![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > General
This book focuses on the characteristics of cooperative control problems for general linear multi-agent systems, including formation control, air traffic control, rendezvous, foraging, role assignment, and cooperative search. On this basis and combined with linear system theory, it introduces readers to the cooperative tracking problem for identical continuous-time multi-agent systems under state-coupled dynamics; the cooperative output regulation for heterogeneous multi-agent systems; and the optimal output regulation for model-free multi-agent systems. In closing, the results are extended to multiple leaders, and cooperative containment control for uncertain multi-agent systems is addressed. Given its scope, the book offers an essential reference guide for researchers and designers of multi-agent systems, as well as a valuable resource for upper-level undergraduate and graduate students.
This title covers the fundamentals of error-correcting codes for the non-specialist user, from general concepts through to the most common error-correcting codes applied to bit transmission in packet switched networks and personal cellular systems. It also includes sections on linear blockades, BCH codes and cyclic codes. The work is intended for professionals and students needing a thorough tutorial in error correction.
This book is a collection of selected papers presented at the First International Conference on Industrial IoT, Big Data and Supply Chain (IIoTBDSC), held as an online conference due to COVID-19 (initially to be held in Macao, Special Administration Region (SAR) of China), during September 15-17, 2020. It includes novel and innovative work from experts, practitioners, scientists and decision-makers from academia and industry. It brings multi-disciplines together on IIoT, data science, cloud computing, software engineering approaches to design, development, testing and quality of products and services.
This book examines a writing activity that has recently fallen into disrepute. Outlining has a bad reputation among students, even though many teachers and textbooks still recommend the process. In part, the author argues, the medium is to blame. Paper and ink make the revision difficult. But if one uses an electronic outliner, the activity can be very helpful in developing a thoughtful and effective document, particularly one that spans many pages and deals with a complicated subject. Outlining Goes Electronic takes an historical approach, examining the way people developed the idea of outlining, from the classical period to the present. We see that the medium in which people worked strongly shaped their assumptions, ideas, and use of outlines. In developing a theoretical model of outlining as an activity, the author argues that a relatively new electronic tool-software that accelerates and performs the process of outlining-can give us a new perspective from which to engage previous classroom models of writing, recent writing theory, and current practice in the technical writing field.
This book focuses on the modelling methodology of microstrip interconnects, discussing various structures of single-input multiple-output (SIMO) tree interconnects for signal integrity (SI) engineering. Further, it describes lumped and distributed transmission line elements based on single-input single-output (SIMO) models of symmetric and asymmetric trees, and investigates more complicated phenomenon, such as interbranch coupling. The modelling approaches are based on the analytical methods using the Z-, Y- and T-matrices. The established method enables the S-parameters and voltage transfer function of SIMO tree to be determined. Providing illustrative results with frequency and time domain analyses for each tree interconnect structure, the book is a valuable resource for researchers, engineers, and graduate students in fields of analogue, RF/microwave, digital and mixed circuit design, SI and manufacturing engineering.
This edited volume explores the fundamental aspects of the dark web, ranging from the technologies that power it, the cryptocurrencies that drive its markets, the criminalities it facilitates to the methods that investigators can employ to master it as a strand of open source intelligence. The book provides readers with detailed theoretical, technical and practical knowledge including the application of legal frameworks. With this it offers crucial insights for practitioners as well as academics into the multidisciplinary nature of dark web investigations for the identification and interception of illegal content and activities addressing both theoretical and practical issues.
Healthcare and well-being have captured the attention of established software companies, start-ups, and investors. Software is starting to play a central role for addressing the problems of the aging society and the escalating cost of healthcare services. Enablers of such digital health are a growing number of sensors for sensing the human body and communication infrastructure for remote meetings, data sharing, and messaging. The challenge that lies in front of us is how to effectively make use of these capabilities, for example to empower patients and to free the scarce resources of medical personnel. Requirements engineering is the process by which the capabilities of a software product are aligned with stakeholder needs and a shared understanding between the stakeholders and development team established. This book provides guide for what to look for and do when inquiring and specifying software that targets healthcare and well-being, helping readers avoid the pitfalls of the highly regulated and sensible healthcare domain are and how they can be overcome. This book brings together the knowledge of 22 researchers, engineers, lawyers, and CEOs that have experience in the development of digital health solutions. It represents a unique line-up of best practices and recommendations of how to engineer requirements for digital health. In particular the book presents: * The area of digital health, e-health, and m-health * Best practice for requirements engineering based on evidence from a large number of projects * Practical step-by-step guidelines, examples, and lessons-learned for working with laws, regulations, ethical issues, interoperability, user experience, security, and privacy * How to put these many concerns together for engineering the requirements of a digital health solution and for scaling a digital health product For anybody who intends to develop software for digital health, this book is an introduction and reference with a wealth of actionable insights. For students interested in understanding how to apply software to healthcare, the text introduces key topics and guides further studies with references to important literature.
