![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > General
This revised and updated book describes how to reduce costs, and covers the basic techniques, products and applications of the technology. It also gives information and access to over 400 organizations that provide services in the voice processing area.
This book provides knowledge into the intelligence and security areas of smart-city paradigms. It focuses on connected computing devices, mechanical and digital machines, objects, and/or people that are provided with unique identifiers. The authors discuss the ability to transmit data over a wireless network without requiring human-to-human or human-to-computer interaction via secure/intelligent methods. The authors also provide a strong foundation for researchers to advance further in the assessment domain of these topics in the IoT era. The aim of this book is hence to focus on both the design and implementation aspects of the intelligence and security approaches in smart city applications that are enabled and supported by the IoT paradigms. Presents research related to cognitive computing and secured telecommunication paradigms; Discusses development of intelligent outdoor monitoring systems via wireless sensing technologies; With contributions from researchers, scientists, engineers and practitioners in telecommunication and smart cities.
There are many valuable and useful books on electrical communication (References 1-5 are some examples), but they have certain disadvantages for the beginner. The more advanced books present some things in a basic way, but they are very narrow for an introduction to communica tion. The introductory books are broader but still narrow by our stan dards. Further, they often pick things out of thin air rather than derive them. This book is aimed at giving the beginner a basic understanding of a wide range of topics which are essential in communication systems. These include antennas and transmission, thermal noise and its consequences, Fourier transforms, modulation and noise, sampling and pulse code modulation, autocorrelation and power spectrum, optimum filtering, gauss ian noise and errors in digital transmission, data transmission, limits on data rate including information theory and quantum limits, and source encoding. We have not included communications traffic, switching, and multiplexing, nor protocols for digital and computer communications. For these, Reference 6 is excellent. In general, our book does not discuss the circuits used for communication or the physics of radio propagation. We assume that these will be taught in specialized courses, but such courses are not prerequisites for this one. Chapter 1 introduces the transmission formula or antenna equation and antenna directivity. Only a very basic sophomore physics knowledge of electromagnetic theory is assumed. The radar equation is also treated."
The book presents the proceedings of the 2nd International Conference on 5G for Ubiquitous Connectivity (5GU 2018), which took place on December 4-5, 2018 in Nanjing, People's Republic of China. The aim of this conference is to bring together researchers and developers as well as regulators and policy makers to present their latest views on 5G, including new networking, new wireless communications, resource control & management, future access techniques, new emerging applications, and latest findings in key research activities on 5G. The book is applicable to researchers, academics, students, and professionals. Features practical, tested applications in 5G for ubiquitous connectivity; Includes discussion of 5G for ubiquitous connectivity in relation to wireless communications, resource control & management, and future access techniques; Applicable to researchers, academics, students, and professionals.
The book includes insights that reflect the advances in the field of Internet of Things from upcoming researchers and leading academicians across the globe. It contains the high-quality peer-reviewed papers of 'International Conference on Internet of Things for Technological Development (IoT4TD 2017)', held at Kadi Sarva Vishvavidyalaya, Gandhinagar, Gujarat, India during April 1-2, 2017. The book covers variety of topics such as Internet of things, Intelligent Image Processing, Networks and Mobile Communications, Big Data and Cloud. The book is helpful for the perspective readers' from computer industry and academia to derive the advances of next generation communication and computational technology and shape them into real life applications.
This book addresses the challenges and design trade-offs arising during the hardware design of Faster-than-Nyquist (FTN) signaling transceivers. The authors describe how to design for coexistence between the FTN system described and Orthogonal frequency-division multiplexing (OFDM) systems, enabling readers to design FTN specific processing blocks as add-ons to the conventional transceiver chain. Provides a comprehensive introduction to Faster-than-Nyquist
(FTN) signaling transceivers, covering both theory and hardware
implementation;
This book provides current R&D trends and novel approaches in design and analysis of broadband, multiband, and smart antennas for 5G and B5G mobile and wireless applications, as well as the identification of integration techniques of these antennas in a diverse range of devices. The book presents theoretical and experimental approaches to help the reader in understanding the unique design issues and more advanced research. Moreover, the book includes chapters on the fundamentals of antenna theory. The book is pertinent to professionals and researchers working in the field of antenna engineering; it is written for graduate students, researchers, academics, and industry practitioners who want to improve their understanding in the current research trends in design analysis of broadband, multiband, and smart antennas for wireless applications.
