![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > General
Traffic Anomaly Detection presents an overview of traffic anomaly detection analysis, allowing you to monitor security aspects of multimedia services. The author's approach is based on the analysis of time aggregation adjacent periods of the traffic. As traffic varies throughout the day, it is essential to consider the concrete traffic period in which the anomaly occurs. This book presents the algorithms proposed specifically for this analysis and an empirical comparative analysis of those methods and settle a new information theory based technique, named "typical day analysis".
This book catalogs the most popular and commonly used serial-port interfaces and provides details on the specifications and the latest standards, enabling you to select an interface for a new design or verify that an interface is working correctly. Each chapter is based on a different interface and is written in an easy to follow, standard format. With this book you will learn: The most widely used serial interfaces How to select the best serial interface for a specific application or design The trade-offs between data rate and distance (length or range) The operation and benefits of serial data transmission The most common media used for serial data transmission
The communication field is evolving rapidly in order to keep up with society's demands. As such, it becomes imperative to research and report recent advancements in computational intelligence as it applies to communication networks. The Handbook of Research on Recent Developments in Intelligent Communication Application is a pivotal reference source for the latest developments on emerging data communication applications. Featuring extensive coverage across a range of relevant perspectives and topics, such as satellite communication, cognitive radio networks, and wireless sensor networks, this book is ideally designed for engineers, professionals, practitioners, upper-level students, and academics seeking current information on emerging communication networking trends.
Bio-inspired computation, especially those based on swarm intelligence, has become increasingly popular in the last decade. Bio-Inspired Computation in Telecommunications reviews the latest developments in bio-inspired computation from both theory and application as they relate to telecommunications and image processing, providing a complete resource that analyzes and discusses the latest and future trends in research directions. Written by recognized experts, this is a must-have guide for researchers, telecommunication engineers, computer scientists and PhD students.
With the rapid progress in networking and computing technologies, a wide variety of network-based computing applications have been developed and deployed on the internet. Flexible and effective service provisioning for supporting the diverse applications is a key requirement for the next generation internet. However, the current internet lacks sufficient capability for meeting this requirement, mainly due to the ossification caused by tight coupling between network architecture and infrastructure. Service-Oriented Architecture (SOA), which has been widely adopted in cloud computing via the Infrastructure-as-a-Service (IaaS), Platform-as-a-Service (PaaS), and Software-as-a-Service (SaaS) paradigms, may be applied in networking to decouple network architecture and infrastructure; thus offering a promising approach to addressing some fundamental challenges to the next generation Internet. In general, such a service-oriented networking paradigm is referred to as Network-as-a-Service (NaaS). This book presents the state of the art of the NaaS paradigm, including its concepts, architecture, key technologies, applications, and development directions for future network service provisioning. It provides readers with a comprehensive reference that reflects the most current technical developments related to NaaS.
This book outlines the background and overall vision for the Internet of Things (IoT) and Machine-to-Machine (M2M) communications and services, including major standards. Key technologies are described, and include everything from physical instrumentation of devices to the cloud infrastructures used to collect data. Also included is how to derive information and knowledge, and how to integrate it into enterprise processes, as well as system architectures and regulatory requirements. Real-world service use case studies provide the hands-on knowledge needed to successfully develop and implement M2M and IoT technologies sustainably and profitably. Finally, the future vision for M2M technologies is described, including prospective changes in relevant standards. This book is written by experts in the technology and business aspects of Machine-to-Machine and Internet of Things, and who have experience in implementing solutions. Standards included: ETSI M2M, IEEE 802.15.4, 3GPP (GPRS, 3G, 4G), Bluetooth Low Energy/Smart, IETF 6LoWPAN, IETF CoAP, IETF RPL, Power Line Communication, Open Geospatial Consortium (OGC) Sensor Web Enablement (SWE), ZigBee, 802.11, Broadband Forum TR-069, Open