![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > General
This issue of Trends in Communication will inspire researchers to take up the matter of convergence as a topic for research. We are entering a world--literally--without technical borders, and we need to adapt our markets as well as our economic and political institutions to that world. Whereas the scientific community has the luxury of being able to sit back and contemplate the issue from every possible angle, bureaucrats, legislators, and regulators are already working out the solutions to practical problems. This issue will hopefully also inform them about convergence and its problems.
Industry 4.0 refers to automation and data exchange in manufacturing technologies. From innovative research, challenges, solutions and strategies to real-world case studies, the aim of this edited book is to focus on the nine pillars of technology that are supporting the transition to Industry 4.0 and smart manufacturing. The nine pillars include the internet of things, cloud computing, autonomous and robotics systems, big data analytics, augmented reality, cyber security, simulation, system integration, and additive manufacturing. A key role is played by the industrial IoTs and state-of-the-art technologies such as fog and edge computing, advanced data analytics, innovative data exchange models, artificial intelligence, machine learning, mobile and network technologies, robotics and sensors. This book is a useful resource for an audience of academic and industry researchers and engineers, as well as advanced students in the fields of information and communication technologies, robotics and automation, big data analytics and data mining, machine learning, artificial intelligence, AR/VR/ER, cybersecurity, cyber physical systems, sensing and robotics with a focus on Industry 4.0, and smart manufacturing.
In this special issue of Trends in Communication management scholars share their ideas and research findings about the use of the community concept in the areas of knowledge management, organizational learning, innovation, and virtual learning. This fine collection of "community of practice" papers shows a variety of perspectives and applications on a new organizational phenomenon.
This book gathers outstanding research papers presented at the International Joint Conference on Computational Intelligence (IJCCI 2019), held at the University of Liberal Arts Bangladesh (ULAB), Dhaka, on 25-26 October 2019 and jointly organized by the University of Liberal Arts Bangladesh (ULAB), Bangladesh; Jahangirnagar University (JU), Bangladesh; and South Asian University (SAU), India. These proceedings present novel contributions in the areas of computational intelligence, and offer valuable reference material for advanced research. The topics covered include collective intelligence, soft computing, optimization, cloud computing, machine learning, intelligent software, robotics, data science, data security, big data analytics, and signal and natural language processing.
This book covers selected topics and methods for peripheral security, which are gaining attention nowadays. The book discusses the security arrangement and methods for monitoring the inside/outside entry of peripheral areas that need to be secured. It relates to a periphery, often portable device (as well as the methods employed, and systems including such a peripheral device and a host central command device with which the local geographical command device communicates), enabling one or more security operations performed by the peripheral device. It also covers the security scenario of snow-prone areas in a remote location. It also elaborates how we can secure the person and devices in extremely cold conditions and rescue them. This book helps the researchers, academicians, and industry persons working in security areas to protect unauthentic entry in large scale areas that may be defense camps or civilian applications like large-sized bungalows, institutes, and organizations of national importance. The experimental results are in close conformance to the proposed methodologies.
This book gathers the latest research findings on emerging trends in 5G and beyond wireless systems. The authors present and assess different enabling technologies, capabilities, and anticipated communications and computing solutions for 5G and beyond. Topics discussed include new frequency bands, new multiple antenna systems, massive D2D connectivity, new network deployment, and more. These discussions help the readers to understand more advanced research materials for developing new ideas to make a contribution in this field for themselves. This book aims to serve as a virtual and effective bridge between academic research in theory and engineering development in practice. Students, professional, and practitioners who seek to learn the latest development in wireless technologies should find interest in this book.
The use of neural networks is permeating every area of signal processing. They can provide powerful means for solving many problems, especially in nonlinear, real-time, adaptive, and blind signal processing. The Handbook of Neural Network Signal Processing brings together applications that were previously scattered among various publications to provide an up-to-date, detailed treatment of the subject from an engineering point of view.
