0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (1)
  • R100 - R250 (288)
  • R250 - R500 (831)
  • R500+ (14,090)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Wideband CDMA for Third Generation Mobile Communications (Hardcover): Tero Ojanpera, Ramjee Prasad Wideband CDMA for Third Generation Mobile Communications (Hardcover)
Tero Ojanpera, Ramjee Prasad
R4,079 Discovery Miles 40 790 Ships in 10 - 15 working days

This text evaluates wideband CDMA as an effective third generation technology option, giving a picture of the various wideband CDMA standardization activities underway worldwide in the late 1990s. The book compares a range of CDMA design techniques and examines how each affects system performance. It also describes how third generation system applications will impact radio access system design and compares and contrasts each major wideband CDMA standardization proposal currently on the table, including FRAMES wideband CDMA in Europe, Core-A in Japan, wideband IS-95 in the US, and wideband CDMA in Korea. It identifies and describes various air interface access schemes for third and fourth generation mobile communications systems; analyzes wideband CDMA performance in varying radio environments; and discusses the integration of the GSM core network with wideband CDMA.

Social Computing in Homeland Security - Disaster Promulgation and Response (Hardcover): Amy Wenxuan Ding Social Computing in Homeland Security - Disaster Promulgation and Response (Hardcover)
Amy Wenxuan Ding
R4,564 Discovery Miles 45 640 Ships in 10 - 15 working days

The sequence of major events that occurred after entering the twenty-first century have all pointed to an effective emergency response as one of the most complex challenges many countries now face. ""Social Computing in Homeland Security: Disaster Promulgation and Response"" presents a theoretical framework addressing how to enhance national response capabilities and ready the public in the presence of human-made or natural disasters. A practical reference for those involved in disaster response and management, this book explores fascinating topics including designing effective threat warning advisories, quantifying public reactions to and confidence in warning advisories, and assessing how anxiety and fear translate into impacts on effective response and social productivity.

Distance Learning Technology and Applications (Hardcover): Daniel Minoli Distance Learning Technology and Applications (Hardcover)
Daniel Minoli
R3,006 Discovery Miles 30 060 Ships in 10 - 15 working days

An all-encompassing guide to the business, engineering, and regulatory factors shaping the growth of the distance learning industry. This book examines potential providers, users, applications, and problem solutions, and includes actual case studies. An outstanding reference for educators, network service providers, public policy makers, and graduate level engineering students specializing in telecommunications.

Optical Networks - Recent Advances - Recent Advances (Hardcover, 2001 ed.): Lu Ruan, Dingzhu Du Optical Networks - Recent Advances - Recent Advances (Hardcover, 2001 ed.)
Lu Ruan, Dingzhu Du
R4,554 Discovery Miles 45 540 Ships in 10 - 15 working days

With the rapid growth of bandwidth demand from network users and the advances in optical technologies, optical networks with multiterabits per-second capacity has received significant interest from both researchers and practitioners. Optical networks deployment raises a number of challenging problems that require innovative solutions, including net work architectures, scalable and fast network management, resource efficient routing and wavelength assignment algorithms, QoS support and scheduling algorithms, and switch and router architectures. In this book, we put together some important developments in this exiting area during last several years. Some of the articles are research papers and some are surveys. All articles were reviewed by two reviewers. The paper, "On Dynamic Wavelength Assignment in WDM Optical Networks," by Alanyali gives an overview of some issues in the analy sis and synthesis of dynamic wavelength assignment policies for optical WDM networks and illustrates a new method of analysis. The paper by Ellinas and Bala, "Wavelength Assignment Algorithms for WDM Ring Architectures," presents two optimal wavelength assignment algorithms that assign the minimum number of wavelengths between nodes on WDM rings to achieve full mesh connectivity. In the paper, "Optimal Placement of Wavelength Converters in WDM Networks for Parallel and Distributed Computing Systems," Jia et al."

