0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (170)
  • R250 - R500 (1,035)
  • R500+ (10,363)
  • -
Status
Format
Author / Contributor
Publisher

Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications

Resource Management in Satellite Networks - Optimization and Cross-Layer Design (Hardcover, 2007 ed.): Giovanni Giambene Resource Management in Satellite Networks - Optimization and Cross-Layer Design (Hardcover, 2007 ed.)
Giovanni Giambene
R4,339 Discovery Miles 43 390 Ships in 12 - 17 working days

This book provides significant knowledge on innovative radio resource management schemes for satellite communication systems that exploit lower layer adaptivity and the knowledge of layer 3 IP QoS support and transport layer behavior. The book integrates competencies considering all the parts of system design: propagation aspects, radio resource management, access protocols, network protocols, transport layer protocols, and more, to cover both broadband and mobile satellite systems.

Networked Control Under Communication Constraints - A Time-Delay Approach (Hardcover, 1st ed. 2020): Kun Liu, Emilia Fridman,... Networked Control Under Communication Constraints - A Time-Delay Approach (Hardcover, 1st ed. 2020)
Kun Liu, Emilia Fridman, Yuanqing Xia
R3,533 Discovery Miles 35 330 Ships in 10 - 15 working days

This book presents a time-delay approach to the analysis and synthesis of networked control systems (NCSs) under communication constraints. Differently from other approaches, the time-delay approach to NCSs allows communication delays to be larger than the sampling intervals in the presence of scheduling protocols. The book starts from a comprehensive introduction to three main approaches to sampled-data and networked control. It then focuses on time-delay approach, and the modelling of the closed-loop systems in the form of time-delay system. It presents discontinuous (in time) Lyapunov functional constructions that are efficient for NCSs in the presence of communications delays. Further, it highlights time-delay approaches developed to model and analyze NCSs under communication constraints, with a particular focus on dynamic quantization, round-robin, try-once-discard and stochastic protocols. The results are first presented for the continuous-time NCSs and then extended to discrete-time NCSs. Discussing recent developments in Lyapunov-based analysis of NCSs under communication constraints, the book is a valuable resource for researchers interested in sampled-data and networked control, and time-delay systems, as well as for graduate students in automatic control and systems theory.

Wireless Technology - Applications, Management, and Security (Hardcover, 2009 ed.): Steven Powell, J.P. Shim Wireless Technology - Applications, Management, and Security (Hardcover, 2009 ed.)
Steven Powell, J.P. Shim
R4,885 R4,318 Discovery Miles 43 180 Save R567 (12%) Ships in 12 - 17 working days

Wireless technology and handheld devices are dramatically changing the degrees of interaction throughout the world, further creating a ubiquitous network society. The emergence of advanced wireless telecommunication technologies and devices in today's society has increased accuracy and access rate, all of which are increasingly essential as the volume of information handled by users expands at an accelerated pace. The requirement for mobility leads to increasing pressure for applications and wireless systems to revolve around the concept of continuous communication with anyone, anywhere, and anytime. With the wireless technology and devices come ?exibility in network design and quicker deployment time. Over the past decades, numerous wireless telecommu- cation topics have received increasing attention from industry professionals, a- demics, and government agencies. Among these topics are the wireless Internet; multimedia; 3G/4G wireless networks and systems; mobile and wireless network security; wireless network modeling, algorithms, and simulation; satellite based s- tems; 802.11x; RFID; and broadband wireless access.

Analysis and Design for Networked Teleoperation System (Hardcover, 1st ed. 2019): Changchun Hua, Yana Yang, Xian Yang, Xinping... Analysis and Design for Networked Teleoperation System (Hardcover, 1st ed. 2019)
Changchun Hua, Yana Yang, Xian Yang, Xinping Guan
R2,810 Discovery Miles 28 100 Ships in 10 - 15 working days

This book presents cutting-edge results on stability analysis and control scheme designs for networked teleoperation systems. It highlights new research on commonly encountered nonlinear teleoperation systems, including the stability analysis of teleoperation systems with asymmetric time-varying delays, stability analysis of teleoperation systems with interval time delays, and so on. Moreover, the book presents several high-performance control scheme designs for teleoperation systems when the velocity is available and unavailable, and for systems with nonlinear input. The results presented here mark a substantial contribution to nonlinear teleoperation system theory, robotic control theory and networked control system theory. As such, the book will be of interest to university researchers, R&D engineers and graduate students in control theory and control engineering who wish to learn about the core principles, methods, algorithms, and applications of networked teleoperation systems, robotic systems and nonlinear control systems.

