![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > General
One of the crucial challenges for future smart cities is to devise a citywide network infrastructure capable of effectively guaranteeing resource-efficient and reliable communications while managing the complexity of heterogeneous devices and access technologies. This edited book highlights and showcases state of the art research and innovations in 5G and beyond wireless communications technologies for connected smart cities. The main objectives of this work include the exploration of recent advances and application potentials of various communication technologies as promising enablers for future networked smart cities, the investigation of design-specific issues for the integration of different architectural components of smart cities, and addressing various challenges and identifying opportunities in terms of interoperability of potential solutions. The book is aimed at a core and interdisciplinary audience of engineers, researchers and professionals working on smart cities concepts and supporting the integration of next-generation information, communication, networking and sensing technologies. It will also be a very useful ancillary for advanced students and other professionals working on next-generation communication networks.
The gripping, behind-the scenes story of one of the most sophisticated surveillance weapons ever created – and an existential threat to democracy and human rights. Pegasus is widely regarded as the most powerful cyber-surveillance system on the market – available to any government that can afford its multimillion-dollar price tag. The system’s creator, the NSO group, a private corporation headquartered in Israel, boasts about its ability to thwart terrorists and criminals. But the Pegasus system doesn’t only catch terrorists and criminals. Pegasus has been used by repressive regimes to spy on thousands of innocent people around the world: heads of state, diplomats, human rights defenders, lawyers, political opponents, and journalists. Virtually undetectable, the system can track a person’s daily movement in real time, gain control of the device’s microphones and cameras at will, and capture all videos, photos, emails, texts, and passwords – encrypted or not. Its full reach is not even known. This is the gripping story of how Pegasus was uncovered, written by Laurent Richard and Sandrine Rigaud, the two intrepid reporters who revealed the scandal in collaboration with an international consortium of journalists. Their findings shook the world. Tense and compelling, Pegasus reveals how thousands of lives have been turned upside down by this unprecedented threat, and exposes the chilling new ways governments and corporations are laying waste to human rights – and silencing innocent citizens.
The latest EM techniques for detecting concealed targets, whether explosives, weapons, or people Extensively illustrated from basic principles to system design, the fundamental concepts of RF, microwave, millimeter wave, and terahertz detection systems and techniques to find concealed targets are explained in this publication. These concealed targets may be explosive devices or weapons, which can be buried in the ground, concealed in building structures, hidden under clothing, or inside luggage. Concealed targets may also be people who are stowaways or victims of an avalanche or earthquake. Although much information is available in conference proceedings and professional society publications, this book brings all the relevant information in a single, expertly written and organized volume. Readers gain an understanding of the physics underlying electromagnetic (EM) detection methods, as well as the factors that affect the performance of EM detection equipment, helping them choose the right type of equipment and techniques to meet the demands of particular tasks. Among the topics covered are: Ultra-wideband radar and ground-penetrating radar Millimeter, sub-millimeter, and terahertz systems Radar systems including Doppler, harmonic, impulse, FMCW, and holographic Radiometric systems Nuclear quadrupole resonance systems Author David Daniels has many years of experience designing and deploying EM systems to detect concealed targets. As a result, this publication is essential for scientists and engineers who are developing or using EM equipment and techniques for a diverse range of purposes, including homeland security, crime prevention, or the detection of persons.
Based on cutting-edge research projects in the field, this comprehensive 4-volume book series provides the latest details and covers the most impactful aspects of mobile, wireless, and broadband communications development. These books present key systems and enabling technologies in a clear and accessible manner, offering you a detailed roadmap the future evolution of next generation communications. Drawing upon the insights of leading experts in the field, each of the four volumes is dedicated to an area of critical importance, including Radio Interfaces; Networks, Services and Applications; Reconfigurability; and Ad Hoc Networks.
This book contains 74 papers presented at ICTCS 2017: Third International Conference on Information and Communication Technology for Competitive Strategies. The conference was held during 16-17 December 2017, Udaipur, India and organized by Association of Computing Machinery, Udaipur Professional Chapter in association with The Institution of Engineers (India), Udaipur Local Center and Global Knowledge Research Foundation. This book contains papers mainly focused on ICT for Computation, Algorithms and Data Analytics and IT Security etc.
