![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > General
The Wireless Identification and Sensing Platform (WISP) is the first of a new class of RF-powered sensing and computing systems. Rather than being powered by batteries, these sensor systems are powered by radio waves that are either deliberately broadcast or ambient. Enabled by ongoing exponential improvements in the energy efficiency of microelectronics, RF-powered sensing and computing is rapidly moving along a trajectory from impossible (in the recent past), to feasible (today), toward practical and commonplace (in the near future). This book is a collection of key papers on RF-powered sensing and computing systems including the WISP. Several of the papers grew out of the WISP Challenge, a program in which Intel Corporation donated WISPs to academic applicants who proposed compelling WISP-based projects. The book also includes papers presented at the first WISP Summit, a workshop held in Berkeley, CA in association with the ACM Sensys conference, as well as other relevant papers. The book provides a window into the fascinating new world of wirelessly powered sensing and computing.
This book presents a time-delay approach to the analysis and synthesis of networked control systems (NCSs) under communication constraints. Differently from other approaches, the time-delay approach to NCSs allows communication delays to be larger than the sampling intervals in the presence of scheduling protocols. The book starts from a comprehensive introduction to three main approaches to sampled-data and networked control. It then focuses on time-delay approach, and the modelling of the closed-loop systems in the form of time-delay system. It presents discontinuous (in time) Lyapunov functional constructions that are efficient for NCSs in the presence of communications delays. Further, it highlights time-delay approaches developed to model and analyze NCSs under communication constraints, with a particular focus on dynamic quantization, round-robin, try-once-discard and stochastic protocols. The results are first presented for the continuous-time NCSs and then extended to discrete-time NCSs. Discussing recent developments in Lyapunov-based analysis of NCSs under communication constraints, the book is a valuable resource for researchers interested in sampled-data and networked control, and time-delay systems, as well as for graduate students in automatic control and systems theory.
Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged. At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers. Now, however, the traditional framework is being increasingly challenged by new methods that are jostling for a position in the "next-generation" Internet. The concept of a network that is becoming more programmable is one of the aspects that are taking center stage. This opens new possibilities to embed software applications inside the network itself and to manage networks and communications services with unprecedented ease and efficiency. In this edited volume, distinguished experts take the reader on a tour of different facets of programmable network infrastructure and applications that exploit it. Presenting the state of the art in network embedded management and applications and programmable network infrastructure, the book conveys fundamental concepts and provides a glimpse into various facets of the latest technology in the field. "
This book presents the principal structure, networks and applications of the Global Aeronautical Distress and Safety System (GADSS) for enhanced airborne Communication, Navigation and Surveillance (CNS). It shows how their implementation works to ensure better security in flight and on the airports surface; improved aircraft tracking and determination in real space and time; and enhanced distress alerting, safety; and Search and Rescue (SAR) system for missing, hijacked and landed aircraft at sea or on the ground. Main topics of this book are as follows: an overview of radio and satellite systems with retrospective to aeronautical safety; security and distress systems; space segment with all aspects regarding satellite orbits and infrastructures; transmission segment of radio and satellite systems; ground segment of radio and earth ground stations; airborne radio and satellite antenna systems and propagation; aeronautical VHF and HF Radio CNS systems and networks; Inmarsat, Iridium and Cospas-Sasrast aeronautical satellite CNS systems and networks; Aeronautical Global Satellite Augmentation System (GSAS) and networks; Digital Video Broadcasting - Return Channel via Satellite (DVB-RCS) standards and Aeronautical Stratospheric Platform Systems (SPS) and networks.
Survivable Optical WDM Networks investigates different approaches for designing and operating an optical network with the objectives that (1) more connections can be carried by a given network, leading to more revenue, and (2) connections can recover faster in case of failures, leading to better services. Different networks wavelength-routed WDM networks, wavelength-routed WDM networks with sub-wavelength granularity grooming, and data over next-generation SONET/SDH over WDM networks are covered. Different approaches are proposed to explore every aspect of a protection scheme such as: (1) Protection granularity: a. At wavelength granularity. b. At sub-wavelength granularity (2) Protection entity: a. Path protection. b. Sub-path protection. c. Segment protection. (3) Routing: a. Single-path routing. b. Multi-path routing. Tradeoffs between different objectives, e.g., resource efficiency vs. recovery time, are explored and practical approaches are proposed and analyzed."
