![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > General
Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory. Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining to the C2 network evolution, security, and modelling, this publication is ideal for reference use by students, academicians, and security professionals in the fields of C2 and network science.
The growing presence of smart phones and smart devices has caused significant changes to wireless networks. With the ubiquity of these technologies, there is now increasingly more available data for mobile operators to utilize. Big Data Applications in the Telecommunications Industry is a comprehensive reference source for the latest scholarly material on the use of data analytics to study wireless networks and examines how these techniques can increase reliability and profitability, as well as network performance and connectivity. Featuring extensive coverage on relevant topics, such as accessibility, traffic data, and customer satisfaction, this publication is ideally designed for engineers, students, professionals, academics, and researchers seeking innovative perspectives on data science and wireless network communications. Topics Covered The many academic areas covered in this publication include, but are not limited to: Anomaly Detection Co-Occurrence Data Modeling Consumer Feedback Customer Satisfaction and Retention Network Accessibility Social Networks Traffic Data
This book represents the proceedings of the 9th SDL Forum which was
held in Montreal, Quebec, Canada, during the week of June 21-25,
1999. The 9th SDL Forum presents papers on the past and future
development of the MSC and SDL languages.The volume presents
information on experience with the use of these languages in
industrial development projects, on tools and techniques for using
these languages in the software and hardware development process,
and other aspects of these languages.
The latest EM techniques for detecting concealed targets, whether explosives, weapons, or people Extensively illustrated from basic principles to system design, the fundamental concepts of RF, microwave, millimeter wave, and terahertz detection systems and techniques to find concealed targets are explained in this publication. These concealed targets may be explosive devices or weapons, which can be buried in the ground, concealed in building structures, hidden under clothing, or inside luggage. Concealed targets may also be people who are stowaways or victims of an avalanche or earthquake. Although much information is available in conference proceedings and professional society publications, this book brings all the relevant information in a single, expertly written and organized volume. Readers gain an understanding of the physics underlying electromagnetic (EM) detection methods, as well as the factors that affect the performance of EM detection equipment, helping them choose the right type of equipment and techniques to meet the demands of particular tasks. Among the topics covered are: Ultra-wideband radar and ground-penetrating radar Millimeter, sub-millimeter, and terahertz systems Radar systems including Doppler, harmonic, impulse, FMCW, and holographic Radiometric systems Nuclear quadrupole resonance systems Author David Daniels has many years of experience designing and deploying EM systems to detect concealed targets. As a result, this publication is essential for scientists and engineers who are developing or using EM equipment and techniques for a diverse range of purposes, including homeland security, crime prevention, or the detection of persons.
Based on cutting-edge research projects in the field, this comprehensive 4-volume book series provides the latest details and covers the most impactful aspects of mobile, wireless, and broadband communications development. These books present key systems and enabling technologies in a clear and accessible manner, offering you a detailed roadmap the future evolution of next generation communications. Drawing upon the insights of leading experts in the field, each of the four volumes is dedicated to an area of critical importance, including Radio Interfaces; Networks, Services and Applications; Reconfigurability; and Ad Hoc Networks.
This book contains 74 papers presented at ICTCS 2017: Third International Conference on Information and Communication Technology for Competitive Strategies. The conference was held during 16-17 December 2017, Udaipur, India and organized by Association of Computing Machinery, Udaipur Professional Chapter in association with The Institution of Engineers (India), Udaipur Local Center and Global Knowledge Research Foundation. This book contains papers mainly focused on ICT for Computation, Algorithms and Data Analytics and IT Security etc.
The book presents innovative scientific research works by academics, research scholars and students, presented at the 2017 International Conference on Energy, Materials and Information Technology at Amity University Jharkhand, India. It includes contributions on system solutions based on soft computing techniques, and covers innovative soft computing techniques and tools with advanced applications. A major focus of the book is on presenting interdisciplinary problems and how they can be solved using information technology, together with innovative connections to other disciplines. It also includes papers on cloud computing and WSN-related real-time research.