Protocols for High Speed Networks IV (Hardcover, 1995 ed.): G. Neufeld, Mito Protocols for High Speed Networks IV (Hardcover, 1995 ed.)
G. Neufeld, Mito
R4,564 Discovery Miles 45 640 Ships in 10 - 15 working days

Welcome to the fourth IFIP workshop on protocols for high speed networks in Vancouver. This workshop follows three very successful workshops held in Ziirich (1989), Palo Alto (1990) and Stockholm (1993) respectively. We received a large number of papers in response to our call for contributions. This year, forty papers were received of which sixteen were presented as full papers and four were presented as poster papers. Although we received many excellent papers the program committee decided to keep the number of full presentations low in order to accommodate more discussion in keeping with the format of a workshop. Many people have contributed to the success of this workshop including the members of the program committee who, with the additional reviewers, helped make the selection of the papers. We are thankful to all the authors of the papers that were submitted. We also thank several organizations which have contributed financially to this workshop, specially NSERC, ASI, CICSR, UBC, MPR Teltech and Newbridge Networks.

Sustainable Interdependent Networks II - From Smart Power Grids to Intelligent Transportation Networks (Hardcover, 1st ed.... Sustainable Interdependent Networks II - From Smart Power Grids to Intelligent Transportation Networks (Hardcover, 1st ed. 2019)
M. Hadi Amini, Kianoosh G. Boroojeni, S.S. Iyengar, Panos M. Pardalos, Frede Blaabjerg, …
R2,913 Discovery Miles 29 130 Ships in 10 - 15 working days

This book paves the way for researchers working on the sustainable interdependent networks spread over the fields of computer science, electrical engineering, and smart infrastructures. It provides the readers with a comprehensive insight to understand an in-depth big picture of smart cities as a thorough example of interdependent large-scale networks in both theory and application aspects. The contributors specify the importance and position of the interdependent networks in the context of developing the sustainable smart cities and provide a comprehensive investigation of recently developed optimization methods for large-scale networks. There has been an emerging concern regarding the optimal operation of power and transportation networks. In the second volume of Sustainable Interdependent Networks book, we focus on the interdependencies of these two networks, optimization methods to deal with the computational complexity of them, and their role in future smart cities. We further investigate other networks, such as communication networks, that indirectly affect the operation of power and transportation networks. Our reliance on these networks as global platforms for sustainable development has led to the need for developing novel means to deal with arising issues. The considerable scale of such networks, due to the large number of buses in smart power grids and the increasing number of electric vehicles in transportation networks, brings a large variety of computational complexity and optimization challenges. Although the independent optimization of these networks lead to locally optimum operation points, there is an exigent need to move towards obtaining the globally-optimum operation point of such networks while satisfying the constraints of each network properly. The book is suitable for senior undergraduate students, graduate students interested in research in multidisciplinary areas related to future sustainable networks, and the researchers working in the related areas. It also covers the application of interdependent networks which makes it a perfect source of study for audience out of academia to obtain a general insight of interdependent networks.

WirelessHART (TM) - Real-Time Mesh Network for Industrial Automation (Hardcover, 2010 ed.): Deji Chen, Mark Nixon, Aloysius Mok WirelessHART (TM) - Real-Time Mesh Network for Industrial Automation (Hardcover, 2010 ed.)
Deji Chen, Mark Nixon, Aloysius Mok
R3,044 Discovery Miles 30 440 Ships in 10 - 15 working days

