![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > General
Telecommunications - central to our daily lives - continues to change dramatically. These changes are the result of technological advances, deregulation, the proliferation of broadband service offers, and the spectacular popularity of the Internet and wireless services. In such adynamic technological and economic environment, competition is increasing among service providers and among equipment manufacturers. Consequently, optimization of the planning process is becoming essential. Although telecommunications network planning has been tackled by the Operations Research community for some time, many fundamental problems remain challenging. Through its fourteen chapters, this book covers some new and some still challenging older problems which arise in the planning of telecommunication networks. Telecommunications Network Planning will benefit both telecommunications practitioners looking for efficient methods to solve their problems and operations researchers interested in telecommunications. The book examines network design and dimensioning problems; it explores Operation Research issues related to a new standard Asynchronous Transfer Mode (ATM); it overviews problems that arise when designing survivable SDH/SONET Networks; it considers some broadband network problems; and it concludes with three chapters on wireless and mobile networks. Leading area researchers have contributed their recent research on the telecommunications and network topics treated in the volume.
Increasingly, robots are being used in environments inhospitable to humans such as the deep ocean, inside nuclear reactors, and in deep space. Such robots are controlled by remote links to human operators who may be close by or thousands of miles away. The techniques used to control these robots is the subject of this book. The author begins with a basic introduction to robot control and then considers the important problems to be overcome: delays or noisy control lines, feedback and response information, and predictive displays. Readers are assumed to have a basic understanding of robotics though this may be their first exposure to the subject of telerobotics. Professional engineers and roboticists will find this an invaluable introduction to this subject.
This new edition provides both theoretical and practical background of security and forensics for mobile phones. The author discusses confidentiality, integrity, and availability threats in mobile telephones to provide background for the rest of the book. Security and secrets of mobile phones are discussed including software and hardware interception, fraud and other malicious techniques used "against" users. The purpose of this book is to raise user awareness in regards to security and privacy threats present in the use of mobile phones while readers will also learn where forensics data reside in the mobile phone and the network and how to conduct a relevant analysis. The information on denial of service attacks has been thoroughly updated for the new edition. Also, a major addition to this edition is a section discussing software defined radio and open source tools for mobile phones.
Fieldbus Technology (FT) is an enabling platform that is becoming the preferred choice for the next generation real-time automation and control solutions. This book incorporates a selection of research and development papers. Topics covered include: history and background, contemporary standards, underlying architecture, comparison between different Fieldbus systems, applications, latest innovations, new trends as well as issues such as compatibility, interoperability, and interchangeability.
During the past two decades, many communication techniques have been developed to achieve various goals such as higher data rate, more robust link quality, andmoreusercapacityinmorerigorouschannelconditions.Themost well known are, for instance, CDMA, OFDM, MIMO, multiuser OFDM, and UWB systems.All these systems havetheir ownunique superioritywhile they also induce other drawbacks that limit the system performance. Conventional way to overcome the drawback is to impose most of the computational e?ort in the receiver side and let the transmitter design much simpler than receiver. The fact is that, however, by leveraging reasonable computational e?ort to the transmitter, the receiver design can be greatly simpli?ed. For instance, multiaccess interference (MAI) has long been considered to limit the perf- mance of multiuser systems. Popular solutions to mitigate MAI issue include multiuser detection (MUD) or sophisticated signal processing for interference cancellation such as PIC or SIC. However, those solutions impose great b- den in the receiver. In this case, precoding o?er good solutions to achieve simple transceiver designs as we will mention later in this book. This book is intended to provide a comprehensive review of precoding techniques for digital communications systems from a signal processing p- spective. The variety of selected precoding techniques and their applications makes this book quite di?erent from other texts about precoding techniques in digital communication engineering
In this book the author examines 60 GHz and conventional UWB. The book introduces the fundamentals, architectures, and applications of unified ultra wideband devices. The material includes both theory and practice and introduces ultra wideband communication systems and their applications in a systematic manner. The material is written to enable readers to design, analyze, and evaluate UWB communication systems.
This book provides a comprehensive and practically minded introduction into serious games for law enforcement agencies. Serious games offer wide ranging benefits for law enforcement with applications from professional trainings to command-level decision making to the preparation for crises events. This book explains the conceptual foundations of virtual and augmented reality, gamification and simulation. It further offers practical guidance on the process of serious games development from user requirements elicitation to evaluation. The chapters are intended to provide principles, as well as hands-on knowledge to plan, design, test and apply serious games successfully in a law enforcement environment. A diverse set of case studies showcases the enormous variety that is possible in serious game designs and application areas and offers insights into concrete design decisions, design processes, benefits and challenges. The book is meant for law enforcement professionals interested in commissioning their own serious games as well as game designers interested in collaborative pedagogy and serious games for the law enforcement and security sector.
