![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
Over the past decade, the world has witnessed an explosion in the
development and deployment of new wireless network technologies.
From cellular mobile telephony to the ubiquitous "WiFi" networks in
coffee-shops and airports, to the emerging WiMAX wireless broadband
access networks, the menu of wireless access systems has become so
comprehensive that wireline access to user devices may soon become
a relic of the past. Wireless Networking serves as a one-stop view
of cellular, WiFi, and WiMAX networks, as well as the emerging
wireless ad hoc and sensor networks. Rather than provide
descriptive accounts of these technologies and standards, the book
emphasizes conceptual perspectives on the modeling, analysis,
design and optimization of such networks. Furthermore, the authors
present wireless networking within the unifying framework of
resource allocation, using simple abstractions of the underlying
physical wireless communication. In short, Wireless Networking is
an in-depth, exhaustive, and invaluable asset to anyone working in
this rapidly evolving field.
Wireless sensor networks are currently being employed in a variety of applications ranging from medical to military, and from home to industry. Wireless Sensor Networks and Applications aims to provide a reference tool for the increasing number of scientists who depend upon sensor networks in some way. The topics covered include network design and modeling, network management, data management, security and applications. The topic covered in each chapter is given expository but also scholarly treatment, covering the history of the topic, reviewing state-of-the-art thinking relative to the topic, and discussing currently unsolved problems of special interest.
This book presents bond graph model-based fault detection with a focus on hybrid system models. The book addresses model design, simulation, control and model-based fault diagnosis of multidisciplinary engineering systems. The text beings with a brief survey of the state-of-the-art, then focuses on hybrid systems. The author then uses different bond graph approaches throughout the text and provides case studies.
The objective of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012) is to facilitate an exchange of information on best practices for the latest research advances in the area of communications, networks and intelligence applications. These mainly involve computer science and engineering, informatics, communications and control, electrical engineering, information computing, and business intelligence and management. "Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012)" will focus on green information technology and applications, which will provide in-depth insights for engineers and scientists in academia, industry, and government. The book addresses the most innovative research developments including technical challenges, social and economic issues, and presents and discusses the authors' ideas, experiences, findings, and current projects on all aspects of advanced green information technology and applications. Yuhang Yang is a professor at the Department of Electronic Engineering, Shanghai Jiao Tong University. Maode Ma is an associate professor at the School of Electrical & Electronic Engineering, Nanyang Technological University.
Securing communications is a challenging task. A ?rst attempt at security involves learning basic cryptography, and applying encryption algorithms to make messages unintelligible to adversaries. However, rarely is the task of securing a message - changesosimple.Whenonestepsbackandcontemplateshowtosecuretheexchange of communications, one realizes that the challenge is fundamentally one of bui- ing a complete solution. For example, one must ensure that all entities involved have proper and authenticated cryptographic material, or one must ensure that one veri?ably knows to whom one is communicating, or one must understand how the communication process takes place so as to make certain there are no vulnerabilities introduced by the communication process itself. Thislastissue, namelythatsecuritymethodsareoftenbuiltwithoutconsideration to how communication takes place, represents a fundamental gap where much of modern security research has fallen short.The security literature is ?lled with a mass of articles on cryptographic primitives and, although there are still many theoretical hurdlestobeovercomebythecryptographiccommunity,mostoftheseshortcomings areacademicandtherearenownumeroustextbooksoncryptographythatcanprovide thebasicintroductionneededtoemploycryptographicprimitives. Ontheothersideof thecoin,thesecurityliteratureisalso?lledwithamassofarticlesdevotedtobuilding secure protocols and, similarly, there are now numerous textbooks on computer securitythatprovidetheinstructionneededtodesignsecureprotocols.Unfortunately, the issue of how communication takes place or, more speci?cally, whether there are any speci?c issues that might arise or be circumvented because message exchanges aretakingplaceononemediumversusanother(e.g., wirelesscommunicationversus wired communication), is generally neglected.
