![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > General
This edited book explores the use of mobile technologies such as phones, drones, robots, apps, and wearable monitoring devices for improving access to healthcare for socially disadvantaged populations in remote, rural or developing regions. This book brings together examples of large scale, international projects from developing regions of China and Belt and Road countries from researchers in Australia, Bangladesh, Denmark, Norway, Japan, Spain, Thailand and China. The chapters discuss the challenges presented to those seeking to deploy emerging mobile technologies (e.g., smartphones, IoT, drones, robots etc.) for healthcare (mHealth) in developing countries and discuss the solutions undertaken in these case study projects. This book brings together joint work in mHealth projects across multiple disciplines (software, healthcare, mobile communications, entrepreneurship and business and social development). Bringing together research from different institutions and disciplines, the editors illustrate the technical and entrepreneurial aspects of using mobile technologies for healthcare development in remote regions. Chapters are grouped into five key themes: the global challenge, portable health clinics, sustainable and resilient mHealth services, mHealth for the elderly, and mHealth for chronic illnesses. The book will be of particular interest to engineers, entrepreneurs, NGOs and researchers working in healthcare in sustainable development settings.
Brings together in one book classical and modern DOA techniques, showing the connections between themContains contributions from the leading people in the fieldGives a concise and easy- to- read introduction to the classical techniquesEvaluates the strengths and weaknesses of key super-resolution techniquesIncludes applications to sensor networks Classical and Modern Direction of Arrival Estimation contains both theory and practice of direction finding by the leading researchers in the field. This unique blend of techniques used in commercial DF systems and state-of-the art super-resolution methods is a valuable source of information for both practicing engineers and researchers. Key topics covered are: Classical methods of direction findingPractical DF methods used in commercial systemsCalibration in antenna arraysArray mapping, fast algorithms and wideband processingSpatial time-frequency distributions for DOA estimationDOA estimation in threshold regionHigher order statistics for DOA estimationLocalization in sensor networks and direct position estimation T. Engin Tuncer is a Professor in Electrical and Electronics Engineering Department of Middle East Technical University, Turkey. His research is focused on sensor array and multichannel signal processing, statistical signal processing and communications. Ben Friedlander is an internationally known expert in the areas
of statistical signal processing and its applications to
communications and surveillance systems. He has extensive
experience spanning over three decades in array processing and
direction finding. In recent years his work focused on the use of
multiple antennas for wireless communications. Currently he is a
professor of electrical engineering at the University of California
at Santa Cruz.
Latest research indicates that construction of a communal meaning regarding coordination of complex systems development tasks should be implemented into practice, proving that far more attention should be given to the issue of communal meaning construction in organizations. Using Activity Domain Theory for Managing Complex Systems offers a new approach towards managing complex systems that informs the co-construction of technical support for coordination and communal meaning regarding this support. Compiling and structuring empirical observations from the Ericsson Company and theoretical developments from the perspective of meaning construction, this unique book combines a deep understanding of concrete, every-day conditions of the telecom industry with innovative theoretical development of the Activity Domain Theory (ADT).
WIRELESS COMMUNICATION SIGNALS A practical guide to wireless communication systems and concepts Wireless technologies and services have evolved significantly over the last couple of decades, and Wireless Communication Signals offers an important guide to the most recent advances in wireless communication systems and concepts grounded in a practical and laboratory perspective. Written by a noted expert on the topic, the book provides the information needed to model, simulate, test, and analyze wireless system and wireless circuits using modern instrumentation and computer aided design software. Designed as a practical resource, the book provides a clear understanding of the basic theory, software simulation, hardware test, and modeling, system component testing, software and hardware interactions and co-simulations. This important book: Provides organic and harmonized coverage of wireless communication systems Covers a range of systems from radio hardware to digital baseband signal processing Presents information on testing and measurement of wireless communication systems and subsystems Includes MATLAB file codes Written for professionals in the communications industry, technical managers, and researchers in both academia and industry. Wireless Communication Signals introduces wireless communication systems and concepts from both a practical and laboratory perspective.
A one-stop Desk Reference, for R&D engineers involved in
communications engineering; this is a book that will not gather
dust on the shelf. It brings together the essential professional
reference content from leading international contributors in the
field. Material covers a wide scope of topics including voice,
computer, facsimile, video, and multimedia data technologies
As modern technologies continue to transform and impact our society, Radio Frequency Identification has emerged as one of the top areas of study to do just that. Using its wireless data capturing technique and incredible capabilities such as automatic identification, tracking, handling large amounts of data, and flexibility in operation, RFID aims to revamp the new millennium. Advanced RFID Systems, Security, and Applications features a comprehensive collection of research provided by leading experts in both academia and industries. This leading reference source provides state-of-the- art development on RFID and its contents will be of the upmost use to students and researchers at all levels as well as technologists, planners, and policy makers. RFID technology is progressing into a new phase of development.