The process control industry has seen generations of technology advancement, from pneumatic communication to electrical communication to electronic c- munication, from centralized control to distributed control. At the center of today's distributed control systems are operator workstations. These operator wo- stations provide the connection between those overseeing and running plant operations to the process itself. With each new generation of products the operator workstation has become increasingly more intelligent. Newer applications provide advanced alarming, control, and diagnostics. Behind all of these applications are smarter devices. These smart devices provide greater process insight, reduce en- neering costs, and contribute to improving the overall operational performance of the plant. Smart devices include advanced diagnostics that can report the health of the device and in many cases, the health of the process that the device is connected to. It is not uncommon for smart devices to include diagnostics that can detect plugged lines, burner flame instability, agitator loss, wet gas, orifice wear, leaks, and cavitations. These devices tell the user how well they are operating and when they need maintenance. Improvements in sensor technology and diagnostics have lead to a large variety of smart devices. So how do users connect the capabilities of these smart devices to their existing control system infrastructures? The answer is wireless. Wireless technology has matured to the point that it now can be safely applied in industrial control, monitor, and asset management applications.

Enterprise Architecture for Connected E-Government - Practices and Innovations (Hardcover, New): Pallab Saha Enterprise Architecture for Connected E-Government - Practices and Innovations (Hardcover, New)
Pallab Saha
R5,074 Discovery Miles 50 740 Ships in 10 - 15 working days

Enterprise Architecture is the inherent design and management approach essential for organizational coherence leading to alignment, agility, and assurance. Structured Enterprise Architecture approach is often used to plan and implement efficient and effective transformation efforts. However, the strongest driver for Enterprise Architecture is to improve service delivery and overall performance within the organization's business segments. Enterprise Architecture for Connected E-Government: Practices and Innovations addresses the gap in current literature in terms of linking and understanding the relationship between e-government and government Enterprise Architecture. Within this broader context, the focus is specifically on uncovering and comprehending the relationship between government Enterprise Architecture and connected government. Perfect for Government CIOs, IT/IS Managers, Chief Architects, Analysts and Designers seeking better, quicker, and easier approaches to respond to needs of their internal and external customers.

Hacking For Dummies (Paperback, 7th Edition): K Beaver Hacking For Dummies (Paperback, 7th Edition)
K Beaver
R635 R586 Discovery Miles 5 860 Save R49 (8%) Ships in 12 - 19 working days

Learn to think like a hacker to secure your own systems and data.

Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong.

Hacking For Dummies takes you on an easy-to-follow cybersecurity voyage that will teach you the essentials of vulnerability and penetration testing so that you can find the holes in your network before the bad guys exploit them. You will learn to secure your Wi-Fi networks, lock down your latest Windows 11 installation, understand the security implications of remote work, and much more.

You’ll find out how to:

  • Stay on top of the latest security weaknesses that could affect your business’s security setup
  • Use freely available testing tools to “penetration test” your network’s security
  • Use ongoing security checkups to continually ensure that your data is safe from hackers

Perfect for small business owners, IT and security professionals, and employees who work remotely, Hacking For Dummies is a must-have resource for anyone who wants to keep their data safe.

Intelligent Distributed Computing X - Proceedings of the 10th International Symposium on Intelligent Distributed Computing -... Intelligent Distributed Computing X - Proceedings of the 10th International Symposium on Intelligent Distributed Computing - IDC 2016, Paris, France, October 10-12 2016 (Hardcover, 1st ed. 2017)
Costin Badica, Amal EL Fallah-Seghrouchni, Aurelie Beynier, David Camacho, Cedric Herpson, …
R4,945 Discovery Miles 49 450 Ships in 12 - 19 working days

This book presents the combined peer-reviewed proceedings of the tenth International Symposium on Intelligent Distributed Computing (IDC'2016), which was held in Paris, France from October 10th to 12th, 2016. The 23 contributions address a range of topics related to theory and application of intelligent distributed computing, including: Intelligent Distributed Agent-Based Systems, Ambient Intelligence and Social Networks, Computational Sustainability, Intelligent Distributed Knowledge Representation and Processing, Smart Networks, Networked Intelligence and Intelligent Distributed Applications, amongst others.

