![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > General
Optical WDM networking technology is spearheading a bandwidth revolution in the networking infrastructure being developed for the next generation Internet. Rapid advances in optical components have enabled the transition from point-to-point WDM links to all-optical networking. Optical WDM Networks: Principles and Practice presents some of the most important challenges facing the optical networking community, along with some suggested solutions. Earlier textbooks in optical networking have a narrower perspective, and rapidly advancing research has created the need for fresh and current information on problems and issues in the field. The volume editors and contributing authors have endeavoured to capture a substantial subset of the key problems and known solutions to these problems. All of the chapters are original contributions from leading international researchers. The chapters address a wide variety of topics, including the state of the art in WDM technology, physical components that make up WDM fiber-optic networks, medium access protocols, wavelength routed networks, optical access networks, network management, and performance evaluation of wavelength routing networks. The chapters also survey critical points in past research and tackle more recent problems. Practitioners and network product engineers interested in current state-of-the-art information beyond textbook-type coverage, and graduate students commencing research in this area, will appreciate the concise - and pertinent - information presented herein.
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-secure cryptosystem guarantees that the malicious third party cannot guess anything regarding the plain text or the key, even in the case of full access to the cipher text. Despite this advantage, there are only a few real-world implementations of perfect secrecy due to some well-known limitations. Any simple, straightforward modeling can pave the way for further advancements in the implementation, especially in environments with time and resource constraints such as IoT. This book takes one step towards this goal via presenting a hybrid combinatorial-Boolean model for perfectly-secure cryptography in IoT. In this book, we first present an introduction to information-theoretic cryptography as well as perfect secrecy and its real-world implementations. Then we take a systematic approach to highlight information-theoretic cryptography as a convergence point for existing trends in research on cryptography in IoT. Then we investigate combinatorial and Boolean cryptography and show how they are seen almost everywhere in the ecosystem and the life cycle of information-theoretic IoT cryptography. We finally model perfect secrecy in IoT using Boolean functions, and map the Boolean functions to simple, well-studied combinatorial designs like Latin squares. This book is organized in two parts. The first part studie s information-theoretic cryptography and the promise it holds for cryptography in IoT. The second part separately discusses combinatorial and Boolean cryptography, and then presents the hybrid combinatorial-Boolean model for perfect secrecy in IoT.
Routing in Opportunistic Networks focuses on the basics of opportunistic networks, modeling and communication in opportunistic networks, routing in opportunistic networks, and collaboration and cooperation in opportunistic networks. The editors will cover such topics as mobility characterization and discovery in opportunistic networks, scheduling and medium access control in opportunistic networks as well as testbed, tools, and measurements for opportunistic networks.
This book gathers the latest research findings on emerging trends in 5G and beyond wireless systems. The authors present and assess different enabling technologies, capabilities, and anticipated communications and computing solutions for 5G and beyond. Topics discussed include new frequency bands, new multiple antenna systems, massive D2D connectivity, new network deployment, and more. These discussions help the readers to understand more advanced research materials for developing new ideas to make a contribution in this field for themselves. This book aims to serve as a virtual and effective bridge between academic research in theory and engineering development in practice. Students, professional, and practitioners who seek to learn the latest development in wireless technologies should find interest in this book.
This book is the first systematic exposition on the emerging domain of wireless power transfer in ad hoc communication networks. It selectively spans a coherent, large spectrum of fundamental aspects of wireless power transfer, such as mobility management in the network, combined wireless power and information transfer, energy flow among network devices, joint activities with wireless power transfer (routing, data gathering and solar energy harvesting), and safety provisioning through electromagnetic radiation control, as well as fundamental and novel circuits and technologies enabling the wide application of wireless powering. Comprising a total of 27 chapters, contributed by leading experts, the content is organized into six thematic sections: technologies, communication, mobility, energy flow, joint operations, and electromagnetic radiation awareness. It will be valuable for researchers, engineers, educators, and students, and it may also be used as a supplement to academic courses on algorithmic applications, wireless protocols, distributed computing, and networking.