In a face-to-face conversation, only 10 % of the message is conveyed by words, the remaining 90 % is carried via vocal pitch, emphasis, facial expressions, body language, and other related factors. The challenge for future telecommunication systems will be to bridge the shortcomings of our current voice-orientated systems. Video conferencing and live chats are replacing our traditional forms of communication. Worldwide telecommunications networks are being redesigned to provide new multimedia services. The goal of this book is to bring together end users, service providers and researchers from academia as well as the communications industry to share state-of-the-art information on projects, products, services, and processes for future virtual reality (VR) telecommunications systems. Virtual Reality Technologies for Future Telecommunications Systems features:
"This book provides a common framework for mobility management that considers the theoretical and practical aspects of systems optimization for mobile networks." In this book, the authors show how an optimized system of mobility management can improve the quality of service in existing forms of mobile communication. Furthermore, they provide a theoretical approach to mobility management, as well as developing the model for systems optimization, including practical case studies using network layer and mobility layer protocols in different deployment scenarios. The authors also address the different ways in which the specific mobility protocol can be developed, taking into account numerous factors including security, configuration, authentication, quality of service, and movement patterns of the mobiles. Key Features: Defines and discusses a common set of optimization methodologies and their application to all mobility protocols for both IPv4 and IPv6 networksApplies these technologies in the context of various layers: MAC layer, network layer, transport layer and application layer covering 802.11, LTE, WiMax, CDMA networks and protocols such as SIP, MIP, HIP, VoIP, and many moreProvides a thorough analysis of the required steps during a mobility event such as discovery, network selection, configuration, authentication, security association, encryption, binding update, and media directionIncludes models and tables illustrating the analysis of mobility management as well as architecture of sample wireless and mobility test beds built by the authors, involving inter-domain and intra-domain mobility scenarios This book is an excellent resource forprofessionals and systems architects in charge of designing wireless networks for commercial (3G/4G), LTE, IMS, military and Ad Hoc environment. It will be useful deployment guide for the architects wireless service providers. Graduate students, researchers in industry and academia, and systems engineers will also find this book of interest.
Mobile Commerce is an emerging phenomenon based on quickly growing applications of wireless technologies and mobile communications. Mobile communication is becoming as essential need for individuals and businesses in their daily actions. Using mobile commerce, organizations can offer customers services that are easily accessed by a mobile device anytime and anywhere. Wireless Communications and Mobile Commerce collects holistic perspectives contributed by leading professionals to explore strategic considerations regarding potential opportunities and issues in mobile commerce. These professionals' discussions and contributions focus on providing a comprehensive understanding surrounding business strategies, models, management paradigms, architectures, infrastructure, strengths and weaknesses.
This book introduces concepts and technologies of Intelligent Transportation Systems (ITS). It describes state of the art safety communication protocol called Dedicated Short Range Communication (DSRC), currently being considered for adoption by the USDOT and automotive industry in the US. However, the principles of this book are applicable even if the underlying physical layer protocol of V2X changes in the future, e.g. V2X changes from DSRC to cellular-based connectivity. Fundamental ITS concepts include topics like global positioning system; Vehicle to Vehicle (V2V), Vehicle to Pedestrian (V2P), and Vehicle to Infrastructure (V2I) communications; human-machine interface; and security and privacy. Fundamental concepts are sometimes followed by the real-life test experimental results (such as in V2P Chapter) and description of the performance metrics used to evaluate the results. This book also describes equations and math used in the development of the individual parts of the system. This book surveys current and previous publications for trending research in the ITS domain. It also covers state of the art standards that are in place for the DSRC in the US, starting from the application layer defined in SAE J2735 all the way to physical layer defined in IEEE 802.11. The authors provide a detailed discussion on what is needed to extend the current standards to accommodate future needs of the vehicle communications, such as needs for future autonomous vehicles. Programs and code examples accompany appropriate chapters, for example, after describing remote vehicle target classification function a pseudo code and description is provided. In addition, the book discusses current topics of the technology such as spectrum sharing, simulation, security, and privacy. The intended audience for this book includes engineering graduate students, automotive professionals/engineers, researchers and technology enthusiasts.
E-Commerce and M-Commerce Technologies explores the emerging area of mobile commerce. The chapters in this book look specifically at the development of emerging technologies and their application in Internet commerce. From E-business to mobile database developments, this book offers a compilation of readings that will prove useful to individuals and organizations in the academic study and research surrounding mobile commerce as well as in the practical application of these technologies.
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.
This book traces the pedagogical evolution of technical communication in America as it grew out of Engineering English requirements from roughly the turn of the century to 1950. This study examines specific curricular patterns, texts, and writers on the subject of technical communication, while also tracing engineering educational patterns as they emerge from the proceedings of the society for the promotion of engineering education. Unique to the second edition of the book is a new preface by the recent past ATTW series editor, Jimmie Killingsworth, a new introduction by Elizabeth Tebeaux, and an epilogue by Katherine Staples. Writing in a Milieu of Utility concludes that technical writing, as we teach it today, likely found its roots in engineering composition pedagogy, when, at approximately the turn of the century, engineering educators recognized that writing about science and technology not only made sense in an academic milieu that emphasized utility, but that such writing could also contribute to the professional success of engineering students. Existing somewhat tenuously as engineering itself sought academic status, technical communication emerged ultimately as a re-conceptualized composition course, after early to mid twentieth century calls for English and engineering cooperation made traditional composition offerings less relevant. Academic writing on environmental communication proliferated in the 1990's. A few of us had been calling for such work and making initial investigations throughout the 1980's, but the momentum in the field built slowly. Spurred by coverage in the mass media, academic publishers finally caught the wave of interest. In this exciting new volume, the editors demonstrate more fully than ever before how environmental rhetoric and technical communication go hand in hand. The key link that they and their distinguished group of contributors have discovered is the ancient concern of communication scholars with public deliberation. Environmental issues present technical communicators with some of their greatest challenges, above all, how to make the highly specialized and inscrutably difficult technical information generated by environmental scientists and engineers usable in public decision making. The editors encourage us to accept the challenge of contributing to environmentally conscious decision making by integrating technical knowledge and human values. For technical communicators who accept the challenge of working toward solutions by opening access to crucial information and by engaging in critical thinking on ecological issues, the research and theory offered in this volume provide a strong foundation for future practice.
