Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications
This book provides significant knowledge on innovative radio resource management schemes for satellite communication systems that exploit lower layer adaptivity and the knowledge of layer 3 IP QoS support and transport layer behavior. The book integrates competencies considering all the parts of system design: propagation aspects, radio resource management, access protocols, network protocols, transport layer protocols, and more, to cover both broadband and mobile satellite systems.
This book presents a time-delay approach to the analysis and synthesis of networked control systems (NCSs) under communication constraints. Differently from other approaches, the time-delay approach to NCSs allows communication delays to be larger than the sampling intervals in the presence of scheduling protocols. The book starts from a comprehensive introduction to three main approaches to sampled-data and networked control. It then focuses on time-delay approach, and the modelling of the closed-loop systems in the form of time-delay system. It presents discontinuous (in time) Lyapunov functional constructions that are efficient for NCSs in the presence of communications delays. Further, it highlights time-delay approaches developed to model and analyze NCSs under communication constraints, with a particular focus on dynamic quantization, round-robin, try-once-discard and stochastic protocols. The results are first presented for the continuous-time NCSs and then extended to discrete-time NCSs. Discussing recent developments in Lyapunov-based analysis of NCSs under communication constraints, the book is a valuable resource for researchers interested in sampled-data and networked control, and time-delay systems, as well as for graduate students in automatic control and systems theory.
Wireless technology and handheld devices are dramatically changing the degrees of interaction throughout the world, further creating a ubiquitous network society. The emergence of advanced wireless telecommunication technologies and devices in today's society has increased accuracy and access rate, all of which are increasingly essential as the volume of information handled by users expands at an accelerated pace. The requirement for mobility leads to increasing pressure for applications and wireless systems to revolve around the concept of continuous communication with anyone, anywhere, and anytime. With the wireless technology and devices come ?exibility in network design and quicker deployment time. Over the past decades, numerous wireless telecommu- cation topics have received increasing attention from industry professionals, a- demics, and government agencies. Among these topics are the wireless Internet; multimedia; 3G/4G wireless networks and systems; mobile and wireless network security; wireless network modeling, algorithms, and simulation; satellite based s- tems; 802.11x; RFID; and broadband wireless access.
This book presents cutting-edge results on stability analysis and control scheme designs for networked teleoperation systems. It highlights new research on commonly encountered nonlinear teleoperation systems, including the stability analysis of teleoperation systems with asymmetric time-varying delays, stability analysis of teleoperation systems with interval time delays, and so on. Moreover, the book presents several high-performance control scheme designs for teleoperation systems when the velocity is available and unavailable, and for systems with nonlinear input. The results presented here mark a substantial contribution to nonlinear teleoperation system theory, robotic control theory and networked control system theory. As such, the book will be of interest to university researchers, R&D engineers and graduate students in control theory and control engineering who wish to learn about the core principles, methods, algorithms, and applications of networked teleoperation systems, robotic systems and nonlinear control systems.
The World Fantasy Award-winning third volume of the Lyonesse trilogy brings attention to the faerie changeling Madouc. Where princess Suldrun once meekly endured the proprieties of Castle Haidion, Madouc defends herself with mischief. Vexed, King Casmir and Queen Sollace arrange a contest to marry her off. However, Madouc has other ideas, and leaves with the stableboy " Sir Pom-pom" on a quest to learn the identity of her father, encountering swindlers, faeries, trolls, ogres, a knight in search of his youth, and a relatively pedestrian item known as the Holy Grail. As the sorcerers Shimrod and Murgen investigate dire portents in the world of magic, Casmir schemes to murder prince Dhrun of Troicinet and bring all the lands under his iron rule; however, his ambitions will be complicated by one small but important oversight -- he's failed to allow for Madouc
This state-of-the-art edition of a radar classic brings the reader up-to-date on new developments in clutter measurement and modelling, and features a wealth of new information. Authored by a recognized expert in the field, the book covers everything from basic concepts of radar reflectivity to space-time clutter amplitude and bistatic clutter. New radar engineers should find this to be a valuable, all-encompassing, well-illustrated survey of radar reflectivity fundamentals. Veteran engineers and systems designers should appreciate the book's new coverage of: effects of frequency agility; spatial averages for terrain; graphs from GIT clutter models; land and sea echo at extremely low grazing angles; compound statistics including the K and the Rayleigh modulated by Wiebull distributions; super sea echo events and sea spikes; bistatic land and sea clutter; and more.
