemented by suitable windowing and smoothing) is an eminently practical signal analysis tool. The seven chapters of this book cover a wide range of different aspects of the WD and other linear time-frequency distributions: properties such as positivity, spread, and interference term geometry; signal synthesis methods and their application to signal design, time-frequency filtering, and signal separation; WD based analysis of nonstationary random processes; singular value decompositions and their application to WD based detection and classification; and optical applications of the WD. The size of the chapters has been chosen such that an in-depth treatment of the various topics isachieved.
The objective of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012) is to facilitate an exchange of information on best practices for the latest research advances in the area of communications, networks and intelligence applications. These mainly involve computer science and engineering, informatics, communications and control, electrical engineering, information computing, and business intelligence and management. "Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012)" will focus on green information technology and applications, which will provide in-depth insights for engineers and scientists in academia, industry, and government. The book addresses the most innovative research developments including technical challenges, social and economic issues, and presents and discusses the authors' ideas, experiences, findings, and current projects on all aspects of advanced green information technology and applications. Yuhang Yang is a professor at the Department of Electronic Engineering, Shanghai Jiao Tong University. Maode Ma is an associate professor at the School of Electrical & Electronic Engineering, Nanyang Technological University.
Designed for information systems professionals, including IS, DP, MIS, LAN, and systems managers, this text provides a source of introductory information for those involved with decision-making processes related to information systems. Suitable as a University course text in MIS programs, the book also covers the subject in sufficient detail for the more technically orientated. This text describes how to reap the benefits of improved efficiency and productivity through the use of document imaging systems that reduce access time and enhance document integrity.
This textbook presents the mathematical theory and techniques necessary for analyzing and modeling high-performance global networks, such as the Internet. The three main building blocks of high-performance networks are links, switching equipment connecting the links together and software employed at the end nodes and intermediate switches. This book provides the basic techniques for modeling and analyzing these last two components. Topics covered include, but are not limited to: Markov chains and queuing analysis, traffic modeling, interconnection networks and switch architectures and buffering strategies.
Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to the strongly increased security demands for mobile systems. In this book, the authors show how TETRA can be strongly improved and these improvements will most probably be part of future TETRA standards. The areas examined include channel assignment and multiple access techniques, video transmission, wireless LAN integration, and the establishment of multiple wireless mesh networks. Since the requirements for these networks is security, the authors show that innovative techniques such as those based on chaotic signals can be used in order to maximize security. The book is a vital reference point for researchers with ambition to find the general solution for modern problems of public safety.
An in-depth, comprehensive treatment of the principles of electronic warfare (EW). Written by leading experts in the field, this authoritative book takes a systematic approach to exploring EW theory, mathematical models, and quantitative analysis. It offers a detailed examination of the basic targets of EW operations, a thorough presentation of critical radar jamming methods, and definitions of the effectiveness criteria for EW systems and techniques. Key areas covered include: mathematical models for active, passive and active-passive jamming signals; jamming methods based on the use of false radar and thermal targets; the effectiveness of specific jamming methods; a mathematical definition of electronic antiaircraft defense systems as targets; and the reduction of radar detectability. This is a useful resource for practitioners and academics interested in the development and application or radio electronic systems for military and civilian use.
The Wireless Identification and Sensing Platform (WISP) is the first of a new class of RF-powered sensing and computing systems. Rather than being powered by batteries, these sensor systems are powered by radio waves that are either deliberately broadcast or ambient. Enabled by ongoing exponential improvements in the energy efficiency of microelectronics, RF-powered sensing and computing is rapidly moving along a trajectory from impossible (in the recent past), to feasible (today), toward practical and commonplace (in the near future). This book is a collection of key papers on RF-powered sensing and computing systems including the WISP. Several of the papers grew out of the WISP Challenge, a program in which Intel Corporation donated WISPs to academic applicants who proposed compelling WISP-based projects. The book also includes papers presented at the first WISP Summit, a workshop held in Berkeley, CA in association with the ACM Sensys conference, as well as other relevant papers. The book provides a window into the fascinating new world of wirelessly powered sensing and computing.
