![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > General
The parameter estimation and hypothesis testing are the basic tools in statistical inference. These techniques occur in many applications of data processing., and methods of Monte Carlo have become an essential tool to assess performance. For pedagogical purposes the book includes several computational problems and exercices. To prevent students from getting stuck on exercises, detailed corrections are provided.
This book introduces readers to the algorithm of Compass & GPS dual-system software receivers, and to the software implementation. It provides detailed descriptions of key theories in the fields of signal processing, communication, control, and signal estimation. The book is based on the author's extensive experience in GNSS receiver design. The MATLAB script developed for this book demonstrates most of the key theories and equips the reader with excellent tools for practicing them.
The Algorithms such as SVD, Eigen decomposition, Gaussian Mixture Model, HMM etc. are scattered in different fields. There is the need to collect all such algorithms for quick reference. Also there is the need to view such algorithms in application point of view. Algorithm Collections for Digital Signal Processing Applications using MATLAB attempts to satisfy the above requirement. Also the algorithms are made clear using MATLAB programs.
This textbook covers security controls and management. It is for courses in cyber security education that follow National Initiative for Cybersecurity Education (NICE) work roles and framework that adopt the Competency-Based Education (CBE) method. The book follows the CBE general framework, meaning each chapter contains three sections, knowledge and questions, and skills/labs for skills and sbilities. The author makes an explicit balance between knowledge and skills material in information security, giving readers immediate applicable skills. The book is divided into several parts, including: Information Assurance / Encryption; Information Systems Security Management; Information Systems / Network Security; Information Technology Management; IT Management; and IT Risk Management.
The book is a comprehensive treatment of the field, covering fundamental theoretical principles and new technological advancements, state-of-the-art device design, and reviewing examples encompassing a wide range of related sub-areas. In particular, the first area focuses on the recent development of novel wearable and implantable antenna concepts and designs including metamaterial-based wearable antennas, microwave circuit integrated wearable filtering antennas, and textile and/or fabric material enabled wearable antennas. The second set of topics covers advanced wireless propagation and the associated statistical models for on-body, in-body, and off-body modes. Other sub-areas such as efficient numerical human body modeling techniques, artificial phantom synthesis and fabrication, as well as low-power RF integrated circuits and related sensor technology are also discussed. These topics have been carefully selected for their transformational impact on the next generation of body-area network systems and beyond.
This book discusses the application of data systems and data-driven infrastructure in existing industrial systems in order to optimize workflow, utilize hidden potential, and make existing systems free from vulnerabilities. The book discusses application of data in the health sector, public transportation, the financial institutions, and in battling natural disasters, among others. Topics include real-time applications in the current big data perspective; improving security in IoT devices; data backup techniques for systems; artificial intelligence-based outlier prediction; machine learning in OpenFlow Network; and application of deep learning in blockchain enabled applications. This book is intended for a variety of readers from professional industries, organizations, and students.
This book provides readers with a comprehensive and recent exposition in deep learning and its multidisciplinary applications, with a concentration on advances of deep learning architectures. The book discusses various artificial intelligence (AI) techniques based on deep learning architecture with applications in natural language processing, semantic knowledge, forecasting and many more. The authors shed light on various applications that can benefit from the use of deep learning in pattern recognition, person re-identification in surveillance videos, action recognition in videos, image and video captioning. The book also highlights how deep learning concepts can be interwoven with more modern concepts to yield applications in multidisciplinary fields. Presents a comprehensive look at deep learning and its multidisciplinary applications, concentrating on advances of deep learning architectures; Includes a survey of deep learning problems and solutions, identifying the main open issues, innovations and latest technologies; Shows industrial deep learning in practice with examples/cases, efforts, challenges, and strategic approaches.
The book consists of high-quality papers presented at the International Conference on Computational Science and Applications (ICCSA 2019), held at Maharashtra Institute of Technology World Peace University, Pune, India, from 7 to 9 August 2019. It covers the latest innovations and developments in information and communication technology, discussing topics such as soft computing and intelligent systems, web of sensor networks, drone operating systems, web of sensor networks, wearable smart sensors, automated guided vehicles and many more.
