![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering
This book contains 74 papers presented at ICTCS 2017: Third International Conference on Information and Communication Technology for Competitive Strategies. The conference was held during 16-17 December 2017, Udaipur, India and organized by Association of Computing Machinery, Udaipur Professional Chapter in association with The Institution of Engineers (India), Udaipur Local Center and Global Knowledge Research Foundation. This book contains papers mainly focused on ICT for Computation, Algorithms and Data Analytics and IT Security etc.
A concise, updated guide to the 3GPP LTE Security Standardization specifications A welcome Revised Edition of the successful "LTE Security" addressing the security architecture for SAE/LTE, which is based on elements of the security architectures for GSM and 3G, but which needed a major redesign due to the significantly increased complexity, and different architectural and business requirements of fourth generation systems. The authors explain in detail the security mechanisms employed to meet these requirements. The specifications generated by standardization bodies only inform about how to implement the system (and this only to the extent required for interoperability), but almost never inform readers about why things are done the way they are. Furthermore, specifications tend to be readable only for a small group of experts and lack the context of the broader picture. The book fills this gap by providing first hand information from insiders who participated in decisively shaping SAE/LTE security in the relevant standardization body, 3GPP, and can therefore explain the rationale for design decisions in this area.A concise, fully updated guide to the 3GPP LTE Security Standardization specificationsDescribes the essential elements of LTE and SAE Security, written by leading experts who participated in decisively shaping SAE/LTE security in the relevant standardization body, 3GPPExplains the rationale behind the standards specifications giving readers a broader understanding of the context to these specificationsIncludes new chapters covering 3GPP work on system enhancements for MTC, plus application layer security in ETSI TC M2M and embedded smart card in ETSI SCP; Security for Machine-type Communication, Relay Node Security, and Future Challenges, including Voice over LTE, MTC, Home base stations, LIPA/SIPTO, and New Cryptographic Algorithms Essential reading for System engineers, developers and people in technical sales working in the area of LTE and LTE security, communication engineers and software developers in mobile communication field.
This book focuses on the state-of-the-art of biosensor research and development for specialists and non-specialists. It introduces the fundamentals of the subject with relevant characteristics of transducer elements, as well as biochemical recognition molecules. This book is ideal for researchers of nanotechnology, materials science and biophysics.
One of the crucial challenges for future smart cities is to devise a citywide network infrastructure capable of effectively guaranteeing resource-efficient and reliable communications while managing the complexity of heterogeneous devices and access technologies. This edited book highlights and showcases state of the art research and innovations in 5G and beyond wireless communications technologies for connected smart cities. The main objectives of this work include the exploration of recent advances and application potentials of various communication technologies as promising enablers for future networked smart cities, the investigation of design-specific issues for the integration of different architectural components of smart cities, and addressing various challenges and identifying opportunities in terms of interoperability of potential solutions. The book is aimed at a core and interdisciplinary audience of engineers, researchers and professionals working on smart cities concepts and supporting the integration of next-generation information, communication, networking and sensing technologies. It will also be a very useful ancillary for advanced students and other professionals working on next-generation communication networks.
The increasing demand for wireless communications has revolutionised the lifestyle of today's society and one of the key components of wireless technology is antenna design. Broadband planar antennas are the newest generation of antennas boasting the attractive features required, such as broad operating bandwidth, low profile, light weight, low cost and ease of integration into arrays or Radio Frequency (RF) circuits, to make them ideal components of modern communications systems. Research into small and broadband antennas has been spurred by the rapid development of portable wireless communication devices such as cell phones, laptops and personal digital assistants. This all-encompassing volume, "Broadband Planar Antennas: Design and Applications," systematically describes the techniques for all planar antennas from microstrip patch antennas, suspended plate antennas and planar inverted-L/F antennas to planar dipole antennas. Also discussed are some of the most recent outcomes such as broadband antenna issues in promising ultra-wideband applications. Clearly describes the fundamentals of planar antennas and categorises them according to their radiation characteristics Introduces the advanced progress in broadband planar antennas for modern wireless communications Includes a wealth of case studies, design guidelines, figures and tables This text is essential reading for antenna, RF and microwave engineers and manufacturers within the telecommunications industry. Its highly accessible approach will also appeal to researchers, postgraduate students and academic lecturers.
Advances in Laser Materials Processing: Technology, Research and Application, Second Edition, provides a revised, updated and expanded overview of the area, covering fundamental theory, technology and methods, traditional and emerging applications and potential future directions. The book begins with an overview of the technology and challenges to applying the technology in manufacturing. Parts Two thru Seven focus on essential techniques and process, including cutting, welding, annealing, hardening and peening, surface treatments, coating and materials deposition. The final part of the book considers the mathematical modeling and control of laser processes. Throughout, chapters review the scientific theory underpinning applications, offer full appraisals of the processes described and review potential future trends.