Combatting Cybercrime and Cyberterrorism - Challenges, Trends and Priorities (Hardcover, 1st ed. 2016): Babak Akhgar, Ben... Combatting Cybercrime and Cyberterrorism - Challenges, Trends and Priorities (Hardcover, 1st ed. 2016)
Babak Akhgar, Ben Brewster
R4,341 Discovery Miles 43 410 Ships in 12 - 19 working days

This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them through the complexities and operational challenges associated with the management of contemporary and emerging cybercrime and cyberterrorism (CC/CT) issues. Benefiting from the input of three major European Commission funded projects the book's content is enriched with case studies, explanations of strategic responses and contextual information providing the theoretical underpinning required for the clear interpretation and application of cyber law, policy and practice, this unique volume helps to consolidate the increasing role and responsibility of society as a whole, including law enforcement agencies (LEAs), the private sector and academia, to tackle CC/CT. This new contribution to CC/CT knowledge follows a multi-disciplinary philosophy supported by leading experts across academia, private industry and government agencies. This volume goes well beyond the guidance of LEAs, academia and private sector policy documents and doctrine manuals by considering CC/CT challenges in a wider practical and operational context. It juxtaposes practical experience and, where appropriate, policy guidance, with academic commentaries to reflect upon and illustrate the complexity of cyber ecosystem ensuring that all security practitioners are better informed and prepared to carry out their CC/CT responsibilities to protect the citizens they serve.

Phase and Phase-Difference Modulation in Digital Communications (Hardcover): Yuriy Okunev Phase and Phase-Difference Modulation in Digital Communications (Hardcover)
Yuriy Okunev
R4,753 Discovery Miles 47 530 Ships in 10 - 15 working days

Learn how and when to apply the latest phase and phase-difference modulation (PDM) techniques with this valuable guide for systems engineers and researchers. It helps you cut design time and fine-tune system performance.

Communication Infrastructures for Cloud Computing (Hardcover, New): Hussein T. Mouftah, Burak Kantarci Communication Infrastructures for Cloud Computing (Hardcover, New)
Hussein T. Mouftah, Burak Kantarci
R5,451 Discovery Miles 54 510 Ships in 10 - 15 working days

Cloud computing has provided multiple advantages as well as challenges to software and infrastructure services. In order to be fully beneficial, these challenges facing cloud specific communication protocols must be addressed. Communication Infrastructures for Cloud Computing presents the issues and research directions for a broad range of cloud computing aspects of software, computing, and storage systems. This book will highlight a broad range of topics in communication infrastructures for cloud computing that will benefit researchers, academics, and practitioners in the active fields of engineering, computer science, and software.

Cloud Computing - Technology and Practices (Hardcover): Dinesh G. Harkut, Kashmira N. Kasat, Saurabh A. Shah Cloud Computing - Technology and Practices (Hardcover)
Dinesh G. Harkut, Kashmira N. Kasat, Saurabh A. Shah
R2,764 Discovery Miles 27 640 Ships in 10 - 15 working days
Network Management and Control (Hardcover, 1990 ed.): A. Kershenbaum, Manu Malek, M. Wall Network Management and Control (Hardcover, 1990 ed.)
A. Kershenbaum, Manu Malek, M. Wall
R4,728 Discovery Miles 47 280 Ships in 12 - 19 working days

Like the 120 volt standard for electricity, the appearance of standards in network management heralds new opportunities for creativity and achievement. As one example, within the framework of these evolving standards, consider a system of local area networks connecting computing equipment from different vendors. A bridge 1qc. k:8 up because of a transient caused by a repeater failure. The result is a massive disconnecHon of virtual circuits. What is the role of the manager and the network management system in solving the problem? How does the vendor implement the solution? How does the user use it? What measurements should be made? How should they be displayed? How much of the diagnosis and correction should be automated? How does the solution change with different hardware and software? In the IEEE Communications Magazine, I recently reported a timely illustration in the area of problems in fault management. At the workshop hotel, "I was waiting for a room assignment at the reception desk, when my attendant left the counter for a moment. Upon returning, he took one look at his screen and whined an accusatory question at everyone in sight, 'Who logged out my terminal?' Who indeed! It wasn't any of us. It was the system.