The idea of this book comes from the observation that sensor networks represent a topic of interest from both theoretical and practical perspectives. The title und- lines that sensor networks offer the unique opportunity of clearly linking theory with practice. In fact, owing to their typical low-cost, academic researchers have the opportunity of implementing sensor network testbeds to check the validity of their theories, algorithms, protocols, etc., in reality. Likewise, a practitioner has the opportunity of understanding what are the principles behind the sensor networks under use and, thus, how to properly tune some accessible network parameters to improve the performance. On the basis of the observations above, the book has been structured in three parts: PartIisdenotedas"Theory,"sincethetopicsofits vechaptersareapparently "detached" from real scenarios; Part II is denoted as "Theory and Practice," since the topics of its three chapters, altough theoretical, have a clear connection with speci c practical scenarios; Part III is denoted as "Practice," since the topics of its ve chapters are clearly related to practical applications.
In recent years, with the rapid growth of the Internet, the bandwidth demand for data traffic is exploding. Optical networks based on wavelength-division multiplexing (WDM) technology offer the promise to satisfy the bandwidth requirements of the Internet infrastructure. With WDM technology, signals are carried simultaneously on mUltiple wavelengths on a single fiber. WDM provides a practical approach of resolving the mismatch between the fiber ca pacity and the peak electronic processing speed. Mesh-based WDM networks have recently attracted much research and development interest since the In ternet topology is meshed in nature, and more importantly, mesh-based WDM networks are flexible with respect to routing and survivability. This book exam ines the management and survivability issues of mesh-based WDM networks and proposes new WDM network protocols and algorithms that could make telecommunication networks more efficient. Wavelength-routing has been one of the most important technologies to em ploy WDM in backbone networks. In wavelength-routed WDM networks, optical channels, which are referred to as lightpaths, are set up between WDM terminals. Most chapters of this bock are focused on various issues related to wavelength-routed networks, namely, routing and wavelength-assignment, con trol and management, fault management, and wavelength-converter placement. This book also presents an all-optical packet-switched network architecture based on the concept of photonic slot routing. The audience for this book are network designers and planners, research and development engineers active in the field of telecommunications, and students of optical networking at the graduate or senior undergraduate levels."
China Satellite Navigation Conference (CSNC 2020) Proceedings presents selected research papers from CSNC 2020 held during 22nd-25th November in Chengdu, China. These papers discuss the technologies and applications of the Global Navigation Satellite System (GNSS), and the latest progress made in the China BeiDou System (BDS) especially. They are divided into 13 topics to match the corresponding sessions in CSNC2020, which broadly covered key topics in GNSS. Readers can learn about the BDS and keep abreast of the latest advances in GNSS techniques and applications.
How could privacy play a key role in protecting digital identities? How could we merge privacy law, policies, regulations and technologies to protect our digital identities in the context of connected devices and distributed systems? In this book, the author addresses major issues of identity protection and proposes a service-oriented layered framework to achieve interoperability of privacy and secure distributed systems. The framework is intended to distill privacy-related digital identity requirements (business interoperability) into a set of services, which in turn can be implemented on the basis of open standards (technical interoperability). The adoption of the proposed framework in security projects and initiatives would decrease complexities and foster understanding and collaborations between business and technical stakeholders. This work is a step toward implementing the author's vision of delivering cyber security as a set of autonomous multi-platform hosted services that should be available upon user request and on a pay-per-use basis.
