![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering
Wireless physical layer (PHY) security has attracted much attention due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping, jamming, and interference. Physical Layer Security for Wireless Sensing and Communication covers both communication and sensing security from a broad perspective. The main emphasis is on PHY security, although other security measures are covered for the sake of completeness and as a step towards cross-layer security and cognitive security vision. After discussing the features of wireless channels from both the communication and sensing perspectives, the book details their exploitation for secure transmission utilizing various approaches. Wireless sensing and radio environment concepts are also addressed, along with the related security implications in terms of eavesdropping, disruption, manipulation, and, in general, the exploitation of wireless sensing by unauthorised users. Several solutions for these threats from the domains of wireless communication, military radars, and machine learning, are discussed. The book provides valuable information to researchers in academia and industry, as well as engineers, developers, and advanced students in the field of cybersecurity.
The inadequate use of wireless spectrum resources has recently motivated researchers and practitioners to look for new ways to improve resource efficiency. As a result, new cognitive radio technologies have been proposed as an effective solution. Sensing Techniques for Next Generation Cognitive Radio Networks is a pivotal reference source that provides vital research on the application of spectrum sensing techniques. While highlighting topics such as radio identification, compressive sensing, and wavelet transform, this publication explores the standards and the methods of cognitive radio network architecture. This book is ideally designed for IT and network engineers, practitioners, and researchers seeking current research on radio scene analysis for cognitive radios and networks.
This two-volume book set explores how sensors and computer vision technologies are used for the navigation, control, stability, reliability, guidance, fault detection, self-maintenance, strategic re-planning and reconfiguration of unmanned aircraft systems (UAS). Volume 1 concentrates on UAS control and performance methodologies including Computer Vision and Data Storage, Integrated Optical Flow for Detection and Avoidance Systems, Navigation and Intelligence, Modeling and Simulation, Multisensor Data Fusion, Vision in Micro-Aerial Vehicles (MAVs), Computer Vision in UAV using ROS, Security Aspects of UAV and Robot Operating System, Vision in Indoor and Outdoor Drones, Sensors and Computer Vision, and Small UAV for Persistent Surveillance. Volume 2 focuses on UAS deployment and applications including UAV-CPSs as a Testbed for New Technologies and a Primer to Industry 5.0, Human-Machine Interface Design, Open Source Software (OSS) and Hardware (OSH), Image Transmission in MIMO-OSTBC System, Image Database, Communications Requirements, Video Streaming, and Communications Links, Multispectral vs Hyperspectral Imaging, Aerial Imaging and Reconstruction of Infrastructures, Deep Learning as an Alternative to Super Resolution Imaging, and Quality of Experience (QoE) and Quality of Service (QoS).
Microwave tubes are vacuum electron devices used for the generation and amplification of radio frequencies in the microwave range. An established technology area, the use of tubes remains essential in the field today for high-power applications. The culmination of the author's 50 years of industry experience, this authoritative resource offers you a thorough understanding of the operations and major classes of microwave tubes. Minimizing the use of advanced mathematics, the book places emphasis on clear qualitative explanations of phenomena. This practical reference serves as an excellent introduction for newcomers to the field and offers established tube engineers a comprehensive refresher. Professionals find coverage of all major tube classifications, including klystrons, traveling wave tubes (TWTs), magnetrons, cross field amplifiers, and gyrotrons.
