![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > Telephone technology > Mobile phones
This book investigates the modeling and optimization issues in mobile social networks (MSNs). Firstly, the architecture and applications of MSNs are examined. The existing works on MSNs are reviewed by specifying the critical challenges and research issues. Then, with the introduction of MSN-based social graph and information dissemination mechanisms, the analytical model for epidemic information dissemination with opportunistic Links in MSNs is discussed. In addition, optimal resource allocation is studied based on a heterogeneous architecture, which provides mobile social services with high capacity and low latency. Finally, this book summarize some open problems and future research directions in MSNs. Written for researchers and academics, this book is useful for anyone working on mobile networks, network architecture, or content delivery. It is also valuable for advanced-level students of computer science.
As an example of convergence, the mobile phone-especially in the form of smartphone-is now ushering in new promises of seamlessness between engagement with technology and everyday common experiences. This seamlessness is not only about how one transitions between the worlds of the device and the physical environment but it also captures the transition and convergences between devices as well (i.e. laptop to smartphone, smartphone to tablet). This volume argues, however, that these transitions are far from seamless. We see divisions between online and offline, virtual and actual, here and there, taking on different cartographies, emergent forms of seams. It is these seams that this volume acknowledges, challenges and explores-socially, culturally, technologically and historically-as we move to a deeper understanding of the role and impact of mobile communication's saturation throughout the world.
Mobile phones are no longer what they used to be. Not only can users connect to the Internet anywhere and anytime, they can also use their devices to map their precise geographic coordinates and access location-specific information like restaurant reviews, historical information, and locations of other people nearby. The proliferation of location-aware mobile technologies calls for a new understanding of how we define public spaces, how we deal with locational privacy, and how networks of power are developed today. In Mobile Interfaces in Public Spaces, Adriana de Souza E. Silva and Jordan Frith examine these social and spatial changes by framing the development of location-aware technology within the context of other mobile and portable technologies such as the book, the Walkman, the iPod, and the mobile phone. These technologies work as interfaces to public spaces that is, as symbolic systems that not only filter information but also reshape communication relationships and the environment in which social interaction takes place. Yet rather than detaching people from their surroundings, the authors suggest that location-aware technologies may ultimately strengthen our connections to locations.
This practical, one-stop guide will quickly bring you up to speed on LTE and LTE-Advanced. With everything you need to know about the theory and technology behind the standards, this is a must-have for engineers and managers in the wireless industry. * First book of its kind describing technologies and system performance of LTE-A * Covers the evolution of digital wireless technology, basics of LTE and LTE-A, design of downlink and uplink channels, multi-antenna techniques and heterogeneous networks * Analyzes performance benefits over competing technologies, including WiMAX and 802.16m * Reflects the latest LTE Release-10 standards * Includes numerous examples, including extensive system and link results * Unique approach is accessible to technical and non-technical readers alike
The fundamentals of mobile communications technology and systems will be considered including the history and service evolution of mobile communications and environments, etc. CDMA technology including spread spectrum and orthogonal and PN code and etc., will be introduced. We will discuss the fundamentals of single carrier CDMA technologies including DS CDMA, Broadband CDMA with frequency domain equalizer, etc., and multi-carrier CDMA technology for high speed data transmission including MC-DS/CDMA, MC-CDMA, etc.
Foodie and food photographer Eveline Boone shows you how to style a dish and make it look tasty, how you can take the most beautiful food photos with your camera or smartphone and the different composition techniques you can apply. With this book she proves that anyone can learn to take mouth-watering photographs as long as you have the right tools at hand.
This book covers issues related to 5G network security. The authors start by providing details on network architecture and key requirements. They then outline the issues concerning security policies and various solutions that can handle these policies. Use of SDN-NFV technologies for security enhancement is also covered. The book includes intelligent solutions by utilizing the features of artificial intelligence and machine learning to improve the performance of the 5G security protocols and models. Optimization of security models is covered as a separate section with a detailed information on the security of 5G-based edge, fog, and osmotic computing. This book provides detailed guidance and reference material for academicians, professionals, and researchers. Presents extensive information and data on research and challenges in 5G networks; Covers basic architectures, models, security frameworks, and software-defined solutions for security issues in 5G networks; Provides solutions that can help in the growth of new startups as well as research directions concerning the future of 5G networks.