Space-Time Processing for CDMA Mobile Communications is one of the first books to: bring together spatial/temporal channel models and analytic performance evaluation techniques; establish a link between smart antenna systems and advanced receiver design techniques; treat smart antennas specifically for UMTS-like communication systems, with applicable simulations and calculations; supply code with MatlabA(R) GUI so readers can run or modify existing simulations or create new ones. The field of smart antenna technology or, more generally, space-time processing is rapidly becoming one of the most promising areas of mobile communications, especially regarding the development of the first practical third-generation mobile communication systems. The authors have addressed many of the most basic questions relating to the use of space-time processing in CDMA-based third-generation systems and have presented models for the integration of space-time processing, error correction coding, and multi-user detection techniques. Included is extensive background information on cellular systems, antenna array theory, smart antenna techniques, performance of basic space-time processors and advanced space-time processors. The book also includes an extensive simulation program written in MatlabA(R). The simulation code implements both the uplink and the downlink of a UMTS-like communication system. This provides multiple options for simulating system performance using a variety of channel models as well as receiver structures. Space-Time Processing for CDMA Mobile Communications will be an invaluable reference work for engineers and researchers, and a useful source for design engineers enabling them tounderstand the implications of adding space-time processing systems to CDMA-based communication systems.
Recent spectacular achievements in wireless, mobile, and sensor networks have dramatically changed our lives in many ways. However, the rapid evolution of wireless systems not only promises increased functionality, reliability, availability, and security, as well as putting a wide variety of new services at the users' disposal ? it also creates a number of design challenges that our research community is now facing. Scientists and engineers need to come up with, and promptly implement, novel wireless network architectures, while system operators and planners rethink their business models and attend to the growing expectations of their customer base. To provide a suitable forum for discussion between researchers, practitioners, and industry representatives interested in new developments in the respective research area, IFIP WG 6. 8 launched three separate series of conferences: MWCN (Mobile and Wireless Communications Networks), PWC (Personal Wireless Communications), and WSAN (Wireless Sensor and Actors Networks). In 2008, MWCN and PWC were merged into the IFIP Wireless and Mobile Networking Conference (WMNC 2008), held in Toulouse, France, from September 30 to October 2, 2008. MWNC 2008 and PWC 2008 topics were subsequently revised with a view to covering the whole spectrum of hot issues in wireless and mobile networking. As a result, IFIP WG 6. 8 decided to add WSAN as another WMNC track.
This volume contains 73 papers presented at ICMEET 2015: International Conference on Microelectronics, Electromagnetics and Telecommunications. The conference was held during 18 - 19 December, 2015 at Department of Electronics and Communication Engineering, GITAM Institute of Technology, GITAM University, Visakhapatnam, INDIA. This volume contains papers mainly focused on Antennas, Electromagnetics, Telecommunication Engineering and Low Power VLSI Design.
Metadata standards in today's ICT sector are proliferating at unprecedented levels, while automated information management systems collect and process exponentially increasing quantities of data. With interoperability and knowledge exchange identified as a core challenge in the sector, this book examines the role ontology engineering can play in providing solutions to the problems of information interoperability and linked data. At the same time as introducing basic concepts of ontology engineering, the book discusses methodological approaches to formal representation of data and information models, thus facilitating information interoperability between heterogeneous, complex and distributed communication systems. In doing so, the text advocates the advantages of using ontology engineering in telecommunications systems. In addition, it offers a wealth of guidance and best-practice techniques for instances in which ontology engineering is applied in cloud services, computer networks and management systems. Engineering and computer science professionals (infrastructure architects, software developers, service designers, infrastructure operators, engineers, etc.) are today confronted as never before with the challenge of convergence in software solutions and technology. This book will help them respond creatively to what is sure to be a period of rapid development. "
This book, based on extensive international collaborative research, highlights the state-of-the-art design of "smart living" for metropolises, megacities, and metacities, as well as at the community and neighbourhood level. Smart living is one of six main components of smart cities, the others being smart people, smart economy, smart environment, smart mobility and smart governance. Smart living in any smart city can only be designed and implemented with active roles for smart people and smart city government, and as a joint effort combining e-Democracy, e-Governance and ICT-IoT systems. In addition to using information and communication technologies, the Internet of Things, Internet of Governance (e-Governance) and Internet of People (e-Democracy), the design of smart living utilizes various domain-specific tools to achieve coordinated, effective and efficient management, development, and conservation, and to improve ecological, social, biophysical, psychological and economic well-being in an equitable manner without compromising the sustainability of development ecosystems and stakeholders. This book presents case studies covering more than 10 cities and centred on domain-specific smart living components. The book is issued in two volumes. and this volume focus on city studies.