GSM and Personal Communications Handbook (Hardcover): Siegmund H. Redl, Matthias Weber, Malcolm Oliphant GSM and Personal Communications Handbook (Hardcover)
Siegmund H. Redl, Matthias Weber, Malcolm Oliphant
R4,082 Discovery Miles 40 820 Ships in 10 - 15 working days

The World Fantasy Award-winning third volume of the Lyonesse trilogy brings attention to the faerie changeling Madouc. Where princess Suldrun once meekly endured the proprieties of Castle Haidion, Madouc defends herself with mischief. Vexed, King Casmir and Queen Sollace arrange a contest to marry her off. However, Madouc has other ideas, and leaves with the stableboy " Sir Pom-pom" on a quest to learn the identity of her father, encountering swindlers, faeries, trolls, ogres, a knight in search of his youth, and a relatively pedestrian item known as the Holy Grail. As the sorcerers Shimrod and Murgen investigate dire portents in the world of magic, Casmir schemes to murder prince Dhrun of Troicinet and bring all the lands under his iron rule; however, his ambitions will be complicated by one small but important oversight -- he's failed to allow for Madouc

Radar Reflectivity of Land and Sea (Hardcover, 3rd Revised edition): Maurice W. Long Radar Reflectivity of Land and Sea (Hardcover, 3rd Revised edition)
Maurice W. Long
R4,104 Discovery Miles 41 040 Ships in 10 - 15 working days

This state-of-the-art edition of a radar classic brings the reader up-to-date on new developments in clutter measurement and modelling, and features a wealth of new information. Authored by a recognized expert in the field, the book covers everything from basic concepts of radar reflectivity to space-time clutter amplitude and bistatic clutter. New radar engineers should find this to be a valuable, all-encompassing, well-illustrated survey of radar reflectivity fundamentals. Veteran engineers and systems designers should appreciate the book's new coverage of: effects of frequency agility; spatial averages for terrain; graphs from GIT clutter models; land and sea echo at extremely low grazing angles; compound statistics including the K and the Rayleigh modulated by Wiebull distributions; super sea echo events and sea spikes; bistatic land and sea clutter; and more.

Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 3 (Hardcover, 2013... Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012): Volume 3 (Hardcover, 2013 ed.)
Yuhang Yang, Maode Ma
R8,170 Discovery Miles 81 700 Ships in 12 - 17 working days

The objective of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012) is to facilitate an exchange of information on best practices for the latest research advances in the area of communications, networks and intelligence applications. These mainly involve computer science and engineering, informatics, communications and control, electrical engineering, information computing, and business intelligence and management.

"Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012)" will focus on green information technology and applications, which will provide in-depth insights for engineers and scientists in academia, industry, and government. The book addresses the most innovative research developments including technical challenges, social and economic issues, and presents and discusses the authors' ideas, experiences, findings, and current projects on all aspects of advanced green information technology and applications.

Yuhang Yang is a professor at the Department of Electronic Engineering, Shanghai Jiao Tong University. Maode Ma is an associate professor at the School of Electrical & Electronic Engineering, Nanyang Technological University.

Antenna Design with Fiber Optics (Hardcover): Akhileshwar Kumar Antenna Design with Fiber Optics (Hardcover)
Akhileshwar Kumar
R3,670 Discovery Miles 36 700 Ships in 10 - 15 working days

This book explains the advantages of fiber optics over conventional coaxial cables when routing microwave signals.

