Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > General
This book comprises select proceedings of the international conference ETAEERE 2020, and covers latest research in the areas of electronics, communication and computing. The book includes different approaches and techniques for specific applications using particle swarm optimization, Otsu's function and harmony search optimization algorithm, DNA-NAND gate, triple gate SOI MOSFET, micro-Raman and FTIR analysis, high-k dielectric gate oxide, spectrum sensing in cognitive radio, microstrip antenna, GPR with conducting surfaces, energy efficient packet routing, iBGP route reflectors, circularly polarized antenna, double fork shaped patch radiator, implementation of Doppler radar at 24 GHz, iris image classification using SVM, digital image forgery detection, secure communication, spoken dialog system, and DFT-DCT spreading strategies. Given the range of topics covered, this book can be useful for both students and researchers working in electronics and communication.
This volume comprises the proceedings of ICITCS 2020. It aims to provide a snapshot of the latest issues encountered in IT convergence and security. The book explores how IT convergence and security is core to most current research, industrial and commercial activities. Topics covered in this volume include machine learning & deep learning, communication and signal processing, computer vision and applications, future network technology, artificial intelligence and robotics, software engineering and knowledge engineering, intelligent vehicular networking and applications, healthcare and wellness, web technology and applications, internet of things, and security & privacy. Through this volume, readers will gain an understanding of the current state-of-the-art information strategies and technologies in IT convergence and security. The book will be of use to researchers in academia, industry and other research institutes focusing on IT convergence and security.
This book collects selected papers from the 6th Conference on Signal and Information Processing, Networking and Computers, held in Guiyang, China, on August 13 - 16, 2019. Focusing on the latest advances in information theory, communication systems, computer science, aerospace technologies, big data and other related technologies, it offers a valuable resource for researchers and industrial practitioners alike.
E-Commerce and M-Commerce Technologies explores the emerging area of mobile commerce. The chapters in this book look specifically at the development of emerging technologies and their application in Internet commerce. From E-business to mobile database developments, this book offers a compilation of readings that will prove useful to individuals and organizations in the academic study and research surrounding mobile commerce as well as in the practical application of these technologies.
This book features selected research papers presented at the International Conference on Evolutionary Computing and Mobile Sustainable Networks (ICECMSN 2020), held at the Sir M. Visvesvaraya Institute of Technology on 20-21 February 2020. Discussing advances in evolutionary computing technologies, including swarm intelligence algorithms and other evolutionary algorithm paradigms which are emerging as widely accepted descriptors for mobile sustainable networks virtualization, optimization and automation, this book is a valuable resource for researchers in the field of evolutionary computing and mobile sustainable networks.
This book offers a comprehensive overview of fading and shadowing in wireless channels. A number of statistical models including simple, hybrid, compound and cascaded ones are presented along with a detailed discussion of diversity techniques employed to mitigate the effects of fading and shadowing. The effects of co-channel interference before and after the implementation of diversity are also analyzed. To facilitate easy understanding of the models and the analysis, the background on probability and random variables is presented with relevant derivations of densities of the sums, products, ratios as well as order statistics of random variables. The book also provides material on digital modems of interest in wireless systems. The updated edition expands the background materials on probability by offering sections on Laplace and Mellin transforms, parameter estimation, statistical testing and receiver operating characteristics. Newer models for fading, shadowing and shadowed fading are included along with the analysis of diversity combining algorithms. In addition, this edition contains a new chapter on Cognitive Radio. Based on the response from readers of the First Edition, detailed Matlab scripts used in the preparation of this edition are provided. Wherever necessary, Maple scripts used are also provided.
This book presents the latest research in the fields of computational intelligence, ubiquitous computing models, communication intelligence, communication security, machine learning, informatics, mobile computing, cloud computing and big data analytics. The best selected papers, presented at the International Conference on Innovative Data Communication Technologies and Application (ICIDCA 2020), are included in the book. The book focuses on the theory, design, analysis, implementation and applications of distributed systems and networks.