Education and research in the field of telecommunications and networking can prove problematic without the proper resources and tools on the most relevant issues, trends, and advancements. Selected Readings on Telecommunications and Networking supplements course instruction and student research with quality articles focused on key issues concerning the planning, design, maintenance, and management of telecommunications and networking technologies. Containing over 30 chapters from authors across the globe, these selected readings in areas such as collaborative technologies, virtual teams, and wireless systems depict the most relevant and important areas of classroom discussion within the categories of Fundamental Concepts and Theories; Development and Design Methodologies; Tools and Technologies; Application and Utilization; Critical Issues; and Emerging Trends.
Uniquely explains in detail how small antennas work and ways to improve their performance This book addresses the recent significant theoretical and practical developments in the electrically small antenna (ESA) area. Examining antenna designs that work as well as those that have limitations, it offers the latest information on electromagnetically coupled structures and improving bandwidth using spherical helix dipoles, the exact derivation of Q for electrically small antennas for both TE and TM modes, a new simplified Q formula developed by the authors, and discussions of metamaterials and computer model accuracy for ESA. The book begins with detailed electromagnetic derivations of Chu and Thal Q formulations, formulas for Q when U or E cores are used, and effects of loss on Q. It also includes a treatise on bandwidth and matching, and Foster's reactance theorem, as well as up-to-date coverage of canonical antennas: dipoles, loops, self-resonant ESA, PIFA, and dielectric resonator antennas. Just as this book offers the concrete facts on relevant developments in the field, it also clears up confusion regarding findings that have not turned out to be useful. Presented here are antenna ideas that are clever but with performance numbers that are poor, as well as eighteen more antenna ideas that are simply not to be believed. The book concludes with recent data on the use of self-resonant elements in superdirective antennas and new delay line data on superconducting antennas. Each chapter features extensive references and an author list. In addition, helpful appendices cover a world history of ESA, antenna terms important to ESA, a paper on NIM shells enclosing an ESA dipole, and analytical errors associated with perfect lenses and sub-wavelength focusing. Small Antenna Handbook is ideal for practicing engineers in the telecommunications and national defense areas, as well as for upper-level undergraduate and graduate students.
This book offers an intuitive approach to random processes and educates the reader on how to interpret and predict their behavior. Premised on the idea that new techniques are best introduced by specific, low-dimensional examples, the mathematical exposition is easier to comprehend and more enjoyable, and it motivates the subsequent generalizations. It distinguishes between the science of extracting statistical information from raw data--e.g., a time series about which nothing is known a priori--and that of analyzing specific statistical models, such as Bernoulli trials, Poisson queues, ARMA, and Markov processes. The former motivates the concepts of statistical spectral analysis (such as the Wiener-Khintchine theory), and the latter applies and interprets them in specific physical contexts. The formidable Kalman filter is introduced in a simple scalar context, where its basic strategy is transparent, and gradually extended to the full-blown iterative matrix form.
Sets forth the steps needed to protect critical telecommunications circuits from power faults and lightning in high voltage environments The need to protect telecommunications circuits from power faults and lightning has never been greater: when power outages or system disturbances occur, reliable telecommunications are essential. With this book as their guide, readers will know what they need to do (and not do) to protect critical telecommunications circuits and equipment located in high voltage environments such as electrical power plants, substations, and power towers. Moreover, the book explains how to get the job done safely, detailing the proper implementation of safety procedures and the use of protective equipment to eliminate or minimize risk. Setting the foundation, the book begins with an overview of the problem, key issues, industry standards, and safety concerns. Next, it covers: Definitions and fundamentals of electric power systems, with regard to HVPT applicationsCauses, boundary conditions, and calculations of ground potential riseCritical telecommunications circuits that must be protected in high voltage environmentsProtection schemes and equipment to resolve groundpotential rise problemsEffective installation and testing of high voltage interface equipmentPersonal safety for telecommunications personnel working with equipment in high voltage environments Throughout the book, the author refers to accepted industry standards and best practices. Written by one of the most respected professional trainers in the telecommunications industry, "High Voltage Protection for Telecommunications" can be used for professional training courses or self-study. It will enable readers to protect critical data and voice communications circuits from high voltage events and protect themselves during equipment installation and maintenance.