This work makes major contributions to the thriving area of social, communication, and distributed networks by introducing novel methodologies and tools toward the study of the evolutionary behaviors of these networks, as well as their computational complexity and rates of convergence. By departing from the classical approaches and results in the literature, this work shows that it is possible to handle more complex and realistic nonlinear models where either the traditional approaches fail or lead to weak results. The author also develops several easily implementable algorithms, delivering excellent performance guarantees while running faster than those that exist in the literature. The study undertaken and the approaches adopted enable the analysis of the evolution of several different types of social and distributed networks, with the potential to apply to and resolve several other outstanding issues in such networks.
These proceedings present the latest information on intelligent- transportation technologies and their applications in real-world cases. The Second International Conference on Intelligent Transportation was held in Chengdu, China on November 25-27, 2015, to present the latest research in the field, including intelligent-transportation management, intelligent vehicles, rail transportation systems, traffic transportation networks, as well as road traffic element simulations and their industrial development. The aim of conference was to bring together academics, researchers, engineers and students from across the world to discuss state-of-the-art technologies related to intelligent transportation.
Implementing IP and Ethernet on the 4G Mobile Network delves into the 4G mobile network that allows an IP packet transmitted by a mobile to be transported to its gateway, reciprocally using the following networks: MPLS-VPN, VPLS and OTN. The mechanisms for the implementation of quality of service (QoS) on the EPS, IP, Ethernet and MPLS networks are presented, as is the security for the LTE radio interface, the NAS messages and the links of the transport (IPSec). In addition, readers will find discussions of the aspects relating to the synchronization of the eNB entities, including SyncE and IEEE 1588 mechanisms.
Collecting and processing data is a necessary aspect of living in a technologically advanced society. Whether it's monitoring events, controlling different variables, or using decision-making applications, it is important to have a system that is both inexpensive and capable of coping with high amounts of data. Technological Breakthroughs in Modern Wireless Sensor Applications brings together new ways to process and monitor data, and to put it to work in everything from intelligent transportation systems to healthcare to multimedia applications. This book is an essential reference source for research and development engineers, graduate students, academics, and researchers interested in intelligent engineering, internetworking, routing, and network planning algorithms.
With the steady stream of new web based information technologies being introduced to organizations, the need for network and communication technologies to provide an easy integration of knowledge and information sharing is essential. Network and Communication Technology Innovations for Web and IT Advancement presents studies on trends, developments, and methods on information technology advancements through network and communication technology. This collection brings together integrated approaches for communication technology and usage for web and IT advancements.
This book presents multibiometric watermarking techniques for security of biometric data. This book also covers transform domain multibiometric watermarking techniques and their advantages and limitations. The authors have developed novel watermarking techniques with a combination of Compressive Sensing (CS) theory for the security of biometric data at the system database of the biometric system. The authors show how these techniques offer higher robustness, authenticity, better imperceptibility, increased payload capacity, and secure biometric watermarks. They show how to use the CS theory for the security of biometric watermarks before embedding into the host biometric data. The suggested methods may find potential applications in the security of biometric data at various banking applications, access control of laboratories, nuclear power stations, military base, and airports.
In two parts, this book describes the evolution of mercury cadmium telluride (HgCdTe) imager structures based upon published patents and patent applications. The first part covers monolithic arrays, and the second part describes hybrid arrays. Each part has 5 chapters, with each document placed in chronological order, with the documents with the earliest priority placed first. Focus has been directed at the steps of manufacturing and structures of imagers. There is an index at the end of the book containing the patent number, the name of the applicant and the date of publication of each cited document. This monograph will serve as a useful summary of the patents and patent applications in the field of mercury cadmium telluride imagers.
This book describes the bottleneck faced soon by designers of traditional CMOS devices, due to device scaling, power and energy consumption, and variability limitations. This book aims at bridging the gap between device technology and architecture/system design. Readers will learn about challenges and opportunities presented by "beyond-CMOS devices" and gain insight into how these might be leveraged to build energy-efficient electronic systems.
This book describes a flexible and largely automated methodology for adding the estimation of power consumption to high level simulations at the electronic system level (ESL). This method enables the inclusion of power consumption considerations from the very start of a design. This ability can help designers of electronic systems to create devices with low power consumption. The authors also demonstrate the implementation of the method, using the popular ESL language "SystemC". This implementation enables most existing SystemC ESL simulations for power estimation with very little manual work. Extensive case-studies of a Network on Chip communication architecture and a dual-core application processor "ARM Cortex-A9" showcase the applicability and accuracy of the method to different types of electronic devices. The evaluation compares various trade-offs regarding amount of manual work, types of ESL models, achieved estimation accuracy and impact on the simulation speed. Describes a flexible and largely automated ESL power estimation method; Shows implementation of power estimation methodology in SystemC; Uses two extensive case studies to demonstrate method introduced.
