![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
Wireless sensor networks have the potential to become the third wireless revolution after wireless voice networks in the 80s and wireless data networks in the late 90s. Unfortunately, radio power consumption is still a major bottleneck to the wide adoption of this technology. Different directions have been explored to minimize the radio consumption, but the major drawback of the proposed solutions is a reduced wireless link robustness. The primary goal of Architectures and Synthesizers for Ultra-low Power Fast Frequency-Hopping WSN Radios is to discuss, in detail, existing and new architectural and circuit level solutions for ultra-low power, robust, uni-directional and bi-directional radio links. Architectures and Synthesizers for Ultra-low Power Fast Frequency-Hopping WSN Radios guides the reader through the many system, circuit and technology trade-offs he will be facing in the design of communication systems for wireless sensor networks. Finally, this book, through different examples realized in both advanced CMOS and bipolar technologies opens a new path in the radio design, showing how radio link robustness can be guaranteed by techniques that were previously exclusively used in radio systems for middle or high end applications like Bluetooth and military communications while still minimizing the overall system power consumption.
Based on a rigorous selection of submissions to The 29th International Symposium on Computer and Information Sciences (ISCIS 2014), this books includes some of the most recent ideas and technical results in computer systems, computer science, and computer-communication networks. It offers the reader a timely access to innovative research and advances in computing and communications from many different areas of the world. The topics covered include (but are not limited to) computer architectures and digital systems, algorithms, theory, software engineering, data engineering, computational intelligence, system security, computer systems and networks, performance modeling and analysis, distributed and parallel systems, bioinformatics, computer vision and significant applications such as medical informatics and imaging. The 29th International Symposium on Computer and Information Sciences (ISCIS 2014) took place in Krakow Old City, Poland on October, 27-8, 2014.
Probability, Random Processes, and Ergodic Properties is for mathematically inclined information/communication theorists and people working in signal processing. It will also interest those working with random or stochastic processes, including mathematicians, statisticians, and economists. Highlights: Complete tour of book and guidelines for use given in Introduction, so readers can see at a glance the topics of interest. Structures mathematics for an engineering audience, with emphasis on engineering applications. New in the Second Edition: Much of the material has been rearranged and revised for pedagogical reasons. The original first chapter has been split in order to allow a more thorough treatment of basic probability before tackling random processes and dynamical systems. The final chapter has been broken into two pieces to provide separate emphasis on process metrics and the ergodic decomposition of affine functionals. Many classic inequalities are now incorporated into the text, along with proofs; and many citations have been added.
Understand the RF and Digital Signal Processing Principles Driving
Software-defined Radios KEY TOPICS
This book presents cutting-edge research contributions that address various aspects of network design, optimization, implementation, and application of cognitive radio technologies. It demonstrates how to make better utilization of the available spectrum, cognitive radios and spectrum access to achieve effective spectrum sharing between licensed and unlicensed users. The book provides academics and researchers essential information on current developments and future trends in cognitive radios for possible integration with the upcoming 5G networks. In addition, it includes a brief introduction to cognitive radio networks for newcomers to the field.
"LTE-Advanced relay technology and standardization" provides a
timely reference work for relay technology with the finalizing of
LTE Release 10 specifications. LTE-Advanced is quickly becoming the
global standard for 4G cellular communications. The relay
technology, as one of the key features in LTE-Advanced, helps not
only to improve the system coverage and capacity, but also to save
the costs of laying wireline backhaul. As a leading researcher in
the field of LTE-Advanced standards, the author provides an
in-depth description of LTE-A relay technology, and explains in
detail the standard specification and design principles. Dr. Yifei Yuan is theTechnical Director at the Standards Department of ZTE Inc."