The book presents innovative scientific research works by academics, research scholars and students, presented at the 2017 International Conference on Energy, Materials and Information Technology at Amity University Jharkhand, India. It includes contributions on system solutions based on soft computing techniques, and covers innovative soft computing techniques and tools with advanced applications. A major focus of the book is on presenting interdisciplinary problems and how they can be solved using information technology, together with innovative connections to other disciplines. It also includes papers on cloud computing and WSN-related real-time research.
In a face-to-face conversation, only 10 % of the message is conveyed by words, the remaining 90 % is carried via vocal pitch, emphasis, facial expressions, body language, and other related factors. The challenge for future telecommunication systems will be to bridge the shortcomings of our current voice-orientated systems. Video conferencing and live chats are replacing our traditional forms of communication. Worldwide telecommunications networks are being redesigned to provide new multimedia services. The goal of this book is to bring together end users, service providers and researchers from academia as well as the communications industry to share state-of-the-art information on projects, products, services, and processes for future virtual reality (VR) telecommunications systems. Virtual Reality Technologies for Future Telecommunications Systems features:
Mobile Commerce is an emerging phenomenon based on quickly growing applications of wireless technologies and mobile communications. Mobile communication is becoming as essential need for individuals and businesses in their daily actions. Using mobile commerce, organizations can offer customers services that are easily accessed by a mobile device anytime and anywhere. Wireless Communications and Mobile Commerce collects holistic perspectives contributed by leading professionals to explore strategic considerations regarding potential opportunities and issues in mobile commerce. These professionals' discussions and contributions focus on providing a comprehensive understanding surrounding business strategies, models, management paradigms, architectures, infrastructure, strengths and weaknesses.
This book introduces concepts and technologies of Intelligent Transportation Systems (ITS). It describes state of the art safety communication protocol called Dedicated Short Range Communication (DSRC), currently being considered for adoption by the USDOT and automotive industry in the US. However, the principles of this book are applicable even if the underlying physical layer protocol of V2X changes in the future, e.g. V2X changes from DSRC to cellular-based connectivity. Fundamental ITS concepts include topics like global positioning system; Vehicle to Vehicle (V2V), Vehicle to Pedestrian (V2P), and Vehicle to Infrastructure (V2I) communications; human-machine interface; and security and privacy. Fundamental concepts are sometimes followed by the real-life test experimental results (such as in V2P Chapter) and description of the performance metrics used to evaluate the results. This book also describes equations and math used in the development of the individual parts of the system. This book surveys current and previous publications for trending research in the ITS domain. It also covers state of the art standards that are in place for the DSRC in the US, starting from the application layer defined in SAE J2735 all the way to physical layer defined in IEEE 802.11. The authors provide a detailed discussion on what is needed to extend the current standards to accommodate future needs of the vehicle communications, such as needs for future autonomous vehicles. Programs and code examples accompany appropriate chapters, for example, after describing remote vehicle target classification function a pseudo code and description is provided. In addition, the book discusses current topics of the technology such as spectrum sharing, simulation, security, and privacy. The intended audience for this book includes engineering graduate students, automotive professionals/engineers, researchers and technology enthusiasts.