Cluster or co-cluster analyses are important tools in a variety of scientific areas. The introduction of this book presents a state of the art of already well-established, as well as more recent methods of co-clustering. The authors mainly deal with the two-mode partitioning under different approaches, but pay particular attention to a probabilistic approach. Chapter 1 concerns clustering in general and the model-based clustering in particular. The authors briefly review the classical clustering methods and focus on the mixture model. They present and discuss the use of different mixtures adapted to different types of data. The algorithms used are described and related works with different classical methods are presented and commented upon. This chapter is useful in tackling the problem of co-clustering under the mixture approach. Chapter 2 is devoted to the latent block model proposed in the mixture approach context. The authors discuss this model in detail and present its interest regarding co-clustering. Various algorithms are presented in a general context. Chapter 3 focuses on binary and categorical data. It presents, in detail, the appropriated latent block mixture models. Variants of these models and algorithms are presented and illustrated using examples. Chapter 4 focuses on contingency data. Mutual information, phi-squared and model-based co-clustering are studied. Models, algorithms and connections among different approaches are described and illustrated. Chapter 5 presents the case of continuous data. In the same way, the different approaches used in the previous chapters are extended to this situation. Contents 1. Cluster Analysis. 2. Model-Based Co-Clustering. 3. Co-Clustering of Binary and Categorical Data. 4. Co-Clustering of Contingency Tables. 5. Co-Clustering of Continuous Data. About the Authors Gerard Govaert is Professor at the University of Technology of Compiegne, France. He is also a member of the CNRS Laboratory Heudiasyc (Heuristic and diagnostic of complex systems). His research interests include latent structure modeling, model selection, model-based cluster analysis, block clustering and statistical pattern recognition. He is one of the authors of the MIXMOD (MIXtureMODelling) software. Mohamed Nadif is Professor at the University of Paris-Descartes, France, where he is a member of LIPADE (Paris Descartes computer science laboratory) in the Mathematics and Computer Science department. His research interests include machine learning, data mining, model-based cluster analysis, co-clustering, factorization and data analysis. Cluster Analysis is an important tool in a variety of scientific areas. Chapter 1 briefly presents a state of the art of already well-established as well more recent methods. The hierarchical, partitioning and fuzzy approaches will be discussed amongst others. The authors review the difficulty of these classical methods in tackling the high dimensionality, sparsity and scalability. Chapter 2 discusses the interests of coclustering, presenting different approaches and defining a co-cluster. The authors focus on co-clustering as a simultaneous clustering and discuss the cases of binary, continuous and co-occurrence data. The criteria and algorithms are described and illustrated on simulated and real data. Chapter 3 considers co-clustering as a model-based co-clustering. A latent block model is defined for different kinds of data. The estimation of parameters and co-clustering is tackled under two approaches: maximum likelihood and classification maximum likelihood. Hard and soft algorithms are described and applied on simulated and real data. Chapter 4 considers co-clustering as a matrix approximation. The trifactorization approach is considered and algorithms based on update rules are described. Links with numerical and probabilistic approaches are established. A combination of algorithms are proposed and evaluated on simulated and real data. Chapter 5 considers a co-clustering or bi-clustering as the search for coherent co-clusters in biological terms or the extraction of co-clusters under conditions. Classical algorithms will be described and evaluated on simulated and real data. Different indices to evaluate the quality of coclusters are noted and used in numerical experiments.
* Clear, practical tutorial style text with real-world applications
This book explores categories of applications and driving factors surrounding the Smart City phenomenon. The contributing authors provide perspective on the Smart Cities, covering numerous applications and classes of applications. The book uses a top-down exploration of the driving factors in Smart Cities, by including focal areas including "Smart Healthcare," "Public Safety & Policy Issues," and "Science, Technology, & Innovation." Contributors have direct and substantive experience with important aspects of Smart Cities and discuss issues with technologies & standards, roadblocks to implementation, innovations that create new opportunities, and other factors relevant to emerging Smart City infrastructures. Features an exploration of Smart City issues and solutions from a variety of stakeholders in the evolving field Presents conversational, nuanced, and forward thinking perspectives on Smart Cities, their implications, limitations, obstacles, and opportunities Includes contributions from industry insiders who have direct, relevant experience with their respective subjects as well as positioning and corporate stature
Wireless physical layer (PHY) security has attracted much attention due to the broadcast nature of the wireless medium and its inherent vulnerability to eavesdropping, jamming, and interference. Physical Layer Security for Wireless Sensing and Communication covers both communication and sensing security from a broad perspective. The main emphasis is on PHY security, although other security measures are covered for the sake of completeness and as a step towards cross-layer security and cognitive security vision. After discussing the features of wireless channels from both the communication and sensing perspectives, the book details their exploitation for secure transmission utilizing various approaches. Wireless sensing and radio environment concepts are also addressed, along with the related security implications in terms of eavesdropping, disruption, manipulation, and, in general, the exploitation of wireless sensing by unauthorised users. Several solutions for these threats from the domains of wireless communication, military radars, and machine learning, are discussed. The book provides valuable information to researchers in academia and industry, as well as engineers, developers, and advanced students in the field of cybersecurity. |
You may like...
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, …
Paperback
R1,452
Discovery Miles 14 520
Introduction To Communication Studies
George Angelopulo, Elizabeth Lubinga
Paperback
R458
Discovery Miles 4 580
Photovoltaics for Space - Key Issues…
Sheila Bailey, Aloysius F Hepp, …
Paperback
R4,909
Discovery Miles 49 090
|