Near-Field Antenna Measurements shows you how to calculate antenna gain, pattern, and beam pointing faster and more accurately than ever before. Emphasizing practical solutions to real-world problems, it presents a detailed technical overview of the theory and practice of antenna near-field measurements.
Cognitive radios (CR) technology is capable of sensing its surrounding environment and adapting its internal states by making corresponding changes in certain operating parameters. CR is envisaged to solve the problems of the limited available spectrum and the inefficiency in the spectrum usage. CR has been considered in mobile ad hoc networks (MANETs), which enable wireless devices to dynamically establish networks without necessarily using a fixed infrastructure. The changing spectrum environment and the importance of protecting the transmission of the licensed users of the spectrum mainly differentiate classical MANETs from CR-MANETs. The cognitive capability and re-configurability of CR-MANETs have opened up several areas of research which have been explored extensively and continue to attract research and development. The book will describe CR-MANETs concepts, intrinsic properties and research challenges of CR-MANETs. Distributed spectrum management functionalities, such as spectrum sensing and sharing, will be presented. The design, optimization and performance evaluation of security issues and upper layers in CR-MANETs, such as transport and application layers, will be investigated.
This book provides step-by-step explanations of successful implementations and practical applications of machine learning. The book's GitHub page contains software codes to assist readers in adapting materials and methods for their own use. A wide variety of applications are discussed, including wireless mesh network and power systems optimization; computer vision; image and facial recognition; protein prediction; data mining; and data discovery. Numerous state-of-the-art machine learning techniques are employed (with detailed explanations), including biologically-inspired optimization (genetic and other evolutionary algorithms, swarm intelligence); Viola Jones face detection; Gaussian mixture modeling; support vector machines; deep convolutional neural networks with performance enhancement techniques (including network design, learning rate optimization, data augmentation, transfer learning); spiking neural networks and timing dependent plasticity; frequent itemset mining; binary classification; and dynamic programming. This book provides valuable information on effective, cutting-edge techniques, and approaches for students, researchers, practitioners, and teachers in the field of machine learning.
Vehicular communication is a key technology in intelligent transportation systems. For many years now, the academic and industrial research communities have been investigating these communications in order to improve efficiency and safety of future transportation. Vehicular networking offers a wide variety of applications, including safety applications as well as infotainment applications. This book highlights the recent developments in vehicular networking technologies and their interaction with future smart cities in order to promote further research activities and challenges. SAADI BOUDJIT, University of Paris 13, France HAKIMA CHAOUCHI, Telecom SudParis, France YACINE GHAMRI, University La Rochelle, France HALABI HASBULLAH, Universiti Teknologi Petronas, Malaysia ANIS LAOUITI, Telecom SudParis, France SAOUCENE MAHFOUDH, Jeddah, Saudi Arabia PAUL MUHLETHALER, INRIA, France AMIR QAYYUM, Mohamad Ali Jinnah University, Pakistan NAUFAL SAAD, Universiti Teknologi Petronas, Malaysia AHMED SOUA, NIST, USA HAJIME TAZAKI, University of Tokyo, Japan APINUN TUNPAN, Aintec, Thailand WEI WEI, Xi'an University, China RACHID ZAGROUBA, ENSI, Tunisia.