This work addresses stealthy peripheral-based attacks on host computers and presents a new approach to detecting them. Peripherals can be regarded as separate systems that have a dedicated processor and dedicated runtime memory to handle their tasks. The book addresses the problem that peripherals generally communicate with the host via the host's main memory, storing cryptographic keys, passwords, opened files and other sensitive data in the process - an aspect attackers are quick to exploit. Here, stealthy malicious software based on isolated micro-controllers is implemented to conduct an attack analysis, the results of which provide the basis for developing a novel runtime detector. The detector reveals stealthy peripheral-based attacks on the host's main memory by exploiting certain hardware properties, while a permanent and resource-efficient measurement strategy ensures that the detector is also capable of detecting transient attacks, which can otherwise succeed when the applied strategy only measures intermittently. Attackers exploit this strategy by attacking the system in between two measurements and erasing all traces of the attack before the system is measured again.
Perfectly-secure cryptography is a branch of information-theoretic cryptography. A perfectly-secure cryptosystem guarantees that the malicious third party cannot guess anything regarding the plain text or the key, even in the case of full access to the cipher text. Despite this advantage, there are only a few real-world implementations of perfect secrecy due to some well-known limitations. Any simple, straightforward modeling can pave the way for further advancements in the implementation, especially in environments with time and resource constraints such as IoT. This book takes one step towards this goal via presenting a hybrid combinatorial-Boolean model for perfectly-secure cryptography in IoT. In this book, we first present an introduction to information-theoretic cryptography as well as perfect secrecy and its real-world implementations. Then we take a systematic approach to highlight information-theoretic cryptography as a convergence point for existing trends in research on cryptography in IoT. Then we investigate combinatorial and Boolean cryptography and show how they are seen almost everywhere in the ecosystem and the life cycle of information-theoretic IoT cryptography. We finally model perfect secrecy in IoT using Boolean functions, and map the Boolean functions to simple, well-studied combinatorial designs like Latin squares. This book is organized in two parts. The first part studie s information-theoretic cryptography and the promise it holds for cryptography in IoT. The second part separately discusses combinatorial and Boolean cryptography, and then presents the hybrid combinatorial-Boolean model for perfect secrecy in IoT.
The objective of this book is to advance the current knowledge of sensor research particularly highlighting recent advances, current work, and future needs. The goal is to share current technologies and steer future efforts in directions that will benefit the majority of researchers and practitioners working in this broad field of study.
Radio Design in Nanometer Technologies addresses current trends and future directions in radio design for wireless applications. As radio transceivers constitute the major bottleneck in a wireless chipset in terms of power consumption and die size, the radio must be designed in the context of the entire system, end to end. Therefore the book will address wireless systems as well as the DSP parts before it gets into coverage of radio design issues. To that end, the book contains three parts: Part 1: a general part discussing current and future wireless networks, chipset evolution over the past decade and ending with a discussion on radio requirements for software defined radio(SDR). Part 2: will focus on the digital baseband of a wireless chip set, flexible DSP cores for multi-standard wireless platforms and system-on-chip SoC implementation and design flow issues. Part 3: will be devoted to radio design issues starting at the transceiver level and going down to discuss critical issues facing design of future multi band multi standard radios for emerging wireless standards such as UMTS, WiMaX, MIMO and WLAN in a way that is consistent with the prevailing vision of SDR. As such, the book is the first volume that looks at the integrated radio design problem as a "piece of a big puzzle," namely the entire chipset or single chip that builds an entire wireless system. This is the only way to successfully design radios to meet the stringent demands of todaya (TM)s increasingly complex wireless systems.
This book presents the trends, challenges, and advances in Internet of Things (IoT) in the areas of industrial management and industrial engineering. The authors look at how smart environments (smart city, smart university, smart regions, smart transportation, etc.) affect the way industrial management and industrial engineering are envisioned, planned, and applied and how engineers must incorporate new ideas and methods now and in the future. Some topics include the impact of ICT on the emergency response vehicle driving time, car accident detecting systems based on machine learning algorithms, smart city platforms based on citizen reporting services, and IoT-based household energy consumption prediction using machine learning. The book brings together contributions from academics and practitioners from around the world to discuss the intersection of IoT, industry and management.
