![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > General
As electronic designers pack more and more circuits onto a single chip to create increasingly complex devices, they run into a daunting obstacle: intermodulation distortion. This distortion occurs when are circuits are too closely placed together and their operating frequencies begin to interfere with each other. This manual addresses all aspects of intermodulation distortion. From the basics of circuit design, to cutting-edge techniques, it offers practitioners hands-on guidance for their challenging projects.
Hardware Based Packet Classification for High Speed Internet Routers presents the most recent developments in hardware based packet classification algorithms and architectures. This book describes five methods which reduce the space that classifiers occupy within TCAMs; TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. These methods demonstrate that in most cases a substantial reduction of space is achieved. Case studies and examples are provided throughout this book. About this book: * Presents the only book in the market that exclusively covers hardware based packet classification algorithms and architectures. * Describes five methods which reduce the space that classifiers occupy within TCAMs: TCAM Razor, All-Match Redundancy Removal, Bit Weaving, Sequential Decomposition, and Topological Transformations. * Provides case studies and examples throughout. Hardware Based Packet Classification for High Speed Internet Routers is designed for professionals and researchers who work within the related field of router design. Advanced-level students concentrating on computer science and electrical engineering will also find this book valuable as a text or reference book.
A handbook for technicians, applying knowledge of important wireless communications technologies to the real-world situations that technicians encounter every day. This second edition features material on such critical technologies as GPRS, EDGE, CDMA-2000 and WCDMA, and includes an introduction to network design and performance issues.
"Fault Detection and Isolation: Multi-Vehicle Unmanned System" deals with the design and development of fault detection and isolation algorithms for unmanned vehicles such as spacecraft, aerial drones and other related vehicles. Addressing fault detection and isolation is a key step towards designing autonomous, fault-tolerant cooperative control of networks of unmanned systems. This book proposes a solution based on a geometric approach, and presents new theoretical findings for fault detection and isolation in Markovian jump systems. Also discussed are the effects of large environmental disturbances, as well as communication channels, on unmanned systems. The book proposes novel solutions to difficulties like robustness issues, as well as communication channel anomalies. "Fault Detection and Isolation: Multi-Vehicle Unmanned System" is an ideal book for researchers and engineers working in the fields of fault detection, as well as networks of unmanned vehicles.
This book proposes a data-driven methodology using multi-way data analysis for the design of video-quality metrics. It also enables video- quality metrics to be created using arbitrary features. This data- driven design approach not only requires no detailed knowledge of the human visual system, but also allows a proper consideration of the temporal nature of video using a three-way prediction model, corresponding to the three-way structure of video. Using two simple example metrics, the author demonstrates not only that this purely data- driven approach outperforms state-of-the-art video-quality metrics, which are often optimized for specific properties of the human visual system, but also that multi-way data analysis methods outperform the combination of two-way data analysis methods and temporal pooling.
"Introducing Spoken Dialogue Systems into Intelligent
Environments "outlines the formalisms of a novel knowledge-driven
framework for spoken dialogue management and presents the
implementation ofa model-based Adaptive Spoken Dialogue
Manager(ASDM) called OwlSpeak. The authors have identified three
stakeholders thatpotentially influence the behavior of the ASDM:
the user, the SDS, and a complex Intelligent Environment (IE)
consisting of various devices, services, and task
descriptions.
This book covers diverse aspects of advanced computer and communication engineering, focusing specifically on industrial and manufacturing theory and applications of electronics, communications, computing and information technology. Experts in research, industry, and academia present the latest developments in technology, describe applications involving cutting-edge communication and computer systems and explore likely future directions. In addition, access is offered to numerous new algorithms that assist in solving computer and communication engineering problems. The book is based on presentations delivered at ICOCOE 2014, the 1st International Conference on Communication and Computer Engineering. It will appeal to a wide range of professionals in the field, including telecommunication engineers, computer engineers and scientists, researchers, academics and students.