This book presents high-quality original contributions on the fashion supply chain. A wide spectrum of application domains are covered, processing of big data coming from digital and social media channels, fashion new product development, fashion design, fashion marketing and communication strategy, business models and entrepreneurship, e-commerce and omni-channel management, corporate social responsibility, new materials for fashion product, wearable technologies. The contents are based on presentations delivered at IT4Fashion 2017, the 7th International Conference in Business Models and ICT Technologies for the Fashion Supply Chain, which was held in Florence, Italy, in April 2017, and at IT4Fashion 2018, the 8th edition of the same conference, which was held in Florence, Italy, in April 2018. This conference series represents a targeted response to the growing need for research that reports and debates supply chain business models and technologies applied to the fashion industry, with the aim of increasing knowledge in the area of product lifecycle management and supply chain management in that industry.
Readers will progress from an understanding of what the Internet is now towards an understanding of the motivations and techniques that will drive its future.
This book provides a comprehensive overview of modern networks design, from specifications and modeling to implementations and test procedures, including the design and implementation of modern networks on chip, in both wireless and mobile applications. Topical coverage includes algorithms and methodologies, telecommunications, hardware (including networks on chip), security and privacy, wireless and mobile networks and a variety of modern applications, such as VoLTE and the internet of things.
This book features selected contributions in the areas of modeling, simulation, and optimization. The contributors discusses requirements in problem solving for modeling, simulation, and optimization. Modeling, simulation, and optimization have increased in demand in exponential ways and how potential solutions might be reached. They describe how new technologies in computing and engineering have reduced the dimension of data coverage worldwide, and how recent inventions in information and communication technology (ICT) have inched towards reducing the gaps and coverage of domains globally. The chapters cover how the digging of information in a large data and soft-computing techniques have contributed to a strength in prediction and analysis, for decision making in computer science, technology, management, social computing, green computing, and telecom. The book provides an insightful reference to the researchers in the fields of engineering and computer science. Researchers, academics, and professionals will benefit from this volume. Features selected expanded papers in modeling, simulation, and optimization from COMPSE 2016; Includes research into soft computing and its application in engineering and technology; Presents contributions from global experts in academia and industry in modeling, simulation, and optimization.
‘Mr Watson, come here, I want to see you.’
This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners.
This book covers key topics in the field of intelligent ambient adaptive systems. It focuses on the results worked out within the framework of the ATRACO (Adaptive and TRusted Ambient eCOlogies) project. The theoretical background, the developed prototypes, and the evaluated results form a fertile ground useful for the broad intelligent environments scientific community as well as for industrial interest groups. The new edition provides: Chapter authors comment on their work on ATRACO with final remarks as viewed in retrospective Each chapter has been updated with follow-up work emerging from ATRACO An extensive introduction to state-of-the-art statistical dialog management for intelligent environments Approaches are introduced on how Trust is reflected during the dialog with the system
In-Vehicle Corpus and Signal Processing for Driver Behavior is comprised of expanded papers from the third biennial DSPinCARS held in Istanbul in June 2007. The goal is to bring together scholars working on the latest techniques, standards, and emerging deployment on this central field of living at the age of wireless communications, smart vehicles, and human-machine-assisted safer and comfortable driving. Topics covered in this book include: improved vehicle safety; safe driver assistance systems; smart vehicles; wireless LAN-based vehicular location information processing; EEG emotion recognition systems; and new methods for predicting driving actions using driving signals. In-Vehicle Corpus and Signal Processing for Driver Behavior is appropriate for researchers, engineers, and professionals working in signal processing technologies, next generation vehicle design, and networks for mobile platforms.
Wireless Vehicular Networks for Car Collision Avoidance focuses on the development of the ITS (Intelligent Transportation Systems) in order to minimize vehicular accidents. The book presents and analyses a range of concrete accident scenarios while examining the causes of vehicular collision and proposing countermeasures based on wireless vehicular networks.The book also describes the vehicular network standards and quality of service mechanisms focusing on improving critical dissemination of safety information. With recommendations on techniques and protocols to consider when improving road safety policies in order to minimize crashes and collision risks.
Authors are well known and highly recognized by the "acoustic echo
and noise community."