The continuous wavelet transform has deep mathematical roots in the work of Alberto P. Calderon. His seminal paper on complex method of interpolation and intermediate spaces provided the main tool for describing function spaces and their approximation properties. The Calderon identities allow one to give integral representations of many natural operators by using simple pieces of such operators, which are more suited for analysis. These pieces, which are essentially spectral projections, can be chosen in clever ways and have proved to be of tremendous utility in various problems of numerical analysis, multidimensional signal processing, video data compression, and reconstruction of high resolution images and high quality speech. A proliferation of research papers and a couple of books, written in English (there is an earlier book written in French), have emerged on the subject. These books, so far, are written by specialists for specialists, with a heavy mathematical flavor, which is characteristic of the Calderon-Zygmund theory and related research of Duffin-Schaeffer, Daubechies, Grossman, Meyer, Morlet, Chui, and others. Randy Young's monograph is geared more towards practitioners and even non-specialists, who want and, probably, should be cognizant of the exciting proven as well as potential benefits which have either already emerged or are likely to emerge from wavelet theory.
This book presents the latest results on predictive control of networked systems, where communication constraints (e.g., network-induced delays and packet dropouts) and cyber attacks (e.g., deception attacks and denial-of-service attacks) are considered. For the former, it proposes several networked predictive control (NPC) methods based on input-output models and state-space models respectively. For the latter, it designs secure NPC schemes from the perspectives of information security and real-time control. Furthermore, it uses practical experiments to demonstrate the effectiveness and applicability of all the methods, bridging the gap between control theory and practical applications. The book is of interest to academic researchers, R&D engineers, and graduate students in control engineering, networked control systems and cyber-physical systems.
Formal Description Techniques and Protocol Specification, Testing and Verification addresses formal description techniques (FDTs) applicable to distributed systems and communication protocols. It aims to present the state of the art in theory, application, tools and industrialization of FDTs. Among the important features presented are: FDT-based system and protocol engineering; FDT-application to distributed systems; Protocol engineering; Practical experience and case studies. Formal Description Techniques and Protocol Specification, Testing and Verification comprises the proceedings of the Joint International Conference on Formal Description Techniques for Distributed Systems and Communication Protocols and Protocol Specification, Testing and Verification, sponsored by the International Federation for Information Processing, held in November 1998, Paris, France. Formal Description Techniques and Protocol Specification, Testing and Verification is suitable as a secondary text for a graduate-level course on Distributed Systems or Communications, and as a reference for researchers and practitioners in industry.
AI Metaheuristics for Information Security in Digital Media examines the latest developments in AI-based metaheuristics algorithms with applications in information security for digital media. It highlights the importance of several security parameters, their analysis, and validations for different practical applications. Drawing on multidisciplinary research including computer vision, machine learning, artificial intelligence, modified/newly developed metaheuristics algorithms, it will enhance information security for society. It includes state-of-the-art research with illustrations and exercises throughout.