This book addresses privacy in dynamical systems, with applications to smart metering, traffic estimation, and building management. In the first part, the book explores statistical methods for privacy preservation from the areas of differential privacy and information-theoretic privacy (e.g., using privacy metrics motivated by mutual information, relative entropy, and Fisher information) with provable guarantees. In the second part, it investigates the use of homomorphic encryption for the implementation of control laws over encrypted numbers to support the development of fully secure remote estimation and control. Chiefly intended for graduate students and researchers, the book provides an essential overview of the latest developments in privacy-aware design for dynamical systems.
This book discusses recent research and applications in intelligent service computing in mobile environments. The authors first explain how advances in artificial intelligence and big data have allowed for an array of intelligent services with complex and diverse applications. They then show how this brings new opportunities and challenges for service computing. The book, made up of contributions from academic and industry, aims to present advances in intelligent services, new algorithms and techniques in the field, foundational theory and systems, as well as practical real-life applications. Some of the topics discussed include cognition, modeling, description and verification for intelligent services; discovery, recommendation and selection for intelligent services; formal verification, testing and inspection for intelligent services; and composition and cooperation methods for intelligent services.
This revised textbook presents updated material on its core content: an end-to-end IoT architecture that is comprised of devices, network, compute, storage, platform, applications along with management and security components. As with the second edition, it is organized into six main parts: an IoT reference model; fog computing and the drivers; IoT management and applications; smart services in IoT; IoT standards; and case studies. This edition's features include overhaul of the IoT Protocols (Chapter 5) to include an expanded treatment of low-power wide area networks including narrow band IoT (NB-IoT) protocol, updated IoT platforms and capabilities (Chapter 7) to include comparison of commercially available platforms (e.g. AWS IoT Platform, Google Cloud IoT Platform, Microsoft Azure IoT Platform, and PTC ThinkWorx), updated security (Chapter 8) to include approaches for securing IoT devices with examples of IoT devices used in security attacks and associated solutions including MUD and DICE, and finally new Appendix B to include six IoT project detailed for students.
Systems Management is emerging as the predominant area for computer science in the enterprise, with studies showing that the bulk (up to 80%) of an enterprise IT budget is spent on management/operational issues and is the largest piece of the expenditure. This textbook provides an overview of the field of computer systems and network management. Systems management courses are being taught in different graduate and undergraduate computer science programs, but there are no good books with a comprehensive overview of the subject. This text book will provide content appropriate for either an undergraduate course (junior or senior year) or a graduate course in systems management.
This book provides a comprehensive view of cyber operations, analysis and targeting, including operational examples viewed through a lens of conceptual models available in current technical and policy literature. Readers will gain a better understanding of how the current cyber environment developed, as well as how to describe it for future defense. The author describes cyber analysis first as a conceptual model, based on well-known operations that span from media to suspected critical infrastructure threats. He then treats the topic as an analytical problem, approached through subject matter interviews, case studies and modeled examples that provide the reader with a framework for the problem, developing metrics and proposing realistic courses of action. Provides first book to offer comprehensive coverage of cyber operations, analysis and targeting; Pulls together the various threads that make up current cyber issues, including information operations to confidentiality, integrity and availability attacks; Uses a graphical, model based, approach to describe as a coherent whole the development of cyber operations policy and leverage frameworks; Provides a method for contextualizing and understanding cyber operations.
This book presents a technical solution to ensuring the noise immunity of navigation systems in civil aviation aircrafts at the stages of their terminal procedures. It highlights instrumental precision approaches to landing and landing in automatic mode using satellite and inertial radio navigation systems and ground-based augmentation used as the primary means, in accordance with the ICAO requirements. The book is intended for engineering and technical specialists engaged in the development, manufacture and operation of on-board radio electronic systems of aircrafts and ground-based radio engineering support for flights, as well as graduate students and senior students of radio engineering specialties. It is also useful for professionals whose activities are related to air traffic control.