This book contains research contributions from leading global scholars in nature-inspired computing. It includes comprehensive coverage of each respective topic, while also highlighting recent and future trends. The contributions provides readers with a snapshot of the state of the art in the field of nature-inspired computing and its application. This book has focus on the current researches while highlighting the empirical results along with theoretical concepts to provide a comprehensive reference for students, researchers, scholars, professionals and practitioners in the field of Advanced Artificial Intelligence, Nature-Inspired Algorithms and Soft Computing.
This book shows how to model selected communication scenarios using game theory. The book helps researchers specifically dealing with scenarios motivated by the increasing use of the Internet of Things (IoT) and 5G Communications by using game theory to approach the study of such challenging scenarios. The author explains how game theory acts as a mathematical tool that models decision making in terms of strategies and mechanisms that can result in optimal payoffs for a number of interacting entities, offering often antagonistic behaviors. The book explores new technologies in terms of design, development and management from a theoretical perspective, using game theory to analyze strategic situations and demonstrate profitable behaviors of the cooperative entities. The book identifies and explores several significant applications/uses/situations that arise from the vast deployment of the IoT. The presentation of the technological scenarios is followed in each of the first four chapters by a step-by-step theoretical model often followed by equilibrium proof, and numerical simulation results, that are explained in a tutorial-like manner. The four chapters tackle challenging IoT and 5G related issues, including: new security threats that IoT brings, e.g. botnets, ad hoc vehicular networks and the need for trust in vehicular communications, content repetition by offloading traffic onto mobile users, as well as issues due to new wearable devices that enable data collection to become more intrusive.
This book provides a comprehensive introduction to all major topics in digital signal processing (DSP). The book is designed to serve as a textbook for courses offered to undergraduate students enrolled in electrical, electronics, and communication engineering disciplines. The text is augmented with many illustrative examples for easy understanding of the topics covered. Every chapter contains several numerical problems with answers followed by question-and-answer type assignments. The detailed coverage and pedagogical tools make this an ideal textbook for students and researchers enrolled in electrical engineering and related programs.
The use of contextually aware, pervasive, distributed computing, and sensor networks to bridge the gap between the physical and online worlds is the basis of mobile social networking. This book shows how applications can be built to provide mobile social networking, the research issues that need to be solved to enable this vision, and how mobile social networking can be used to provide computational intelligence that will improve daily life. With contributions from the fields of sociology, computer science, human-computer interaction and design, this book demonstrates how mobile social networks can be inferred from users' physical interactions both with the environment and with others, as well as how users behave around them and how their behavior differs on mobile vs. traditional online social networks.
"Applications, 2nd Edition" focuses on moving object management, from the location management perspective to determining how constantly changing locations affect the traditional database and data mining technology. The book specifically describes the topics of moving objects modeling and location tracking, indexing and querying, clustering, location uncertainty, traffic-aware navigation and privacy issues, as well as the application to intelligent transportation systems. Through the book, the readers will be made familiar with the cutting-edge technologies in moving object management that can be effectively applied in LBS and transportation contexts. The second edition of this book significantly expands the coverage of the latest research on location privacy, traffic-aware navigation and uncertainty. The book has also been reorganized, with nearly all chapters rewritten, and several new chapters have been added to address the latest topics on moving objects management. Xiaofeng Meng is a professor at the School of Information, Renmin University of China; Zhiming Ding is a professor at the Institute of Software, Chinese Academy of Sciences (ISCAS); Jiajie Xu is an assistant professor at the ISCAS.