The objective of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012) is to facilitate an exchange of information on best practices for the latest research advances in the area of communications, networks and intelligence applications. These mainly involve computer science and engineering, informatics, communications and control, electrical engineering, information computing, and business intelligence and management. "Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012)" will focus on green information technology and applications, which will provide in-depth insights for engineers and scientists in academia, industry, and government. The book addresses the most innovative research developments including technical challenges, social and economic issues, and presents and discusses the authors' ideas, experiences, findings, and current projects on all aspects of advanced green information technology and applications. Yuhang Yang is a professor at the Department of Electronic Engineering, Shanghai Jiao Tong University. Maode Ma is an associate professor at the School of Electrical & Electronic Engineering, Nanyang Technological University.
This book explains the advantages of fiber optics over conventional coaxial cables when routing microwave signals.
This book presents an overview of the field of multimodal location estimation. The authors' aim is to describe the research results in this field in a unified way. The book describes fundamental methods of acoustic, visual, textual, social graph, and metadata processing as well as multimodal integration methods used for location estimation. In addition, the book covers benchmark metrics and explores the limits of the technology based on a human baseline. The book also outlines privacy implications and discusses directions for future research in the area.
Securing communications is a challenging task. A ?rst attempt at security involves learning basic cryptography, and applying encryption algorithms to make messages unintelligible to adversaries. However, rarely is the task of securing a message - changesosimple.Whenonestepsbackandcontemplateshowtosecuretheexchange of communications, one realizes that the challenge is fundamentally one of bui- ing a complete solution. For example, one must ensure that all entities involved have proper and authenticated cryptographic material, or one must ensure that one veri?ably knows to whom one is communicating, or one must understand how the communication process takes place so as to make certain there are no vulnerabilities introduced by the communication process itself. Thislastissue, namelythatsecuritymethodsareoftenbuiltwithoutconsideration to how communication takes place, represents a fundamental gap where much of modern security research has fallen short.The security literature is ?lled with a mass of articles on cryptographic primitives and, although there are still many theoretical hurdlestobeovercomebythecryptographiccommunity,mostoftheseshortcomings areacademicandtherearenownumeroustextbooksoncryptographythatcanprovide thebasicintroductionneededtoemploycryptographicprimitives. Ontheothersideof thecoin,thesecurityliteratureisalso?lledwithamassofarticlesdevotedtobuilding secure protocols and, similarly, there are now numerous textbooks on computer securitythatprovidetheinstructionneededtodesignsecureprotocols.Unfortunately, the issue of how communication takes place or, more speci?cally, whether there are any speci?c issues that might arise or be circumvented because message exchanges aretakingplaceononemediumversusanother(e.g., wirelesscommunicationversus wired communication), is generally neglected.
IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations.
It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This book tackles the analysis part, especially under situations where the targeted device is protected by random masking. The authors explain advances in the field and provide the reader with mathematical formalizations. They present all known analyses within the same notation framework, which allows the reader to rapidly understand and learn contrasting approaches. It will be useful as a graduate level introduction, also for self-study by researchers and professionals, and the examples are taken from real-world datasets.
Wireless sensor networks are currently being employed in a variety of applications ranging from medical to military, and from home to industry. Wireless Sensor Networks and Applications aims to provide a reference tool for the increasing number of scientists who depend upon sensor networks in some way. The topics covered include network design and modeling, network management, data management, security and applications. The topic covered in each chapter is given expository but also scholarly treatment, covering the history of the topic, reviewing state-of-the-art thinking relative to the topic, and discussing currently unsolved problems of special interest.
This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms - for wired devices - are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book. Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication; Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data; Features authentication methods based on the usage of authentication tags as well as digital watermarks.
Learn how to quickly solve electromagnetic scattering problems using the Moment Method with this unique book. Software Included! Accompanying software featuring FORTRAN source code allows you to modify the book's examples and understand how simple and complex shapes scatter waves. One 3.5" IBM PC-compatible diskette.
This book provides step-by-step explanations of successful implementations and practical applications of machine learning. The book's GitHub page contains software codes to assist readers in adapting materials and methods for their own use. A wide variety of applications are discussed, including wireless mesh network and power systems optimization; computer vision; image and facial recognition; protein prediction; data mining; and data discovery. Numerous state-of-the-art machine learning techniques are employed (with detailed explanations), including biologically-inspired optimization (genetic and other evolutionary algorithms, swarm intelligence); Viola Jones face detection; Gaussian mixture modeling; support vector machines; deep convolutional neural networks with performance enhancement techniques (including network design, learning rate optimization, data augmentation, transfer learning); spiking neural networks and timing dependent plasticity; frequent itemset mining; binary classification; and dynamic programming. This book provides valuable information on effective, cutting-edge techniques, and approaches for students, researchers, practitioners, and teachers in the field of machine learning.
