![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > General
Orthogonal Frequency Division Multiplexing for Wireless Communications is an edited volume with contributions by leading authorities in the subject of OFDM. Its coverage consists of principles, important wireless topics (e.g. Synchronization, channel estimation, etc.) and techniques. Included is information for advancing wireless communication in a multipath environment with an emphasis on implementation of OFDM in base stations. Orthogonal Frequency Division Multiplexing for Wireless Communications provides a comprehensive introduction of the theory and practice of OFDM. To facilitate the readers, extensive subject indices and references are given at the end of the book. Even though each chapter is written by different experts, symbols and notations in all chapters of the book are consistent.
This textbook presents the mathematical theory and techniques necessary for analyzing and modeling high-performance global networks, such as the Internet. The three main building blocks of high-performance networks are links, switching equipment connecting the links together and software employed at the end nodes and intermediate switches. This book provides the basic techniques for modeling and analyzing these last two components. Topics covered include, but are not limited to: Markov chains and queuing analysis, traffic modeling, interconnection networks and switch architectures and buffering strategies.
This book describes, analyzes, and recommends traffic engineering
(TE) and quality of service (QoS) optimization methods for
integrated voice/data dynamic routing networks. These functions
control a network's response to traffic demands and other stimuli,
such as link failures or node failures. TE and QoS optimization is
concerned with measurement, modeling, characterization, and control
of network traffic, and the application of techniques to achieve
specific performance objectives. The scope of the analysis and
recommendations include dimensioning, call/flow and connection
routing, QoS resource management, routing table management, dynamic
transport routing, and operational requirements. Case studies are
included which provide the reader with a concrete way into the
technical details and highlight why and how to use the techniques
described in the book.
This book, the second volume, highlights 7 out of a total of about 36 megacities in the World which by definition have 10 million inhabitants. The cities/chapters presented in this book are based on recent advance such as the wide use of ICT, IOT, e-Governance, e-Democracy, smart economy and flattening and acceleration of the world that is taking place in recent times as reported by 3 times Pulitzer Prize Winner Thomas Friedman. It therefor departs from other ideologies where only a certain megacity qualifies for the title of smart global megacities while in reality every megacity can, and presents how smart global megacities can be created.
The Wireless Identification and Sensing Platform (WISP) is the first of a new class of RF-powered sensing and computing systems. Rather than being powered by batteries, these sensor systems are powered by radio waves that are either deliberately broadcast or ambient. Enabled by ongoing exponential improvements in the energy efficiency of microelectronics, RF-powered sensing and computing is rapidly moving along a trajectory from impossible (in the recent past), to feasible (today), toward practical and commonplace (in the near future). This book is a collection of key papers on RF-powered sensing and computing systems including the WISP. Several of the papers grew out of the WISP Challenge, a program in which Intel Corporation donated WISPs to academic applicants who proposed compelling WISP-based projects. The book also includes papers presented at the first WISP Summit, a workshop held in Berkeley, CA in association with the ACM Sensys conference, as well as other relevant papers. The book provides a window into the fascinating new world of wirelessly powered sensing and computing.
This book presents a time-delay approach to the analysis and synthesis of networked control systems (NCSs) under communication constraints. Differently from other approaches, the time-delay approach to NCSs allows communication delays to be larger than the sampling intervals in the presence of scheduling protocols. The book starts from a comprehensive introduction to three main approaches to sampled-data and networked control. It then focuses on time-delay approach, and the modelling of the closed-loop systems in the form of time-delay system. It presents discontinuous (in time) Lyapunov functional constructions that are efficient for NCSs in the presence of communications delays. Further, it highlights time-delay approaches developed to model and analyze NCSs under communication constraints, with a particular focus on dynamic quantization, round-robin, try-once-discard and stochastic protocols. The results are first presented for the continuous-time NCSs and then extended to discrete-time NCSs. Discussing recent developments in Lyapunov-based analysis of NCSs under communication constraints, the book is a valuable resource for researchers interested in sampled-data and networked control, and time-delay systems, as well as for graduate students in automatic control and systems theory.