Ethics and Human Behaviour in ICT Development discusses ethics in a professional context and encourages readers to self-assessment of their own behaviour. It provides thought-provoking accounts of the little-known early history of technological development in information and communication technology (ICT) and the automation industry in Poland, with a focus on Wroclaw. The book provides a framework for understanding the relationship between ethics and behaviour, and analyses critically ethical and behavioural issues in challenging workplaces and social contexts. It includes: case studies from around the world, especially Poland, which illustrate the relationships between human behaviour and ethics; biographies of successful Polish ICT and automation leading designers; analysis of case studies of human behaviour and ethics in challenging industrial development and other environments; and illustrative practical applications alongside the theory of human behaviour and ethics. The authors demonstrate the ingenuity of the early Polish designers, programmers and other specialists in overcoming the shortage of components caused by import embargoes to enable Poland to develop its own computer industry. An example of this is Elwro, formerly the largest manufacturer of computers in Poland. The discussion of its growth illustrates the potential of human creativity to overcome problems. The discussion of its fall highlights the importance of ethical approaches to technology transfer and the dangers of a colonialist mentality. The book is designed for engineers, computer scientists, researchers and professionals alike, as well as being of interest for those broadly concerned with ethics and human behaviour.
This textbook discusses the principles of queuing theory and teletraffic engineering in telecommunication networks. The book lays out the rigorous theoretical background while keeping strong links to practical applications and real-life scenarios. The overall goal of this textbook is to provide students with in-depth and broad understanding of the operational framework of teletraffic problems, and therefore the capability to select the most suitable and effective method to solve traffic engineering problems that may arise in real-life. The student will learn to pick and choose from a spectrum of tools, ranging from the simplest mathematical treatment to sophisticated models. The book features practical examples derived from real life, presented and discussed, establishing the links with the theoretical results. Pedagogical materials include end-of-chapter exercises and problems.
ThisvolumeispublishedastheproceedingsoftheRussian-GermanAdvanced Research workshop on Computational Science and High Performance C- puting in Novosibirsk Academgorodok in September 2003. The contributions of these proceedings were provided and edited by the authors, chosen after a careful selection and reviewing. The workshop was organized by the Institute of Computational Techno- gies SB RAS (Novosibirsk, Russia) and the High Performance Computing Center Stuttgart (Stuttgart, Germany). The objective was the discussion of the latest results in computational science and to develop a close coope- tion between Russian and German specialists in the above-mentioned ?eld. The main directions of the workshop are associated with the problems of computational hydrodynamics, application of mathematical methods to the development of new generation of materials, environment protection pr- lems, development of algorithms, software and hardware support for hi- performance computation, and designing modern facilities for visualization of computational modelling results. The importance of the workshop topics was con?rmed by the partici- tion of representatives of major research organizations engaged in the so- tion of the most complex problems of mathematical modelling, development of new algorithms, programs and key elements of new information techno- gies. Among the Russian participants were researchers of the Institutes of the Siberian Branch of the Russian Academy of Sciences: Institute of Com- tational Technologies, Institute of Computational Mathematics and Mat- matical Geophysics, Institute of Computational Modelling, Russian Federal Nuclear Center, All-Russian Research Institute of Experimental Physics, - merovo State University.
This book investigates processes for the prototyping of user interfaces for mobile apps, and describes the development of new concepts and tools that can improve the prototype driven app development in the early stages. It presents the development and evaluation of a new requirements catalogue for prototyping mobile app tools that identifies the most important criteria such tools should meet at different prototype-development stages. This catalogue is not just a good point of orientation for designing new prototyping approaches, but also provides a set of metrics for a comparing the performance of alternative prototyping tools. In addition, the book discusses the development of Blended Prototyping, a new approach for prototyping user interfaces for mobile applications in the early and middle development stages, and presents the results of an evaluation of its performance, showing that it provides a tool for teamwork-oriented, creative prototyping of mobile apps in the early design stages.
Learn about the latest developments in automotive Ethernet technology and implementation with this fully revised second edition. Including approximately twenty-five percent new material and greater technical detail, coverage is expanded to include: * Detailed explanations of how the 100BASE-T1 PHY and 1000 BASE-T1 PHY technologies actually work * A step-by-step description of how the 1000BASE-T1 channel was derived * A summary of the content and uses of the new TSN standards * A framework for security in Automotive Ethernet * Discussion of the interrelation between power supply and automotive Ethernet communication Industry pioneers share the technical and non-technical decisions that have led to the success of automotive Ethernet, covering everything from electromagnetic requirements and physical layer technologies, Quality of Service, the use of VLANs, IP and Service Discovery, and network architecture and testing. This is a guide for engineers, technical managers and researchers designing components for in-car electronics, and those interested in the strategy of introducing a new technology.
