![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > General
This revised textbook motivates and illustrates the techniques of applied probability by applications in electrical engineering and computer science (EECS). The author presents information processing and communication systems that use algorithms based on probabilistic models and techniques, including web searches, digital links, speech recognition, GPS, route planning, recommendation systems, classification, and estimation. He then explains how these applications work and, along the way, provides the readers with the understanding of the key concepts and methods of applied probability. Python labs enable the readers to experiment and consolidate their understanding. The book includes homework, solutions, and Jupyter notebooks. This edition includes new topics such as Boosting, Multi-armed bandits, statistical tests, social networks, queuing networks, and neural networks. For ancillaries related to this book, including examples of Python demos and also Python labs used in Berkeley, please email Mary James at [email protected]. This is an open access book.
This book equips readers to understand a complex range of healthcare products that are used to diagnose, monitor, and treat diseases or medical conditions affecting humans. The first part of the book presents medical technologies such as medical information retrieval, tissue engineering techniques, 3D medical imaging, nanotechnology innovations in medicine, medical wireless sensor networks, and knowledge mining techniques in medicine. The second half of the book focuses on healthcare technologies including prediction hospital readmission risk, modeling e-health framework, personal Web in healthcare, security issues for medical records, and personalized services in healthcare. The contributors are leading world researchers who share their innovations, making this handbook the definitive resource on these topics. Handbook of Medical and Healthcare Technologies is intended for a wide audience including academicians, designers, developers, researchers and advanced-level students. It is also valuable for business managers, entrepreneurs, and investors within the medical and healthcare industries.
Are Information and Communications Technologies (ICTs) helpful or detrimental to the process of design? According to Aristotle, the imagination is a mental power that assists logical, sound judgments. Design, therefore, incorporates both reason and imagination. Challenging ICT Applications in Architecture, Engineering, and Industrial Design Education posits imagination as the central feature of design. It questions the common assumption that ICTs are not only useful but also valuable for the creation of the visual designs that reside at the core of architecture, engineering design, and industrial design. For readers who believe this assumption is right, this book offers an alternative perspective.
This book draws inspiration from natural shepherding, whereby a farmer utilizes sheepdogs to herd sheep, to inspire a scalable and inherently human friendly approach to swarm control. The book discusses advanced artificial intelligence (AI) approaches needed to design smart robotic shepherding agents capable of controlling biological swarms or robotic swarms of unmanned vehicles. These smart shepherding agents are described with the techniques applicable to the control of Unmanned X Vehicles (UxVs) including air (unmanned aerial vehicles or UAVs), ground (unmanned ground vehicles or UGVs), underwater (unmanned underwater vehicles or UUVs), and on the surface of water (unmanned surface vehicles or USVs). This book proposes how smart 'shepherds' could be designed and used to guide a swarm of UxVs to achieve a goal while ameliorating typical communication bandwidth issues that arise in the control of multi agent systems. The book covers a wide range of topics ranging from the design of deep reinforcement learning models for shepherding a swarm, transparency in swarm guidance, and ontology-guided learning, to the design of smart swarm guidance methods for shepherding with UGVs and UAVs. The book extends the discussion to human-swarm teaming by looking into the real-time analysis of human data during human-swarm interaction, the concept of trust for human-swarm teaming, and the design of activity recognition systems for shepherding. Presents a comprehensive look at human-swarm teaming; Tackles artificial intelligence techniques for swarm guidance; Provides artificial intelligence techniques for real-time human performance analysis.
This book provides conceptual understanding of machine learning algorithms though supervised, unsupervised, and advanced learning techniques. The book consists of four parts: foundation, supervised learning, unsupervised learning, and advanced learning. The first part provides the fundamental materials, background, and simple machine learning algorithms, as the preparation for studying machine learning algorithms. The second and the third parts provide understanding of the supervised learning algorithms and the unsupervised learning algorithms as the core parts. The last part provides advanced machine learning algorithms: ensemble learning, semi-supervised learning, temporal learning, and reinforced learning. Provides comprehensive coverage of both learning algorithms: supervised and unsupervised learning; Outlines the computation paradigm for solving classification, regression, and clustering; Features essential techniques for building the a new generation of machine learning.
This book provides an accessible and comprehensive tutorial on the key enabling technologies for 5G and beyond, covering both the fundamentals and the state-of-the-art 5G standards. The book begins with a historical overview of the evolution of cellular technologies and addresses the questions on why 5G and what is 5G. Following this, six tutorial chapters describe the fundamental technology components for 5G and beyond. These include modern advancements in channel coding, multiple access, massive multiple-input and multiple-output (MIMO), network densification, unmanned aerial vehicle enabled cellular networks, and 6G wireless systems. The second part of this book consists of five chapters that introduce the basics of 5G New Radio (NR) standards developed by 3GPP. These include 5G architecture, protocols, and physical layer aspects. The third part of this book provides an overview of the key 5G NR evolution directions. These directions include ultra-reliable low-latency communication (URLLC) enhancements, operation in unlicensed spectrum, positioning, integrated access and backhaul, air-to-ground communication, and non-terrestrial networks with satellite communication.