Despite the explosion of networking services and applications in the past decades, the basic technological underpinnings of the Internet have remained largely unchanged. At its heart are special-purpose appliances that connect us to the digital world, commonly known as switches and routers. Now, however, the traditional framework is being increasingly challenged by new methods that are jostling for a position in the "next-generation" Internet. The concept of a network that is becoming more programmable is one of the aspects that are taking center stage. This opens new possibilities to embed software applications inside the network itself and to manage networks and communications services with unprecedented ease and efficiency. In this edited volume, distinguished experts take the reader on a tour of different facets of programmable network infrastructure and applications that exploit it. Presenting the state of the art in network embedded management and applications and programmable network infrastructure, the book conveys fundamental concepts and provides a glimpse into various facets of the latest technology in the field. "
This book presents the principal structure, networks and applications of the Global Aeronautical Distress and Safety System (GADSS) for enhanced airborne Communication, Navigation and Surveillance (CNS). It shows how their implementation works to ensure better security in flight and on the airports surface; improved aircraft tracking and determination in real space and time; and enhanced distress alerting, safety; and Search and Rescue (SAR) system for missing, hijacked and landed aircraft at sea or on the ground. Main topics of this book are as follows: an overview of radio and satellite systems with retrospective to aeronautical safety; security and distress systems; space segment with all aspects regarding satellite orbits and infrastructures; transmission segment of radio and satellite systems; ground segment of radio and earth ground stations; airborne radio and satellite antenna systems and propagation; aeronautical VHF and HF Radio CNS systems and networks; Inmarsat, Iridium and Cospas-Sasrast aeronautical satellite CNS systems and networks; Aeronautical Global Satellite Augmentation System (GSAS) and networks; Digital Video Broadcasting - Return Channel via Satellite (DVB-RCS) standards and Aeronautical Stratospheric Platform Systems (SPS) and networks.
Survivable Optical WDM Networks investigates different approaches for designing and operating an optical network with the objectives that (1) more connections can be carried by a given network, leading to more revenue, and (2) connections can recover faster in case of failures, leading to better services. Different networks wavelength-routed WDM networks, wavelength-routed WDM networks with sub-wavelength granularity grooming, and data over next-generation SONET/SDH over WDM networks are covered. Different approaches are proposed to explore every aspect of a protection scheme such as: (1) Protection granularity: a. At wavelength granularity. b. At sub-wavelength granularity (2) Protection entity: a. Path protection. b. Sub-path protection. c. Segment protection. (3) Routing: a. Single-path routing. b. Multi-path routing. Tradeoffs between different objectives, e.g., resource efficiency vs. recovery time, are explored and practical approaches are proposed and analyzed."
Near-Field Antenna Measurements shows you how to calculate antenna gain, pattern, and beam pointing faster and more accurately than ever before. Emphasizing practical solutions to real-world problems, it presents a detailed technical overview of the theory and practice of antenna near-field measurements.
Cognitive radios (CR) technology is capable of sensing its surrounding environment and adapting its internal states by making corresponding changes in certain operating parameters. CR is envisaged to solve the problems of the limited available spectrum and the inefficiency in the spectrum usage. CR has been considered in mobile ad hoc networks (MANETs), which enable wireless devices to dynamically establish networks without necessarily using a fixed infrastructure. The changing spectrum environment and the importance of protecting the transmission of the licensed users of the spectrum mainly differentiate classical MANETs from CR-MANETs. The cognitive capability and re-configurability of CR-MANETs have opened up several areas of research which have been explored extensively and continue to attract research and development. The book will describe CR-MANETs concepts, intrinsic properties and research challenges of CR-MANETs. Distributed spectrum management functionalities, such as spectrum sensing and sharing, will be presented. The design, optimization and performance evaluation of security issues and upper layers in CR-MANETs, such as transport and application layers, will be investigated.