This book discusses the use of the spectrum sharing techniques in cognitive radio technology, in order to address the problem of spectrum scarcity for future wireless communications. The authors describe a cognitive radio medium access control (MAC) protocol, with which throughput maximization has been achieved. The discussion also includes use of this MAC protocol for imperfect sensing scenarios and its effect on the performance of cognitive radio systems. The authors also discuss how energy efficiency has been maximized in this system, by applying a simple algorithm for optimizing the transmit power of the cognitive user. The study about the channel fading in the cognitive user and licensed user and power adaption policy in this scenario under peak transmit power and interference power constraint is also present in this book.
Multisensor fusion systems are only practical if the algorithms used are practical and effective, and if there is efficient database support. The first part of this book discusses a wide range of issues related to the development of robust, context-sensitive, and efficient data fusion algorithms. The second part addresses database requirements, structures, and issues related to achieving overall computational efficiency. Featuring highly accessible notation, the processing model and database issues presented in the text are aimed at system developers working in sensor fusion, automatic target recognition, multiple-target tracking, robotic control, automated image understanding, and large-scale integration and fabrication.
This book presents the principal structure, networks and applications of the Global Aeronautical Distress and Safety System (GADSS) for enhanced airborne Communication, Navigation and Surveillance (CNS). It shows how their implementation works to ensure better security in flight and on the airports surface; improved aircraft tracking and determination in real space and time; and enhanced distress alerting, safety; and Search and Rescue (SAR) system for missing, hijacked and landed aircraft at sea or on the ground. Main topics of this book are as follows: an overview of radio and satellite systems with retrospective to aeronautical safety; security and distress systems; space segment with all aspects regarding satellite orbits and infrastructures; transmission segment of radio and satellite systems; ground segment of radio and earth ground stations; airborne radio and satellite antenna systems and propagation; aeronautical VHF and HF Radio CNS systems and networks; Inmarsat, Iridium and Cospas-Sasrast aeronautical satellite CNS systems and networks; Aeronautical Global Satellite Augmentation System (GSAS) and networks; Digital Video Broadcasting - Return Channel via Satellite (DVB-RCS) standards and Aeronautical Stratospheric Platform Systems (SPS) and networks.
The purpose of this book is to provide tools for a better understanding of the fundamental tradeo's and interdependencies in wireless networks, with the goal of designing resource allocation strategies that exploit these int- dependencies to achieve signi?cant performance gains. Two facts prompted us to write it: First, future wireless applications will require a fundamental understanding of the design principles and control mechanisms in wireless networks. Second, the complexity of the network problems simply precludes the use of engineering common sense alone to identify good solutions, and so mathematics becomes the key avenue to cope with central technical problems in the design of wireless networks. In this book, two ?elds of mathematics play a central role: Perron-Frobenius theory for non-negative matrices and optimization theory. This book is a revised and expanded version of the research monograph "Resource Allocation in Wireless Networks" that was published as Lecture Notes in Computer Sciences (LNCS 4000) in 2006. Although the general structure has remained unchanged to a large extent, the book contains - merous additional results and more detailed discussion. For instance, there is a more extensive treatment of general nonnegative matrices and interf- ence functions that are described by an axiomatic model. Additional material on max-min fairness, proportional fairness, utility-based power control with QoS (quality of service) support and stochastic power control has been added.
This book presents bond graph model-based fault detection with a focus on hybrid system models. The book addresses model design, simulation, control and model-based fault diagnosis of multidisciplinary engineering systems. The text beings with a brief survey of the state-of-the-art, then focuses on hybrid systems. The author then uses different bond graph approaches throughout the text and provides case studies.
This book covers control theory signal processing and relevant applications in a unified manner. It introduces the area, takes stock of advances, and describes open problems and challenges in order to advance the field. The editors and contributors to this book are pioneers in the area of active sensing and sensor management, and represent the diverse communities that are targeted.
Instructs advanced and important analysis methods which are frequently used for researchers, engineers and students who work on applications of electromagnetic waves to microwave devices and antennas. The book also includes various numerical techniques.