This book presents some of the most interesting iPhone and iPad games, along with stories of the people behind these games. It describes hundreds of titles, including well-known games and hidden games, and provides insight into the development of games for the iOS platform.
This book presents the peer-reviewed contributions of ICMWT2016, an international conference devoted to mobile and wireless technology. Researchers and professionals from academia and industry met to discuss the cutting-edge developments in the field. The book includes papers on mobile and wireless networks, the increasingly important security issues, data management, as well as the latest developments in mobile software development.
SC-FDMA for Mobile Communications examines Single-Carrier Frequency Division Multiple Access (SC-FDMA). Explaining this rapidly evolving system for mobile communications, it describes its advantages and limitations and outlines possible solutions for addressing its current limitations. The book explores the emerging trend of cooperative communication with SC-FDMA and how it can improve the physical layer security. It considers the design of distributed coding schemes and protocols for wireless relay networks where users cooperate to send their data to the destination. Supplying you with the required foundation in cooperative communication and cooperative diversity, it presents an improved Discrete Cosine Transform (DCT)-based SC-FDMA system. It introduces a distributed space-time coding scheme and evaluates its performance and studies distributed SFC for broadband relay channels. Presents relay selection schemes for improving the physical layer Introduces a new transceiver scheme for the SC-FDMA system Describes space-time/frequency coding schemes for SC-FDMA Includes MATLAB (R) codes for all simulation experiments The book investigates Carrier Frequency Offsets (CFO) for the Single-Input Single-Output (SISO) SC-FDMA system, and Multiple-Input Multiple-Output (MIMO) SC-FDMA system simulation software. Covering the design of cooperative diversity schemes for the SC-FDMA system in the uplink direction, it also introduces and studies a new transceiver scheme for the SC-FDMA system.
This edited volume is the first book-length study focusing entirely on mobile phone use in China. Drawing on examples from a wide range of contemporary situations in China and beyond, the contributors argue that the mobile phone is in fact an important means by which one can understand a rapidly changing China, and the developing culture of mobile phone usage reflects both the cultural norms and struggle of the people. Through a theoretical comparison of usage in the West and in China, the editors assert the uniqueness of China's experience, highlighting that Chinese society is being exposed simultaneously to a rapid process of industrialization and cyberization. The contributors maintain that such density of experience under a compressed period combined with a thick cultural heritage and a country still under a dictating rule provides a unique situation and offers deep insights into Chinese culture in general. This work will be of great interest to all students and scholars of Asian communication studies, ICT and Chinese culture and society.
Following on from the successful first edition (March 2012), this book gives a clear explanation of what LTE does and how it works. The content is expressed at a systems level, offering readers the opportunity to grasp the key factors that make LTE the hot topic amongst vendors and operators across the globe. The book assumes no more than a basic knowledge of mobile telecommunication systems, and the reader is not expected to have any previous knowledge of the complex mathematical operations that underpin LTE. This second edition introduces new material for the current state of the industry, such as the new features of LTE in Releases 11 and 12, notably coordinated multipoint transmission and proximity services; the main short- and long-term solutions for LTE voice calls, namely circuit switched fallback and the IP multimedia subsystem; and the evolution and current state of the LTE market. It also extends some of the material from the first edition, such as inter-operation with other technologies such as GSM, UMTS, wireless local area networks and cdma2000; additional features of LTE Advanced, notably heterogeneous networks and traffic offloading; data transport in the evolved packet core; coverage and capacity estimation for LTE; and a more rigorous treatment of modulation, demodulation and OFDMA. The author breaks down the system into logical blocks, by initially introducing the architecture of LTE, explaining the techniques used for radio transmission and reception and the overall operation of the system, and concluding with more specialized topics such as LTE voice calls and the later releases of the specifications. This methodical approach enables readers to move on to tackle the specifications and the more advanced texts with confidence.
Emerging Location Aware Broadband Wireless Ad Hoc Networks is a compilation of new material on wireless networking and technology addressing several technical challenges in the field. The contributions are authored by distinguished experts who presented experimental results on their work at the recent International Symposium on Personal, Indoor, Mobile, Radio Communications (PIMRC) held in Barcelona, Spain, September 5-8, 2004. The authors present new results on issues involving wireless LANs and ad hoc networks; mobile wireless internet and satellite applications; encoding, algorithms and performance; and issues related to overlay networks, cross layer interactions and smart antennas. Whether you re a telecommunications/networking specialist, systems engineer or a scientist, Emerging Location Aware Broadband Wireless Ad Hoc Networks provides valuable insight from experts in wireless networking for developing wireless systems and meeting future application requirements.