This is a guide for the system designers and installers faced with
the day-to-day issues of achieving EMC, and will be found valuable
across a wide range of roles and sectors, including process
control, manufacturing, medical, IT and building management. The
EMC issues covered will also make this book essential reading for
product manufacturers and suppliers - and highly relevant for
managers as well as technical staff. EMC for Systems and Installations is designed to complement Tim
Williams' highly successful EMC for Product Designers.
Cellular Neural Networks (CNNs) constitute a class of nonlinear, recurrent and locally coupled arrays of identical dynamical cells that operate in parallel. ANALOG chips are being developed for use in applications where sophisticated signal processing at low power consumption is required. Signal processing via CNNs only becomes efficient if the network is implemented in analog hardware. In view of the physical limitations that analog implementations entail, robust operation of a CNN chip with respect to parameter variations has to be insured. By far not all mathematically possible CNN tasks can be carried out reliably on an analog chip; some of them are inherently too sensitive. This book defines a robustness measure to quantify the degree of robustness and proposes an exact and direct analytical design method for the synthesis of optimally robust network parameters. The method is based on a design centering technique which is generally applicable where linear constraints have to be satisfied in an optimum way. Processing speed is always crucial when discussing signal-processing devices. In the case of the CNN, it is shown that the setting time can be specified in closed analytical expressions, which permits, on the one hand, parameter optimization with respect to speed and, on the other hand, efficient numerical integration of CNNs. Interdependence between robustness and speed issues are also addressed. Another goal pursued is the unification of the theory of continuous-time and discrete-time systems. By means of a delta-operator approach, it is proven that the same network parameters can be used for both of these classes, even if their nonlinear output functions differ. More complex CNN optimization problems that cannot be solved analytically necessitate resorting to numerical methods. Among these, stochastic optimization techniques such as genetic algorithms prove their usefulness, for example in image classification problems. Since the inception of the CNN, the problem of finding the network parameters for a desired task has been regarded as a learning or training problem, and computationally expensive methods derived from standard neural networks have been applied. Furthermore, numerous useful parameter sets have been derived by intuition. In this book, a direct and exact analytical design method for the network parameters is presented. The approach yields solutions which are optimum with respect to robustness, an aspect which is crucial for successful implementation of the analog CNN hardware that has often been neglected. This beautifully rounded work provides many interesting and useful results, for both CNN theorists and circuit designers.' Leon O. Chua
Service quality and cost control are critical success factors for the communications industry and performance engineering is vital in achieving both. It enables service quality to be 'built in' to products; cost control is achieved by addressing potential problems at an early stage, before the costs to remedy problems rise and large failure costs are incurred. Telecommunications Performance Engineering includes both introductory material, giving a comprehensive overview of the subject area, and in-depth case studies illustrating the latest tools and techniques. Performance engineering throughout the whole life-cycle is discussed, including modelling, measurement, testing and capacity management. In addition, the book covers cutting-edge information and technology on the designs used to protect the performance levels of overloaded networks. A wide range of system and network applications are covered, from broadband, IP networks, and intelligent networks providing telemarketing services to combined Web/telephony systems, operational support systems and call centres. This book is essential reading for communications managers, designers, performance engineers and students.
Wireless communication has emerged as an independent discipline in the past decades. Everything from cellular voice telephony to wireless data transmission using wireless sensor networks has profoundly impacted the safety, production, and productivity of industries and our lifestyle as well. After a decade of exponential growth, the wireless industry is one of the largest industries in the world. Therefore, it would be an injustice if the wireless communication is not explored for mining industry. Underground mines, which are characterized by their tough working conditions and hazardous environments, require fool-proof mine-wide communication systems for smooth functioning of mine workings and ensuring better safety. Proper and re- able communication systems not only save the machine breakdown time but also help in immediate passing of messages from the vicinity of underground working area to the surface for day-to-day normal mining operations as well as for speedy rescue operations in case of disaster. Therefore, a reliable and effective commu- cation system is an essential requisite for safe working, and maintaining requisite production and productivity of underground mines. Most of the existing systems generally available in underground mines are based on line (wired) communication principle, hence these are unable to withstand in the disaster conditions and dif?cult to deploy in inaccessible places. Therefore, wireless communication is an indispe- able, reliable, and convenient system and essential in case of day-to-day normal duty or disaster situations.