Complex Orthogonal Space-Time Processing in Wireless Communications incorporates orthogonal space-time processing using STBCs in MIMO wireless communication systems. Complex Orthogonal STBCs (CO STBCs) are given emphasis because they can be used for PSK/QAM modulation schemes and are more practical than real STBCs. The overall coverage provides general knowledge about space-time processing and its applications for broad audiences. It also includes the most up-to-date review of the literature on space-time processing in general, and space-time block processing in particular. The authors also examine open issues and problems for future research in this area.
It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This book tackles the analysis part, especially under situations where the targeted device is protected by random masking. The authors explain advances in the field and provide the reader with mathematical formalizations. They present all known analyses within the same notation framework, which allows the reader to rapidly understand and learn contrasting approaches. It will be useful as a graduate level introduction, also for self-study by researchers and professionals, and the examples are taken from real-world datasets.
This book describes Smart Cities and the information technologies that will provide better living conditions in the cities of tomorrow. It brings together research findings from 27 countries across the globe, from academia, industry and government. It addresses a number of crucial topics in state of the arts of technologies and solutions related to smart cities, including big data and cloud computing, collaborative platforms, communication infrastructures, smart health, sustainable development and energy management. Information Innovation Technology in Smart Cities is essential reading for researchers working on intelligence and information communication systems, big data, Internet of Things, Cyber Security, and cyber-physical energy systems. It will be also invaluable resource for advanced students exploring these areas.
A book offering advice on how to safeguard a company's telecommunication and computer networks against natural disaster, sabotage and human error. It aims to help identify the vulnerabilities of a system and describes specific risk avoidance measures.
This book introduces new concepts and mechanisms regarding the usage of both social media interactions and artifacts for peer education in digital educational games. Digital games in general, and digital educational games in particular, represent an area with a high potential for interdisciplinary innovation, not only from an information technology standpoint, but also from social science, psychological and didactic perspectives. This book presents an interdisciplinary approach to educational games, which is centered on information technology and aims at: (1) improving digital management by focusing on the exchange of learning outcomes and solution assessment in a peer-to-peer network of learners; (2) achieving digital implementation by using forms of interaction to change the course of educational games; and (3) providing digital support by fostering group-formation processes in educational situations to increase both the effects of educational games and knowledge exchange at the individual level. In addition to a systematic analysis of the relationship between software architecture, educational games and social media applications, the book also presents the implemented IT systems' architectures and algorithmic solutions as well as the resulting applicable evaluation findings from the field of interactive multimedia learning.
Smart cards have recently emerged as a key computer network and Internet security technology. These plastic cards contain an embedded microprocessor, allowing them to be programmed to perform specific duties. This extensively updated, second edition of the popular Artech House book, Smart Card Security and Applications, offers a current overview of the ways smart cards address the computer security issues of today's varied applications. Brand new discussions on multi-application operating systems, computer networks, and the Internet are included to keep technical and business professionals abreast of the very latest developments in this field. The book provides technical details on the newest protection mechanisms, features a discussion on the effects of recent attacks, and presents a clear methodology for solving unique security problems. |
![]() ![]() You may like...
Multimedia Data Mining and Analytics…
Aaron K Baughman, Jiang Gao, …
Hardcover
Proceedings of the Linnean Society of…
Linnean Society of New South Wales
Paperback
R939
Discovery Miles 9 390
Physical-Layer Security for Cooperative…
Yulong Zou, Jia Zhu
Hardcover
R2,873
Discovery Miles 28 730
Models of Neural Networks - Temporal…
Eytan Domany, J. Leo Van Hemmen, …
Hardcover
R4,556
Discovery Miles 45 560
Algorithms in Machine Learning Paradigms
Jyotsna Kumar Mandal, Somnath Mukhopadhyay, …
Hardcover
R5,091
Discovery Miles 50 910
Building Blocks of Tabletop Game Design…
Geoffrey Engelstein, Isaac Shalev
Paperback
R1,984
Discovery Miles 19 840
Vision, Sensing and Analytics…
MD Atiqur Rahman Ahad, Atsushi Inoue
Hardcover
R5,153
Discovery Miles 51 530
|