The bestselling guide to getting the most out of your Android Samsung Galaxy S9 Samsung Galaxy S9 For Dummies documents all the features and capabilities of this popular smartphone, approaching them from the point of view of a user who is perhaps a bit baffled by the documentation and online support that comes with the phone. All aspects of the device are covered, from setup and configuration, to extensive use of the new features and capabilities. Whether you're looking for approachable guidance on the basics like texting, e-mailing, and accessing the internet, or more advanced topics like downloading apps, synching with a PC, and expanding the phone's potential with new software releases, this trusted resource covers it all. Take pictures, watch movies, and record videos Use maps and navigation Stay connected on social networking sites Make sense of software updates You'll want to keep this book close by, referring to it often as you explore the features and functions of your new Samsung Galaxy S9 smartphone.
Ready to create your own iPhone app? This book walks you through the entire iPhone app development process, from start to finish. You'll learn how to download the tools, build the app, get it through Apple's approval process, and then market and maintain the finished product. All you need to get started is a familiarity with object-oriented programming. With "iPhone App Development: The Missing Manual", you'll get lots of illustrations, step-by-step tutorials, and real-world examples. Author and Mac guru Craig Hockenberry is your ideal guide because he's been there, having created the wildly popular Twitterific iPhone app that lets you manage your tweets and Twitter account right on your iPhone screen. Craig's goal is to make you a successful iPhone App developer, whether you're a student or an experienced programmer. He pursues this goal with clarity and a terrific sense of humor.
This book investigates the intuitive application of strategic knowledge arbitrage and serendipity (SKARSE) principles by CEOs in their use of mobile electronic devices. CEOs of small to mid-sized organizations are responsible for the income, expenses, and profitability of their respective division and rely heavily on mobile devices for learning, knowledge management, and communication. This book explores the effects of mobile devices on the individual CEO, their interpersonal relationships, and culture. It will benefit students, academics, and business professionals recognize events that can add to knowledge and enhance management skills.
New in paperback: A renowned health authority reveals how we can protect ourselves against the harmful effects of electromagnetic fields. The hazards of electronic pollution may once have been the stuff of science fiction, but now we know they're all too real. And now that 5G ultra-wideband technology is here to stay, the danger is greater than ever. Dr. Joseph Mercola, one of the world's foremost authorities on alternative health, has mined the scientific literature to offer a radical new understanding of how electromagnetic fields impact your body and mind. In this eye-opening guide, now available in paperback for the first time, he reveals: What EMFs (electromagnetic fields) actually are, where you find them in your daily life, and how they affect you The toll that EMFs have been proven to take on human health--and why you've been largely kept in the dark about this threat How you can actually repair the damage done by EMFs at a cellular level Practical strategies to protect yourself and your loved ones from EMFs at home, at work, and out in the world "Dr. Mercola's groundbreaking new book on the health effects of EMFs is both a sobering tale and an effective call to action." -- Thomas Cowan, M.D., author of Vaccines, Autoimmunity, and the Changing Nature of Childhood Illness and Cancer and the New Biology of Water
Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo-leading researchers in mobile security. Mobile devices and apps have become part of everyday life in both developed and developing countries. As with most evolving technologies, mobile devices and mobile apps can be used for criminal exploitation. Along with the increased use of mobile devices and apps to access and store sensitive, personally identifiable information (PII) has come an increasing need for the community to have a better understanding of the associated security and privacy risks. Drawing upon the expertise of world-renowned researchers and experts, this volume comprehensively discusses a range of mobile security and privacy topics from research, applied, and international perspectives, while aligning technical security implementations with the most recent developments in government, legal, and international environments. The book does not focus on vendor-specific solutions, instead providing a complete presentation of forward-looking research in all areas of mobile security. The book will enable practitioners to learn about upcoming trends, scientists to share new directions in research, and government and industry decision-makers to prepare for major strategic decisions regarding implementation of mobile technology security and privacy. In addition to the state-of-the-art research advances, this book also discusses prospective future research topics and open challenges.