The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and bandwidth resources of end users, the P2P approach enables high performance of data distribution which is hard to achieve with traditional client-server architectures. The P2P computing community is also being actively utilized for software updates to the Internet, P2PSIP VoIP, video-on-demand, and distributed backups. The recent introduction of the identifier-locator split proposal for future Internet architectures poses another important application for DHTs, namely mapping between host permanent identity and changing IP address. The growing complexity and scale of modern P2P systems requires the introduction of hierarchy and intelligence in routing of requests. "Structured Peer-to-Peer Systems" covers fundamental issues in organization, optimization, and tradeoffs of present large-scale structured P2P systems, as well as, provides principles, analytical models, and simulation methods applicable in designing future systems. Part I presents the state-of-the-art of structured P2P systems, popular DHT topologies and protocols, and the design challenges for efficient P2P network topology organization, routing, scalability, and security. Part II shows that local strategies with limited knowledge per peer provide the highest scalability level subject to reasonable performance and security constraints. Although the strategies are local, their efficiency is due to elements of hierarchical organization, which appear in many DHT designs that traditionally are considered as flat ones. Part III describes methods to gradually enhance the local view limit when a peer is capable to operate with larger knowledge, still partial, about the entire system. These methods were formed in the evolution of hierarchical organization from flat DHT networks to hierarchical DHT architectures, look-ahead routing, and topology-aware ranking. Part IV highlights some known P2P-based experimental systems and commercial applications in the modern Internet. The discussion clarifies the importance of P2P technology for building present and future Internet systems."
This work offers a practical, non-theoretical introduction to the principles, application and benefits of multi-sensor technology in smart weapon development, surveillance systems, and an increasing variety of non-military applications. It also provides an overview of MMW (Millimeter-Wave) and IR (infrared) sensor constraints, design principles, system alternatives and targeting applications.
Network Science is the emerging field concerned with the study of large, realistic networks. This interdisciplinary endeavor, focusing on the patterns of interactions that arise between individual components of natural and engineered systems, has been applied to data sets from activities as diverse as high-throughput biological experiments, online trading information, smart-meter utility supplies, and pervasive telecommunications and surveillance technologies. This unique text/reference provides a fascinating insight into the state of the art in network science, highlighting the commonality across very different areas of application and the ways in which each area can be advanced by injecting ideas and techniques from another. The book includes contributions from an international selection of experts, providing viewpoints from a broad range of disciplines. It emphasizes networks that arise in nature-such as food webs, protein interactions, gene expression, and neural connections-and in technology-such as finance, airline transport, urban development and global trade. Topics and Features: begins with a clear overview chapter to introduce this interdisciplinary field; discusses the classic network science of fixed connectivity structures, including empirical studies, mathematical models and computational algorithms; examines time-dependent processes that take place over networks, covering topics such as synchronisation, and message passing algorithms; investigates time-evolving networks, such as the World Wide Web and shifts in topological properties (connectivity, spectrum, percolation); explores applications of complex networks in the physical and engineering sciences, looking ahead to new developments in the field. Researchers and professionals from disciplines as varied as computer science, mathematics, engineering, physics, chemistry, biology, ecology, neuroscience, epidemiology, and the social sciences will all benefit from this topical and broad overview of current activities and grand challenges in the unfolding field of network science.
The paradigm of complexity is pervading both science and engineering, le- ing to the emergence of novel approaches oriented at the development of a systemic view of the phenomena under study; the de?nition of powerful tools for modelling, estimation, and control; and the cross-fertilization of di?erent disciplines and approaches. One of the most promising paradigms to cope with complexity is that of networked systems. Complex, dynamical networks are powerful tools to model, estimate, and control many interesting phenomena, like agent coordination, synch- nization, social and economics events, networks of critical infrastructures, resourcesallocation, informationprocessing, controlovercommunicationn- works, etc. Advances in this ?eld are highlighting approaches that are more and more oftenbasedondynamicalandtime-varyingnetworks, i.e.networksconsisting of dynamical nodes with links that can change over time. Moreover, recent technological advances in wireless communication and decreasing cost and size of electronic devices are promoting the appearance of large inexpensive interconnected systems, each with computational, sensing and mobile ca- bilities. This is fostering the development of many engineering applications, which exploit the availability of these systems of systems to monitor and control very large-scale phenomena with ?ne resoluti
The only source for practical, real-world information on RF measurements for cellular phones and wireless data systems It is predicted that by the year 2010, all digital wireless communications equipment--including cellular, PCS, and 3G phones; wireless LANs; GPS navigation systems; and DBS TV--will have data transfer capabilities of over 1 Mbps. Now, as this significant turning point quickly approaches, this book presents everything industry professionals need to know about the Radio Frequency (RF) measurements and tests that must be made on this new generation of digital wireless communications equipment. Presenting just enough theory as is absolutely required for comprehension, RF Measurements for Cellular Phones and Wireless Data Systems: Provides a review of basic RF principles and terminology Describes RF measurement equipment, including signal generators, power meters, frequency meters, vector network analyzers, spectrum analyzers, and vector signal analyzers Explains the RF devices that are used in cellular phones and wireless data transmission equipment--how they work, what their critical performance parameters are, how they're tested, and typical test results Illustrates the testing of RF devices and systems with digitally modulated signals that represent the voice, video, or data that the RF wave is carrying RF Measurements for Cellular Phones and Wireless Data Systems has been written to serve as the industry standard for RF measurements and testing. It is an indispensable resource for engineers, technicians, and managers involved in the construction, installation, or maintenance of cell phones and wireless data equipment.
