Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > General
The motivation for this book stems from an early exposure to the book Ap plied Mechanics by John Perry. Professor Perry strove to encourage his readers to understand the applications and use of mathematics in engineering with out insisting that they become immersed in pure mathematics. The following text uses this approach to the application of telecommunications switching. Readers wishing to study the derivation and proof of formulas will be able to do so using relevant references. The existence of low-cost programmable calculators frees practicing engineers from much laborious calculation, allowing more time for creative design and application of the art. The reader should not need to be able to derive formulas in order to apply them just as, to quote Professor Perry, "He should not have to be able to design a watch in order to tell time ... The material for this book has been drawn from my own experience in the field. Inevitably, however, I have used CCITT and Bell System publications for references and in some cases quotation, and I gratefully acknowledge permission for their use. I am also grateful to Stromberg Carlson Corporation for their earlier encour agement and support without which this book would not have been possible. Thanks are also due to Fred Hadfield for his advice and assistance in the preparation of the many figures and to my wife Ada for her support and patience as I pursued the demanding but interesting task of producing the text."
'Data acquisition' is concerned with taking one or more analogue signals and converting them to digital form with sufficient accu racy and speed to be ready for processing by a computer. The increasing use of computers makes this an expanding field, and it is important that the conversion process is done correctly because information lost at this stage can never be regained, no matter how good the computation. The old saying - garbage in, garbage out - is very relevant to data acquisition, and so every part of the book contains a discussion of errors: where do they come from, how large are they, and what can be done to reduce them? The book aims to treat the data acquisition process in depth with less detailed chapters on the fundamental principles of measure ment, sensors and signal conditioning. There is also a chapter on software packages, which are becoming increasingly popular. This is such a rapidly changing topic that any review of available pro grams is bound to be out of date before the book reaches the read ers. For this reason, I have described the data handling which is available in various types of program and left it to the reader to select from whatever is on the market at the time."
This textbook describes the selection, design and history of a multitude of antenna types. It includes wire, yagi, log periodic, microstrip, phased array, small, spiral and direction finding antennas. Also, radar and radio astronomy antennas are described. A comprehensive list of terms as well as charts, nomographs and useful tables are presented.
Communications, Information and Network Security is an excellent reference for both professional and academic researchers in the field of communication. Those working in space-time coding, multiuser detection, and wireless networks will find the book to be of particular use. New and highly original results by leading experts in communication, information theory, and data security are presented. Communications, Information and Network Security is a tribute to the broad and profound work of Ian Blake in the field of communication. All of the contributors have individually and collectively dedicated their work to Professor Blake.
Excellent textbook of multimedia signal processing also dealing with the optimization of multimedia communication systems. It covers the theoretical background of one- and multidimensional signal processing, statistical analysis and modelling, coding and information theory as well as estimation and classification theory.
This book represents a timely overview of advances in systems safety and security, based on selected, revised and extended contributions from the 2nd and 3rd editions of the International Workshop on Systems Safety and Security - IWSSS, held in 2014 and 2015, respectively, in Bucharest, Romania. It includes 14 chapters, co-authored by 34 researchers from 7 countries. The book provides an useful reference from both theoretical and applied perspectives in what concerns recent progress in this area of critical interest. Contributions, broadly grouped by core topic, address challenges related to information theoretic methods for assuring systems safety and security, cloud-based solutions, image processing approaches, distributed sensor networks and legal or risk analysis viewpoints. These are mostly accompanied by associated case studies providing additional practical value and underlying the broad relevance and impact of the field.
The book offers an original view on channel coding, based on a unitary approach to block and convolutional codes for error correction. It presents both new concepts and new families of codes. For example, lengthened and modified lengthened cyclic codes are introduced as a bridge towards time-invariant convolutional codes and their extension to time-varying versions. The novel families of codes include turbo codes and low-density parity check (LDPC) codes, the features of which are justified from the structural properties of the component codes. Design procedures for regular LDPC codes are proposed, supported by the presented theory. Quasi-cyclic LDPC codes, in block or convolutional form, represent one of the most original contributions of the book. The use of more than 100 examples allows the reader gradually to gain an understanding of the theory, and the provision of a list of more than 150 definitions, indexed at the end of the book, permits rapid location of sought information.
