Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > Telephone technology
Human-computer interaction is a growing field of study in which researchers and professionals aim to understand and evaluate the impact of new technologies on human behavior. With the integration of smart phones, tablets, and other portable devices into everyday life, there is a greater need to understand the influence of such technology on the human experience. Emerging Perspectives on the Design, Use, and Evaluation of Mobile and Handheld Devices is an authoritative reference source consisting of the latest scholarly research and theories from international experts and professionals on the topic of human-computer interaction with mobile devices. Featuring a comprehensive collection of chapters on critical topics in this dynamic field, this publication is an essential reference source for researchers, educators, students, and practitioners interested in the use of mobile and handheld devices and their impact on individuals and society as a whole. This publication features timely, research-based chapters pertaining to topics in the design and evaluation of smart devices including, but not limited to, app stores, category-based interfaces, gamified mobility applications, mobile interaction, mobile learning, pervasive multimodal applications, smartphone interaction, and social media use.
Just as the steam engine was the driving force behind the Industrial Revolution, today, broadband Internet is seen as critical to the transition of knowledge-intensive economies across the world. As a general purpose technology, broadband Internet is considered a fundamental driver of economic growth and social development, releasing the innovative potential and energy of previously disenfranchised members of the population. Many of the countries in the Middle East and North Africa region (MENA) now recognize that broadband Internet is crucial to their efforts to reduce poverty and create job opportunities, especially for their young populations and for women. Broadband Networks in the Middle East and North Africa re-emphasizes the important contribution that broadband Internet can make and assesses the status of existing nfrastructure in at least 18 MENA countries. While there is significant potential across the region, the take-up of broadband Internet has been slow and the price of broadband service is high in many countries. In large part, this stems from market structures that, too often, reflect the past when telecommunications were treated as a monopoly utility service. The report finds that there are gaps in infrastructure regionally with no connectivity between neighboring countries in some cases. Similarly, there are gaps within countries exacerbating the (digital) divide between rural and urban areas. "Broadband Networks in the Middle East and North Africa" examines the regulatory and market bottlenecks that are hampering the growth of the Internet in these and other MENA countries: the five North African countries (Algeria, Egypt, Morocco, Libya, Tunisia); the six Mashreq countries (the Islamic Republic of Iran, Iraq, Jordan, Lebanon, Syria, and the West Bank and Gaza economy); the six Gulf countries (Bahrain, Kuwait, Oman, Qatar, Saudi Arabia, the United Arab Emirates); and Djibouti and the Republic of Yemen. Last, the report provides policy and regulatory options for increasing effective use of existing fixed and mobile infrastructure as well as alternative infrastructure networks such as power grids and railroads. It explains the benefits of effective cross-sector infrastructure construction frameworks, highlighting the need to adjust market structures to foster competitive behavior among service providers to bring down prices and stimulate the demand for value-added services to drive future broadband development.
The current state-of-art in securing computers and data is tantamount to an arms race between the attackers on one hand and the software developers who have to provide the updates to counteract the attacks on the other. This monograph introduces a novel technique for designing secure protocols with provable security guarantees for wireless ad-hoc networks infiltrated with adversarial nodes. It does this by developing a system-theoretical approach to secure protocol design that provides provable and comprehensive security guarantees, where any features of a protocol that reduce complexity or maximize the network throughput do not come at the expense of security. The desired approach is one of security first and performance second, which is the reverse of the current approach. This novel approach uses a game-theoretic framework that addresses the deficiencies in the defense-in-depth approach to securing complex systems. A Clean Slate Approach to Secure Wireless Networking describes in detail the theory of using this approach in both closed synchronized and unsynchronized networks. It will be of interest to all researchers and designers working on securing wireless networks.
This monograph provides a tutorial on a family of sequential learning and decision problems known as the multi-armed bandit problems. In such problems, any decision serves the purpose of exploring or exploiting or both. This balancing act between exploration and exploitation is characteristic of this type of ""learning-on-the-go"" problem, in which we have to instantaneously apply what we have learned so far, even as we continue to learn. The authors give an in-depth introduction to the technical aspects of the theory of decision-making technologies. The range is comprehensive and covers topics that have applications in many networking systems. These include Recommender systems, Ad Placement systems, the smart grid, and clinical trials. Online Learning Methods for Networking is essential reading for students working in networking and machine learning. Designers of many network-based systems will find it a valuable resource for improving their technology.