In the last two decades, the field of time-frequency analysis has evolved into a widely recognized and applied discipline of signal processing. Besides linear time-frequency representations such as the short-time Fourier transform, the Gabor transform, and the wavelet transform, an important contribution to this development has undoubtedly been the Wigner distribution (WD) which holds an exceptional position within the field of bilinear/quadratic time-frequency representations. The WD was first defined in quantum mechanics as early as 1932 by the later Nobel laureate E. Wigner. In 1948, J. Ville introduced this concept in signal analysis. Based on investigations of its mathematical structure and properties by N.G. de Bruijn in 1967, the WD was brought to the attention of a larger signal processing community in 1980. The WD was soon recognized to be important for two reasons: firstly, it provides a powerful theoretical basis for quadratic time-frequency analysis; secondly, its discrete-time form (supplemented by suitable windowing and smoothing) is an eminently practical signal analysis tool. The seven chapters of this book cover a wide range of different aspects of the WD and other linear time-frequency distributions: properties such as positivity, spread, and interference term geometry; signal synthesis methods and their application to signal design, time-frequency filtering, and signal separation; WD based analysis of nonstationary random processes; singular value decompositions and their application to WD based detection and classification; and optical applications of the WD. The size of the chapters has been chosen such that an in-depth treatment of the various topics isachieved.
Designed for information systems professionals, including IS, DP, MIS, LAN, and systems managers, this text provides a source of introductory information for those involved with decision-making processes related to information systems. Suitable as a University course text in MIS programs, the book also covers the subject in sufficient detail for the more technically orientated. This text describes how to reap the benefits of improved efficiency and productivity through the use of document imaging systems that reduce access time and enhance document integrity.
This comprehensive book makes the important technologies and mathematical concepts behind today's optical communications systems accessible and understandable to practicing and future electrical and communication engineers. Featuring nearly 400 figures and over 900 equations, the book provides the practical engineering details and mathematical tools necessary to analyze and design optical fiber systems.
This book provides an introduction to software-defined radio and cognitive radio, along with methodologies for applying knowledge representation, semantic web, logic reasoning and artificial intelligence to cognitive radio, enabling autonomous adaptation and flexible signaling. Readers from the wireless communications and software-defined radio communities will use this book as a reference to extend software-defined radio to cognitive radio, using the semantic technology described.
Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to the strongly increased security demands for mobile systems. In this book, the authors show how TETRA can be strongly improved and these improvements will most probably be part of future TETRA standards. The areas examined include channel assignment and multiple access techniques, video transmission, wireless LAN integration, and the establishment of multiple wireless mesh networks. Since the requirements for these networks is security, the authors show that innovative techniques such as those based on chaotic signals can be used in order to maximize security. The book is a vital reference point for researchers with ambition to find the general solution for modern problems of public safety.
The first comprehensive analysis of the application of Low Earth Orbital Satellites (LEO) in personal communication networks. This new book describes the characteristic design features, discusses the issues to be considered during the design of LEO satellite communications networks, and presents analytical frameworks for evaluating their performance.
Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged. At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers. Now, however, the traditional framework is being increasingly challenged by new methods that are jostling for a position in the "next-generation" Internet. The concept of a network that is becoming more programmable is one of the aspects that are taking center stage. This opens new possibilities to embed software applications inside the network itself and to manage networks and communications services with unprecedented ease and efficiency. In this edited volume, distinguished experts take the reader on a tour of different facets of programmable network infrastructure and applications that exploit it. Presenting the state of the art in network embedded management and applications and programmable network infrastructure, the book conveys fundamental concepts and provides a glimpse into various facets of the latest technology in the field. "
This book discusses the use of the spectrum sharing techniques in cognitive radio technology, in order to address the problem of spectrum scarcity for future wireless communications. The authors describe a cognitive radio medium access control (MAC) protocol, with which throughput maximization has been achieved. The discussion also includes use of this MAC protocol for imperfect sensing scenarios and its effect on the performance of cognitive radio systems. The authors also discuss how energy efficiency has been maximized in this system, by applying a simple algorithm for optimizing the transmit power of the cognitive user. The study about the channel fading in the cognitive user and licensed user and power adaption policy in this scenario under peak transmit power and interference power constraint is also present in this book.