5. 2 Rings and Ideals 148 5. 3 Ideals and Cyclic Subspaces 152 5. 4 Generator Matrices and Parity-Check Matrices 159 5. 5 Encoding Cyclic Codest 163 5. 6 Syndromes and Simple Decoding Procedures 168 5. 7 Burst Error Correcting 175 5. 8 Finite Fields and Factoring xn-l over GF(q) 181 5. 9 Another Method for Factoring xn-l over GF(q)t 187 5. 10 Exercises 193 Chapter 6 BCH Codes and Bounds for Cyclic Codes 6. 1 Introduction 201 6. 2 BCH Codes and the BCH Bound 205 6. 3 Bounds for Cyclic Codest 210 6. 4 Decoding BCH Codes 215 6. 5 Linearized Polynomials and Finding Roots of Polynomialst 224 6. 6 Exercises 231 Chapter 7 Error Correction Techniques and Digital Audio Recording 7. 1 Introduction 237 7. 2 Reed-Solomon Codes 237 7. 3 Channel Erasures 240 7. 4 BCH Decoding with Erasures 244 7. 5 Interleaving 250 7. 6 Error Correction and Digital Audio Recording 256 7.
"Video Tracking" provides a comprehensive treatment of the fundamental aspects of algorithm and application development for the task of estimating, over time, the position of objects of interest seen through cameras. Starting from the general problem definition and a review of existing and emerging video tracking applications, the book discusses popular methods, such as those based on correlation and gradient-descent. Using practical examples, the reader is introduced to the advantages and limitations of deterministic approaches, and is then guided toward more advanced video tracking solutions, such as those based on the Bayes' recursive framework and on Random Finite Sets. Key features: Discusses the design choices and implementation issues required to turn the underlying mathematical models into a real-world effective tracking systems. Provides block diagrams and simil-code implementation of the algorithms. Reviews methods to evaluate the performance of video trackers - this is identified as a major problem by end-users. The book aims to help researchers and practitioners develop techniques and solutions based on the potential of video tracking applications. The design methodologies discussed throughout the book provide guidelines for developers in the industry working on vision-based applications. The book may also serve as a reference for engineering and computer science graduate students involved in vision, robotics, human-computer interaction, smart environments and virtual reality programmes
This book addresses and disseminates research and development in the applications of intelligent techniques for computer vision, the field that works on enabling computers to see, identify, and process images in the same way that human vision does, and then providing appropriate output. The book provides contributions which include theory, case studies, and intelligent techniques pertaining to computer vision applications. The book helps readers grasp the essence of the recent advances in this complex field. The audience includes researchers, professionals, practitioners, and students from academia and industry who work in this interdisciplinary field. The authors aim to inspire future research both from theoretical and practical viewpoints to spur further advances in the field.
The book discusses the evolution of cellular technology, then focusing in on 5G and its architecture and what it means for current engineers. The book first focuses on 4G and how it changed the industry, allowing people to communicate by connecting devices to the internet. The authors detail the emergence of services and applications that have revolutionized communication and continue to impact the daily habits of majority of the world's population. The authors endeavor to tell this story by showing the path taken until the arrival of 5G, detailing how technological and architectural progress evolved in all these years. It is a technical book, but the authors take care to explain in detail each aspect related to technology in order to allow everyone interested in the subject to delve into this important topic. Presents a comprehensive explanation about 4G and 5G architecture, modulation and protocols; Includes a thorough explanation of modern antennas technology and O-RAN; Relevant to technology professionals and students interested in 5G, but with little background in telecommunications; The English translation of this book from its Portuguese original manuscript was done with the help of artificial intelligence (machine translation by the service provider DeepL.com). A subsequent human revision of the content was done by the author.