Control Loops are the feedback mechanisms that work between a sensor or site control and a set of system or component settings-such as temperature or pressure. Understanding the various dynamics that come in to play when trying to control any active system can be complex and difficult, but this book seeks to make that effort much easier and more applicable to the day-to-day job site. The new edition will have greater coverage of on new software-driven control loop systems and control loop analytics. Readers will find: Review of control loop fundamentals, including PID controllers, loop dynamics and common tuning methods Coverage of the effects of various kinds of dynamics, including process, controller, measurement, valve and nonlinear dynamics New chapters on computer-aided control loop tuning methods and smart systems Summaries with useful control loop equations and algorithms
Graphs and Networks A unique blend of graph theory and network science for mathematicians and data science professionals alike. Featuring topics such as minors, connectomes, trees, distance, spectral graph theory, similarity, centrality, small-world networks, scale-free networks, graph algorithms, Eulerian circuits, Hamiltonian cycles, coloring, higher connectivity, planar graphs, flows, matchings, and coverings, Graphs and Networks contains modern applications for graph theorists and a host of useful theorems for network scientists. The book begins with applications to biology and the social and political sciences and gradually takes a more theoretical direction toward graph structure theory and combinatorial optimization. A background in linear algebra, probability, and statistics provides the proper frame of reference. Graphs and Networks also features: Applications to neuroscience, climate science, and the social and political sciences A research outlook integrated directly into the narrative with ideas for students interested in pursuing research projects at all levels A large selection of primary and secondary sources for further reading Historical notes that hint at the passion and excitement behind the discoveries Practice problems that reinforce the concepts and encourage further investigation and independent work
Written by a leading expert in the field, this unique book describes the technical requirements for three-tier shared spectrum as well as key policy rationale and the impact for 5G. Detail is provided on the inception of the concept and its implementation in the US Citizens Broadband Radio Service (CBRS), along with descriptions of standards for deployment, algorithms required for implementation, and the broader consequences for wireless network and service architectures. The economic and innovation incentives offered by three-tier spectrum are described, along with potential outcomes such as widely deployed neutral host networks. There is also detailed technical analysis of the unique challenges introduced by three-tier spectrum, such as co-existence among non-cooperating networks. Covering a wide range of spectrum bands, International Telecommunication Union (ITU) international allocations, and rule structures that can be adapted for different regimes, this is ideal for an international readership of communications engineers, policy-makers, regulators, and industry strategic planners.
RFID is a method of remotely storing and receiving data using
devices called RFID tags. RFID tags can be small adhesive stickers
containing antennas that receive and respond to transmissions from
RFID transmitters. RFID tags are used to identify and track
everything from Exxon EZ pass to dogs to beer kegs to library
books.
Sets forth the steps needed to protect critical telecommunications circuits from power faults and lightning in high voltage environments The need to protect telecommunications circuits from power faults and lightning has never been greater: when power outages or system disturbances occur, reliable telecommunications are essential. With this book as their guide, readers will know what they need to do (and not do) to protect critical telecommunications circuits and equipment located in high voltage environments such as electrical power plants, substations, and power towers. Moreover, the book explains how to get the job done safely, detailing the proper implementation of safety procedures and the use of protective equipment to eliminate or minimize risk. Setting the foundation, the book begins with an overview of the problem, key issues, industry standards, and safety concerns. Next, it covers: Definitions and fundamentals of electric power systems, with regard to HVPT applicationsCauses, boundary conditions, and calculations of ground potential riseCritical telecommunications circuits that must be protected in high voltage environmentsProtection schemes and equipment to resolve groundpotential rise problemsEffective installation and testing of high voltage interface equipmentPersonal safety for telecommunications personnel working with equipment in high voltage environments Throughout the book, the author refers to accepted industry standards and best practices. Written by one of the most respected professional trainers in the telecommunications industry, "High Voltage Protection for Telecommunications" can be used for professional training courses or self-study. It will enable readers to protect critical data and voice communications circuits from high voltage events and protect themselves during equipment installation and maintenance.
The primary aim of this volume is to provide researchers and engineers from both academic and industry with up-to-date coverage of new results in the field of robotic welding, intelligent systems and automation. The book is mainly based on papers selected from the 2019 International Workshop on Intelligentized Welding Manufacturing (IWIWM'2019) in USA. The articles show that the intelligentized welding manufacturing (IWM) is becoming an inevitable trend with the intelligentized robotic welding as the key technology. The volume is divided into four logical parts: Intelligent Techniques for Robotic Welding, Sensing of Arc Welding Processing, Modeling and Intelligent Control of Welding Processing, as well as Intelligent Control and its Applications in Engineering.