Handbook of Signal Processing Systems (Hardcover, Edition.): Shuvra S. Bhattacharyya, Ed F. Deprettere, Rainer Leupers, Jarmo... Handbook of Signal Processing Systems (Hardcover, Edition.)
Shuvra S. Bhattacharyya, Ed F. Deprettere, Rainer Leupers, Jarmo Takala
R5,847 Discovery Miles 58 470 Ships in 10 - 15 working days

It gives me immense pleasure to introduce this timely handbook to the research/- velopment communities in the ?eld of signal processing systems (SPS). This is the ?rst of its kind and represents state-of-the-arts coverage of research in this ?eld. The driving force behind information technologies (IT) hinges critically upon the major advances in both component integration and system integration. The major breakthrough for the former is undoubtedly the invention of IC in the 50's by Jack S. Kilby, the Nobel Prize Laureate in Physics 2000. In an integrated circuit, all components were made of the same semiconductor material. Beginning with the pocket calculator in 1964, there have been many increasingly complex applications followed. In fact, processing gates and memory storage on a chip have since then grown at an exponential rate, following Moore's Law. (Moore himself admitted that Moore's Law had turned out to be more accurate, longer lasting and deeper in impact than he ever imagined. ) With greater device integration, various signal processing systems have been realized for many killer IT applications. Further breakthroughs in computer sciences and Internet technologies have also catalyzed large-scale system integration. All these have led to today's IT revolution which has profound impacts on our lifestyle and overall prospect of humanity. (It is hard to imagine life today without mobiles or Internets ) The success of SPS requires a well-concerted integrated approach from mul- ple disciplines, such as device, design, and application.

The Mobile Communications Handbook (Hardcover, 2nd ed. 1999): Jerry D. Gibson The Mobile Communications Handbook (Hardcover, 2nd ed. 1999)
Jerry D. Gibson
R5,791 Discovery Miles 57 910 Ships in 10 - 15 working days

In a single volume, The Mobile Communications Handbook covers the entire field, from principles of analog and digital communications to cordless telephones, wireless local area networks (LANs), and international technology standards. The tremendous scope of this second edition ensures that it will be the primary reference for every aspect of mobile communications. Details and references follow preliminary discussions, ensuring that the reader obtains the most accurate information available on the particular topic.

Roadside Networks for Vehicular Communications - Architectures, Applications, and Test Fields (Hardcover): Robil Daher, Alexey... Roadside Networks for Vehicular Communications - Architectures, Applications, and Test Fields (Hardcover)
Robil Daher, Alexey Vinel
R5,222 Discovery Miles 52 220 Ships in 10 - 15 working days

Roadside Networks for Vehicular Communications: Architectures, Applications, and Test Fields attempts to close the gap between science and technology in the field of roadside backbones for VCNs. This collection will be useful not only for researchers and engineers at universities, but for students in the fields of wireless communication networks, especially vehicular communication networks, and backbone networks as well.

Peer-to-Peer Video - The Economics, Policy, and Culture of Today's New Mass Medium (Hardcover, 2008 ed.): Eli M. Noam,... Peer-to-Peer Video - The Economics, Policy, and Culture of Today's New Mass Medium (Hardcover, 2008 ed.)
Eli M. Noam, Lorenzo Maria Pupillo
R3,065 Discovery Miles 30 650 Ships in 10 - 15 working days

Peer-to-Peer (P2P) networks allow individuals to share digital content files in real time. They facilitate communication and promote community without hierarchy or strict control. This book applies economic principles to analyze and understand the P2P phenomenon. It also provides numerous contemporary examples from the US and around the world to shed light on the implications of P2P as a mass medium, considering such issues as pricing, licensing, security, and regulation.