Space-time adaptive processing (STAP) is an exciting technology for advanced radar systems that allows for significant performance enhancements over conventional approaches. Based on a time-tested course taught in industry, government and academia, this second edition reviews basic STAP concepts and methods, placing emphasis on implementation in real-world systems. It addresses the needs of radar engineers who are seeking to apply effective STAP techniques to their systems, and serves as an excellent reference for non-radar specialists with an interest in the signal processing applications of STAP. Engineers find the analysis tools they need to assess the impact of STAP on a variety of important radar applications. A toolkit of STAP algorithms and implementation techniques allows practitioners the flexibility of adapting the best methods to their application. In addition, this second edition adds brand new coverage on "STAP on Transmit" and "Knowledge-Aided STAP (KA-STAP). Market Radar systems engineers and managers; signal processing engineers and managers; and researchers and academics involved in these areas.
The most recent design and system applications of OF amplifiers are comprehensively described in this detailed book. With specific focus on the latest telecommunication engineering issues, it reviews all significant properties of optical fiber amplifiers and presents highly accurate models for erbium-, neodymium-, and praseodymium- doped fiver amplifiers.
Advances in information technologies now enable the incorporation of Internet services into vehicles, allowing the transfer of digital data from the smart nodes inside the vehicle to central servers on the Internet. Telematics Communication Technologies and Vehicular Networks: Wireless Architectures and Applications examines critical issues involved with telematics such as vehicular network infrastructure, vehicular network communication protocols, and vehicular services and applications. A defining collection of latest findings and cutting-edge solutions, this highly esteemed reference publication provides useful techniques, tools, and assessments for those involved with computer science, computer engineering, and management information systems.
This book focuses on partitional clustering algorithms, which are commonly used in engineering and computer scientific applications. The goal of this volume is to summarize the state-of-the-art in partitional clustering. The book includes such topics as center-based clustering, competitive learning clustering and density-based clustering. Each chapter is contributed by a leading expert in the field.
Readers will progress from an understanding of what the Internet is now towards an understanding of the motivations and techniques that will drive its future.
While there are numerous books describing modern wireless communication systems that contain overviews of radio propagation and radio channel modelling, there are none that contain detailed information on the design, implementation and calibration of radio channel measurement equipment, the planning of experiments and the in depth analysis of measured data. The book would begin with an explanation of the fundamentals of radio wave propagation and progress through a series of topics, including the measurement of radio channel characteristics, radio channel sounders, measurement strategies, data analysis techniques and radio channel modelling. Application of results for the prediction of achievable digital link performance would be discussed with examples pertinent to single carrier, multi-carrier and spread spectrum radio links. This work would address specifics of communications in various different frequency bands for both long range and short range fixed and mobile radio links.
Near-Field Antenna Measurements shows you how to calculate antenna gain, pattern, and beam pointing faster and more accurately than ever before. Emphasizing practical solutions to real-world problems, it presents a detailed technical overview of the theory and practice of antenna near-field measurements.
Introduction to Applied Statistical Signal Analysis is designed for
the experienced individual with a basic background in mathematics,
science, and computer. With this predisposed knowledge, the reader
will coast through the practical introduction and move on to signal
analysis techniques, commonly used in a broad range of engineering
areas such as biomedical engineering, communications, geophysics,
and speech. The presentation style is designed for the upper level
undergraduate or graduate student who needs a theoretical
introduction to the basic principles of statistical modeling and
the knowledge to implement them practically.
This book provides a comprehensive overview of modern networks design, from specifications and modeling to implementations and test procedures, including the design and implementation of modern networks on chip, in both wireless and mobile applications. Topical coverage includes algorithms and methodologies, telecommunications, hardware (including networks on chip), security and privacy, wireless and mobile networks and a variety of modern applications, such as VoLTE and the internet of things. |
You may like...
Introduction To Control Of Oscillations…
Alexander L. Fradkov, Alexander Yu Pogromsky
Hardcover
R2,513
Discovery Miles 25 130
Black Kid Magic - Young, Gifted and…
Tirzah McClinton, Andrew McClinton
Hardcover
R420
Discovery Miles 4 200
|