Thewritingofthisbookhasbeeninspiredbytheexperienceofteachinga courseonDetectionandSignalProcessingtograduatestudentsoveraperiod ofmanyyears. Itwasstrikingthatstudentswerenotonlyfascinatedbythe variousdetectionprinciplesandtechnicalperformancesofpracticalsystems, butalsobytheprofessionalismoftheinvolved typical physicalengine- ing. Usuallystudentsarethoroughlytaughtindi?erentcoursesofphysics, whicharemostlystudiedasisolated?elds. Thecourseondetectionands- nalprocessingisbasedontypicalresultsthatwereestablishedindi?erent disciplines like optics, solid state physics, thermodynamics, mathematical statistics,Fouriertransforms,andelectroniccircuitry. Theirsimultaneousand interdependentapplicationbroadenstheinsightofmutualrelationsinthev- ious?elds. Forinstancethe?uctuationsofthermalbackgroundradiationcan bederivedeitherwiththeblackbodytheoryorindependentlywithther- dynamicstoarriveatthesameresult. AlsotheappliedFourierrelationsin thefrequencyandtimedomainsarenolongerabstractmathematicalman- ulationsbutpracticaltoolsandprobablyeasiertounderstandintheapplied technique. Estimatesoftheorderofmagnitudeswithcomparisonofrelevant physicale?ectsnecessarybydesigningadeviceareveryinstructive. Ingeneral theachievementsofvariousdisciplinesarebroughttogethertodesignandto evaluatequantitativelythetechnicalperformancesofdetectiontechniques. Thustheinterestfordetectionandsignalprocessingisbothtolearnthe knowledgefordesigningpracticaldetectionsystemsandtogetacquainted withthethinkingofphysicalengineering. The?rstpartofthebookisdevotedtonoisephenomenaandradiation detectors. Fundamentaldescriptionswithquantitativeanalysesoftheund- lyingphysicalprocessesofbothdetectorsandaccompanyingnoiseleadto understandthepotentialswithrespecttosensitivityandoperatingfrequency domain. Thesecondpartdealswithampli?cationproblemsandtherecovery ofrepetitivesignalsburiedinnoise. Thelastpartisdevotedtosolvingthe problemsconnectedwithreachingtheultimatedetectionlimitorquantum limit. Thisisdoneforheterodynedetectionandphotoncounting. Although VIII Preface heterodynedetectionyieldstheultimatesensitivity,itsspatialmodesel- tivityand,ingeneral,thelowspectralpowerdensityofthesignalrequire sophisticatedprovisions. Thisisdiscussedindetail. Theinherentproblemsare analyzedandappropriatetechnicalsolutionsaredescribedtoreachtheul- matesensitivityfordetectingincoherentradiationandcommunicationsignals thatarerandomlyDopplershifted. Theresultsareillustratedwithexamples ofspacecommunication. Hengelo(O),January2006 W. J. Witteman Contents 1 RandomFluctuations...1 1. 1 Introduction...1 1. 2 ThermalNoiseofResistance...2 1. 3 ShotNoise...5 1. 3. 1 SpectralDistribution ...6 1. 3. 2 Photons...10 1. 4 FlickerNoise...10 1. 5 Generation-RecombinationNoise...10 1. 6 ThermalRadiationandItsFluctuations...13 1. 7 TemperatureFluctuationsofSmallBodies...18 1. 7. 1 AbsorptionandEmissionFluctuations...20 2 Signal-NoiseRelations...21 2. 1 SignalLimitation...22 2. 2 BackgroundLimitation...22 2. 2. 1 IdealDetection...24 2. 3 JohnsonNoise...27 2. 4 DarkCurrentNoise...27 2. 5 NoiseandSensitivity...28 2. 6 Ampli?erNoiseandMismatching...28 3 ThermalDetectors...31 3. 1 ThermocoupleandThermopile...31 3. 2 Bolometer...36 3. 2. 1 MetallicBolometer...39 3. 2. 2 Thermistor...40 3. 3 PyroelectricDetector...44 4 VacuumPhotodetectors...51 4. 1 VacuumPhotodiode...52 4. 2 Photomultiplier...56 X Contents 5 SemiconductorPhotodetectors...61 5. 1 Photoconductors...6 1 5. 1. 1 AnalysisoftheDetectionProcess...64 5. 1. 2 FrequencyResponse ...69 5. 2 Photodiodes...69 5. 2. 1 P-NJunction...70 5. 2. 2 Current-VoltageCharacteristic...72 5. 2. 3 PhotonExcitation...75 5. 2. 4 OperationalModes...79 5. 2. 5 OpenCircuit ...80 5. 2. 6 CurrentCircuit...82 5. 2. 7 Reverse-BiasedCircuit...83 5. 3 AvalanchePhotodiodes...
This book not only introduces the principles of INS, CNS and GNSS, the related filters and semi-physical simulation, but also systematically discusses the key technologies needed for integrated navigations of INS/GNSS, INS/CNS, and INS/CNS/GNSS, respectively. INS/CNS/GNSS integrated navigation technology has established itself as an effective tool for precise positioning navigation, which can make full use of the complementary characteristics of different navigation sub-systems and greatly improve the accuracy and reliability of the integrated navigation system. The book offers a valuable reference guide for graduate students, engineers and researchers in the fields of navigation and its control. Dr. Wei Quan, Dr. Jianli Li, Dr. Xiaolin Gong and Dr. Jiancheng Fang are all researchers at the Beijing University of Aeronautics and Astronautics. |
You may like...
Genocide and the Modern Age - Etiology…
Michael Dobkowski, Isidor Wallimann
Hardcover
R2,455
Discovery Miles 24 550
Little Bird Of Auschwitz - How My Mother…
Alina Peretti, Jacques Peretti
Paperback
|