This book traces the pedagogical evolution of technical communication in America as it grew out of Engineering English requirements from roughly the turn of the century to 1950. This study examines specific curricular patterns, texts, and writers on the subject of technical communication, while also tracing engineering educational patterns as they emerge from the proceedings of the society for the promotion of engineering education. Unique to the second edition of the book is a new preface by the recent past ATTW series editor, Jimmie Killingsworth, a new introduction by Elizabeth Tebeaux, and an epilogue by Katherine Staples. Writing in a Milieu of Utility concludes that technical writing, as we teach it today, likely found its roots in engineering composition pedagogy, when, at approximately the turn of the century, engineering educators recognized that writing about science and technology not only made sense in an academic milieu that emphasized utility, but that such writing could also contribute to the professional success of engineering students. Existing somewhat tenuously as engineering itself sought academic status, technical communication emerged ultimately as a re-conceptualized composition course, after early to mid twentieth century calls for English and engineering cooperation made traditional composition offerings less relevant. Academic writing on environmental communication proliferated in the 1990's. A few of us had been calling for such work and making initial investigations throughout the 1980's, but the momentum in the field built slowly. Spurred by coverage in the mass media, academic publishers finally caught the wave of interest. In this exciting new volume, the editors demonstrate more fully than ever before how environmental rhetoric and technical communication go hand in hand. The key link that they and their distinguished group of contributors have discovered is the ancient concern of communication scholars with public deliberation. Environmental issues present technical communicators with some of their greatest challenges, above all, how to make the highly specialized and inscrutably difficult technical information generated by environmental scientists and engineers usable in public decision making. The editors encourage us to accept the challenge of contributing to environmentally conscious decision making by integrating technical knowledge and human values. For technical communicators who accept the challenge of working toward solutions by opening access to crucial information and by engaging in critical thinking on ecological issues, the research and theory offered in this volume provide a strong foundation for future practice.
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.
This book details some of the major developments in the implementation of compressive sensing in radio applications for electronic defense and warfare communication use. It provides a comprehensive background to the subject and at the same time describes some novel algorithms. It also investigates application value and performance-related parameters of compressive sensing in scenarios such as direction finding, spectrum monitoring, detection, and classification.
This monograph presents new theories and methods for fixed-time cooperative control of multi-agent systems. Fundamental concepts of fixed-time stability and stabilization are introduced with insightful understanding. This book presents solutions for several problems of fixed-time cooperative control using systematic design methods. The book compares fixed-time cooperative control with asymptotic cooperative control, demonstrating how the former can achieve better closed-loop performance and disturbance rejection properties. It also discusses the differences from finite-time control, and shows how fixed-time cooperative control can produce the faster rate of convergence and provide an explicit estimate of the settling time independent of initial conditions. This monograph presents multiple applications of fixed-time control schemes, including to distributed optimization of multi-agent systems, making it useful to students, researchers and engineers alike.
This book focuses on conceptual frameworks that are helpful in understanding the basics of electronics - what the feedback system is, the principle of an oscillator, the operational working of an amplifier, and other relevant topics. It also provides an overview of the technologies supporting electronic systems, like OP-AMP, transistor, filter, ICs, and diodes. It consists of seven chapters, written in an easy and understandable language, and featuring relevant block diagrams, circuit diagrams, valuable and interesting solved examples, and important test questions. Further, the book includes up-to-date illustrations, exercises, and numerous worked examples to illustrate the theory and to demonstrate their use in practical designs.
This book objectively represents the status quo and trends of world Internet development in 2021, systematically summarizes Internet development in major countries and regions, and deeply analyzes new development condition and trends in key fields of Internet, in terms of eight aspects, i.e., information infrastructure, information technology, digital economy, e-government, cyber media, cybersecurity, cyberlaws, and international cyberspace governance. This book maintains the index system of world Internet development, optimizes some indexes, and comprehensively evaluates Internet development in major countries and regions in the world, in order to better demonstrate the strength and characteristics of Internet development in various countries and mirror the overall trend in world Internet development in a comprehensive, accurate, and objective way. This book collects the latest research results in world Internet development. With diverse subjects and detailed discussion, this book possesses great significance for these engaged in Internet field in governmental departments, Internet enterprises, scientific research institutions, and universities, who hope to fully understand world Internet development.
Mobile Commerce Applications addresses and explores the critical architectural issues in constructing m-commerce applications and in applying mobile technologies in different areas, including methodologies, enabling technologies, models, paradigms, architectures, standards and innovations.
This book provides insights into the First International Conference on Communication, Devices and Computing (ICCDC 2017), which was held in Haldia, India on November 2-3, 2017. It covers new ideas, applications and the experiences of research engineers, scientists, industrialists, scholars and students from around the globe. The proceedings highlight cutting-edge research on communication, electronic devices and computing, and address diverse areas such as 5G communication, spread spectrum systems, wireless sensor networks, signal processing for secure communication, error control coding, printed antennas, analysis of wireless networks, antenna array systems, analog and digital signal processing for communication systems, frequency selective surfaces, radar communication, and substrate integrated waveguide and microwave passive components, which are key to state-of-the-art innovations in communication technologies.