The book proposes new technologies and discusses future solutions for design infrastructure for ICT. The book contains high quality submissions presented at Second International Conference on Information and Communication Technology for Sustainable Development (ICT4SD - 2016) held at Goa, India during 1 - 2 July, 2016. The conference stimulates the cutting-edge research discussions among many academic pioneering researchers, scientists, industrial engineers, and students from all around the world. The topics covered in this book also focus on innovative issues at international level by bringing together the experts from different countries.
This book presents link-layer cooperative frameworks to improve transmission reliability and network throughput of distributed TDMA MAC protocols in vehicular ad hoc networks (VANETs). The main objective of this book is to present link-layer node cooperation schemes to enhance the link-layer performance of vehicular networks, in terms of reliability and system throughput. The authors present approaches proposed for the medium access control (MAC) and node cooperation in VANETs. The authors also cover cooperative ADHOC MAC for point-to-point communication between a pair of source and destination nodes, and cooperative relay broadcasting for broadcast services in this book. The performance of node cooperation frameworks is evaluated via mathematical analysis and computer simulations, in comparison with distributed TDMA MAC protocols without cooperation. The proposed node cooperation frameworks enhance the performance of distributed TDMA MAC and make it more robust to tackle the dynamic networking conditions in VANETs. Furthermore, with cooperation enabled transmission, the performance of distributed TMDA MAC is more suitable to support the wide range of mobile applications and their strict service requirements which is discussed in this book. The proposed node cooperation schemes and distributed cooperation decisions can be extended to wireless systems other than distributed TDMA MAC, such as cellular communication, for vehicular communications introduced in this book. This book is useful for researchers from academia and industry, as well as advanced level students interested in vehicular communication networks. It is also useful for professionals and engineers developing applications that use cooperative wireless communication systems.
In his paper Theory of Communication [Gab46], D. Gabor proposed the use of a family of functions obtained from one Gaussian by time-and frequency shifts. Each of these is well concentrated in time and frequency; together they are meant to constitute a complete collection of building blocks into which more complicated time-depending functions can be decomposed. The application to communication proposed by Gabor was to send the coeffi cients of the decomposition into this family of a signal, rather than the signal itself. This remained a proposal-as far as I know there were no seri ous attempts to implement it for communication purposes in practice, and in fact, at the critical time-frequency density proposed originally, there is a mathematical obstruction; as was understood later, the family of shifted and modulated Gaussians spans the space of square integrable functions [BBGK71, Per71] (it even has one function to spare [BGZ75] . . . ) but it does not constitute what we now call a frame, leading to numerical insta bilities. The Balian-Low theorem (about which the reader can find more in some of the contributions in this book) and its extensions showed that a similar mishap occurs if the Gaussian is replaced by any other function that is "reasonably" smooth and localized. One is thus led naturally to considering a higher time-frequency density.
This book provides, for the first time, a single complete reference on microphone arrays. Top researchers in this field contributed articles addressing their specific topics of study. The results cover the current state of the art in microphone array research, development, and technological application. Part I concerns the problem of enhancing the speech signal acquired by an array of microphones. Part II is devoted to the source localization problem. Part III details some specific applications of microphone array technology available today. Part IV presents expert summaries of current open problems in the field, as well as personal views of what the future of microphone array processing might hold. The individual chapters selected for the book were designed to be tutorial in nature with a specific emphasis on recent important results. They are of utility to a large audience, from the student or practising engineer just approaching the field to the experienced researcher.
This proceedings volume presents selected papers from the 7th International Conference on Emerging Databases: Technologies, Applications, and Theory (EDB 2017), which was held in Busan, Korea from 7 to 9 August, 2017. This conference series was launched by the Korean Institute of Information Scientists and Engineers (KIISE) Database Society of Korea as an annual forum for exploring novel technologies, applications, and research advances in the field of emerging databases. This forum has evolved into the premier international venue for researchers and practitioners to discuss current research issues, challenges, new technologies, and solutions.
This is an edited collection by world-class experts, from diverse fields, focusing on integrating smart in-vehicle systems with human factors to enhance safety in automobiles. The book presents developments on road safety, in-vehicle technologies and state-of-the art systems. Includes coverage of DSP technologies in adaptive automobiles, algorithms and evaluation of in-car communication systems, driver-status monitoring and stress detection, in-vehicle dialogue systems and human-machine interfaces, challenges in video and audio processing for in-vehicle products, multi-sensor fusion for driver identification and vehicle to infrastructure wireless technologies.