Anomaly Detection Principles and Algorithms (Hardcover, 1st ed. 2017): Kishan G. Mehrotra, Chilukuri K. Mohan, Huaming Huang Anomaly Detection Principles and Algorithms (Hardcover, 1st ed. 2017)
Kishan G. Mehrotra, Chilukuri K. Mohan, Huaming Huang
R2,779 R2,015 Discovery Miles 20 150 Save R764 (27%) Ships in 12 - 19 working days

This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field. A large number of algorithms are succinctly described, along with a presentation of their strengths and weaknesses. The authors also cover algorithms that address different kinds of problems of interest with single and multiple time series data and multi-dimensional data. New ensemble anomaly detection algorithms are described, utilizing the benefits provided by diverse algorithms, each of which work well on some kinds of data. With advancements in technology and the extensive use of the internet as a medium for communications and commerce, there has been a tremendous increase in the threats faced by individuals and organizations from attackers and criminal entities. Variations in the observable behaviors of individuals (from others and from their own past behaviors) have been found to be useful in predicting potential problems of various kinds. Hence computer scientists and statisticians have been conducting research on automatically identifying anomalies in large datasets. This book will primarily target practitioners and researchers who are newcomers to the area of modern anomaly detection techniques. Advanced-level students in computer science will also find this book helpful with their studies.

Physical Unclonable Functions in Theory and Practice (Hardcover, 2013 ed.): Christoph Boehm, Maximilian Hofer Physical Unclonable Functions in Theory and Practice (Hardcover, 2013 ed.)
Christoph Boehm, Maximilian Hofer
R4,457 R3,600 Discovery Miles 36 000 Save R857 (19%) Ships in 12 - 19 working days

In "Physical Unclonable Functions in Theory and Practice," the authorspresent an in-depth overview ofvarious topics concerning PUFs, providing theoretical background and application details. This book concentrates on the practical issues of PUF hardware design, focusing on dedicated microelectronic PUF circuits.

Additionally, the authors discuss the whole process of circuit design, layout and chip verification. The book also offers coverage of: Different published approaches focusing on dedicated microelectronic PUF circuits Specification of PUF circuits General design issues Minimizing error rate from the circuit s perspective Transistor modeling issues of Montecarlo mismatch simulation and solutions Examples of PUF circuits including an accurate description of the circuits and testing/measurement resultsDifferent error rate reducing pre-selection techniques

This monographgives insight into PUFs in general and provides knowledge in the field of PUF circuit design and implementation. It could be of interest for all circuit designers confronted with PUF design, and also for professionals and students being introduced to the topic."

Computer-Mediated Communication (Hardcover): Indrakshi Dey Computer-Mediated Communication (Hardcover)
Indrakshi Dey
R3,325 Discovery Miles 33 250 Ships in 10 - 15 working days
Security-Aware Design for Cyber-Physical Systems - A Platform-Based Approach (Hardcover, 1st ed. 2017): Chungwei Lin, Alberto... Security-Aware Design for Cyber-Physical Systems - A Platform-Based Approach (Hardcover, 1st ed. 2017)
Chungwei Lin, Alberto Sangiovanni-Vincentelli
R3,365 Discovery Miles 33 650 Ships in 10 - 15 working days

Addressing the rising security issues during the design stages of cyber-physical systems, this book develops a systematic approach to address security at early design stages together with all other design constraints. Cyber-attacks become more threatening as systems are becoming more connected with the surrounding environment, infrastructures, and other systems. Security mechanisms can be designed to protect against attacks and meet security requirements, but there are many challenges of applying security mechanisms to cyber-physical systems including open environments, limited resources, strict timing requirements, and large number of devices. Designed for researchers and professionals, this book is valuable for individuals working in network systems, security mechanisms, and system design. It is also suitable for advanced-level students of computer science.