This classroom-tested textbook describes the design and implementation of software for distributed real-time systems, using a bottom-up approach. The text addresses common challenges faced in software projects involving real-time systems, and presents a novel method for simply and effectively performing all of the software engineering steps. Each chapter opens with a discussion of the core concepts, together with a review of the relevant methods and available software. This is then followed with a description of the implementation of the concepts in a sample kernel, complete with executable code. Topics and features: introduces the fundamentals of real-time systems, including real-time architecture and distributed real-time systems; presents a focus on the real-time operating system, covering the concepts of task, memory, and input/output management; provides a detailed step-by-step construction of a real-time operating system kernel, which is then used to test various higher level implementations; describes periodic and aperiodic scheduling, resource management, and distributed scheduling; reviews the process of application design from high-level design methods to low-level details of design and implementation; surveys real-time programming languages and fault tolerance techniques; includes end-of-chapter review questions, extensive C code, numerous examples, and a case study implementing the methods in real-world applications; supplies additional material at an associated website. Requiring only a basic background in computer architecture and operating systems, this practically-oriented work is an invaluable study aid for senior undergraduate and graduate-level students of electrical and computer engineering, and computer science. The text will also serve as a useful general reference for researchers interested in real-time systems.
Finding ways to interfere with or jam communication signals is an essential area of electronic warfare (EW). In modern EW systems, anti-jam technology has been employed to overcome signal jamming. Recently, electronic warfare R&D has focused on creating methods to disrupt these anti-jam systems. This newly revised and greatly expanded edition of the popular Artech House book, "Modern Communications Jamming Principles and Techniques", provides an up-to-date, exhaustive treatment of the techniques and methods available to create countermeasures against anti-jam, over-the-air communications. The Second Edition features a wealth of new material on urban warfare, including a computer simulation of EW architecture alternatives for land-based forces based on urban constraints. This unique resource is dedicated to showing professionals how to design and build jammers specifically targeted at anti-jam communications. Moreover, practitioners find assistance in evaluating the expected performance of jamming systems against modern communications systems.
Because the wireless industry is less capital intensive than others sectors in the telecommunications marketplace, it is expected to enjoy continued profitability. With survival at stake, telecommunications companies must ready themselves for battle to win access and operations rights in the wireless communications spectrum. This book maps out the strategies required to fight this battle by explaining how a telecommunications company should structure its entry and operations in the spectrum.
For scientists, research engineers, physicists and postgraduate students, this work introduces the essential aspects of electromagnetic waves in chiral and bi-isotropic media, to give the practical working knowledge necessary for new application development. It includes sections on effective methods of measurement, how chiral and BI media affect electromagnetic fields and wave propagation, and how to apply the theory to basic problems in waveguide, antenna and scattering analysis.
This book covers ideas, methods, algorithms, and tools for the in-depth study of the performance and reliability of dependable fault-tolerant systems. The chapters identify the current challenges that designers and practitioners must confront to ensure the reliability, availability, and performance of systems, with special focus on their dynamic behaviors and dependencies. Topics include network calculus, workload and scheduling; simulation, sensitivity analysis and applications; queuing networks analysis; clouds, federations and big data; and tools. This collection of recent research exposes system researchers, performance analysts, and practitioners to a spectrum of issues so that they can address these challenges in their work.
|
You may like...
Object-Oriented Analysis and Design for…
Raul Sidnei Wazlawick
Paperback
R1,120
Discovery Miles 11 200
Machine Vision Algorithms in Java…
Paul F. Whelan, Derek Molloy
Paperback
R4,015
Discovery Miles 40 150
UML 2 Certification Guide - Fundamental…
Tim Weilkiens, Bernd Oestereich
Paperback
R1,260
Discovery Miles 12 600
Object-oriented Design Knowledge…
Mario Piattini, Javier Garzas
Hardcover
R2,507
Discovery Miles 25 070
|