Old Wires and New Waves- The History of the Telegraph, Telephone and Wireless By Alvin F. Harlow. Originally published in 1936. FOREWORD: THERE may be those who will think that a disproportionate amount of space is given in this book to the early history of the telegraph, as against the remarkable technical develop ments of the past quarter or half century. May it be suggested that the birth and infancy of ideas are intrinsically more note worthy, more important, than their middle age The centuries of groping for a method of quick communication, the one long century of mans striving to make electricity his servant, the pioneer days of the telegraph, when not only it but all America was simple and crude these are to most folk to-day so exotic, the last-named phase is to the student so significant a picture of the youth of American society and the nation, that, in the judgment of the author, they should be dealt with in detail for the benefit of a generation which knows them not. On the other hand, the rapid developments in telegraph, tele phone, and wireless in recent days are described at length in newspapers and magazines as they appear and they come so swiftly and we are so inured to them that the astounding inven tion of yesterday has to-day become a commonplace, and to morrow is superseded by something still more miraculous. It is therefore scarcely worth while for so slowly built and so final a publication as a book to attempt chronicling all the - minor de tails of recent progress in communication, especially since these matters become so complex and so abstruse that full explanation of their development and functioning would be too complicated for non-technically minded readers.Nevertheless, these modern developments have not been neglected, but are treated as fully as space limitations and the need for clarity seem to dictate. As usual, I have leaned heavily in my research upon the original documents and other materials in the collections of the New York Public Library and the New York Historical So ciety. The latters Henry ORielly Collection is one of the most valuable telegraph sources in existence. The great communications companies have all been very help ful. Through the good offices of Mr. William P. Banning, Assis tant Vice-President of the American Telephone and Telegraph Company, I spent many hours in personally conducted tours through that companys three huge operating buildings in New York City, any one of which is worth a trip to New York to see I was overwhelmed with pamphlets, reports, documents, magazine articles, and books and any and all photographs I desired for illustrations were at my disposal. Mr. Langdon, the librarian Miss Winburg, keeper of the photographs Messrs. Fowler and Mills of the Bell Telephone Laboratories, Rood and Lea of the Long Lines Building Carl and Sedgwick of the New York Telephone Company, all gave their assistance with the courtesy characteristic of the organization. Mr. E. W. Goode, of the publicity department of the Inter national Telephone and Telegraph Corporation, supplied all the data at his command, loaned books not to be found elsewhere, procured permission for me to see the companys operating rooms, gave me whatever photographs I desired, and searched the country over for older ones which were not in his files. The Radio Corporation of America, through Messrs. Galvin, Wright, and Weaver, was also veryhelpful. I was conducted through its operating building and was supplied with photographs and technical information as needed...
Strengthen your understanding of fast-moving WDMA optical network technology, and learn how to better select and design reliable all-optical telecom networks with this practical book. It will help expand your knowledge of LLN, Manhattan, Shuffle, De Bruijn, Gemmet, Matrix, Swift, and Starnet and will show you how to employ an effective method of network organization based on traffic demands.
Wireless technology and handheld devices are dramatically changing the degrees of interaction throughout the world, further creating a ubiquitous network society. The emergence of advanced wireless telecommunication technologies and devices in today's society has increased accuracy and access rate, all of which are increasingly essential as the volume of information handled by users expands at an accelerated pace. The requirement for mobility leads to increasing pressure for applications and wireless systems to revolve around the concept of continuous communication with anyone, anywhere, and anytime. With the wireless technology and devices come ?exibility in network design and quicker deployment time. Over the past decades, numerous wireless telecommu- cation topics have received increasing attention from industry professionals, a- demics, and government agencies. Among these topics are the wireless Internet; multimedia; 3G/4G wireless networks and systems; mobile and wireless network security; wireless network modeling, algorithms, and simulation; satellite based s- tems; 802.11x; RFID; and broadband wireless access.
This book examines recent developments in semantic systems that can respond to situations and environments and events. The contributors to this book cover how to design, implement and utilize disruptive technologies. The editor discusses the two fundamental sets of disruptive technologies: the development of semantic technologies including description logics, ontologies and agent frameworks; and the development of semantic information rendering and graphical forms of displays of high-density time-sensitive data to improve situational awareness. Beyond practical illustrations of emerging technologies, the editor proposes to utilize an incremental development method called knowledge scaffolding -a proven educational psychology technique for learning a subject matter thoroughly. The goal of this book is to help readers learn about managing information resources, from the ground up and reinforcing the learning as they read on.
This book explains the advantages of fiber optics over conventional coaxial cables when routing microwave signals.
Instructs advanced and important analysis methods which are frequently used for researchers, engineers and students who work on applications of electromagnetic waves to microwave devices and antennas. The book also includes various numerical techniques.
The spread-spectrum technique is becoming increasingly important in wireless communication systems. In this work, the main advantages of this techniques are outlined, describing its key elements, presenting important code acquisition strategies for direct sequences (DS) and frequency hopping (FH) systems, comparing various code tracking loop systems, and detailing receiver configurations based on CCD, SAW and DSP matched filters. The authors also examine system capacity issues related to the CDMA cellular network, and explain the CDMA overlay, packetized transmission in CDMA networks, and the problems of multiuser detection.
Wireless sensor networks are currently being employed in a variety of applications ranging from medical to military, and from home to industry. Wireless Sensor Networks and Applications aims to provide a reference tool for the increasing number of scientists who depend upon sensor networks in some way. The topics covered include network design and modeling, network management, data management, security and applications. The topic covered in each chapter is given expository but also scholarly treatment, covering the history of the topic, reviewing state-of-the-art thinking relative to the topic, and discussing currently unsolved problems of special interest.
IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations.
