![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > Telephone technology > Mobile phones
This book presents effective ways to partition mobile devices such that the enterprise system access and its information are completely separated from the personal information. For those using mobile devices for personal and business purposes, the ability to keep the data secure and separate is critical. The applications for security in smart platforms range from personal email accounts to global enterprise systems. Several approaches for mobile virtualization are described, all creating secure and secluded environments for enterprise information. The authors present a reference architecture that allows for integration with existing enterprise mobile device management systems and provides a lightweight solution for containerizing mobile applications. This solution is then benchmarked with several of the existing mobile virtualization solutions across a range of mobile devices. Virtualization Techniques for Mobile Systems is an excellent resource for researchers and professionals working in mobile systems. Advanced-level students studying computer science and electrical engineering will also find the content helpful.
Is your phone the first thing you reach for when you wake up? And the last thing you see before you sleep? Do you find the hours slip away as you idly scroll through your social media timeline? In short, are you addicted to your phone? If so, How to Break Up with Your Phone is here to help. How to Break Up With Your Phone is a smart, practical and useful plan to help you conquer your mobile phone addiction in just 30 days - and take back your life in the process. Recent studies have shown that spending extended time on our phones affects our ability to form new memories, think deeply, focus and absorb information, and the hormones triggered every time we hear our phones buzz both add to our stress levels and are the hallmark signs of addiction. In How to Break Up with Your Phone, award-winning science journalist Catherine Price explores the effects that our constant connectivity is having on our brains, bodies, relationships, and society at large and asks, how much time do you really want to spend on your phone? Over the course of 30 days, Catherine will guide you through an easy-to-follow plan that enables you to identify your goals, priorities and bad habits, tidy your apps, prune your email, and take time away. Lastly, you will create a new, healthier relationship with your phone and establish habits and routines to ensure this new relationship sticks. You don't have to give up your phone forever; instead you will be more mindful not only of how you use your phone, but also about how you choose to spend the precious moments of your life.
In this chapter we describe the motivation for writing this book and explain its scope. Some remarks on nomenclature are given in order to help the reader with a fast and easy start. The concept and structure of the material compiled is p- sented, followed by some hints on how to make best use of it. Finally the status of standardization, on which this book is based, is described. 1. 1 Motivation Probably the main motivation for starting to draft the script for this book, and eventually to finish it, was the desire to have a more or less complete, up-to-date overview of mobile network technology for myself, not only when starting my work in 3GPP standardization, but also continuously afterwards. I realized that some of my colleagues were in search of the same, and I extrapolated to the point where, after 3G technology is in in the field for some time, the huge, new step of development would be implemented and finally exist in reality: a manifold of s- tem designers, SW engineers, solution consultants, test personnel, field tech- cians and service staff would have to deal with the underlying architecture, c- cepts and detailed procedures. Yet, I noticed in my roughly two decades of work as a engineer (in a few diverse fields) that compact, consistent, and balanced ov- view material, suitable for the wider audience is scarce.
Health Effects of Cell Phone Radiation will offer a concentrated and up-to-date overview on the effects of radio frequencies on human tissue. While significant advances are being made on many fronts, ranging in frequency from quasi-static to the optical regime, a special emphasis of this volume is on current understanding of biological interactions of cellular mobile communication radiation. The use of cell-phones has experienced phenomenal growth - some estimate that there will be more than 3.5 billion users of these wireless devices by the end of 2010, worldwide. The widespread impact of these new wireless technologies has raised concerns about the safety of human exposure to radio-frequency (RF) energy emitted by these telecommunication devices. A better understanding of the biological effects of RF electromagnetic field is needed to safeguard against possible harm to the general population. Fortunately in recent years there has been a resurgence of research interest in achieving a quantitative understanding of the relationships between the biological effects of RF radiation and the physical variables that may cause them. A significant number of results have and are beginning to appear in the literature. This volume reviews and assesses the biological effects of exposure to electromagnetic fields from wireless communication technology.