Multimodal Location Estimation of Videos and Images (Hardcover, 2015 ed.): Jae-Young Choi, Gerald Friedland Multimodal Location Estimation of Videos and Images (Hardcover, 2015 ed.)
Jae-Young Choi, Gerald Friedland
R4,302 R3,298 Discovery Miles 32 980 Save R1,004 (23%) Ships in 12 - 17 working days

This book presents an overview of the field of multimodal location estimation. The authors' aim is to describe the research results in this field in a unified way. The book describes fundamental methods of acoustic, visual, textual, social graph, and metadata processing as well as multimodal integration methods used for location estimation. In addition, the book covers benchmark metrics and explores the limits of the technology based on a human baseline. The book also outlines privacy implications and discusses directions for future research in the area.

Securing Wireless Communications at the Physical Layer (Hardcover, 2010 ed.): Ruoheng Liu, Wade Trappe Securing Wireless Communications at the Physical Layer (Hardcover, 2010 ed.)
Ruoheng Liu, Wade Trappe
R5,762 R4,349 Discovery Miles 43 490 Save R1,413 (25%) Ships in 12 - 17 working days

Securing communications is a challenging task. A ?rst attempt at security involves learning basic cryptography, and applying encryption algorithms to make messages unintelligible to adversaries. However, rarely is the task of securing a message - changesosimple.Whenonestepsbackandcontemplateshowtosecuretheexchange of communications, one realizes that the challenge is fundamentally one of bui- ing a complete solution. For example, one must ensure that all entities involved have proper and authenticated cryptographic material, or one must ensure that one veri?ably knows to whom one is communicating, or one must understand how the communication process takes place so as to make certain there are no vulnerabilities introduced by the communication process itself. Thislastissue, namelythatsecuritymethodsareoftenbuiltwithoutconsideration to how communication takes place, represents a fundamental gap where much of modern security research has fallen short.The security literature is ?lled with a mass of articles on cryptographic primitives and, although there are still many theoretical hurdlestobeovercomebythecryptographiccommunity,mostoftheseshortcomings areacademicandtherearenownumeroustextbooksoncryptographythatcanprovide thebasicintroductionneededtoemploycryptographicprimitives. Ontheothersideof thecoin,thesecurityliteratureisalso?lledwithamassofarticlesdevotedtobuilding secure protocols and, similarly, there are now numerous textbooks on computer securitythatprovidetheinstructionneededtodesignsecureprotocols.Unfortunately, the issue of how communication takes place or, more speci?cally, whether there are any speci?c issues that might arise or be circumvented because message exchanges aretakingplaceononemediumversusanother(e.g., wirelesscommunicationversus wired communication), is generally neglected.

IT Security Management - IT Securiteers - Setting up an IT Security Function (Hardcover, 2010 ed.): Alberto Partida, Diego... IT Security Management - IT Securiteers - Setting up an IT Security Function (Hardcover, 2010 ed.)
Alberto Partida, Diego Andina
R2,949 Discovery Miles 29 490 Ships in 10 - 15 working days

IT securiteers - The human and technical dimension working for the organisation.

Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry.

More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems.

IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations.

Side-Channel Analysis of Embedded Systems - An Efficient Algorithmic Approach (Hardcover, 1st ed. 2021): Maamar Ouladj, Sylvain... Side-Channel Analysis of Embedded Systems - An Efficient Algorithmic Approach (Hardcover, 1st ed. 2021)
Maamar Ouladj, Sylvain Guilley
R1,824 Discovery Miles 18 240 Ships in 10 - 15 working days

It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This book tackles the analysis part, especially under situations where the targeted device is protected by random masking. The authors explain advances in the field and provide the reader with mathematical formalizations. They present all known analyses within the same notation framework, which allows the reader to rapidly understand and learn contrasting approaches. It will be useful as a graduate level introduction, also for self-study by researchers and professionals, and the examples are taken from real-world datasets.

Wireless Sensor Networks and Applications (Hardcover, 2008 ed.): Yingshu Li, My T. Thai Wireless Sensor Networks and Applications (Hardcover, 2008 ed.)
Yingshu Li, My T. Thai
R4,714 R4,287 Discovery Miles 42 870 Save R427 (9%) Ships in 12 - 17 working days

Wireless sensor networks are currently being employed in a variety of applications ranging from medical to military, and from home to industry. Wireless Sensor Networks and Applications aims to provide a reference tool for the increasing number of scientists who depend upon sensor networks in some way. The topics covered include network design and modeling, network management, data management, security and applications. The topic covered in each chapter is given expository but also scholarly treatment, covering the history of the topic, reviewing state-of-the-art thinking relative to the topic, and discussing currently unsolved problems of special interest.