It is certain that, over the next few years, data traffic will dwarf voice traffic on telecommunications networks. Growth in data-traffic volumes far exceeds that for voice, and is driven by increased use of applications such as e-mail attachments, remote printing and fileserver access, and the now omnipresent World Wide Web. The growth of data networking to connect computers with each other and with their peripheral devices began in earnest in the 1970s, took off in the 1980s and exploded in the 1990s. The early 21st century will see ever faster, more cost effective networks providing flexible data access into ever more businesses and homes. Since the 1970s there have been great advances in technology. For the past twenty years the processing power of computers has continued to grow with no hint of slowing - recall the oft-cited Moore's Law claiming that this power doubles every 18 months. Advances in the data networking equipment required to support the data traffic generated have been enormous. The pace of development from early X. 25 and modem technology through to some of the advanced equipment functionality now available is breathtaking - it is sometimes hard to believe that the practical router is barely ten years old This book provides an overview of the advanced data networking field by bringing together chapters on local area networks, wide area networks and their application."
This book provides an in-depth treatment of both linear fiber-optic systems and their key enabling devices. It presents a concise but rigorous treatment of the theory and practice of analog (linear) fiber-optics links and systems that constitute the foundation of Hybrid Fiber Coax infrastructure in present-day CATV distribution and cable modem Internet access. Emerging applications in remote fiber-optic feed for free-space millimeter wave enterprise campus networks are also described. Issues such as dispersion and interferometric noise are treated quantitatively, and means for mitigating them are explained. This broad but concise text will thus be invaluable not only to students of fiber-optics communication but also to practicing engineers. To the second edition of this book important new aspects of linear fiber-optic transmission technologies are added, such as high level system architectural issues, algorithms for deriving the optimal frequency assignment, directly modulated or externally modulated laser transmitters and the use of Erbium-doped fiber amplifier (EDFA) in linear fiber optic systems. Significant examples of field deployed military systems enabled by linear fiber optic links are described in an appendix.
The authors combine relevant and cutting-edge information on existing and future use of videoconferencing technology in the field of education.
It is a complete training in digital communications in the same book with all the aspects involved in such training: courses, tutorials with many typical problems targeted with detailed solutions, practical work concretely illustrating various aspects of technical implementation implemented. It breaks down into three parts. The Theory of information itself, which concerns both the sources of information and the channels of its transmission, taking into account the errors they introduce in the transmission of information and the means of protect by the use of appropriate coding methods. Then for the technical aspects of transmission, first the baseband transmission is presented with the important concept and fundamental technique of equalization. The performance evaluation in terms of probability of errors is systematically developed and detailed as well as the online codes used. Finally, the third part presents the Transmissions with digital modulation of carriers used in radio transmissions but also on electric cables. A second important aspect in learning a learner's knowledge and skills is this book. It concerns the "Directed Work" aspect of a training. This is an ordered set of 33 typical problems with detailed solutions covering the different parts of the course with practical work. Finally, the last aspect concerns the practical aspects in the proper sense of the term, an essential complement to training going as far as know-how. We propose here a set of 5 practical works.
This book elaborates the science and engineering basis for energy-efficient driving in conventional and autonomous cars. After covering the physics of energy-efficient motion in conventional, hybrid, and electric powertrains, the book chiefly focuses on the energy-saving potential of connected and automated vehicles. It reveals how being connected to other vehicles and the infrastructure enables the anticipation of upcoming driving-relevant factors, e.g. hills, curves, slow traffic, state of traffic signals, and movements of nearby vehicles. In turn, automation allows vehicles to adjust their motion more precisely in anticipation of upcoming events, and to save energy. Lastly, the energy-efficient motion of connected and automated vehicles could have a harmonizing effect on mixed traffic, leading to additional energy savings for neighboring vehicles. Building on classical methods of powertrain modeling, optimization, and optimal control, the book further develops the theory of energy-efficient driving. In addition, it presents numerous theoretical and applied case studies that highlight the real-world implications of the theory developed. The book is chiefly intended for undergraduate and graduate engineering students and industry practitioners with a background in mechanical, electrical, or automotive engineering, computer science or robotics.
The book is compilation of technical papers presented at International Research Symposium on Computing and Network Sustainability (IRSCNS 2016) held in Goa, India on 1st and 2nd July 2016. The areas covered in the book are sustainable computing and security, sustainable systems and technologies, sustainable methodologies and applications, sustainable networks applications and solutions, user-centered services and systems and mobile data management. The novel and recent technologies presented in the book are going to be helpful for researchers and industries in their advanced works.