This edited volume is the first book-length study focusing entirely on mobile phone use in China. Drawing on examples from a wide range of contemporary situations in China and beyond, the contributors argue that the mobile phone is in fact an important means by which one can understand a rapidly changing China, and the developing culture of mobile phone usage reflects both the cultural norms and struggle of the people. Through a theoretical comparison of usage in the West and in China, the editors assert the uniqueness of China 's experience, highlighting that Chinese society is being exposed simultaneously to a rapid process of industrialization and cyberization. The contributors maintain that such density of experience under a compressed period combined with a thick cultural heritage and a country still under a dictating rule provides a unique situation and offers deep insights into Chinese culture in general. This work will be of great interest to all students and scholars of Asian communication studies, ICT and Chinese culture and society.
This book addresses current technology trends and requirements leading towards the next era in mobile communication handsets; and beyond that the book proposes innovative solutions that could be candidate solutions for 5G phones. It adopts a multidisciplinary and interdisciplinary stance towards handset design, a necessary ingredient if 5th Generation handset and services are to really take-off. Therefore the scope of the book targets a broad range of subjects, including energy efficiency, RF design, cooperation, context-aware systems, roaming, and short-range networking, all of which working in synergy to provide seamless mobility and high speed connectivity within a HetNet environment. Specifically, the authors investigate how we can exploit the cooperation paradigm and context-aware mechanism working in synergy to provide energy compliant phones that can introduce power savings of up to 50% on state-of-the-art. Going beyond this, a chapter on business modeling approaches is also included, based on incentive mechanisms for cooperation that will provide the necessary leverage to promote the up-take of the proposed technology.
Mobile computing and wireless technology have grown at a phenomenal rate in recent years, and so has artificial intelligence. The most advanced software applications that the world ever witnessed can be realized through a combined aspect of these disciplines, capable of delivering high level support to various industry sectors and to people's quality of life in general. Currently, many countries are facing challenges from the COVID-19 pandemic. One of the most impacted industries by the pandemic is that of tourism and hospitality. It is time to explore and leverage the power of mobile and wireless intelligence to assist with the recovery of the tourism and hospitality sector during and after the pandemic, which constitutes a need for relevant research in the field. Mobile Computing and Technology Applications in Tourism and Hospitality presents the latest research and development in mobile and intelligent computing with a focus on tourism and hospitality sectors. The chapters discuss the role of research on innovative technologies and applications for resilience to return the tourism and hospitality industry back to its normal state. This includes research on topics such as sensor-based technology, smart tourism, virtual and augmented reality, mobile travel applications, and more. This book is ideal for managers, executives, museum and cultural heritage specialists, app developers, IT consultants, tourism and hospitality professionals, researchers, academicians, and students.
This book presents the proceedings of 2nd EAI International Conference on Smart Technology (MTYMEX), which took place April 27th, 2021, online and in Monterrey, Mexico. MTYMEX is an international conference aimed at demonstrating the potential of new applications for the Internet in the future. The authors offer perspectives on research on smart technologies in society, including the results of research projects on virtual reality, blockchain, artificial intelligence, and smart cities. The book offers examples of applications with smart technologies in different knowledge areas. The conference brings together the academic, research and private sectors working on applications and smart devices for e-health and smart cities.
Location, location-awareness, and location data have all become familiar and increasingly significant parts of our everyday mobile-mediated experiences. Cultural Economies of Locative Media examines the ways in which location-based services, such as GPS-enabled mobile smartphones, are socially, culturally, economically, and politically produced just as much as they are technically designed and manufactured. Rowan Wilken explores the complex interrelationships that mutually define new business models and the economic factors that emerge around, and structure, locative media services. Further, he offers readers insight into the diverse social uses, cultures of consumption, and policy implications of location, providing a detailed, critical account of contemporary location-sensitive mobile data. Cultural Economies of Locative Media delves into the ideas, technologies, contexts, and power relationships that define this scholarship, resulting in a rich portrait of locative media in all of its cultural and economic complexity.
This book reports the newest research and technical achievements on the following theme blocks: Design of mobile map services and its constraints, typology and usability of mobile map services, visualization solutions on small displays for time-critical tasks, mobile map users, interaction and adaptation in mobile environments and applications of map-based mobile services.