The development of mobile applications has created numerous opportunities across different industries. With these advances, the management of data has been optimized to allow a broader scope of potential uses. Advanced Mobile Technologies for Secure Transaction Processing: Emerging Research and Opportunities is an innovative reference source for the latest academic material on the application of mobile computing for secure payment transactions. Highlighting a range of relevant topics such as information security, electronic money, and online banking, this book is ideally designed for professionals, researchers, practitioners, students, and professionals interested in novel perspectives on mobile technologies and data management.
The effects of digital technology on the security industry require
constant vigilance by security distributors, sales staff, and
installation professionals. Today and for the foreseeable future,
all security professionals must have at least a basic understanding
of digital technology. "Digital CCTV" addresses this new challenge.
Control Applications for Biomedical Engineering Systems presents different control engineering and modeling applications in the biomedical field. It is intended for senior undergraduate or graduate students in both control engineering and biomedical engineering programs. For control engineering students, it presents the application of various techniques already learned in theoretical lectures in the biomedical arena. For biomedical engineering students, it presents solutions to various problems in the field using methods commonly used by control engineers.
This book provides a single-source reference to routing algorithms for Networks-on-Chip (NoCs), as well as in-depth discussions of advanced solutions applied to current and next generation, many core NoC-based Systems-on-Chip (SoCs). After a basic introduction to the NoC design paradigm and architectures, routing algorithms for NoC architectures are presented and discussed at all abstraction levels, from the algorithmic level to actual implementation. Coverage emphasizes the role played by the routing algorithm and is organized around key problems affecting current and next generation, many-core SoCs. A selection of routing algorithms is included, specifically designed to address key issues faced by designers in the ultra-deep sub-micron (UDSM) era, including performance improvement, power, energy, and thermal issues, fault tolerance and reliability.
Famed author Jack Ganssle has selected the very best embedded
systems design material from the Newnes portfolio and compiled into
this volume. The result is a book covering the gamut of embedded
design-from hardware to software to integrated embedded
systems-with a strong pragmatic emphasis. In addition to specific
design techniques and practices, this book also discusses various
approaches to solving embedded design problems and how to
successfully apply theory to actual design tasks. The material has
been selected for its timelessness as well as for its relevance to
contemporary embedded design issues. This book will be an essential
working reference for anyone involved in embedded system design!
The Newnes Know It All Series takes the best of what our authors
have written to create hard-working desk references that will be an
engineer's first port of call for key information, design
techniques and rules of thumb. Guaranteed not to gather dust on a
shelf!
This book provides a comprehensive survey of the technology of flash lamp annealing (FLA) for thermal processing of semiconductors. It gives a detailed introduction to the FLA technology and its physical background. Advantages, drawbacks and process issues are addressed in detail and allow the reader to properly plan and perform their own thermal processing. Moreover, this books gives a broad overview of the applications of flash lamp annealing, including a comprehensive literature survey. Several case studies of simulated temperature profiles in real material systems give the reader the necessary insight into the underlying physics and simulations. This book is a valuable reference work for both novice and advanced users.
This 6 volume set presents a groundbreaking resource in this branch of natural organic compounds and demonstrates how proton nuclear magnetic resonance (NMR) spectroscopy can be manipulated in structures of natural organic compounds. The authors provide the most comprehensive data of 17 kinds amounting to over 10,000 natural organic compounds. The 2nd volume mainly illustrates the molecular formula and structures of saponins. |
You may like...
Non-Instantaneous Impulsive Differential…
Jinrong Wang, Michal Fečkan
Paperback
R764
Discovery Miles 7 640
Introduction to Computational Physics…
Omair Zubairi, Fridolin Weber
Hardcover
R1,928
Discovery Miles 19 280
View of Sir Isaac Newton's Philosophy
Henry 1694-1771 Pemberton
Hardcover
R1,017
Discovery Miles 10 170
|