Noise Tolerant Data Authentication for Wireless Communication (Hardcover, 1st ed. 2018): Obaid Ur-Rehman, Natasa Zivic Noise Tolerant Data Authentication for Wireless Communication (Hardcover, 1st ed. 2018)
Obaid Ur-Rehman, Natasa Zivic
R1,524 Discovery Miles 15 240 Ships in 12 - 17 working days

This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms - for wired devices - are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book. Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication; Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data; Features authentication methods based on the usage of authentication tags as well as digital watermarks.

Understanding Electromagnetic Scattering Using the Moment Method - A Practical Approach (Hardcover): Randy Bancroft Understanding Electromagnetic Scattering Using the Moment Method - A Practical Approach (Hardcover)
Randy Bancroft
R2,820 Discovery Miles 28 200 Ships in 10 - 15 working days

Learn how to quickly solve electromagnetic scattering problems using the Moment Method with this unique book.

Software Included! Accompanying software featuring FORTRAN source code allows you to modify the book's examples and understand how simple and complex shapes scatter waves. One 3.5" IBM PC-compatible diskette.

Implementations and Applications of Machine Learning (Hardcover, 1st ed. 2020): Saad Subair, Christopher Thron Implementations and Applications of Machine Learning (Hardcover, 1st ed. 2020)
Saad Subair, Christopher Thron
R4,258 Discovery Miles 42 580 Ships in 10 - 15 working days

This book provides step-by-step explanations of successful implementations and practical applications of machine learning. The book's GitHub page contains software codes to assist readers in adapting materials and methods for their own use. A wide variety of applications are discussed, including wireless mesh network and power systems optimization; computer vision; image and facial recognition; protein prediction; data mining; and data discovery. Numerous state-of-the-art machine learning techniques are employed (with detailed explanations), including biologically-inspired optimization (genetic and other evolutionary algorithms, swarm intelligence); Viola Jones face detection; Gaussian mixture modeling; support vector machines; deep convolutional neural networks with performance enhancement techniques (including network design, learning rate optimization, data augmentation, transfer learning); spiking neural networks and timing dependent plasticity; frequent itemset mining; binary classification; and dynamic programming. This book provides valuable information on effective, cutting-edge techniques, and approaches for students, researchers, practitioners, and teachers in the field of machine learning.

Spectrum Sharing in Cognitive Radio Networks - Medium Access Control Protocol Based Approach (Hardcover, 1st ed. 2017): Shweta... Spectrum Sharing in Cognitive Radio Networks - Medium Access Control Protocol Based Approach (Hardcover, 1st ed. 2017)
Shweta Pandit, Ghanshyam Singh
R3,795 R3,356 Discovery Miles 33 560 Save R439 (12%) Ships in 12 - 17 working days

This book discusses the use of the spectrum sharing techniques in cognitive radio technology, in order to address the problem of spectrum scarcity for future wireless communications. The authors describe a cognitive radio medium access control (MAC) protocol, with which throughput maximization has been achieved. The discussion also includes use of this MAC protocol for imperfect sensing scenarios and its effect on the performance of cognitive radio systems. The authors also discuss how energy efficiency has been maximized in this system, by applying a simple algorithm for optimizing the transmit power of the cognitive user. The study about the channel fading in the cognitive user and licensed user and power adaption policy in this scenario under peak transmit power and interference power constraint is also present in this book.

Principles of Data Fusion Automation (Hardcover): Richard T. Antony Principles of Data Fusion Automation (Hardcover)
Richard T. Antony
R4,269 Discovery Miles 42 690 Ships in 10 - 15 working days

Multisensor fusion systems are only practical if the algorithms used are practical and effective, and if there is efficient database support. The first part of this book discusses a wide range of issues related to the development of robust, context-sensitive, and efficient data fusion algorithms. The second part addresses database requirements, structures, and issues related to achieving overall computational efficiency. Featuring highly accessible notation, the processing model and database issues presented in the text are aimed at system developers working in sensor fusion, automatic target recognition, multiple-target tracking, robotic control, automated image understanding, and large-scale integration and fabrication.