In this book, three different methods are presented to enhance the capacity and coverage area in LTE-A cellular networks. The scope involves the evaluation of the effect of the RN location in terms of capacity and the determination of the optimum location of the relay that provides maximum achievable data rate for users with limited interference at the cell boundaries. This book presents a new model to enhance both capacity and coverage area in LTE-A cellular network by determining the optimum location for the RN with limited interference. The new model is designed to enhance the capacity of the relay link by employing two antennas in RN. This design enables the relay link to absorb more users at cell edge regions. An algorithm called the Balance Power Algorithm (BPA) is developed to reduce MR power consumption. The book pertains to postgraduate students and researchers in wireless & mobile communications.
This book introduces readers to mobile information services for networks. The content is divided into eight chapters, each of which presents a specific concept and the latest related developments in mobile information services. Mobile information services for networks can be defined as platform-independent functional entities that provide various services based on the communication network platform. The book discusses the three main supporting technologies for mobile information services: neighbor discovery in the data link layer; routing and balanced association in the network layer; and community structure detection in the application layer. Lastly, the book describes the development of applications based on the authors' mobile information service platform, as well as related key technologies in the domains of intelligent transportation, smart tourism, and mobile payment, such as trajectory analysis, location recommendation, and mobile behavior authentication, which are promoting the development of mobile information services. This book offers a valuable reference guide for researchers in the field of computer science and technology, as well as those in the field of network mobile information service technology.
Mobile Data Visualization is about facilitating access to and understanding of data on mobile devices. Wearable trackers, mobile phones, and tablets are used by millions of people each day to read weather maps, financial charts, or personal health meters. What is required to create e ffective visualizations for mobile devices? This book introduces key concepts of mobile data visualization and discusses opportunities and challenges from both research and practical perspectives. Mobile Data Visualization is the first book to provide an overview of how to e ffectively visualize, analyze, and communicate data on mobile devices. Drawing from the expertise, research, and experience of an international range of academics and practitioners from across the domains of Visualization, Human Computer Interaction, and Ubiquitous Computing, the book explores the challenges of mobile visualization and explains how it diff ers from traditional data visualization. It highlights opportunities for reaching new audiences with engaging, interactive, and compelling mobile content. In nine chapters, this book presents interesting perspectives on mobile data visualization including: how to characterize and classify mobile visualizations; how to interact with them while on the go and with limited attention spans; how to adapt them to various mobile contexts; specific methods on how to design and evaluate them; reflections on privacy, ethical and other challenges, as well as an outlook to a future of ubiquitous visualization. This accessible book is a valuable and rich resource for visualization designers, practitioners, researchers, and students alike.
From the editors of the highly successful LTE for UMTS: Evolution to LTE-Advanced, this new book examines the main technical enhancements brought by LTE-Advanced, thoroughly covering 3GPP Release 10 specifications and the main items in Release 11. Using illustrations, graphs and real-life scenarios, the authors systematically lead readers through this cutting-edge topic to provide an outlook on existing technologies as well as possible future developments. The book is structured to follow the main technical areas that will be enhanced by the LTE-Advanced specifications. The main topics covered include: Carrier Aggregation; Multiantenna MIMO Transmission, Heterogeneous Networks; Coordinated Multipoint Transmission (CoMP); Relay nodes; 3GPP milestones and IMT-Advanced process in ITU-R; and LTE-Advanced Performance Evaluation. Key features: * Leading author and editor team bring their expertise to the next generation of LTE technology * Includes tables, figures and plots illustrating the concepts or simulation results, to aid understanding of the topic, and enabling readers to be ahead of the technological advances
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services. "AAA and Network Security for Mobile Access" is an invaluable guide to the AAA concepts and framework, including its protocols Diameter and Radius. The authors give an overview of established and emerging standards for the provision of secure network access for mobile users while providing the basic design concepts and motivations. "AAA and Network Security for Mobile Access: " Covers trust, i.e., authentication and security key management for fixed and mobile users, and various approaches to trust establishment. Discusses public key infrastructures and provides practical tips on certificates management. Introduces Diameter, a state-of-the-art AAA protocol designed to meet today's reliability, security and robustness requirements, and examines Diameter-Mobile IP interactions. Explains RADIUS (Remote Authentication Dial-In User Services) and its latest extensions. Details EAP (Extensible Authentication Protocol) in-depth, giving a protocol overview, and covering EAP-XXX authentication methods as well as use of EAP in 802 networks. Describes IP mobility protocols including IP level mobility management, its security and optimizations, and latest IETF seamless mobility protocols. Includes a chapter describing the details of Mobile IP and AAA interaction, illustrating Diameter Mobile IP applications and the process used in CDMA2000. Contains a section on security and AAA issues to support roaming, discussing a variety of options for operator co-existence, including an overviewof Liberty Alliance. This text will provide researchers in academia and industry, network security engineers, managers, developers and planners, as well as graduate students, with an accessible explanation of the standards fundamental to secure mobile access.