This book is written for academic and industry professionals working in the field of sensing, instrumentation and related fields, and is positioned to give a snapshot of the current state of the art in sensing technology, particularly from the applied perspective. The book is intended to give broad overview of the latest developments, in addition to discussing the process through which researchers go through in order to develop sensors, or related systems, which will become more widespread in the future.
This book contains research contributions from leading cyber security scholars from around the world. The authors provide comprehensive coverage of various cyber security topics, while highlighting recent trends. The book also contains a compendium of definitions and explanations of concepts, processes, acronyms, and comprehensive references on existing literature and research on cyber security and analytics, information sciences, decision systems, digital forensics, and related fields. As a whole, the book is a solid reference for dynamic and innovative research in the field, with a focus on design and development of future-ready cyber security measures. Topics include defenses against ransomware, phishing, malware, botnets, insider threats, and many others.
This book discusses email spam detection and its challenges such as text classification and categorization. The book proposes an efficient spam detection technique that is a combination of Character Segmentation and Recognition and Classification (CSRC). The author describes how this can detect whether an email (text and image based) is a spam mail or not. The book presents four solutions: first, to extract the text character from the image by segmentation process which includes a combination of Discrete Wavelet Transform (DWT) and skew detection. Second, text characters are via text recognition and visual feature extraction approach which relies on contour analysis with improved Local Binary Pattern (LBP). Third, extracted text features are classified using improvised K-Nearest Neighbor search (KNN) and Support Vector Machine (SVM). Fourth, the performance of the proposed method is validated by the measure of metric named as sensitivity, specificity, precision, recall, F-measure, accuracy, error rate and correct rate. Presents solutions to email spam detection and discusses its challenges such as text classification and categorization; Analyzes the proposed techniques' performance using precision, F-measure, recall and accuracy; Evaluates the limitations of the proposed research thereby recommending future research.
This book deepens the understanding of people through smartphone data obtained via mobile sensing and applies psychological insights for social networking applications. The author first introduces TYDR, an application for researching smartphone data and user personality. A novel, structured privacy model for mobile sensing applications is developed and the obtained empirical results help researchers gauge what data they can expect users to share in daily-life studies. The new research findings, the concept of mobile sensing, and psychological insights about the formation and structure of real-life social networks are integrated into the field of social networking. Finally, for this novel integration, the author presents concepts, decentralized software architectures, and fully realized prototypes that recommend new contacts, media, and locations to individual users and groups of users.
This thesis focuses on the design and use of software defined networking (SDN) in residential Internet service providers (ISPs), as well as innovative operational models that can be incorporated in broadband ecosystems. Though SDN addresses the challenges for bundled best-effort service provided by broadband operators for users, it does not distinguish between the different types of applications (video streaming, web-browsing, and large file transfers), nor does it cater to the varying needs of different household devices (entertainment tablets, work laptops, or connected appliances). This is a problem for end-users, who want to differentiate between applications and devices; for content providers (CPs), who want to exercise control over streams of high monetary value; and for Internet service providers (ISPs), who have to accommodate growing traffic volumes without additional revenues. This book develops a series of solution techniques that use SDN to find an optimal balance between the competing requirements of end-users, ISPs, and CPs. In addition to the design and discussions of various architectures, it provides technical details on real-world system implementations and prototypes. As such, it offers a valuable resource for researchers, network architects, network strategists, developers, and all other readers seeking to learn more about the practical value of SDN in future ISP networks.