Global Aeronautical Distress and Safety Systems (GADSS) - Theory and Applications (Hardcover, 1st ed. 2020): Stojce Dimov Ilcev Global Aeronautical Distress and Safety Systems (GADSS) - Theory and Applications (Hardcover, 1st ed. 2020)
Stojce Dimov Ilcev
R4,970 Discovery Miles 49 700 Ships in 12 - 17 working days

This book presents the principal structure, networks and applications of the Global Aeronautical Distress and Safety System (GADSS) for enhanced airborne Communication, Navigation and Surveillance (CNS). It shows how their implementation works to ensure better security in flight and on the airports surface; improved aircraft tracking and determination in real space and time; and enhanced distress alerting, safety; and Search and Rescue (SAR) system for missing, hijacked and landed aircraft at sea or on the ground. Main topics of this book are as follows: an overview of radio and satellite systems with retrospective to aeronautical safety; security and distress systems; space segment with all aspects regarding satellite orbits and infrastructures; transmission segment of radio and satellite systems; ground segment of radio and earth ground stations; airborne radio and satellite antenna systems and propagation; aeronautical VHF and HF Radio CNS systems and networks; Inmarsat, Iridium and Cospas-Sasrast aeronautical satellite CNS systems and networks; Aeronautical Global Satellite Augmentation System (GSAS) and networks; Digital Video Broadcasting - Return Channel via Satellite (DVB-RCS) standards and Aeronautical Stratospheric Platform Systems (SPS) and networks.

Fundamentals of Resource Allocation in Wireless Networks - Theory and Algorithms (Hardcover, 2nd ed. 2008): Slawomir Stanczak,... Fundamentals of Resource Allocation in Wireless Networks - Theory and Algorithms (Hardcover, 2nd ed. 2008)
Slawomir Stanczak, Marcin Wiczanowski, Holger Boche
R3,051 Discovery Miles 30 510 Ships in 10 - 15 working days

The purpose of this book is to provide tools for a better understanding of the fundamental tradeo's and interdependencies in wireless networks, with the goal of designing resource allocation strategies that exploit these int- dependencies to achieve signi?cant performance gains. Two facts prompted us to write it: First, future wireless applications will require a fundamental understanding of the design principles and control mechanisms in wireless networks. Second, the complexity of the network problems simply precludes the use of engineering common sense alone to identify good solutions, and so mathematics becomes the key avenue to cope with central technical problems in the design of wireless networks. In this book, two ?elds of mathematics play a central role: Perron-Frobenius theory for non-negative matrices and optimization theory. This book is a revised and expanded version of the research monograph "Resource Allocation in Wireless Networks" that was published as Lecture Notes in Computer Sciences (LNCS 4000) in 2006. Although the general structure has remained unchanged to a large extent, the book contains - merous additional results and more detailed discussion. For instance, there is a more extensive treatment of general nonnegative matrices and interf- ence functions that are described by an axiomatic model. Additional material on max-min fairness, proportional fairness, utility-based power control with QoS (quality of service) support and stochastic power control has been added.

Bond Graph Model-based Fault Diagnosis of Hybrid Systems (Hardcover): Wolfgang Borutzky Bond Graph Model-based Fault Diagnosis of Hybrid Systems (Hardcover)
Wolfgang Borutzky
R4,377 R3,374 Discovery Miles 33 740 Save R1,003 (23%) Ships in 12 - 17 working days

This book presents bond graph model-based fault detection with a focus on hybrid system models. The book addresses model design, simulation, control and model-based fault diagnosis of multidisciplinary engineering systems. The text beings with a brief survey of the state-of-the-art, then focuses on hybrid systems. The author then uses different bond graph approaches throughout the text and provides case studies.

Foundations and Applications of Sensor Management (Hardcover): Alfred Olivier Hero, David Castanon, Doug Cochran, Keith Kastella Foundations and Applications of Sensor Management (Hardcover)
Alfred Olivier Hero, David Castanon, Doug Cochran, Keith Kastella
R4,268 Discovery Miles 42 680 Ships in 10 - 15 working days

This book covers control theory signal processing and relevant applications in a unified manner. It introduces the area, takes stock of advances, and describes open problems and challenges in order to advance the field. The editors and contributors to this book are pioneers in the area of active sensing and sensor management, and represent the diverse communities that are targeted.