The book consists of chapters based on selected papers of international conference Power, Control and Optimization 2012, held in Las Vegas, USA. Readers can find interesting chapters discussing various topics from the field of power control, its distribution and related fields. Book discusses topics like energy consumption impacted by climate, mathematical modeling of the influence of thermal power plant on the aquatic environment, investigation of cost reduction in residential electricity bill using electric vehicle at peak times or allocation and size evaluation of distributed generation using ANN model and others. Chapter authors are to the best of our knowledge the originators or closely related to the originators of presented ideas and its applications. Hence, this book certainly is one of the few books discussing the benefit from intersection of those modern and fruitful scientific fields of research with very tight and deep impact on real life and industry. This book is devoted to the studies of common and related subjects in intensive research fields of power technologies. For these reasons, we believe that this book will be useful for scientists and engineers working in the above-mentioned fields of research and applications. "
The classic text, now completely up to date This Second Edition of State Variables for Engineers is completely updated to reflect both the many changes in the field of systems and control and the fact that today's first-year graduate students are well prepared in the background skills and techniques needed to handle this material. The book begins with an introduction to the basic concepts behind time domain techniques, comparisons between state variable feedback and classical output feedback, and a discussion of the concepts of observability and controllability. The authors stress the importance of studying matrices and linear spaces by offering state variable representations for continuous linear systems in matrix form along with the solution to the resulting linear matrix differential equation. This treatment demonstrates how these basic linear algebra tools are related to the state variable analysis of linear systems. This new edition retains thorough coverage of the eigenvalue-eigenvector problem from the first edition, as well as several chapters on state variables for continuous and discrete-time systems—now supplemented with additional material on observability and controllability. It also offers three entirely new chapters covering:
Supplemented with appendices on basic matrix algebra and Z transforms, State Variables for Engineers, Second Edition is the ideal text for courses in systems analysis and techniques. It is also an excellent reference for professionals who want to keep pace with recent changes in the field.
This book provides a range of application areas of data and knowledge management and their solutions for the fields related to the convergence of information and communication technology (ICT), healthcare, and telecommunication services. The authors present approaches and case studies in future technological trends and challenges in the aforementioned fields. The book acts as a scholarly forum for researchers both in academia and industry.
This book presents high-quality papers from the Third International Conference on Smart Computing and Informatics (SCI 2018 19), organized by the School of Computer Engineering and School of Computer Application, Kalinga Institute of Industrial Technology Deemed to be University, Bhubaneswar, from 21 to 22 December 2018. It includes advanced and multi-disciplinary research on the design of smart computing and informatics, focusing on innovation paradigms in system knowledge, intelligence and sustainability that have the potential to provide realistic solutions to various problems in society, the environment and industry. The papers featured provide a valuable contribution to the deployment of emerging computational and knowledge transfer approaches, optimizing solutions in varied disciplines of science, technology and health care.
This edited book covers recent advances of techniques, methods and tools treating the problem of learning from data streams generated by evolving non-stationary processes. The goal is to discuss and overview the advanced techniques, methods and tools that are dedicated to manage, exploit and interpret data streams in non-stationary environments. The book includes the required notions, definitions, and background to understand the problem of learning from data streams in non-stationary environments and synthesizes the state-of-the-art in the domain, discussing advanced aspects and concepts and presenting open problems and future challenges in this field. Provides multiple examples to facilitate the understanding data streams in non-stationary environments; Presents several application cases to show how the methods solve different real world problems; Discusses the links between methods to help stimulate new research and application directions.
This book discusses the impact of advanced information technologies, such as data processing, machine learning, and artificial intelligence, on organizational decision-making processes and practices. One of the book's central themes is the interplay between human reasoning and machine logic in the context of organizational functioning, specifically, the fairly common situations in which subjective beliefs are pitted against objective evidence giving rise to conflict rather than enhancing the quality of organizational sensemaking. Aiming to not only raise the awareness of the potential challenges but also to offer solutions, the book delineates and discusses the core impediments to effective human-information technology interactions, and outlines strategies for overcoming those obstacles on the way to enhancing the efficacy of organizational decision-making. |
You may like...
One Square Inch of Silence - One Man's…
Gordon Hempton, John Grossmann
Paperback
Field Guide To The Spiders Of South…
Ansie Dippenaar-Schoeman
Paperback
The Art of Strategy - A Game Theorist's…
Avinash K. Dixit, Barry J. Nalebuff
Paperback
R461
Discovery Miles 4 610
Evolving Ourselves - How Unnatural…
Juan Enriquez, Steve Gullans
Paperback
(1)R801 Discovery Miles 8 010
HowExpert Guide to Insects - 101 Most…
Howexpert, Clinton W Waters
Hardcover
R735
Discovery Miles 7 350
|