This book provides an overview of recent innovations and achievements in the broad areas of cyber-physical systems (CPS), including architecture, networking, systems, applications, security, and privacy. The book discusses various new CPS technologies from diverse aspects to enable higher level of innovation towards intelligent life. The book provides insight to the future integration, coordination and interaction between the physical world, the information world, and human beings. The book features contributions from renowned researchers and engineers, who discuss key issues from various perspectives, presenting opinions and recent CPS-related achievements. Investigates how to advance the development of cyber-physical systems Provides a joint consideration of other newly emerged technologies and concepts in relation to CPS like cloud computing, big data, fog computing, and crowd sourcing Includes topics related to CPS such as architecture, system, networking, application, algorithm, security and privacy
This book addresses Software-Defined Radio (SDR) baseband processing from the computer architecture point of view, providing a detailed exploration of different computing platforms by classifying different approaches, highlighting the common features related to SDR requirements and by showing pros and cons of the proposed solutions. It covers architectures exploiting parallelism by extending single-processor environment (such as VLIW, SIMD, TTA approaches), multi-core platforms distributing the computation to either a homogeneous array or a set of specialized heterogeneous processors, and architectures exploiting fine-grained, coarse-grained, or hybrid reconfigurability.
Some Obstacles on the Road to ATM; D. Abensour, L. Felton. Electropolitical Correctness and High Speed Networking, or, Why ATM Is Like a Nose; D. Stevenson. An Overview of the ATM Forum and the Traffic Management Activities; L. Gun, G.A. Marin. Communication Subsystems for High Speed Networks; D.N. Serpanos. SMDS and Frame Relay; J.P. Bernoux. ATM Systems in Support of BISDN, Frame Relay, and SMDS Services; P. Holzworth. Approaching BISDN; C. Bisdikian, et al. On Transport Systems for ATM Networks; M. Zitterbart, et al. XTP Bucket Error Control; S. Fdida, H. Santoso. Congestion Control Mechanisms for ATM Networks; D.S. Holtsinger. Highly-Bursty Sources and their Admission Control in ATM Networks; K. Sohraby. A User Relief Approach to Congestion Control in ATM Networks; I. Stavrakakis, et al. Space Priority Buffer Management; D. Tipper, et al. 4 additional articles. Index.
This book covers the basic principles for understanding radio wave propagation for common frequency bands used in radio-communications. This includes achievements and developments in propagation models for wireless communication. This book is intended to bridge the gap between the theoretical calculations and approaches to the applied procedures needed for radio links design in a proper manner. The authors emphasize propagation engineering by giving fundamental information and explain the use of basic principles together with technical achievements. This new edition includes additional information on radio wave propagation in guided media and technical issues for fiber optics cable networks with several examples and problems. This book also includes a solution manual - with 90 solved examples distributed throughout the chapters - and 158 problems including practical values and assumptions.
Telecommunications firms worldwide are actively involved in AI applications for resolving network management and telecommunications problems. This book addresses the following major functional areas: planning, scheduling, monitoring, control, fault classification and diagnosis, training, and help desks. Several AI techniques are applied, including neural networks, expert systems, integrating rule-based systems with case-based reasoning systems, genetic algorithms, distributed AI, and intelligent tutoring systems. It is of interest to researchers and professionals in telecommunication, AI experts, and graduate students.
This book presents high-quality papers from the Fourth International Conference on Microelectronics, Computing & Communication Systems (MCCS 2019). It discusses the latest technological trends and advances in MEMS and nanoelectronics, wireless communication, optical communication, instrumentation, signal processing, image processing, bioengineering, green energy, hybrid vehicles, environmental science, weather forecasting, cloud computing, renewable energy, RFID, CMOS sensors, actuators, transducers, telemetry systems, embedded systems and sensor network applications. It includes papers based on original theoretical, practical and experimental simulations, development, applications, measurements and testing. The applications and solutions discussed here provide excellent reference material for future product development.
This edited book contains invited papers from renowned experts working in the field of Wearable Electronics Sensors. It includes 14 chapters describing recent advancements in the area of Wearable Sensors, Wireless Sensors and Sensor Networks, Protocols, Topologies, Instrumentation architectures, Measurement techniques, Energy harvesting and scavenging, Signal processing, Design and Prototyping. The book will be useful for engineers, scientist and post-graduate students as a reference book for their research on wearable sensors, devices and technologies which is experiencing a period of rapid growth driven by new applications such as heart rate monitors, smart watches, tracking devices and smart glasses.
The Proceedings of The Third International Conference on Communications, Signal Processing and Systems provides the state-of-art developments of Communications, Signal Processing and Systems. The conference covered such topics as wireless communications, networks, systems, signal processing for communications. This book is a collection of contributions coming out of Third International Conference on Communications, Signal Processing and Systems held on July 2014 in Hohhot, Inner Mongolia, China.