This textbook presents a practical introduction to information security using the Competency Based Education (CBE) method of teaching. The content and ancillary assessment methods explicitly measure student progress in the three core categories: Knowledge, Skills, and Experience, giving students a balance between background knowledge, context, and skills they can put to work. Students will learn both the foundations and applications of information systems security; safeguarding from malicious attacks, threats, and vulnerabilities; auditing, testing, and monitoring; risk, response, and recovery; networks and telecommunications security; source code security; information security standards; and compliance laws. The book can be used in introductory courses in security (information, cyber, network or computer security), including classes that don't specifically use the CBE method, as instructors can adjust methods and ancillaries based on their own preferences. The book content is also aligned with the Cybersecurity Competency Model, proposed by department of homeland security. The author is an active member of The National Initiative for Cybersecurity Education (NICE), which is led by the National Institute of Standards and Technology (NIST). NICE is a partnership between government, academia, and the private sector focused on cybersecurity education, training, and workforce development.
Following on from "Optical Fiber Sensors", Volumes 1 and 2, this third volume discusses the significance and applications of recent fibre optic development, including: Fiber Bragg grating and its impact on the basis of sensing technology; optical fibre amplifiers and their emergence as an important optical source when configured as a laser and as a broadband photoluminescent device; and the developments of distributed sensing.
Lectori Salutem! This is another book - among the myriads - dealing with wireless communications. The reader might be aware: this topic is really among bestsellers in technology - bestsellers in technology itself and that in technical literature. Communications is one of the leading techniques in information society and mobile/wireless communications is one among the (maybe not more than two with optics the second) leading techniques in communications. Development of wireless communications was and is really spec- cular in the last decade of the 20th and first decade of the 21st century. Such topics as MIMO, wireless networking, security in the technological field, new business models in the service providing field, various applications in the users' side, to mention a few only, were undergoing an unprecedented evolution. So it is not surprising that the number of conferences and the number of books in this field grows and grows, in a nearly unbounded way.
The unprecedented growth in the range of multimedia services offered these days by modern telecommunication systems has been made possible only because of the advancements in signal processing technologies and algorithms. In the area of telecommunications, application of signal processing allows for new generations of systems to achieve performance close to theoretical limits, while in the area of multimedia, signal processing the underlying technology making possible realization of such applications that not so long ago were considered just a science fiction or were not even dreamed about. We all learnt to adopt those achievements very quickly, but often the research enabling their introduction takes many years and a lot of efforts. This book presents a group of invited contributions, some of which have been based on the papers presented at the International Symposium on DSP for Communication Systems held in Coolangatta on the Gold Coast, Australia, in December 2003. Part 1 of the book deals with applications of signal processing to transform what we hear or see to the form that is most suitable for transmission or storage for a future retrieval. The first three chapters in this part are devoted to processing of speech and other audio signals. The next two chapters consider image coding and compression, while the last chapter of this part describes classification of video sequences in the MPEG domain.
This book consists of a collection of works on utilizing the automatic identification technology provided by Radio Frequency Identification (RFID) to address the problems of global counterfeiting of goods. The book presents current research, directed to securing supply chains against the efforts of counterfeit operators, carried out at the Auto-ID Labs around the globe. It assumes very little knowledge on the part of the reader on Networked RFID systems as the material provided in the introduction familiarizes the reader with concepts, underlying principles and vulnerabilities of modern RFID systems.
This book is for designers and would-be designers of digital communication systems. The general approach of this book is to extract the common principles underlying a range of media and applications and present them in a unified framework. Digital Communication is relevant to the design of a variety of systems, including voice and video digital cellular telephone, digital CATV distribution, wireless LANs, digital subscriber loop, metallic Ethernet, voiceband data modems, and satellite communication systems. New in this Third Edition: New material on recent advances in wireless communications, error-control coding, and multi-user communications has been added. As a result, two new chapters have been added, one on the theory of MIMO channels, and the other on diversity techniques for mitigating fading. Error-control coding has been rewritten to reflect the current state of the art. Chapters 6 through 9 from the Second Edition have been reorganized and streamlined to highlight pulse-amplitude modulation, becoming the new Chapters 5 through 7. Readability is increased by relegating many of the more detailed derivations to appendices and exercise solutions, both of which are included in the book. Exercises, problems, and solutions have been revised and expanded. Three chapters from the previous edition have been moved to the booka (TM)s Web site to make room for new material. This book is ideal as a first-year graduate textbook, and is essential to many industry professionals. The book is attractive to both audiences through the inclusion of many practical examples and a practical flavor in the choice of topics. Digital Communicationhas a Web site at: http: //www.ece.gatech.edu/~barry/digital/, where the reader may find additional information from the Second Edition, other supplementary materials, useful links, a problem solutions manual, and errata.