Learn how to quickly solve electromagnetic scattering problems using the Moment Method with this unique book. Software Included! Accompanying software featuring FORTRAN source code allows you to modify the book's examples and understand how simple and complex shapes scatter waves. One 3.5" IBM PC-compatible diskette.
Anyone who has ever shopped for a new smart phone, laptop, or other tech gadget knows that staying connected is crucial. There is a lot of discussion over which service provider offers the best coverage-enabling devices to work anywhere and at any time-with 4G and LTE becoming a pervasive part of our everyday language. The Handbook of Research on Next Generation Mobile Communication Systems offers solutions for optimal connection of mobile devices. From satellite signals to cloud technologies, this handbook focuses on the ways communication is being revolutionized, providing a crucial reference source for consumers, researchers, and business professionals who want to be on the frontline of the next big development in wireless technologies. This publication features a wide variety of research-based articles that discuss the future of topics such as bandwidth, energy-efficient power, device-to-device communication, network security and privacy, predictions for 5G communication systems, spectrum sharing and connectivity, and many other relevant issues that will influence our everyday use of technology.
Multisensor fusion systems are only practical if the algorithms used are practical and effective, and if there is efficient database support. The first part of this book discusses a wide range of issues related to the development of robust, context-sensitive, and efficient data fusion algorithms. The second part addresses database requirements, structures, and issues related to achieving overall computational efficiency. Featuring highly accessible notation, the processing model and database issues presented in the text are aimed at system developers working in sensor fusion, automatic target recognition, multiple-target tracking, robotic control, automated image understanding, and large-scale integration and fabrication.
The World Fantasy Award-winning third volume of the Lyonesse trilogy brings attention to the faerie changeling Madouc. Where princess Suldrun once meekly endured the proprieties of Castle Haidion, Madouc defends herself with mischief. Vexed, King Casmir and Queen Sollace arrange a contest to marry her off. However, Madouc has other ideas, and leaves with the stableboy " Sir Pom-pom" on a quest to learn the identity of her father, encountering swindlers, faeries, trolls, ogres, a knight in search of his youth, and a relatively pedestrian item known as the Holy Grail. As the sorcerers Shimrod and Murgen investigate dire portents in the world of magic, Casmir schemes to murder prince Dhrun of Troicinet and bring all the lands under his iron rule; however, his ambitions will be complicated by one small but important oversight -- he's failed to allow for Madouc
Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secure and reliable wireless systems. Whereas most of the references typically address cryptographic attacks by using conventional "network security" approches for securing wireless systems, the proposed book will be differentiated from the rest of the market by its focus on non-cryptographic attacks that cannot easily be addressed by using traditional methods, and further by presenting a collection of defense mechanisms that operate at the lower-layers of the protocol stack and can defend wireless systems before the effects of attacks propagate up to higher-level applications and services. The book will focus on fundamental security problems that involve properties unique to wireless systems, such as the characteristics of radio propagation, or the location of communicating entities, or the properties of the medium access control layer. Specifically, the book provides detection mechanisms and highlights defense strategies that cope with threats to wireless localization infrastructure, attacks on wireless networks that exploit entity identity (i.e. spoofing attacks), jamming and radio interference that can undermine the availability of wireless communications, and privacy threats where an adversary seeks to infer spatial and temporal contextual information surrounding wireless communications. Additionally, the authors explore new paradigms of physical layer security for wireless systems, which can support authentication and confidentiality services by exploiting fading properties unique to wireless communications.
Spacecraft TT&C and Information Transmission Theory and Technologies introduces the basic theory of spacecraft TT&C (telemetry, track and command) and information transmission. Combining TT&C and information transmission, the book presents several technologies for continuous wave radar including measurements for range, range rate and angle, analog and digital information transmissions, telecommand, telemetry, remote sensing and spread spectrum TT&C. For special problems occurred in the channels for TT&C and information transmission, the book represents radio propagation features and its impact on orbit measurement accuracy, and the effects caused by rain attenuation, atmospheric attenuation and multi-path effect, and polarization composition technology. This book can benefit researchers and engineers in the field of spacecraft TT&C and communication systems. Liu Jiaxing is a professor at The 10th Institute of China Electronics Technology Group Corporation.
This book covers control theory signal processing and relevant applications in a unified manner. It introduces the area, takes stock of advances, and describes open problems and challenges in order to advance the field. The editors and contributors to this book are pioneers in the area of active sensing and sensor management, and represent the diverse communities that are targeted. |
You may like...
New Ecoinformatics Tools in…
Vladimir F. Krapivin, Costas A. Varotsos, …
Hardcover
R4,292
Discovery Miles 42 920
Learn Calligraphy - The Complete Book Of…
Margaret Shepherd
Paperback
An Introduction to Wavelets and Other…
Ramazan Gencay, Faruk Selcuk, …
Hardcover
R2,710
Discovery Miles 27 100
|