This proceeding features papers discussing big data innovation for sustainable cognitive computing. The papers feature detail on cognitive computing and its self-learning systems that use data mining, pattern recognition and natural language processing (NLP) to mirror the way the human brain works. This international conference focuses on cognitive computing technologies, from knowledge representation techniques and natural language processing algorithms to dynamic learning approaches. Topics covered include Data Science for Cognitive Analysis, Real-Time Ubiquitous Data Science, Platform for Privacy Preserving Data Science, and Internet-Based Cognitive Platform. The EAI International Conference on Big Data Innovation for Sustainable Cognitive Computing (BDCC 2018), took place on 13 - 15 December 2018 in Coimbatore, India.
Offers an understanding of the applications and supporting technologies associated with digital video communications. The text also shows how to provide reliable, flexible and robust video transmission over networks. It begins with a discussion of the new and emerging applications of digital video communications including tele-medicine, videoconferencing and distance learning, and introduces the key systems required to support digital video: the Internet, ATM networks and Broadband ISDN. It also explores near future developments to the Internet that will support real-time video traffic.
This book discusses the design and implementation aspects of ultra-low power biosignal acquisition platforms that exploit analog-assisted and algorithmic approaches for power savings.The authors describe an approach referred to as "analog-and-algorithm-assisted" signal processing.This enables significant power consumption reductions by implementing low power biosignal acquisition systems, leveraging analog preprocessing and algorithmic approaches to reduce the data rate very early in the signal processing chain.They demonstrate savings for wearable sensor networks (WSN) and body area networks (BAN), in the sensors' stimulation power consumption, as well in the power consumption of the digital signal processing and the radio link. Two specific implementations, an adaptive sampling electrocardiogram (ECG) acquisition and a compressive sampling (CS) photoplethysmogram (PPG) acquisition system, are demonstrated. First book to present the so called, "analog-and-algorithm-assisted" approaches for ultra-low power biosignal acquisition and processing platforms; Covers the recent trend of "beyond Nyquist rate" signal acquisition and processing in detail, including adaptive sampling and compressive sampling paradigms; Includes chapters on compressed domain feature extraction, as well as acquisition of photoplethysmogram, an emerging optical sensing modality, including compressive sampling based PPG readout with embedded feature extraction; Discusses emerging trends in sensor fusion for improving the signal integrity, as well as lowering the power consumption of biosignal acquisition systems.
This book provides probabilistic, deterministic and geolocation-aware approaches for adaptive connectivity, robust security and privacy-aware communications for vehicular cyber physical systems (CPS). It presents mathematical models and numerical results obtained from experiments and simulations, and a trade-off between connectivity, security and privacy for vehicular communications. Connectivity between vehicles is crucial for vehicular CPS. Intelligent vehicular CPS provides not only road safety and traffic efficiency by exchanging information among vehicles, but also offers infotainment services to passengers using a variety of wireless technologies to forward the traffic/trajectory information with Vehicle-to-Vehicle (V2V), vehicular ad hoc network (VANET), and Vehicle-to-Roadside-to-Vehicle (V2R2V) communications. The book covers how to ensure that the message received from other vehicles is secure and trustworthy, rather than malicious. Further, it reveals how to make sure that the privacy of participants is not revealed while validating the received message. Researchers and professionals working with vehicular networks, smart systems, cyber physical systems, and mobile privacy will find this book valuable.
This book presents the design of delay-efficient packet schedulers for heterogeneous M2M uplink traffic classified into several classes, based on packet delay requirements, payload size, arrival process, etc. Specifically, the authors use tools from queuing theory to determine the delay-optimal scheduling policy. The proposed packet schedulers are designed for a generic M2M architecture and thus equally applicable to any M2M application. Additionally, due to their low implementation complexity and excellent delay-performance, they authors show how they are also well-suited for practical M2M systems. The book pertains primarily to real-time process scheduler experts in industry/academia and graduate students whose research deals with designing Quality-of-Service-aware packet schedulers for M2M packet schedulers over existing and future cellular infrastructure. Presents queuing theoretic analysis and optimization techniques used to design proposed packet scheduling strategies; Provides utility functions to precisely model diverse delay requirements, which lends itself to formulation of utility-maximization problems for determining the delay- or utility-optimal packet scheduler; Includes detail on low implementation complexity of the proposed scheduler by using iterative and distributed optimization techniques.
This book gathers the main recent results on positive trigonometric polynomials within a unitary framework. The book has two parts: theory and applications. The theory of sum-of-squares trigonometric polynomials is presented unitarily based on the concept of Gram matrix (extended to Gram pair or Gram set). The applications part is organized as a collection of related problems that use systematically the theoretical results. |
You may like...
Effective Business Communication In…
Michael Fielding, Franzel du Plooy-Cilliers
Paperback
(3)
Burnz' Phonic Shorthand for Schools…
Eliza Boardman 1823-1903 Burnz
Hardcover
R768
Discovery Miles 7 680
Smart Brevity - The Power of Saying More…
Jim Vandehei, Mike Allen, …
Hardcover
The Great First Impression Book Proposal…
Carolyn Howard-Johnson
Hardcover
R463
Discovery Miles 4 630
|