Electronic Data Interchange in Finance and Accounting (Hardcover, New): Robert J Thierauf Electronic Data Interchange in Finance and Accounting (Hardcover, New)
Robert J Thierauf
R2,781 Discovery Miles 27 810 Ships in 10 - 15 working days

One of the most important trends in information systems today is the increasing use of electronic data interchange whereby paper is replaced by electronic communication for transactions between companies. Written for financial and accounting professionals as well as the MIS managers with whom they interface, this book offers a comprehensive discussion of the elements of EDI systems that are particularly useful in finance and accounting applications. Thierauf introduces the underlying framework for EDI, comparing it to the present paper operating mode; explains the fundamentals of national and international electronic communication, and explores the hardware and software necessary as well as the typical costs involved. Numerous real-world case studies are included to demonstrate the feasibility, development, and implementation of EDI systems in finance, accounting, and banking operations.

The text's structure follows a logical sequence from concept through application designed to assist the typical end user in the design and installation of an EDI system. Part One shows the relationship of EDI systems to various types of management information systems and discusses factors underlying both U.S. and international systems. In Part Two, Thierauf investigates the currently available EDI hardware and software and presents a custom-designed approach to software. In the final chapter of Part Two, Thierauf provides in-depth treatment of typical EDI applications as well as the design considerations for their development. The feasibility of undertaking an EDI system and detailed procedures for developing and implementing such a system form the focus of Part Three. Separate chapters cover EDI in strategic planning, banking, finance, and accounting. Numerous figures amplify points made in the text. In addition to providing a thorough guide to EDI for accounting, finance, and MIS professionals, this volume will also be ideal as a supplemental text for undergraduate and graduate courses in business information systems.

Multi-Technology Positioning (Hardcover, 1st ed. 2017): Jari Nurmi, Elena Simona Lohan, Henk Wymeersch, Gonzalo Seco-Granados,... Multi-Technology Positioning (Hardcover, 1st ed. 2017)
Jari Nurmi, Elena Simona Lohan, Henk Wymeersch, Gonzalo Seco-Granados, Ossi Nykanen
R4,712 Discovery Miles 47 120 Ships in 12 - 19 working days

This book provides an overview of positioning technologies, applications and services in a format accessible to a wide variety of readers. Readers who have always wanted to understand how satellite-based positioning, wireless network positioning, inertial navigation, and their combinations work will find great value in this book. Readers will also learn about the advantages and disadvantages of different positioning methods, their limitations and challenges. Cognitive positioning, adding the brain to determine which technologies to use at device runtime, is introduced as well. Coverage also includes the use of position information for Location Based Services (LBS), as well as context-aware positioning services, designed for better user experience.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Emerging Technologies in Data Mining and…
Joao Manuel R.S. Tavares, Satyajit Chakrabarti, … Hardcover R5,821 Discovery Miles 58 210
Computer and Information Sciences…
Erol Gelenbe, Ricardo Lent, … Hardcover R6,096 Discovery Miles 60 960
Dense Image Correspondences for Computer…
Tal Hassner, Ce Liu Hardcover R3,623 Discovery Miles 36 230
Computational Intelligence for Machine…
Rajshree Srivastava, Pradeep Kumar Mallick, … Hardcover R4,117 Discovery Miles 41 170
Amazon Kinesis Data Analytics Developer…
Documentation Team Hardcover R1,576 Discovery Miles 15 760
3D Point Cloud Analysis - Traditional…
Shan Liu, Min Zhang, … Hardcover R3,357 Discovery Miles 33 570
Amazon EMR Management Guide
Documentation Team Hardcover R2,119 Discovery Miles 21 190
Advanced Machine Vision Paradigms for…
Tapan K. Gandhi, Siddhartha Bhattacharyya, … Paperback R3,207 Discovery Miles 32 070
Amazon Lex Developer Guide
Documentation Team Hardcover R2,407 Discovery Miles 24 070
Developments in Wireless Network…
Mohammad A. Matin Hardcover R5,231 Discovery Miles 52 310

 

Partners