Analysis Methods for Electromagnetic Wave Problems, v. 1 (Hardcover): Eikichi Yamashita Analysis Methods for Electromagnetic Wave Problems, v. 1 (Hardcover)
Eikichi Yamashita
R3,980 Discovery Miles 39 800 Ships in 10 - 15 working days

Instructs advanced and important analysis methods which are frequently used for researchers, engineers and students who work on applications of electromagnetic waves to microwave devices and antennas. The book also includes various numerical techniques.

Detection and Signal Processing - Technical Realization (Hardcover, 2006 ed.): Wilhelmus Jacobus Witteman Detection and Signal Processing - Technical Realization (Hardcover, 2006 ed.)
Wilhelmus Jacobus Witteman
R1,574 Discovery Miles 15 740 Ships in 10 - 15 working days

Thewritingofthisbookhasbeeninspiredbytheexperienceofteachinga courseonDetectionandSignalProcessingtograduatestudentsoveraperiod ofmanyyears. Itwasstrikingthatstudentswerenotonlyfascinatedbythe variousdetectionprinciplesandtechnicalperformancesofpracticalsystems, butalsobytheprofessionalismoftheinvolved typical physicalengine- ing. Usuallystudentsarethoroughlytaughtindi?erentcoursesofphysics, whicharemostlystudiedasisolated?elds. Thecourseondetectionands- nalprocessingisbasedontypicalresultsthatwereestablishedindi?erent disciplines like optics, solid state physics, thermodynamics, mathematical statistics,Fouriertransforms,andelectroniccircuitry. Theirsimultaneousand interdependentapplicationbroadenstheinsightofmutualrelationsinthev- ious?elds. Forinstancethe?uctuationsofthermalbackgroundradiationcan bederivedeitherwiththeblackbodytheoryorindependentlywithther- dynamicstoarriveatthesameresult. AlsotheappliedFourierrelationsin thefrequencyandtimedomainsarenolongerabstractmathematicalman- ulationsbutpracticaltoolsandprobablyeasiertounderstandintheapplied technique. Estimatesoftheorderofmagnitudeswithcomparisonofrelevant physicale?ectsnecessarybydesigningadeviceareveryinstructive. Ingeneral theachievementsofvariousdisciplinesarebroughttogethertodesignandto evaluatequantitativelythetechnicalperformancesofdetectiontechniques. Thustheinterestfordetectionandsignalprocessingisbothtolearnthe knowledgefordesigningpracticaldetectionsystemsandtogetacquainted withthethinkingofphysicalengineering. The?rstpartofthebookisdevotedtonoisephenomenaandradiation detectors. Fundamentaldescriptionswithquantitativeanalysesoftheund- lyingphysicalprocessesofbothdetectorsandaccompanyingnoiseleadto understandthepotentialswithrespecttosensitivityandoperatingfrequency domain. Thesecondpartdealswithampli?cationproblemsandtherecovery ofrepetitivesignalsburiedinnoise. Thelastpartisdevotedtosolvingthe problemsconnectedwithreachingtheultimatedetectionlimitorquantum limit. Thisisdoneforheterodynedetectionandphotoncounting. Although VIII Preface heterodynedetectionyieldstheultimatesensitivity,itsspatialmodesel- tivityand,ingeneral,thelowspectralpowerdensityofthesignalrequire sophisticatedprovisions. Thisisdiscussedindetail. Theinherentproblemsare analyzedandappropriatetechnicalsolutionsaredescribedtoreachtheul- matesensitivityfordetectingincoherentradiationandcommunicationsignals thatarerandomlyDopplershifted. Theresultsareillustratedwithexamples ofspacecommunication. Hengelo(O),January2006 W. J. Witteman Contents 1 RandomFluctuations...1 1. 1 Introduction...1 1. 2 ThermalNoiseofResistance...2 1. 3 ShotNoise...5 1. 3. 1 SpectralDistribution ...6 1. 3. 2 Photons...10 1. 4 FlickerNoise...10 1. 5 Generation-RecombinationNoise...10 1. 6 ThermalRadiationandItsFluctuations...13 1. 7 TemperatureFluctuationsofSmallBodies...18 1. 7. 1 AbsorptionandEmissionFluctuations...20 2 Signal-NoiseRelations...21 2. 1 SignalLimitation...22 2. 2 BackgroundLimitation...22 2. 2. 1 IdealDetection...24 2. 3 JohnsonNoise...27 2. 4 DarkCurrentNoise...27 2. 5 NoiseandSensitivity...28 2. 6 Ampli?erNoiseandMismatching...28 3 ThermalDetectors...31 3. 1 ThermocoupleandThermopile...31 3. 2 Bolometer...36 3. 2. 1 MetallicBolometer...39 3. 2. 2 Thermistor...40 3. 3 PyroelectricDetector...44 4 VacuumPhotodetectors...51 4. 1 VacuumPhotodiode...52 4. 2 Photomultiplier...56 X Contents 5 SemiconductorPhotodetectors...61 5. 1 Photoconductors...6 1 5. 1. 1 AnalysisoftheDetectionProcess...64 5. 1. 2 FrequencyResponse ...69 5. 2 Photodiodes...69 5. 2. 1 P-NJunction...70 5. 2. 2 Current-VoltageCharacteristic...72 5. 2. 3 PhotonExcitation...75 5. 2. 4 OperationalModes...79 5. 2. 5 OpenCircuit ...80 5. 2. 6 CurrentCircuit...82 5. 2. 7 Reverse-BiasedCircuit...83 5. 3 AvalanchePhotodiodes...