Today, increasing demands and expectations are being placed on GPS systems. Assisted GPS (A-GPS) has been developed to provide greatly improved capabilities, helping GPS work better and faster in almost any location. Offering a detailed look at all the technical aspects and underpinnings of A-GPS, this unique book places emphasis on practical implementation. The book reviews standard GPS design, helping professionals understand why GPS requires assistance in the first place. Readers discover how A-GPS enables the computing of a position from navigation satellites in the absence of precise time - a topic not covered in any other book. Moreover, engineers learn how to design and analyze a high sensitivity GPS receiver and determine the achievable sensitivity of a GPS receiver.
This book features selected papers presented at the 3rd International Conference on Recent Innovations in Computing (ICRIC 2020), held on 20-21 March 2020 at the Central University of Jammu, India, and organized by the university's Department of Computer Science & Information Technology. It includes the latest research in the areas of software engineering, cloud computing, computer networks and Internet technologies, artificial intelligence, information security, database and distributed computing, and digital India.
This book aims to gather the insight of leading experts on corruption and anti-corruption studies working at the scientific frontier of this phenomenon using the multidisciplinary tools of data and network science, in order to present current theoretical, empirical, and operational efforts being performed in order to curb this problem. The research results strengthen the importance of evidence-based approaches in the fight against corruption in all its forms, and foster the discussion about the best ways to convert the obtained knowledge into public policy. The contributed chapters provide comprehensive and multidisciplinary approaches to handle the non-trivial structural and dynamical aspects that characterize the modern social, economic, political and technological systems where corruption takes place. This book will serve a broad multi-disciplinary audience from natural to social scientists, applied mathematicians, including law and policymakers.
This book presents the proceedings of the 2nd International Conference on Networks and Advances in Computational Technologies (NetACT19) which took place on July 23-25, 2019 at Mar Baselios College of Engineering and Technology in Thiruvananthapuram, India. The conference was in association with Bowie State University, USA, Gannon University, USA and Malardalen University, Sweden. Papers presented were included in technical programs that were part of five parallel tracks, namely Computer Application, Image Processing, Network Security, Hardware & Network Systems and Machine Learning. The proceedings brings together experts from industry, governments and academia from around the world with vast experiences in design, engineering and research. Presents the proceedings of the 2nd International Conference on Networks and Advances in Computational Technologies (NetACT19); Includes research in Computer Application, Image Processing, Network Security, Hardware & Network Systems and Machine Learning; Provides perspectives from industry, academia and government.
This book focuses on the fundamentals of blockchain technology along with the means and methods of its integration with Internet of Things (IoT). The book allows the reader to have a deeper understanding of blockchain technology, IoT and various application areas wherein both technologies can be implemented. The book serves the purpose of providing knowledge about the fundamentals of blockchain and IoT to a common reader along with allowing a research scholar to identify some futuristic problem areas that emerge from the convergence of both technologies. Furthermore, the authors discuss relevant application areas such as smart city, e-healthcare, smart travel, etc. throughout the course of the book. The book also talks through a few case studies illustrating the implementation and benefits of using blockchain and IoT. Provides a comprehensive view of blockchain technology and its integration with IoT; Facilitates in having a valuable understanding of various application areas pertaining to blockchain and IoT; Assists the reader in exploring new research areas wherein blockchain and IoT can find their applicability based upon their list of benefits.
This book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature, and digital watermarking. This book is organized into fifteen chapters; topics include foundations of functional encryption, impact of group theory in cryptosystems, elliptic curve cryptography, XTR algorithm, pairing based cryptography, NTRU algorithms, ring units, cocks IBE schemes, Boneh-Franklin IBE, Sakai-Kasahara IBE, hierarchical identity based encryption, attribute based Encryption, extensions of IBE and related primitives, and digital signatures. Explains the latest functional encryption algorithms in a simple way with examples; Includes applications of functional encryption in information security, application security, and network security; Relevant to academics, research scholars, software developers, etc.
LTE (Long Term Evolution) is commonly marketed as 4G. LTE and LTE Advanced have been recognized by ITU-R and ITU-T (International Telecommunications Union - Telecommunications) as the principal solution for the future mobile communication networks standards. They are thus the framework of what the marketing calls 4G and possibly also 5G. This book describes various aspects of LTE as well as the change of paradigm, which it is bringing to mobile communications, focusing on LTE standards and architecture, OFDMA, the Full IP Core Network and LTE security.
This book focuses on the combination of IoT and data science, in particular how methods, algorithms, and tools from data science can effectively support IoT. The authors show how data science methodologies, techniques and tools, can translate data into information, enabling the effectiveness and usefulness of new services offered by IoT stakeholders. The authors posit that if IoT is indeed the infrastructure of the future, data structure is the key that can lead to a significant improvement of human life. The book aims to present innovative IoT applications as well as ongoing research that exploit modern data science approaches. Readers are offered issues and challenges in a cross-disciplinary scenario that involves both IoT and data science fields. The book features contributions from academics, researchers, and professionals from both fields.