The new edition of this popular professional book on artificial intelligence (ML) and machine learning (ML) has been revised for classroom or training use. The new edition provides comprehensive coverage of combined AI and ML theory and applications. Rather than looking at the field from only a theoretical or only a practical perspective, this book unifies both perspectives to give holistic understanding. The first part introduces the concepts of AI and ML and their origin and current state. The second and third parts delve into conceptual and theoretic aspects of static and dynamic ML techniques. The fourth part describes the practical applications where presented techniques can be applied. The fifth part introduces the user to some of the implementation strategies for solving real life ML problems. Each chapter is accompanied with a set of exercises that will help the reader / student to apply the learnings from the chapter to a real-life problem. Completion of these exercises will help the reader / student to solidify the concepts learned. The book is appropriate for students in graduate and upper undergraduate courses in addition to researchers and professionals. It makes minimal use of mathematics to make the topics more intuitive and accessible. The book covers a large gamut of topics in the area of AI and ML and a professor can tailor a course on AI / ML based on the book by selecting and re-organizing the sequence of chapters to suit the needs.
China Satellite Navigation Conference (CSNC 2020) Proceedings presents selected research papers from CSNC 2020 held during 22nd-25th November in Chengdu, China. These papers discuss the technologies and applications of the Global Navigation Satellite System (GNSS), and the latest progress made in the China BeiDou System (BDS) especially. They are divided into 13 topics to match the corresponding sessions in CSNC2020, which broadly covered key topics in GNSS. Readers can learn about the BDS and keep abreast of the latest advances in GNSS techniques and applications.
The industry's #1 wiring reference, fully updated for the latest NEC wiring standards! The #1 single-source resource for wiring professionals has just been updated to reflect the latest media, wiring schemes, products, and techniques -- plus critical new safety and fire requirements from the latest National Fire Code (NEC)." Telecommunications Wiring, Third Edition" offers the industry's most coherent, end-to-end approach to designing and implementing cabling systems. It delivers every skill you need, across the entire system lifecycle: planning, selecting media, defining architectures, creating successful RFPs, choosing vendors, installation, testing, documentation, and maintenance. Coverage includes:
Whether you're a telecom/datacom manager, wiring specialist, technician, consultant, contractor, orinstructor, you can depend upon "Telecommunications Wiring, Third Edition" -- today, tomorrow, and for years to come.
In 1995, James D. Taylor's Introduction to Ultra-Wideband Radar Systems introduced engineers to the theory behind a promising new concept for remote sensing. Since then, the field has undergone enormous growth with new applications realized and more applications conceptualized at a remarkable pace. However, understanding ultra-wideband (UWB) radar requires a new philosophical approach. Concepts such as radar cross section will have new meanings as range resolution becomes smaller than the target.
This book includes a general overview of the book series and summarizes the research results in its 13 subtopics. It systematically elaborates on how the construction and promotion of intelligent cities with Chinese characteristics could be implemented in the course of intelligent urbanization in China. Furthermore, it presents a variety of literature on urban management innovation and development, making it a valuable reference source on both the theoretic and empirical development of the new urbanization in China for intelligent-city decision-makers, c-level directors and officials in urban economy, social and environment departments and institutions all over the world.
Network monitoring serves as the basis for a wide scope of network, engineering and management operations. Precise network monitoring involves inspecting every packet traversing in a network. However, this is not feasible with future high-speed networks, due to significant overheads of processing, storing, and transferring measured data. Network Monitoring in High Speed Networks presents accurate measurement schemes from both traffic and performance perspectives, and introduces adaptive sampling techniques for various granularities of traffic measurement. The techniques allow monitoring systems to control the accuracy of estimations, and adapt sampling probability dynamically according to traffic conditions. The issues surrounding network delays for practical performance monitoring are discussed in the second part of this book. Case studies based on real operational network traces are provided throughout this book. Network Monitoring in High Speed Networks is designed as a secondary text or reference book for advanced-level students and researchers concentrating on computer science and electrical engineering. Professionals working within the networking industry will also find this book useful.