This book details some of the major developments in the implementation of compressive sensing in radio applications for electronic defense and warfare communication use. It provides a comprehensive background to the subject and at the same time describes some novel algorithms. It also investigates application value and performance-related parameters of compressive sensing in scenarios such as direction finding, spectrum monitoring, detection, and classification.
This monograph presents new theories and methods for fixed-time cooperative control of multi-agent systems. Fundamental concepts of fixed-time stability and stabilization are introduced with insightful understanding. This book presents solutions for several problems of fixed-time cooperative control using systematic design methods. The book compares fixed-time cooperative control with asymptotic cooperative control, demonstrating how the former can achieve better closed-loop performance and disturbance rejection properties. It also discusses the differences from finite-time control, and shows how fixed-time cooperative control can produce the faster rate of convergence and provide an explicit estimate of the settling time independent of initial conditions. This monograph presents multiple applications of fixed-time control schemes, including to distributed optimization of multi-agent systems, making it useful to students, researchers and engineers alike.
This book focuses on conceptual frameworks that are helpful in understanding the basics of electronics - what the feedback system is, the principle of an oscillator, the operational working of an amplifier, and other relevant topics. It also provides an overview of the technologies supporting electronic systems, like OP-AMP, transistor, filter, ICs, and diodes. It consists of seven chapters, written in an easy and understandable language, and featuring relevant block diagrams, circuit diagrams, valuable and interesting solved examples, and important test questions. Further, the book includes up-to-date illustrations, exercises, and numerous worked examples to illustrate the theory and to demonstrate their use in practical designs.
This book objectively represents the status quo and trends of world Internet development in 2021, systematically summarizes Internet development in major countries and regions, and deeply analyzes new development condition and trends in key fields of Internet, in terms of eight aspects, i.e., information infrastructure, information technology, digital economy, e-government, cyber media, cybersecurity, cyberlaws, and international cyberspace governance. This book maintains the index system of world Internet development, optimizes some indexes, and comprehensively evaluates Internet development in major countries and regions in the world, in order to better demonstrate the strength and characteristics of Internet development in various countries and mirror the overall trend in world Internet development in a comprehensive, accurate, and objective way. This book collects the latest research results in world Internet development. With diverse subjects and detailed discussion, this book possesses great significance for these engaged in Internet field in governmental departments, Internet enterprises, scientific research institutions, and universities, who hope to fully understand world Internet development.
Mobile Commerce Applications addresses and explores the critical architectural issues in constructing m-commerce applications and in applying mobile technologies in different areas, including methodologies, enabling technologies, models, paradigms, architectures, standards and innovations.
As Cavalli and Sarma astutely remarked in the introduction to this volume, it is quite remarkable that SDL '97 may have the first participant younger than SDL itself. SDL '97 provides the opportunity to reflect the course SDL has taken and why it has been successful over two decades where other languages addressing the same market have failed. SDL now also has a permanent companion in MSC (Message Sequence Charts). MSC today is a language in its own right and has its areas of application both in conjunction with SDL and independently or in combination with other techniques. MSC has strong structuring concepts to specify message sequences for large systems and can be used to develop scenarios, which is extremely useful for test and design environments. The SDL Forum today really is the SDL and MSC Forum.
This book provides insights into the First International Conference on Communication, Devices and Computing (ICCDC 2017), which was held in Haldia, India on November 2-3, 2017. It covers new ideas, applications and the experiences of research engineers, scientists, industrialists, scholars and students from around the globe. The proceedings highlight cutting-edge research on communication, electronic devices and computing, and address diverse areas such as 5G communication, spread spectrum systems, wireless sensor networks, signal processing for secure communication, error control coding, printed antennas, analysis of wireless networks, antenna array systems, analog and digital signal processing for communication systems, frequency selective surfaces, radar communication, and substrate integrated waveguide and microwave passive components, which are key to state-of-the-art innovations in communication technologies. |
You may like...
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao
Paperback
Introduction To Communication Studies
George Angelopulo, Elizabeth Lubinga
Paperback
R458
Discovery Miles 4 580
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, …
Paperback
R1,452
Discovery Miles 14 520
|