INS/CNS/GNSS Integrated Navigation Technology (Hardcover, 2015 ed.): Wei Quan, Jianli Li, Xiaolin Gong, Jiancheng Fang INS/CNS/GNSS Integrated Navigation Technology (Hardcover, 2015 ed.)
Wei Quan, Jianli Li, Xiaolin Gong, Jiancheng Fang
R2,878 Discovery Miles 28 780 Ships in 10 - 15 working days

This book not only introduces the principles of INS, CNS and GNSS, the related filters and semi-physical simulation, but also systematically discusses the key technologies needed for integrated navigations of INS/GNSS, INS/CNS, and INS/CNS/GNSS, respectively. INS/CNS/GNSS integrated navigation technology has established itself as an effective tool for precise positioning navigation, which can make full use of the complementary characteristics of different navigation sub-systems and greatly improve the accuracy and reliability of the integrated navigation system. The book offers a valuable reference guide for graduate students, engineers and researchers in the fields of navigation and its control. Dr. Wei Quan, Dr. Jianli Li, Dr. Xiaolin Gong and Dr. Jiancheng Fang are all researchers at the Beijing University of Aeronautics and Astronautics.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
I was no. 20832 at Auschwitz
Eva Tichauer, Nicki Rensten, … Paperback R458 Discovery Miles 4 580
Genocide and the Modern Age - Etiology…
Michael Dobkowski, Isidor Wallimann Hardcover R2,455 Discovery Miles 24 550
Education in Nazi Germany
Lisa Pine Hardcover R3,294 Discovery Miles 32 940
Little Bird Of Auschwitz - How My Mother…
Alina Peretti, Jacques Peretti Paperback R453 R370 Discovery Miles 3 700
Hitler's Prophecy - The Key to the…
Simon Burgess Paperback R592 Discovery Miles 5 920
Reluctant Witnesses - Survivors, Their…
Arlene Stein Hardcover R959 Discovery Miles 9 590
A Hidden Jewish Child from Belgium…
Francine Lazarus Paperback R548 Discovery Miles 5 480
The Silent Holocaust - Romania and Its…
Rene Spodheim Hardcover R2,713 Discovery Miles 27 130
Witnessing the Holocaust - Six Literary…
Judith M. Hughes Hardcover R2,173 Discovery Miles 21 730
Finland's Holocaust - Silences of…
S. Muir, H. Worthen Hardcover R3,298 Discovery Miles 32 980

 

Partners