This book intends to change the perception of modern day telecommunications. Communication systems, usually perceived as "dumb pipes", carrying information / data from one point to another, are evolved into intelligently communicating smart systems. The book introduces a new field of cloud communications. The concept, theory, and architecture of this new field of cloud communications are discussed. The book lays down nine design postulates that form the basis of the development of a first of its kind cloud communication paradigm entitled Green Symbiotic Cloud Communications or GSCC. The proposed design postulates are formulated in a generic way to form the backbone for development of systems and technologies of the future. The book can be used to develop courses that serve as an essential part of graduate curriculum in computer science and electrical engineering. Such courses can be independent or part of high-level research courses. The book will also be of interest to a wide range of readers including both scientific and non-scientific domains as it discusses innovations from a simplistic explanatory viewpoint.
Linear signal spaces are of fundamental importance in signal and system theory, communication theory, and modern signal processing. This book proposes a time-frequency analysis of linear signal spaces that is based on two novel time-frequency representations called the `Wigner distribution of a linear signal space' and the `ambiguity function of a linear signal space'. Besides being a useful display and analysis tool, the Wigner distribution of a linear signal space allows the design of high-resolution time-frequency filtering methods. This book develops such methods and applies them to the enhancement, decomposition, estimation, and detection of noisy deterministic and stochastic signals. Formulation of the filtering (estimation, detection) methods in the time-frequency plane yields a direct interpretation of the effect of adding or deleting information, changing parameters, etc. In a sense, the prior information and the signal processing tasks are brought to life in the time-frequency plane. The ambiguity function of a linear signal space, on the other hand, is closely related to a novel maximum-likelihood multipulse estimator of the range and Doppler shift of a slowly fluctuating point target - an estimation problem that is important in radar and sonar. Specifically, the ambiguity function of a linear signal space is relevant to the problem of optimally designing a set of radar pulses. The concepts and methods presented are amply illustrated by examples and pictures. Time-Frequency Analysis and Synthesis of Linear Signal Spaces: Time-Frequency Filters, Signal Detection and Estimation, and Range-Doppler Estimation is an excellent reference and may be used as a text for advanced courses covering the subject.
Integrated Silicon Optoelectronics synthesizes topics from optoelectronics and microelectronics. The book concentrates on silicon as the major base of modern semiconductor devices and circuits. Starting from the basics of optical emission and absorption, as well as from the device physics of photodetectors, the aspects of the integration of photodetectors in modern bipolar, CMOS, and BiCMOS technologies are discussed. Detailed descriptions of fabrication technologies and applications of optoelectronic integrated circuits are included. The book, furthermore, contains a review of the newest state of research on eagerly anticipated silicon light emitters. In order to cover the topics comprehensively, also included are integrated waveguides, gratings, and optoelectronic power devices. Numerous elaborate illustrations facilitate and enhance comprehension. This extended edition will be of value to engineers, physicists, and scientists in industry and at universities. The book is also recommended to graduate students specializing on microelectronics or optoelectronics. |
![]() ![]() You may like...
Introduction To Communication Studies
George Angelopulo, Elizabeth Lubinga
Paperback
R458
Discovery Miles 4 580
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, …
Paperback
R1,540
Discovery Miles 15 400
Digital Methods and Tools to Support…
Pradeep Kumar Ray, Siaw-Teng Liaw, …
Hardcover
Machine Learning for Future Fiber-Optic…
Alan Pak Tao Lau, Faisal Nadeem Khan
Paperback
R2,866
Discovery Miles 28 660
|