The Finite-Difference Time-domain (FDTD) method allows you to
compute electromagnetic interaction for complex problem geometries
with ease. The simplicity of the approach coupled with its
far-reaching usefulness, create the powerful, popular method
presented in The Finite Difference Time Domain Method for
Electromagnetics. This volume offers timeless applications and
formulations you can use to treat virtually any material type and
geometry.
This resource addresses the complicated modulation schemes and higher frequencies required of today's wireless communications circuits. Covering cutting-edge developments in mixer circuits, frequency synthesizers, amplifier design, noise, and the future of wireless communication, it helps you design applications for digital cellular telephony, wireless LANs, PCS, GaAs and high-speed silicon bipolar IC technology, and low-power RF circuit technology.
Brain and Behavior Computing offers insights into the functions of the human brain. This book provides an emphasis on brain and behavior computing with different modalities available such as signal processing, image processing, data sciences, statistics further it includes fundamental, mathematical model, algorithms, case studies, and future research scopes. It further illustrates brain signal sources and how the brain signal can process, manipulate, and transform in different domains allowing researchers and professionals to extract information about the physiological condition of the brain. Emphasizes real challenges in brain signal processing for a variety of applications for analysis, classification, and clustering. Discusses data sciences and its applications in brain computing visualization. Covers all the most recent tools for analysing the brain and it's working. Describes brain modeling and all possible machine learning methods and their uses. Augments the use of data mining and machine learning to brain computer interface (BCI) devices. Includes case studies and actual simulation examples. This book is aimed at researchers, professionals, and graduate students in image processing and computer vision, biomedical engineering, signal processing, and brain and behavior computing.
Gaussian linear modelling cannot address current signal processing demands. In moderncontexts, suchasIndependentComponentAnalysis(ICA), progresshasbeen made speci?cally by imposing non-Gaussian and/or non-linear assumptions. Hence, standard Wiener and Kalman theories no longer enjoy their traditional hegemony in the ?eld, revealing the standard computational engines for these problems. In their place, diverse principles have been explored, leading to a consequent diversity in the implied computational algorithms. The traditional on-line and data-intensive pre- cupations of signal processing continue to demand that these algorithms be tractable. Increasingly, full probability modelling (the so-called Bayesian approach)-or partial probability modelling using the likelihood function-is the pathway for - sign of these algorithms. However, the results are often intractable, and so the area of distributional approximation is of increasing relevance in signal processing. The Expectation-Maximization (EM) algorithm and Laplace approximation, for ex- ple, are standard approaches to handling dif?cult models, but these approximations (certainty equivalence, and Gaussian, respectively) are often too drastic to handle the high-dimensional, multi-modal and/or strongly correlated problems that are - countered. Since the 1990s, stochastic simulation methods have come to dominate Bayesian signal processing. Markov Chain Monte Carlo (MCMC) sampling, and - lated methods, are appreciated for their ability to simulate possibly high-dimensional distributions to arbitrary levels of accuracy. More recently, the particle ?ltering - proach has addressed on-line stochastic simulation. Nevertheless, the wider acce- ability of these methods-and, to some extent, Bayesian signal processing itself- has been undermined by the large computational demands they typically mak
This book presents the practical motivation, theoretical description, and extant techniques for traffic grooming in optical networks. The description of the various topics of research will be authored by leading researchers in this area, and will contain comprehensive description of related literature for each area. This book is intended to be a definitive reference and text for traffic grooming both for the practitioner in industry and the student in academia.
This book presents the proceedings of the 5th International Conference on Signal Processing and Information Communications (ICSPIC)), which was held in Paris, France on March 14-16, 2022. The conference solicits papers on all aspects of signal processing and information communications, which includes mixed signal processing, multimedia signal processing, nonlinear signal processing, communication theory and techniques, optical communications, and wireless networks. The conference is made up of theorists and experts in advanced characterization techniques in the fields of signal processing and information communications, which brings researchers, practitioners, and scientists in discussion of the latest methods, research developments, and future opportunities.