What we profoundly witness these days is a growing number of human-centric systems and a genuine interest in a comprehensive understanding of their underlying paradigms and the development of solid and efficient design practices. We are indeed in the midst of the next information revolution, which very likely brings us into a completely new world of ubiquitous and invisible computing, Ambient Intelligent (AMI), and wearable hardware. This requires a totally new way of thinking in which cognitive aspects of design, cognitive system engineering and distributed approach play a pivotal role. This book fully addresses these timely needs by filling a gap between the two well-established disciplines of cognitive sciences and cognitive systems engineering. As we put succinctly in the preface, with the psychological perspective of human cognition in mind, the book explores the computational models of reasoning, learning, planning and multi-agent coordination and control of the human moods . This is an excellent, up to the point description of the book. The treatise is focused on the underlying fundamentals, spans across a vast territory embracing logic perspectives of human cognition, distributed models, parallel computing, expert systems, and intelligent robotics."
As the telecommunication industry introduces new sophisticated technologies, the nature of services and the volume of demands have changed. Indeed, a broad range of new services for users appear, combining voice, data, graphics, video, etc. This implies new planning issues. Fiber transmission systems that can carry large amounts of data on a few strands of wire were introduced. These systems have such a large bandwidth that the failure of even a single transmission link: in the network can create a severe service loss to customers. Therefore, a very high level of service reliability is becoming imperative for both system users and service providers. Since equipment failures and accidents cannot be avoided entirely, networks have to be designed so as to "survive" failures. This is done by judiciously installing spare capacity over the network so that all traffic interrupted by a failure may be diverted around that failure by way of this spare or reserve capacity. This of course translates into huge investments for network operators. Designing such survivable networks while minimizing spare capacity costs is, not surprisingly, a major concern of operating companies which gives rise to very difficult combinatorial problems. In order to make telecommunication networks survivable, one can essentially use two different strategies: protection or restoration. The protection approach preas signs spare capacity to protect each element of the network independently, while the restoration approach spreads the redundant capacity over the whole network and uses it as required in order to restore the disrupted traffic."
Granular Computing is concerned with constructing and processing carried out at the level of information granules. Using information granules, we comprehend the world and interact with it, no matter which intelligent endeavor this may involve. The landscape of granular computing is immensely rich and involves set theory (interval mathematics), fuzzy sets, rough sets, random sets linked together in a highly synergetic environment. This volume is a first comprehensive treatment of this emerging paradigm and embraces its fundamentals, underlying methodological framework, and a sound algorithmic environment. The panoply of applications covered includes system identification, telecommunications, linguistics and music processing. Written by experts in the field, this volume will appeal to all developing intelligent systems, either working at the methodological level or interested in detailed system realization.
Internet traffic is increasing at a rate of at least 200% per year. The worlda (TM)s largest Internet Service Provider has recently stated that it expects traffic capacity on its regional trunks to grow to a 1-10 petabit range over the next four to five years. Wavelength division multiplexing (WDM), long-haul fiber-optic links and high-capacity all-optical circuit switches are now being employed at the Internet core to process such massive traffic, consequently creating a demand for novel high-performance packet switching technologies (IP routers, ATM switches, and Ethernet Switches) which feed the optical core. Over the last ten years, tremendous technological advances have taken place in order to achieve these objectives. High-performance Packet Switching Architectures is the first book to cover these advances in a comprehensive one-volume survey. The booka (TM)s editors have brought together contributions from leading researchers in industry and universities, yielding an integrated coverage of the state-of-the-art in packet-switching technologies. A mix of theoretical and practical material allows the book to act an essential reference for researchers in academia as well as industrial engineers.
In this book the authors first describe the background of trusted platforms and trusted computing and speculate about the future. They then describe the technical features and architectures of trusted platforms from several different perspectives, finally explaining second-generation TPMs, including a technical description intended to supplement the Trusted Computing Group's TPM2 specifications. The intended audience is IT managers and engineers and graduate students in information security.
An introduction to telephone exchange software, its functions and architectures. With continuous reference to the problems and realities of existing systems, this book analyzes hardware and software architectures adopted for the control of telecommunication switching exchanges.
Symposium M of the 1998 annual meeting of the European Materials
Research Society has been devoted to "Molecular Photonics for
Optical Communications: Materials, Physics and Device Technology."
It was held in Strasbourg from 15-19 June, building on the sizable
success of the former symposium "Molecular Electronics and
Photonics," held during the last 1997 E-MRS meeting. A total of 42
oral and 36 poster presentations were delivered at this symposium.
A most remarkable common feature to almost all papers presented
concerned a very broad approach which was given to this particular
field of "Materials Science," starting at the borderlines between
chemistry and physics, photonics and electronics, from their most
fundamental aspects all the way to technology and device
engineering considerations. |
You may like...
|