Mobile Alliance (OMA) Device Management (DM), ISA100.11a, WirelessHART, M-BUS, Wireless M-BUS, KNX, RFID, Object Management Group (OMG) Business Process Modelling Notation (BPMN)Key technologies for M2M and IoTcovered: Embedded systems hardware and software, devices and gateways, capillary and M2M area networks, local and wide area networking, M2M Service Enablement, IoT data management and data warehousing, data analytics and big data, complex event processing and stream analytics, knowledge discovery and management, business process and enterprise integration, Software as a Service and cloud computingCombines both technical explanations together with design features of M2M/IoT and use cases. Together, these descriptions will assist you to develop solutions that will work in the real worldDetailed description of the network architectures and technologies that form the basis of M2M and IoTClear guidelines and examples of M2M and IoT use cases from real-world implementations such as Smart Grid, Smart Buildings, Smart Cities, Participatory Sensing, and Industrial AutomationA description of the vision for M2M and its evolution towards IoT"
"Design of Modern Communication Networks" focuses on methods and
algorithms related to the design of communication networks, using
optimization, graph theory, probability theory and simulation
techniques. The book discusses the nature and complexity of the
network design process, then introduces theoretical concepts,
problems and solutions. It demonstrates the design of network
topology and traditional loss networks, followed by uncontrolled
packet networks, flow-controlled networks, and multiservice
networks. Access network design is reviewed, and the book concludes
by considering the design of survivable (reliable) networks and
various reliability concepts.
Are Information and Communications Technologies (ICTs) helpful or detrimental to the process of design? According to Aristotle, the imagination is a mental power that assists logical, sound judgments. Design, therefore, incorporates both reason and imagination. Challenging ICT Applications in Architecture, Engineering, and Industrial Design Education posits imagination as the central feature of design. It questions the common assumption that ICTs are not only useful but also valuable for the creation of the visual designs that reside at the core of architecture, engineering design, and industrial design. For readers who believe this assumption is right, this book offers an alternative perspective.
"Unified Communications Forensics: Anatomy of Common UC Attacks "is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: analysis of forensic artifacts in common UC attacks an in-depth look at established UC technologies and attack exploits hands-on understanding of UC attack vectors and associated countermeasures companion website http: //secvoip.comgiving readers access to
the most up-to-date information on UC attacks. Provides key information for hackers and pen testers on the most current Unified Communications implementations. The only book to explore and demonstrate how to work with digital artifacts from attacks within the UC environment. Deals with UC security from multiple angles-less about theory and more about hands-on threat defense and forensics. "
Optical Fiber Telecommunications VI (A&B) is the sixth in a series that has chronicled the progress in the R&D of lightwave communications since the early 1970s. Written by active authorities from academia and industry, this edition brings a fresh look to many essential topics, including devices, subsystems, systems and networks. A central theme is the enabling of high-bandwidth communications in a cost-effective manner for the development of customer applications. These volumes are an ideal reference for R&D engineers and managers, optical systems implementers, university researchers and students, network operators, and investors. Volume A is devoted to components and subsystems, including photonic integrated circuits, multicore and few-mode fibers, photonic crystals, silicon photonics, signal processing, and optical interconnections. Volume B is devoted to systems and networks, including advanced
modulation formats, coherent detection, Tb/s channels,
space-division multiplexing, reconfigurable networks, broadband
access, undersea cable, satellite communications, and microwave
photonics.
LTE (Long Term Evolution) is commonly marketed as 4G. LTE and LTE Advanced have been recognized by ITU-R and ITU-T (International Telecommunications Union - Telecommunications) as the principal solution for the future mobile communication networks standards. They are thus the framework of what the marketing calls 4G and possibly also 5G. This book describes various aspects of LTE as well as the change of paradigm, which it is bringing to mobile communications, focusing on LTE standards and architecture, OFDMA, the Full IP Core Network and LTE security.
|
You may like...
Device and Circuit Cryogenic Operation…
Francis Balestra, G. Ghibaudo
Hardcover
R4,156
Discovery Miles 41 560
Full-Chip Nanometer Routing Techniques
Tsung-Yi Ho, Yao-Wen Chang, …
Hardcover
R2,712
Discovery Miles 27 120
|