Hadamard Matrix Analysis and Synthesis: With Applications to Communications and Signal/Image Processing presents the basic concepts of Sylvester's construction of Hadamard matrices, the eigenvalue-eigenvector decompositions, along with its relationship to Fourier transforms. Relevant computational structures are included for those interested in implementing the Hadamard transform. The 2-dimensional Hadamard transform is discussed in terms of a 1- dimensional transform. The applications presented touch on statistics, error correction coding theory, communications signaling, Boolean function analysis and synthesis, image processing, sequence theory (maximal length binary sequences, composite sequences, and Thue-Morse sequences) and signal representation. An interesting application of the Hadamard transform to images is the Naturalness Preserving Transform (NPT), which is presented. The NPT provides a way to encode an image that can be reconstructed when it is transmitted through a noisy or an unfriendly channel. The potential applications of the Hadamard transform are wide and the book samples many of the important concepts among a vast field of applications of the transform. Hadamard Matrix Analysis and Synthesis: With Applications to Communications and Signal/Image Processing serves as an excellent reference source and may be used as a text for advanced courses on the topic.
This book focuses on the stabilization and model predictive control of interconnected systems with mixed connection configurations. It introduces the concept of dissipation-based quadratic constraint for developing attractivity assurance methods for interconnected systems. In order to develop these methods, distributed and decentralized architectures are employed, whereby the communication between subsystems is fully connected, partially connected, or completely disconnected. Given that the control inputs are entirely or partially decoupled between subsystems and no additional constraints are imposed on the interactive variables beyond the coupling constraint itself, the proposed approaches can be used with various types of systems and applications. Further, the book describes how the effects of coupling delays and data losses in device networks are resolved. From a practical perspective, the innovations presented are of benefit in applications in a broad range of fields, including the process and manufacturing industries, networked robotics, and network-centric systems such as chemical process systems, power systems, telecommunication networks, transportation networks, and, no less importantly, supply chain automation.
Cryptographic Engineering is the first book that discusses the design techniques and methods. The material of this book is scattered in journal and conference articles, and authors lecture notes. This is a first attempt by top cryptographic engineers to bring this material in a book form and make it available to electrical engineering and computer science students and engineers working for the industry. This book is intended for a graduate-level course in Cryptographic Engineering to be taught in Electrical Engineering, Computer Engineering, and Computer Science departments. Students will have to have the knowledge of basic cryptographic algorithms before taking this course which will teach them how to design cryptographic hardware (FPGA, ASIC, custom) and embedded software to be used in secure systems. Additionally, engineers working in the industry will be interested in this book to learn how to design cryptographic chips and embedded software. Engineers working on the design of cellular phones, mobile computing and sensor systems, web and enterprise security systems which rely upon cryptographic hardware and software will be interested in this book. Essential and advanced design techniques for cryptography will be covered by this book."
Error Coding for Engineers provides a useful tool for practicing engineers, students, and researchers, focusing on the applied rather than the theoretical. It describes the processes involved in coding messages in such a way that, if errors occur during transmission or storage, they are detected and, if necessary, corrected. Very little knowledge beyond a basic understanding of binary manipulation and Boolean algebra is assumed, making the subject accessible to a broad readership including non-specialists. The approach is tutorial: numerous examples, illustrations, and tables are included, along with over 30 pages of hands-on exercises and solutions. Error coding is essential in many modern engineering applications. Engineers involved in communications design, DSP-based applications, IC design, protocol design, storage solutions, and memory product design are among those who will find the book to be a valuable reference. Error Coding for Engineers is also suitable as a text for basic and advanced university courses in communications and engineering.
Co-published with Oxford University Press. A volume in the "IEEE Press/OUP Electromagnetic Wave Series." Gain a thorough understanding of one of the most important simulation tools in computational electromagnetics with this comprehensive introduction to the TLM method. Written by one of the foremost researchers in the TLM method, this book covers the entire area of electromagnetics from the basic principles to advanced formulations and applications and including microwaves, antennas, RCS, electromagnetic compatibility, and electromagnetic heating, while providing a clear explanation of modeling principles from lumped components through 1, 2 and 3 dimensional complex systems.
Here's the first complete reference available on all of the modern reflector antenna analysis and design techniques. This book demystifies modern reflector antenna analysis by proceeding from the early numerical integration approaches to today's powerful techniques, such as the Jacobi-Bessel and Fourier-Bessel Methods. |
You may like...
Renegades - Born In The USA
Barack Obama, Bruce Springsteen
Hardcover
(1)
|