This book provides step-by-step explanations of successful implementations and practical applications of machine learning. The book's GitHub page contains software codes to assist readers in adapting materials and methods for their own use. A wide variety of applications are discussed, including wireless mesh network and power systems optimization; computer vision; image and facial recognition; protein prediction; data mining; and data discovery. Numerous state-of-the-art machine learning techniques are employed (with detailed explanations), including biologically-inspired optimization (genetic and other evolutionary algorithms, swarm intelligence); Viola Jones face detection; Gaussian mixture modeling; support vector machines; deep convolutional neural networks with performance enhancement techniques (including network design, learning rate optimization, data augmentation, transfer learning); spiking neural networks and timing dependent plasticity; frequent itemset mining; binary classification; and dynamic programming. This book provides valuable information on effective, cutting-edge techniques, and approaches for students, researchers, practitioners, and teachers in the field of machine learning.
Vehicular communication is a key technology in intelligent transportation systems. For many years now, the academic and industrial research communities have been investigating these communications in order to improve efficiency and safety of future transportation. Vehicular networking offers a wide variety of applications, including safety applications as well as infotainment applications. This book highlights the recent developments in vehicular networking technologies and their interaction with future smart cities in order to promote further research activities and challenges. SAADI BOUDJIT, University of Paris 13, France HAKIMA CHAOUCHI, Telecom SudParis, France YACINE GHAMRI, University La Rochelle, France HALABI HASBULLAH, Universiti Teknologi Petronas, Malaysia ANIS LAOUITI, Telecom SudParis, France SAOUCENE MAHFOUDH, Jeddah, Saudi Arabia PAUL MUHLETHALER, INRIA, France AMIR QAYYUM, Mohamad Ali Jinnah University, Pakistan NAUFAL SAAD, Universiti Teknologi Petronas, Malaysia AHMED SOUA, NIST, USA HAJIME TAZAKI, University of Tokyo, Japan APINUN TUNPAN, Aintec, Thailand WEI WEI, Xi'an University, China RACHID ZAGROUBA, ENSI, Tunisia.
This book presents high-quality original contributions on the fashion supply chain. A wide spectrum of application domains are covered, processing of big data coming from digital and social media channels, fashion new product development, fashion design, fashion marketing and communication strategy, business models and entrepreneurship, e-commerce and omni-channel management, corporate social responsibility, new materials for fashion product, wearable technologies. The contents are based on presentations delivered at IT4Fashion 2017, the 7th International Conference in Business Models and ICT Technologies for the Fashion Supply Chain, which was held in Florence, Italy, in April 2017, and at IT4Fashion 2018, the 8th edition of the same conference, which was held in Florence, Italy, in April 2018. This conference series represents a targeted response to the growing need for research that reports and debates supply chain business models and technologies applied to the fashion industry, with the aim of increasing knowledge in the area of product lifecycle management and supply chain management in that industry.
Readers will progress from an understanding of what the Internet is now towards an understanding of the motivations and techniques that will drive its future.
This book provides a comprehensive overview of modern networks design, from specifications and modeling to implementations and test procedures, including the design and implementation of modern networks on chip, in both wireless and mobile applications. Topical coverage includes algorithms and methodologies, telecommunications, hardware (including networks on chip), security and privacy, wireless and mobile networks and a variety of modern applications, such as VoLTE and the internet of things.
This book features selected contributions in the areas of modeling, simulation, and optimization. The contributors discusses requirements in problem solving for modeling, simulation, and optimization. Modeling, simulation, and optimization have increased in demand in exponential ways and how potential solutions might be reached. They describe how new technologies in computing and engineering have reduced the dimension of data coverage worldwide, and how recent inventions in information and communication technology (ICT) have inched towards reducing the gaps and coverage of domains globally. The chapters cover how the digging of information in a large data and soft-computing techniques have contributed to a strength in prediction and analysis, for decision making in computer science, technology, management, social computing, green computing, and telecom. The book provides an insightful reference to the researchers in the fields of engineering and computer science. Researchers, academics, and professionals will benefit from this volume. Features selected expanded papers in modeling, simulation, and optimization from COMPSE 2016; Includes research into soft computing and its application in engineering and technology; Presents contributions from global experts in academia and industry in modeling, simulation, and optimization.
‘Mr Watson, come here, I want to see you.’