Most books on linear systems for undergraduates cover discrete and continuous systems material together in a single volume. Such books also include topics in discrete and continuous filter design, and discrete and continuous state-space representations. However, with this magnitude of coverage, the student typically gets a little of both discrete and continuous linear systems but not enough of either. Minimal coverage of discrete linear systems material is acceptable provided that there is ample coverage of continuous linear systems. On the other hand, minimal coverage of continuous linear systems does no justice to either of the two areas. Under the best of circumstances, a student needs a solid background in both these subjects. Continuous linear systems and discrete linear systems are broad topics and each merit a single book devoted to the respective subject matter. The objective of this set of two volumes is to present the needed material for each at the undergraduate level, and present the required material using MATLAB (R) (The MathWorks Inc.).
This book focuses on a wide range of innovations related to Cybersecurity Education which include: curriculum development, faculty and professional development, laboratory enhancements, community outreach, and student learning. The book includes topics such as: Network Security, Biometric Security, Data Security, Operating Systems Security, Security Countermeasures, Database Security, Cloud Computing Security, Industrial Control and Embedded Systems Security, Cryptography, and Hardware and Supply Chain Security. The book introduces the concepts, techniques, methods, approaches and trends needed by cybersecurity specialists and educators for keeping current their security knowledge. Further, it provides a glimpse of future directions where cybersecurity techniques, policies, applications, and theories are headed. The book is a rich collection of carefully selected and reviewed manuscripts written by diverse cybersecurity experts in the listed fields and edited by prominent cybersecurity researchers and specialists.
This textbook details the architecture of a digital coherent optical system and describes its main digital signal processing (DSP) algorithms. The authors first show how the combination of advanced modulation techniques, DSP and coherent detection has led to significant gains in capacity and ease of operation. The authors follow the path of the information from its generation in the transmitter, to propagation through the fiber and processing by the DSP algorithms in the receiver. The work summarizes academic results and presents them in a didactic way to students and practitioners working on the area of optical communications. A full suite of classroom materials is included for easy integration into a curriculum, containing theoretic and simulation problems, and off-the-shelf Matlab/Octave functions.
This book provides comprehensive, graduate-level treatment of analog and digital signal analysis suitable for course use and self-guided learning. This expert text guides the reader from the basics of signal theory through a range of application tools for use in acoustic analysis, geophysics, and data compression. Each concept is introduced and explained step by step, and the necessary mathematical formulae are integrated in an accessible and intuitive way. The first part of the book explores how analog systems and signals form the basics of signal analysis. This section covers Fourier series and integral transforms of analog signals, Laplace and Hilbert transforms, the main analog filter classes, and signal modulations. Part II covers digital signals, demonstrating their key advantages. It presents z and Fourier transforms, digital filtering, inverse filters, deconvolution, and parametric modeling for deterministic signals. Wavelet decomposition and reconstruction of non-stationary signals are also discussed. The third part of the book is devoted to random signals, including spectral estimation, parametric modeling, and Tikhonov regularization. It covers statistics of one and two random variables and the principles and methods of spectral analysis. Estimation of signal properties is discussed in the context of ergodicity conditions and parameter estimations, including the use of Wiener and Kalman filters. Two appendices cover the basics of integration in the complex plane and linear algebra. A third appendix presents a basic Matlab toolkit for computer signal analysis. This expert text provides both a solid theoretical understanding and tools for real-world applications.
This book presents works from world-class experts from academia, industry, and national agencies representing countries from across the world focused on automotive fields for in-vehicle signal processing and safety. These include cutting-edge studies on safety, driver behavior, infrastructure, and human-to-vehicle interfaces. Vehicle Systems, Driver Modeling and Safety is appropriate for researchers, engineers, and professionals working in signal processing for vehicle systems, next generation system design from driver-assisted through fully autonomous vehicles. |
![]() ![]() You may like...
Telegraph Code, 1883
Kean & Co Preston, Lawrence J Gutter Collection of Chic
Hardcover
R752
Discovery Miles 7 520
Electromagnetic Modeling in Power…
Ivica Stevanovic, Bernhard Wunsch
Hardcover
R1,331
Discovery Miles 13 310
Intelligent Systems and Networks…
Duc-Tan Tran, Gwanggil Jeon, …
Hardcover
R6,028
Discovery Miles 60 280
IoT Technologies in Smart-Cities - From…
Fadi Al-Turjman, Muhammad Imran
Hardcover
Community Engagement in the Online Space
Michelle Dennis, James H Albert
Hardcover
R6,126
Discovery Miles 61 260
Handbook of Research on Evolving Designs…
Kandarpa Kumar Sarma, Navajit Saikia, …
Hardcover
R10,584
Discovery Miles 105 840
|