This book gathers outstanding research papers presented at the International Joint Conference on Advances in Computational Intelligence (IJCACI 2020), organized by Daffodil International University (DIU) and Jahangirnagar University (JU) in Bangladesh and South Asian University (SAU) in India. These proceedings present novel contributions in the areas of computational intelligence and offer valuable reference material for advanced research. The topics covered include collective intelligence, soft computing, optimization, cloud computing, machine learning, intelligent software, robotics, data science, data security, big data analytics, and signal and natural language processing.
This book is intended for senior undergraduate and graduate students as well as practicing engineers who are involved in design and analysis of radio frequency (RF) circuits. Fully-solved, tutorial-like examples are used to put into practice major topics and to understand the underlying principles of the main sub-circuits required to design an RF transceiver and the whole communication system. Starting with review of principles in electromagnetic (EM) transmission and signal propagation, through detailed practical analysis of RF amplifier, mixer, modulator, demodulator, and oscillator circuit topologies, as well as basics of the system communication theory, this book systematically covers most relevant aspects in a way that is suitable for a single semester university level course. Readers will benefit from the author's sharp focus on radio receiver design, demonstrated through hundreds of fully-solved, realistic examples, as opposed to texts that cover many aspects of electronics and electromagnetic without making the required connection to wireless communication circuit design. Offers readers a complete, self-sufficient tutorial style textbook; Includes all relevant topics required to study and design an RF receiver in a consistent, coherent way with appropriate depth for a one-semester course; Uses hundreds of fully-solved, realistic examples of radio design technology to demonstrate concepts; Explains necessary physical/mathematical concepts and their interrelationship.
This book discusses the role of human computer interaction (HCI) design in fostering digital literacy and promoting socio-cultural acceptance and usage of the latest ICT innovations in developing countries. The book presents techniques, theories, case studies, and methodologies in HCI design approaches that have been used to foster digital literacy, break the socio-cultural barriers to ICT adoption, and promote the widespread usage of the latest innovations in the health, agriculture, economic, education and social sectors in developing countries. The authors provide insights on how crossing disciplines in HCI such as usability design, user centered design, user experience, anticipated user experience, technology acceptance design, persuasive design, philosophical designs, motivational design, social-cultural oriented designs, and other HCI design approaches have promoted digital literacy and stimulated socio-cultural acceptance and the usage of the latest ICT innovations. The book is relevant in academic, industry and government. Presents theoretical, practical, and socio-cultural approaches to digital literacy challenges in developing countries; Discusses recent ICT and HCI innovations used to transform the health, agriculture, economic, education and social sectors in developing countries; Provides insights on design opportunities and challenges presented in countries where digital literacy is very low and with complex socio-cultural dynamics.
This book presents materials on the implementation of modern technologies for aircraft information support and ground-based radio equipment for flights in the Russian Federation, especially in the Arctic and far Eastern regions, as well as new methods for monitoring the flight of civil aviation aircraft based on the use of local control and correction stations and optical systems that fully meet the requirements of international and domestic organizations for the reliability and integrity of transmitted information. The book is intended for engineering and technical specialists involved in the development, manufacturing and operation of aircraft avionics and ground-based radio electronic flight support systems, as well as graduate students and senior students of radio engineering specialties. It is useful to researchers and professionals whose activities are related to air traffic control.
This book exemplifies how smart buildings have a crucial role to play for the future of energy. The book investigates what already exists in regards to technologies, approaches and solutions both with a scientific and technological point of view. The authors cover solutions for mirroring and tracing human activities, optimal strategies to configure home settings, and generating explanations and persuasive dashboards to get occupants better committed in their home energy managements. Solutions are adapted from the fields of Internet of Things, physical modeling, optimization, machine learning and applied artificial intelligence. Practical applications are given throughout.
This book addresses one of the most overlooked practical, methodological, and moral questions in the journey to secure and handle the massive amount of data being generated from smart devices interactions: the integration of Blockchain with 5G-enabled IoT. After an overview, this book discusses open issues and challenges, which may hinder the growth of Blockchain technology. Then, this book presents a variety of perspectives on the most pressing questions in the field, such as: how IoT can connect billions of objects together; how the access control mechanisms in 5G-enabled industrial environment works; how to address the real-time and quality-of-service requirements for industrial applications; and how to ensure scalability and computing efficiency. Also, it includes a detailed discussions on the complexity of adoption of Blockchain for 5G-Enabled IoT and presents comparative case studies with respect to various performance evaluation metrics such as scalability, data management, standardization, interoperability and regulations, accessibility, human-factors engineering and interfaces, reliability, heterogeneity, and QoS requirements. This book acts as a professional guide for the practitioners in information security and related topics. |
![]() ![]() You may like...
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, …
Paperback
R1,491
Discovery Miles 14 910
Academic Press Library in Signal…
Sergios Theodoridis, Rama Chellappa
Hardcover
R4,214
Discovery Miles 42 140
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright
Paperback
R1,531
Discovery Miles 15 310
|