This book introduces novel research targeting technical aspects of protecting information security and establishing trust in the digital space. New paradigms, and emerging threats and solutions are presented in topics such as application security and threat management; modern authentication paradigms; digital fraud detection; social engineering and insider threats; cyber threat intelligence; intrusion detection; behavioral biometrics recognition; hardware security analysis. The book presents both the important core and the specialized issues in the areas of protection, assurance, and trust in information security practice. It is intended to be a valuable resource and reference for researchers, instructors, students, scientists, engineers, managers, and industry practitioners.
This book covers key topics in the field of intelligent ambient adaptive systems. It focuses on the results worked out within the framework of the ATRACO (Adaptive and TRusted Ambient eCOlogies) project. The theoretical background, the developed prototypes, and the evaluated results form a fertile ground useful for the broad intelligent environments scientific community as well as for industrial interest groups. The new edition provides: Chapter authors comment on their work on ATRACO with final remarks as viewed in retrospective Each chapter has been updated with follow-up work emerging from ATRACO An extensive introduction to state-of-the-art statistical dialog management for intelligent environments Approaches are introduced on how Trust is reflected during the dialog with the system
In-Vehicle Corpus and Signal Processing for Driver Behavior is comprised of expanded papers from the third biennial DSPinCARS held in Istanbul in June 2007. The goal is to bring together scholars working on the latest techniques, standards, and emerging deployment on this central field of living at the age of wireless communications, smart vehicles, and human-machine-assisted safer and comfortable driving. Topics covered in this book include: improved vehicle safety; safe driver assistance systems; smart vehicles; wireless LAN-based vehicular location information processing; EEG emotion recognition systems; and new methods for predicting driving actions using driving signals. In-Vehicle Corpus and Signal Processing for Driver Behavior is appropriate for researchers, engineers, and professionals working in signal processing technologies, next generation vehicle design, and networks for mobile platforms.
Wireless Vehicular Networks for Car Collision Avoidance focuses on the development of the ITS (Intelligent Transportation Systems) in order to minimize vehicular accidents. The book presents and analyses a range of concrete accident scenarios while examining the causes of vehicular collision and proposing countermeasures based on wireless vehicular networks.The book also describes the vehicular network standards and quality of service mechanisms focusing on improving critical dissemination of safety information. With recommendations on techniques and protocols to consider when improving road safety policies in order to minimize crashes and collision risks.
Authors are well known and highly recognized by the "acoustic echo
and noise community."
Complex Orthogonal Space-Time Processing in Wireless Communications incorporates orthogonal space-time processing using STBCs in MIMO wireless communication systems. Complex Orthogonal STBCs (CO STBCs) are given emphasis because they can be used for PSK/QAM modulation schemes and are more practical than real STBCs. The overall coverage provides general knowledge about space-time processing and its applications for broad audiences. It also includes the most up-to-date review of the literature on space-time processing in general, and space-time block processing in particular. The authors also examine open issues and problems for future research in this area.
It has been more than 20 years since the seminal publications on side-channel attacks. They aim at extracting secrets from embedded systems while they execute cryptographic algorithms, and they consist of two steps, measurement and analysis. This book tackles the analysis part, especially under situations where the targeted device is protected by random masking. The authors explain advances in the field and provide the reader with mathematical formalizations. They present all known analyses within the same notation framework, which allows the reader to rapidly understand and learn contrasting approaches. It will be useful as a graduate level introduction, also for self-study by researchers and professionals, and the examples are taken from real-world datasets. |
![]() ![]() You may like...
Dark Silicon and Future On-chip Systems…
Suyel Namasudra, Hamid Sarbazi-Azad
Hardcover
R4,186
Discovery Miles 41 860
Object Orientation with Parallelism and…
Burkhard Freitag, Cliff B. Jones, …
Hardcover
R4,489
Discovery Miles 44 890
Mixed-Effects Models in S and S-PLUS
Jose Pinheiro, Douglas Bates
Hardcover
R6,329
Discovery Miles 63 290
Java How to Program, Late Objects…
Paul Deitel, Harvey Deitel
Paperback
|