Introduction to Convolutional Codes with Applications is an introduction to the basic concepts of convolutional codes, their structure and classification, various error correction and decoding techniques for convolutionally encoded data, and some of the most common applications. The definition and representations, distance properties, and important classes of convolutional codes are also discussed in detail. The book provides the first comprehensive description of table-driven correction and decoding of convolutionally encoded data. Complete examples of Viterbi, sequential, and majority-logic decoding technique are also included, allowing a quick comparison among the different decoding approaches. Introduction to Convolutional Codes with Applications summarizes the research of the last two decades on applications of convolutional codes in hybrid ARQ protocols. A new classification allows a natural way of studying the underlying concepts of hybrid schemes and accommodates all of the new research. A novel application of fast decodable invertible convolutional codes for lost packet recovery in high speed networks is described. This opens the door for using convolutional coding for error recovery in high speed networks. Practicing communications, electronics, and networking engineers who want to get a better grasp of the underlying concepts of convolutional coding and its applications will greatly benefit by the simple and concise style of explanation. An up-to-date bibliography of over 300 papers is included. Also suitable for use as a textbook or a reference text in an advanced course on coding theory with emphasis on convolutional codes.
This work addresses the evaluation of the human and the automatic speaker recognition performances under different channel distortions caused by bandwidth limitation, codecs, and electro-acoustic user interfaces, among other impairments. Its main contribution is the demonstration of the benefits of communication channels of extended bandwidth, together with an insight into how speaker-specific characteristics of speech are preserved through different transmissions. It provides sufficient motivation for considering speaker recognition as a criterion for the migration from narrowband to enhanced bandwidths, such as wideband and super-wideband.
This book is the companion book of reference to the first volume. The book delivers an up-to-date review of key areas in modern optics with tutorial chapters that provide information on such topics as: coherent optical fiber systems, free space optical communications, atmospheric against guided wave optical communications and techniques for signal fading and loss.
A major challenge in grid computing remains the application software development for this new kind of infrastructure. Grid application programmers have to take into account several complicated aspects: distribution of data and computations, parallel computations on different sites and processors, heterogeneity of the involved computers, load balancing, etc. Grid programmers thus demand novel programming methodologies that abstract over such technical details while preserving the beneficial features of modern grid middleware. For this purpose, the authors introduce Higher-Order Components (HOCs). HOCs implement generic parallel/distributed processing patterns, together with the required middleware support, and they are offered to users via a high-level service interface. Users only have to provide the application-specific pieces of their programs as parameters, while low-level implementation details, such as the transfer of data across the grid, are handled by the HOCs. HOCs were developed within the CoreGRID European Network of Excellence and have become an optional extension of the popular Globus middleware. The book provides the reader with hands-on experience, describing a broad collection of example applications from various fields of science and engineering, including biology, physics, etc. The Java code for these examples is provided online, complementing the book. The expected application performance is studied and reported for extensive performance experiments on different testbeds, including grids with worldwide distribution. The book is targeted at graduate students, advanced professionals, and researchers in both academia and industry. Readers can raise their level of knowledge about methodologies for programming contemporary parallel and distributed systems, and, furthermore, they can gain practical experience in using distributed software. Practical examples show how the complementary online material can easily be adopted in various new projects. |
![]() ![]() You may like...
Emerging Wireless Communication and…
Karm Veer Arya, Robin Singh Bhadoria, …
Hardcover
R4,887
Discovery Miles 48 870
Pseudo-Differential Operators: Groups…
M.W. Wong, Hongmei Zhu
Hardcover
R3,057
Discovery Miles 30 570
Computational Pulse Signal Analysis
David Zhang, Wangmeng Zuo, …
Hardcover
R3,067
Discovery Miles 30 670
Bridging the Semantic Gap in Image and…
Halina Kwasnicka, Lakhmi C. Jain
Hardcover
R1,597
Discovery Miles 15 970
Robust Output LQ Optimal Control via…
Leonid Fridman, Alexander Poznyak, …
Hardcover
|