This book covers and makes four major contributions: 1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks; 2) proposing a novel approach to identify rumor sources in time-varying networks; 3) developing a fast approach to identify multiple rumor sources; 4) proposing a community-based method to overcome the scalability issue in this research area. These contributions enable rumor source identification to be applied effectively in real-world networks, and eventually diminish rumor damages, which the authors rigorously illustrate in this book. In the modern world, the ubiquity of networks has made us vulnerable to various risks. For instance, viruses propagate throughout the Internet and infect millions of computers. Misinformation spreads incredibly fast in online social networks, such as Facebook and Twitter. Infectious diseases, such as SARS, H1N1 or Ebola, have spread geographically and killed hundreds of thousands people. In essence, all of these situations can be modeled as a rumor spreading through a network, where the goal is to find the source of the rumor so as to control and prevent network risks. So far, extensive work has been done to develop new approaches to effectively identify rumor sources. However, current approaches still suffer from critical weaknesses. The most serious one is the complex spatiotemporal diffusion process of rumors in time-varying networks, which is the bottleneck of current approaches. The second problem lies in the expensively computational complexity of identifying multiple rumor sources. The third important issue is the huge scale of the underlying networks, which makes it difficult to develop efficient strategies to quickly and accurately identify rumor sources. These weaknesses prevent rumor source identification from being applied in a broader range of real-world applications. This book aims to analyze and address these issues to make rumor source identification more effective and applicable in the real world. The authors propose a novel reverse dissemination strategy to narrow down the scale of suspicious sources, which dramatically promotes the efficiency of their method. The authors then develop a Maximum-likelihood estimator, which can pin point the true source from the suspects with high accuracy. For the scalability issue in rumor source identification, the authors explore sensor techniques and develop a community structure based method. Then the authors take the advantage of the linear correlation between rumor spreading time and infection distance, and develop a fast method to locate the rumor diffusion source. Theoretical analysis proves the efficiency of the proposed method, and the experiment results verify the significant advantages of the proposed method in large-scale networks. This book targets graduate and post-graduate students studying computer science and networking. Researchers and professionals working in network security, propagation models and other related topics, will also be interested in this book.
Based on cutting-edge research projects in the field, this comprehensive 4-volume book series provides the latest details and covers the most impactful aspects of mobile, wireless, and broadband communications development. These books present key systems and enabling technologies in a clear and accessible manner, offering you a detailed roadmap the future evolution of next generation communications. Drawing upon the insights of leading experts in the field, each of the four volumes is dedicated to an area of critical importance, including Radio Interfaces; Networks, Services and Applications; Reconfigurability; and Ad Hoc Networks.
This book focuses on conceptual frameworks that are helpful in understanding the basics of electronics - what the feedback system is, the principle of an oscillator, the operational working of an amplifier, and other relevant topics. It also provides an overview of the technologies supporting electronic systems, like OP-AMP, transistor, filter, ICs, and diodes. It consists of seven chapters, written in an easy and understandable language, and featuring relevant block diagrams, circuit diagrams, valuable and interesting solved examples, and important test questions. Further, the book includes up-to-date illustrations, exercises, and numerous worked examples to illustrate the theory and to demonstrate their use in practical designs.
This classroom-tested textbook describes the design and implementation of software for distributed real-time systems, using a bottom-up approach. The text addresses common challenges faced in software projects involving real-time systems, and presents a novel method for simply and effectively performing all of the software engineering steps. Each chapter opens with a discussion of the core concepts, together with a review of the relevant methods and available software. This is then followed with a description of the implementation of the concepts in a sample kernel, complete with executable code. Topics and features: introduces the fundamentals of real-time systems, including real-time architecture and distributed real-time systems; presents a focus on the real-time operating system, covering the concepts of task, memory, and input/output management; provides a detailed step-by-step construction of a real-time operating system kernel, which is then used to test various higher level implementations; describes periodic and aperiodic scheduling, resource management, and distributed scheduling; reviews the process of application design from high-level design methods to low-level details of design and implementation; surveys real-time programming languages and fault tolerance techniques; includes end-of-chapter review questions, extensive C code, numerous examples, and a case study implementing the methods in real-world applications; supplies additional material at an associated website. Requiring only a basic background in computer architecture and operating systems, this practically-oriented work is an invaluable study aid for senior undergraduate and graduate-level students of electrical and computer engineering, and computer science. The text will also serve as a useful general reference for researchers interested in real-time systems.