"UMTS Network Planning, Optimization, and Inter-Operation with GSM" is an accessible, one-stop reference to help engineers effectively reduce the time and costs involved in UMTS deployment and optimization. "Rahnema" includes detailed coverage from both a theoretical and practical perspective on the planning and optimization aspects of UMTS, and a number of other new techniques to help operators get the most out of their networks.Provides an end-to-end perspective, from network design to optimizationIncorporates the hands-on experiences of numerous researchersSingle authorship allows for strong coherency and accessibilityDetails the complete iteration cycle of radio link budgeting for coverage planning and dimensioning "Rahnema" demonstrates detailed formulation of radio capacity and coverage in UMTS, and discusses the tradeoffs involved. He presents complete link budgeting and iterative simulations for capacity and coverage planning, along with practical guidelines. "UMTS Network Planning" contains seventeen cohesive and well-organized chapters which cover numerous topics, including: Radio channel structures, radio channel models, parameters, model tuningTechniques for capacity and coverage enhancementsComplete treatment of power control, handoffs and radio resource practical management processes and parametersDetailed coverage of TCP protocol enhancement for operation over wireless links, particularly UMTSApplication of GSM measurements to plan and re-engineer for UMTS radio sitesGuidelines for site co-location with GSM, the QOS classes, parameters and inter-workings in UMTSAMR voice codecs and tradeoffs, core and access network design, architectural evolution, and protocolsComprehensive discussion and presentation of practical techniques for radio performance analysis, trending, and troubleshooting Perfect for professionals in the field and researchers specializing in network enhancement. Engineers working on other air interfaces and next generation technologies will find many of the techniques introduced helpful in designing and deploying future wireless networks as well. Students and professionals new to the wireless field will also find this book to be a good foundation in network planning, performance analysis, and optimization.
Wireless Sensor Networks: Theory and Practice for Deployment addresses WSNs deployment, a mandatory and critical step in the process of developing WSNs solutions for real-life applications. The authors address simple approaches to deploy static WSNs, then exploring more sophisticated approaches to deploy mobile WSNs. Featuring detailed investigations of deployment-related issues such as deployment cost, coverage, connectivity, sensors reliability, and harsh deployment environments, this book will equip you with the basics and an advanced view of both the theoretical and practical aspects, along with knowledge of the guidelines for WSNs deployment.
Whether used for communication, entertainment, socio-economic growth, crowd-sourcing social and political events, monitoring vital signs in patients, helping to drive vehicles, or delivering education, mobile technology has been transformed from a mode to a medium. Mobile Technology Consumption: Opportunities and Challenges explores essential questions related to the cost, benefit, individual and social impact, and security risks associated with the rapid consumption of mobile technology. This book presents the current state of mobile technologies and their use in various domains including education, healthcare, government, entertainment, and emerging economic sectors.
Starting with an overview of current research progresses on multiple access technology, the book then presents the theoretical fundamentals, technical principles, transmission scheme, key technologies and evaluation results of new multi-access technologies, especially focusing on its typical applications 5G communication systems. With extensive practical cases, it is an essential reference for researchers, engineers and graduate students.
Mobile Applications Development with Android: Technologies and Algorithms presents advanced techniques for mobile app development, and addresses recent developments in mobile technologies and wireless networks. The book covers advanced algorithms, embedded systems, novel mobile app architecture, and mobile cloud computing paradigms.
This book provides the first comprehensive introduction to the newly-emerging science of mobile phone behavior. It presents the unexpected complexity of human mobile phone behavior through four basic aspects of mobile phone usage (users, technologies, activities, and effects), and then explores four major domains of such behavior (medicine, business, education, and everyday life). Chapters open with thoughts on mobile phone usage and behavior from interviews with cell phone users, then present a series of scientific studies, synthesized knowledge, and real-life cases, concluding with complex but highly readable analyses of each aspect of mobile phone behavior. Readers should achieve two intellectual goals: gaining a usable knowledge of the complexity of mobile phone behaviour, and developing the skills to analyze the complexity of mobile phone usage - and further technological behaviors. |
You may like...
Brain Games - Sticker by Letter: Jungle
Publications International Ltd, Brain Games, …
Spiral bound
Who Was Jesus and What Does It Mean to…
Nancy Elizabeth Bedford
Paperback
Wavelets and Their Applications
J.S. Byrnes, Kathryn A. Hargreaves, …
Hardcover
R7,863
Discovery Miles 78 630
|