Discover what is involved in designing the world's most popular and advanced consumer product to date - the phone in your pocket. With this essential guide you will learn how the dynamics of the market, and the pace of technology innovation, constantly create new opportunities which design teams utilize to develop new products that delight and surprise us. Explore core technology building blocks, such as chipsets and software components, and see how these components are built together through the design lifecycle to create unique handset designs. Learn key design principles to reduce design time and cost, and best practice guidelines to maximize opportunities to create a successful product. A range of real-world case studies are included to illustrate key insights. Finally, emerging trends in the handset industry are identified, and the global impact those trends could have on future devices is discussed.
Without correct timing, there is no safe and reliable embedded software. This book shows how to consider timing early in the development process for embedded systems, how to solve acute timing problems, how to perform timing optimization, and how to address the aspect of timing verification.The book is organized in twelve chapters. The first three cover various basics of microprocessor technologies and the operating systems used therein. The next four chapters cover timing problems both in theory and practice, covering also various timing analysis techniques as well as special issues like multi- and many-core timing. Chapter 8 deals with aspects of timing optimization, followed by chapter 9 that highlights various methodological issues of the actual development process. Chapter 10 presents timing analysis in AUTOSAR in detail, while chapter 11 focuses on safety aspects and timing verification. Finally, chapter 12 provides an outlook on upcoming and future developments in software timing. The number of embedded systems that we encounter in everyday life is growing steadily. At the same time, the complexity of the software is constantly increasing. This book is mainly written for software developers and project leaders in industry. It is enriched by many practical examples mostly from the automotive domain, yet the vast majority of the book is relevant for any embedded software project. This way it is also well-suited as a textbook for academic courses with a strong practical emphasis, e.g. at applied sciences universities. Features and Benefits * Shows how to consider timing in the development process for embedded systems, how to solve timing problems, and how to address timing verification * Enriched by many practical examples mostly from the automotive domain * Mainly written for software developers and project leaders in industry
This book is designed to be usable as a textbook for an undergraduate course or for an advanced graduate course in coding theory as well as a reference for researchers in discrete mathematics, engineering and theoretical computer science. This second edition has three parts: an elementary introduction to coding, theory and applications of codes, and algebraic curves. The latter part presents a brief introduction to the theory of algebraic curves and its most important applications to coding theory. |
You may like...
Transformation Optics-based Antennas
Shah Nawaz Burokur, Andre de Lutrac, …
Hardcover
R1,623
Discovery Miles 16 230
Urban Mobility and the Smartphone…
Anne Aguilera, Virginie Boutueil
Paperback
R2,514
Discovery Miles 25 140
Encyclopedia of Wireless Communications…
Bernhard Ekman
Hardcover
Cellular Internet of Things - From…
Olof Liberg, Marten Sundberg, …
Paperback
R2,403
Discovery Miles 24 030
Contemporary Challenges and Solutions…
Ismail Khalil, Edgar Weippl
Hardcover
R4,840
Discovery Miles 48 400
Paving the Way for 5G Through the…
Ramona Trestian, Gabriel-Miro Muntean
Hardcover
R4,959
Discovery Miles 49 590
Advanced Methodologies and Technologies…
D.B.A., Mehdi Khosrow-Pour,
Hardcover
R9,085
Discovery Miles 90 850
|