This book provides insights into the First International Conference on Communication, Devices and Computing (ICCDC 2017), which was held in Haldia, India on November 2-3, 2017. It covers new ideas, applications and the experiences of research engineers, scientists, industrialists, scholars and students from around the globe. The proceedings highlight cutting-edge research on communication, electronic devices and computing, and address diverse areas such as 5G communication, spread spectrum systems, wireless sensor networks, signal processing for secure communication, error control coding, printed antennas, analysis of wireless networks, antenna array systems, analog and digital signal processing for communication systems, frequency selective surfaces, radar communication, and substrate integrated waveguide and microwave passive components, which are key to state-of-the-art innovations in communication technologies.
Mobile Commerce is an emerging phenomenon based on quickly growing applications of wireless technologies and mobile communications. Mobile communication is becoming as essential need for individuals and businesses in their daily actions. Using mobile commerce, organizations can offer customers services that are easily accessed by a mobile device anytime and anywhere. Wireless Communications and Mobile Commerce collects holistic perspectives contributed by leading professionals to explore strategic considerations regarding potential opportunities and issues in mobile commerce. These professionals' discussions and contributions focus on providing a comprehensive understanding surrounding business strategies, models, management paradigms, architectures, infrastructure, strengths and weaknesses.
This book tackles important problems of anomaly detection and health status analysis in complex core router systems, integral to today's Internet Protocol (IP) networks. The techniques described provide the first comprehensive set of data-driven resiliency solutions for core router systems. The authors present an anomaly detector for core router systems using correlation-based time series analysis, which monitors a set of features of a complex core router system. They also describe the design of a changepoint-based anomaly detector such that anomaly detection can be adaptive to changes in the statistical features of data streams. The presentation also includes a symbol-based health status analyzer that first encodes, as a symbol sequence, the long-term complex time series collected from a number of core routers, and then utilizes the symbol sequence for health analysis. Finally, the authors describe an iterative, self-learning procedure for assessing the health status. Enables Accurate Anomaly Detection Using Correlation-Based Time-Series Analysis; Presents the design of a changepoint-based anomaly detector; Includes Hierarchical Symbol-based Health-Status Analysis; Describes an iterative, self-learning procedure for assessing the health status.
This book features research related to computational intelligence and energy and thermal aware management of computing resources. The authors publish original and timely research in current areas of power, energy, temperature, and environmental engineering as and advances in computational intelligence that are benefiting the fields. Topics include signal processing architectures, algorithms, and applications; biomedical informatics and computation; artificial intelligence and machine learning; green technologies in information; and more. The book includes contributions from a wide range of researchers, academicians, and industry professionals. The book is made up both of extended papers presented at the International Conference on Intelligent Computing and Sustainable System (ICICSS 2018), September 20-21, 2018, and other accepted papers on R&D and original research work related to the practice and theory of technologies to enable and support Intelligent Computing applications.
This book details some of the major developments in the implementation of compressive sensing in radio applications for electronic defense and warfare communication use. It provides a comprehensive background to the subject and at the same time describes some novel algorithms. It also investigates application value and performance-related parameters of compressive sensing in scenarios such as direction finding, spectrum monitoring, detection, and classification.
This book covers ideas, methods, algorithms, and tools for the in-depth study of the performance and reliability of dependable fault-tolerant systems. The chapters identify the current challenges that designers and practitioners must confront to ensure the reliability, availability, and performance of systems, with special focus on their dynamic behaviors and dependencies. Topics include network calculus, workload and scheduling; simulation, sensitivity analysis and applications; queuing networks analysis; clouds, federations and big data; and tools. This collection of recent research exposes system researchers, performance analysts, and practitioners to a spectrum of issues so that they can address these challenges in their work.
Finding ways to interfere with or jam communication signals is an essential area of electronic warfare (EW). In modern EW systems, anti-jam technology has been employed to overcome signal jamming. Recently, electronic warfare R&D has focused on creating methods to disrupt these anti-jam systems. This newly revised and greatly expanded edition of the popular Artech House book, "Modern Communications Jamming Principles and Techniques", provides an up-to-date, exhaustive treatment of the techniques and methods available to create countermeasures against anti-jam, over-the-air communications. The Second Edition features a wealth of new material on urban warfare, including a computer simulation of EW architecture alternatives for land-based forces based on urban constraints. This unique resource is dedicated to showing professionals how to design and build jammers specifically targeted at anti-jam communications. Moreover, practitioners find assistance in evaluating the expected performance of jamming systems against modern communications systems.