"It strikes an excellent balance between underlying theory and principles, rigorous derivation of design formulae and description of practical applications, ranging from device to system and network, performances and properties." -- International Journal of Optoelectronics "I would recommend it as a reference for those seeking to gain a basic understanding of fiber optic access networks and for technical managers who want an up-to-date overview of advances in this technology." -- Laser Focus World
This book provides a snapshot of the current state-of-the-art in the fields of mobile and wireless technology, security and applications. The proceedings of the 2nd International Conference on Mobile and Wireless Technology (ICMWT2015), it represents the outcome of a unique platform for researchers and practitioners from academia and industry to share cutting-edge developments in the field of mobile and wireless science technology, including those working on data management and mobile security. The contributions presented here describe the latest academic and industrial research from the international mobile and wireless community. The scope covers four major topical areas: mobile and wireless networks and applications; security in mobile and wireless technology; mobile data management and applications; and mobile software. The book will be a valuable reference for current researchers in academia and industry, and a useful resource for graduate-level students working on mobile and wireless technology.
This book examines the architectures, technologies, and design methods that make it possible to achieve a survivable fiber network, both practically and economically. Combining theory and actual results, it explores alternative methods and presents analytical and computational optimization approaches.
The rapid increase in computing power and communication speed, coupled with computer storage facilities availability, has led to a new age of multimedia app- cations. Multimedia is practically everywhere and all around us we can feel its presence in almost all applications ranging from online video databases, IPTV, - teractive multimedia and more recently in multimedia based social interaction. These new growing applications require high-quality data storage, easy access to multimedia content and reliable delivery. Moving ever closer to commercial - ployment also aroused a higher awareness of security and intellectual property management issues. All the aforementioned requirements resulted in higher demands on various - eas of research (signal processing, image/video processing and analysis, com- nication protocols, content search, watermarking, etc.). This book covers the most prominent research issues in multimedia and is divided into four main sections: i) content based retrieval, ii) storage and remote access, iii) watermarking and co- right protection and iv) multimedia applications. Chapter 1 of the first section presents an analysis on how color is used and why is it crucial in nowadays multimedia applications. In chapter 2 the authors give an overview of the advances in video abstraction for fast content browsing, transm- sion, retrieval and skimming in large video databases and chapter 3 extends the discussion on video summarization even further. Content retrieval problem is tackled in chapter 4 by describing a novel method for producing meaningful s- ments suitable for MPEG-7 description based on binary partition trees (BPTs).
Full and accessible coverage of the key concepts governing the
reduction, containment, and measurement of unintentional
electromagnetic radiation. |
You may like...
Optimization of Manufacturing Systems…
Yingfeng Zhang, Fei Tao
Paperback
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, …
Paperback
R1,452
Discovery Miles 14 520
Machine Learning for Future Fiber-Optic…
Alan Pak Tao Lau, Faisal Nadeem Khan
Paperback
R2,699
Discovery Miles 26 990
Practical TCP/IP and Ethernet Networking…
Deon Reynders, Edwin Wright
Paperback
R1,491
Discovery Miles 14 910
|