This book explores some of the technological challenges in the application of digital communications technology in the home, including provision of fast, 'always on' internet connections. It looks at the ways consumers will use broadband access and what the key applications will be for provider and consumer. More broadly it aims to describe how communication to and within the home is evolving, and how people's lives are changing as they take advantage of the new technology and its applications. The expert contributors consider delivery mechanisms for broadband, connecting the home to external networks as well as connecting devices and applications within the home. They discuss how people use and relate to the technology, and how it should be developed to meet their evolving needs. Current applications are described and how new applications are being developed to take advantage of new digital technology. Finally two visionaries give their insights into aspects of the future for the home environment and how much it will be a digital home. This fascinating book provides balanced coverage of the issues surrounding this next phase of the development of communications and the Internet, which may transform our homes and the way we live. It will be of major interest to engineers and other professionals working in communications, IT, new technology and entertainment, as well as those active in research within a number of fields of technology.
The market for consumer electronics is characterized by rapidly growing complexities of applications and decreasing market window opportunities. A key concept for coping with such requirements is the reuse of system components. Embedding programmable processors into VLSI systems facilitates reuse and offers a high degree of flexibility. The use of embedded processors, however, poses challenges for software compilers, because real-time constraints and limited silicon area for program memories demand extremely efficient machine code. Additionally there is a need for flexible, retargetable compilers which explore the mutual dependence between processor architectures and program execution speed. Current compiler technology does not meet these demands, particularly the area of DSP where application-specific processors are predominant. As a consequence, the largest part of DSP software is still developed manually at assembly language level. Recent research efforts, located at the intersection of software and hardware design, aim at eliminating this bottleneck. Retargetable Code Generation for Digital Signal Processors outlines the new role of compilers in hardware/software codesign of embedded systems, and it describes the state-of-the-art in the area of retargetable code generation and optimization for embedded DSPs. It presents novel concepts and algorithmic solutions, which achieve both retargetability and high code quality. In contrast to approaches taken in classical compiler construction, emphasis is put on effective code optimization instead of high compilation speed. The usefulness of the proposed techniques is demonstrated for real-life architectures. Retargetable Code Generation forDigital Signal Processors, with a foreword by Peter Marwedel, is the first contribution to this area, that presents an integrated solution for retargetable DSP compilers. It covers the whole compilation process, including target processor modelling, intermediate code generation, code selection, register allocation, scheduling and optimization for parallelism. It will be of interest to researchers, senior design engineers and CAD managers both in academia and industry.
Every endeavour is covered by some fault, just as ?re is covered by smoke. Therefore one should not give up the work born of his nature, even if such work is full of fault. - The Bhagvad-Gita (18.48) This book is the outcome of the research and developmentcontributions of partners from three different continents, Asia, Europe, America, coming from universities, research centers, industrial partners and SMEs (Small and Medium Enterprise), all of them collaborating in MAGNET (My Adaptive Personal Global Net) and MAGNET Beyond project supported by European Commission within the Sixth Framework Programme (FP6). The project was focusing on a secure user-centric approach developingsecure Personal Networks in multi-network, multi-device, and multi-user environments. The innovative concept of Personal Network (PN), which was introduced and developed in MAGNET, ?nds in this book the ?rst con?rmation of the success that the future of wireless communications is bound to achieve. The importance of this book is not only related to being the ?rst work on PNs, it also gives an overview of operation of a big project, like MAGNET, and in fact the organisation of the book re?ects how then project itself has been structured
|
You may like...
Handbook of Research on Evolving Designs…
Kandarpa Kumar Sarma, Navajit Saikia, …
Hardcover
R9,802
Discovery Miles 98 020
Lewis-Sylvan Debate on Government…
T. P. 1872 Sylvan, David J. 1869-1952 Lewis
Hardcover
R682
Discovery Miles 6 820
|