This book presents design methods and considerations for digitally-assisted wideband millimeter-wave transmitters. It addresses comprehensively both RF design and digital implementation simultaneously, in order to design energy- and cost-efficient high-performance transmitters for mm-wave high-speed communications. It covers the complete design flow, from link budget assessment to the transistor-level design of different RF front-end blocks, such as mixers and power amplifiers, presenting different alternatives and discussing the existing trade-offs. The authors also analyze the effect of the imperfections of these blocks in the overall performance, while describing techniques to correct and compensate for them digitally. Well-known techniques are revisited, and some new ones are described, giving examples of their applications and proving them in real integrated circuits.
This book traces the pedagogical evolution of technical communication in America as it grew out of Engineering English requirements from roughly the turn of the century to 1950. This study examines specific curricular patterns, texts, and writers on the subject of technical communication, while also tracing engineering educational patterns as they emerge from the proceedings of the society for the promotion of engineering education. Unique to the second edition of the book is a new preface by the recent past ATTW series editor, Jimmie Killingsworth, a new introduction by Elizabeth Tebeaux, and an epilogue by Katherine Staples. Writing in a Milieu of Utility concludes that technical writing, as we teach it today, likely found its roots in engineering composition pedagogy, when, at approximately the turn of the century, engineering educators recognized that writing about science and technology not only made sense in an academic milieu that emphasized utility, but that such writing could also contribute to the professional success of engineering students. Existing somewhat tenuously as engineering itself sought academic status, technical communication emerged ultimately as a re-conceptualized composition course, after early to mid twentieth century calls for English and engineering cooperation made traditional composition offerings less relevant. Academic writing on environmental communication proliferated in the 1990's. A few of us had been calling for such work and making initial investigations throughout the 1980's, but the momentum in the field built slowly. Spurred by coverage in the mass media, academic publishers finally caught the wave of interest. In this exciting new volume, the editors demonstrate more fully than ever before how environmental rhetoric and technical communication go hand in hand. The key link that they and their distinguished group of contributors have discovered is the ancient concern of communication scholars with public deliberation. Environmental issues present technical communicators with some of their greatest challenges, above all, how to make the highly specialized and inscrutably difficult technical information generated by environmental scientists and engineers usable in public decision making. The editors encourage us to accept the challenge of contributing to environmentally conscious decision making by integrating technical knowledge and human values. For technical communicators who accept the challenge of working toward solutions by opening access to crucial information and by engaging in critical thinking on ecological issues, the research and theory offered in this volume provide a strong foundation for future practice.
Innovations in multimedia technology have truly revolutionized communication, transforming the definitions of text, audio, and visual information through hybrid combinations of these forms. The rise of multimedia systems has generated new methods for high-speed data capturing, processing, editing, storage, and dissemination across wide networks, creating a need for high-level surveillance and quality-monitoring control schemes. Emerging Research on Networked Multimedia Communication Systems provides a comprehensive overview of the most current theoretical frameworks, technological developments, and empirical research findings in the field of electronic media. This timely reference work also investigates numerous issues related to multimedia sharing and optimization over heterogeneous wired and wireless networks, making it a relevant learning tool for scholars, practitioners, and educators in the multimedia research arena. This authoritative resource features a comprehensive collection of research-based articles on topics ranging from fundamental issues in multimedia optimization to breakthrough advancements in the deployment of multimedia systems, including group synchronization control, video coding, video transmission, video broadcasting, and discussions of recent developments in Quality of Experience (QoE), Quality of Service (QoS), and Video over IP (VoIP) services. |
You may like...
A Modern Guide to the Digitalization of…
Juan Montero, Matthias Finger
Hardcover
R3,939
Discovery Miles 39 390
Pegasus - The Secret Technology That…
Laurent Richard, Sandrine Rigaud
Paperback
Community Engagement in the Online Space
Michelle Dennis, James H Albert
Hardcover
R5,631
Discovery Miles 56 310
Radio For The Amateur - The Underlying…
Alfred Herbert 1889- Packer
Hardcover
R825
Discovery Miles 8 250
|