The first comprehensive analysis of the application of Low Earth Orbital Satellites (LEO) in personal communication networks. This new book describes the characteristic design features, discusses the issues to be considered during the design of LEO satellite communications networks, and presents analytical frameworks for evaluating their performance.
Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged. At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers. Now, however, the traditional framework is being increasingly challenged by new methods that are jostling for a position in the "next-generation" Internet. The concept of a network that is becoming more programmable is one of the aspects that are taking center stage. This opens new possibilities to embed software applications inside the network itself and to manage networks and communications services with unprecedented ease and efficiency. In this edited volume, distinguished experts take the reader on a tour of different facets of programmable network infrastructure and applications that exploit it. Presenting the state of the art in network embedded management and applications and programmable network infrastructure, the book conveys fundamental concepts and provides a glimpse into various facets of the latest technology in the field. "
Survivable Optical WDM Networks investigates different approaches for designing and operating an optical network with the objectives that (1) more connections can be carried by a given network, leading to more revenue, and (2) connections can recover faster in case of failures, leading to better services. Different networks wavelength-routed WDM networks, wavelength-routed WDM networks with sub-wavelength granularity grooming, and data over next-generation SONET/SDH over WDM networks are covered. Different approaches are proposed to explore every aspect of a protection scheme such as: (1) Protection granularity: a. At wavelength granularity. b. At sub-wavelength granularity (2) Protection entity: a. Path protection. b. Sub-path protection. c. Segment protection. (3) Routing: a. Single-path routing. b. Multi-path routing. Tradeoffs between different objectives, e.g., resource efficiency vs. recovery time, are explored and practical approaches are proposed and analyzed."
The most recent design and system applications of OF amplifiers are comprehensively described in this detailed book. With specific focus on the latest telecommunication engineering issues, it reviews all significant properties of optical fiber amplifiers and presents highly accurate models for erbium-, neodymium-, and praseodymium- doped fiver amplifiers.
This comprehensive book makes the important technologies and mathematical concepts behind today's optical communications systems accessible and understandable to practicing and future electrical and communication engineers. Featuring nearly 400 figures and over 900 equations, the book provides the practical engineering details and mathematical tools necessary to analyze and design optical fiber systems.
Vehicular communication is a key technology in intelligent transportation systems. For many years now, the academic and industrial research communities have been investigating these communications in order to improve efficiency and safety of future transportation. Vehicular networking offers a wide variety of applications, including safety applications as well as infotainment applications. This book highlights the recent developments in vehicular networking technologies and their interaction with future smart cities in order to promote further research activities and challenges. SAADI BOUDJIT, University of Paris 13, France HAKIMA CHAOUCHI, Telecom SudParis, France YACINE GHAMRI, University La Rochelle, France HALABI HASBULLAH, Universiti Teknologi Petronas, Malaysia ANIS LAOUITI, Telecom SudParis, France SAOUCENE MAHFOUDH, Jeddah, Saudi Arabia PAUL MUHLETHALER, INRIA, France AMIR QAYYUM, Mohamad Ali Jinnah University, Pakistan NAUFAL SAAD, Universiti Teknologi Petronas, Malaysia AHMED SOUA, NIST, USA HAJIME TAZAKI, University of Tokyo, Japan APINUN TUNPAN, Aintec, Thailand WEI WEI, Xi'an University, China RACHID ZAGROUBA, ENSI, Tunisia.
This book focuses on partitional clustering algorithms, which are commonly used in engineering and computer scientific applications. The goal of this volume is to summarize the state-of-the-art in partitional clustering. The book includes such topics as center-based clustering, competitive learning clustering and density-based clustering. Each chapter is contributed by a leading expert in the field. |
You may like...
Scrambles in Snowdonia - 80 of the best…
Rachel Crolla, Carl McKeating
Paperback
|