The wireless medium is a shared resource. If nearby devices transmit at the same time, their signals interfere, resulting in a collision. In traditional networks, collisions cause the loss of the transmitted information. For this reason, wireless networks have been designed with the assumption that interference is intrinsically harmful and must be avoided. This book, a revised version of the author's award-winning Ph.D. dissertation, takes an alternate approach: Instead of viewing interference as an inherently counterproductive phenomenon that should to be avoided, we design practical systems that transform interference into a harmless, and even a beneficial phenomenon. To achieve this goal, we consider how wireless signals interact when they interfere, and use this understanding in our system designs. Specifically, when interference occurs, the signals get mixed on the wireless medium. By understanding the parameters of this mixing, we can invert the mixing and decode the interfered packets; thus, making interference harmless. Furthermore, we can control this mixing process to create strategic interference that allow decodability at a particular receiver of interest, but prevent decodability at unintended receivers and adversaries. Hence, we can transform interference into a beneficial phenomenon that provides security. Building on this approach, we make four main contributions: We present the first WiFi receiver that can successfully reconstruct the transmitted information in the presence of packet collisions. Next, we introduce a WiFi receiver design that can decode in the presence of high-power cross-technology interference from devices like baby monitors, cordless phones, microwave ovens, or even unknown technologies. We then show how we can harness interference to improve security. In particular, we develop the first system that secures an insecure medical implant without any modification to the implant itself. Finally, we present a solution that establishes secure connections between any two WiFi devices, without having users enter passwords or use pre-shared secret keys.
In multi-hop wireless networks; that is, networks where messages must traverse multiple nodes before reaching their destination, wireless relay nodes must play a dual role: they serve as intermediate steps for relaying schemes and as part of the mechanism that allows interference management schemes. Hence, relaying and interference management are two key aspects of communication in wireless networks. Both these aspects are introduced in a tutorial manner before going on to consider the combination of the two. In multi-hop multi-flow networks, the challenge is to combine the insights obtained in the study of single-hop multi-flow networks and multi-hop single-flow networks in order to design schemes that handle relaying and interference management simultaneously. This monograph discusses the gains that can be obtained by taking such a unified approach to relaying and interference management. Multihop Wireless Networks is of interest to students and researchers working on modern network systems.
The book is an easy-to-follow guide with clear instructions on various mobile forensic techniques. The chapters and the topics within are structured for a smooth learning curve, which will swiftly empower you to master mobile forensics. If you are a budding forensic analyst, consultant, engineer, or a forensic professional wanting to expand your skillset, this is the book for you. The book will also be beneficial to those with an interest in mobile forensics or wanting to find data lost on mobile devices. It will be helpful to be familiar with forensics in general but no prior experience is required to follow this book.
"UMTS Network Planning, Optimization, and Inter-Operation with GSM" is an accessible, one-stop reference to help engineers effectively reduce the time and costs involved in UMTS deployment and optimization. "Rahnema" includes detailed coverage from both a theoretical and practical perspective on the planning and optimization aspects of UMTS, and a number of other new techniques to help operators get the most out of their networks.Provides an end-to-end perspective, from network design to optimizationIncorporates the hands-on experiences of numerous researchersSingle authorship allows for strong coherency and accessibilityDetails the complete iteration cycle of radio link budgeting for coverage planning and dimensioning "Rahnema" demonstrates detailed formulation of radio capacity and coverage in UMTS, and discusses the tradeoffs involved. He presents complete link budgeting and iterative simulations for capacity and coverage planning, along with practical guidelines. "UMTS Network Planning" contains seventeen cohesive and well-organized chapters which cover numerous topics, including: Radio channel structures, radio channel models, parameters, model tuningTechniques for capacity and coverage enhancementsComplete treatment of power control, handoffs and radio resource practical management processes and parametersDetailed coverage of TCP protocol enhancement for operation over wireless links, particularly UMTSApplication of GSM measurements to plan and re-engineer for UMTS radio sitesGuidelines for site co-location with GSM, the QOS classes, parameters and inter-workings in UMTSAMR voice codecs and tradeoffs, core and access network design, architectural evolution, and protocolsComprehensive discussion and presentation of practical techniques for radio performance analysis, trending, and troubleshooting Perfect for professionals in the field and researchers specializing in network enhancement. Engineers working on other air interfaces and next generation technologies will find many of the techniques introduced helpful in designing and deploying future wireless networks as well. Students and professionals new to the wireless field will also find this book to be a good foundation in network planning, performance analysis, and optimization.
iPad (R) and iPhone (R) Tips and Tricks Covers iPad Air, iPad 3rd/4th generation, iPad 2, iPad mini, iPhone 5S, 5/5C and 4/4S running iOS 7 Easily Unlock the Power of Your iPad, iPad mini, or iPhone Discover hundreds of tips and tricks you can use right away with your iPad, iPad mini, or iPhone to maximize its functionality. Learn to use your iOS 7 mobile device as a powerful communication, organization, and productivity tool, as well as a feature-packed entertainment device. In addition to learning all about the apps that come preinstalled on your iPad or iPhone, you will learn about some of the best third-party apps currently available, plus discover useful strategies for how to best utilize them in your personal and professional life. Using an easy-to-understand, nontechnical approach, this book is ideal for beginners and more experienced iPad, iPad mini, or iPhone users who want to discover how to use the iOS 7 operating system with iCloud, and the latest versions of popular apps. If you're using an iPad running iOS 7, this book is an indispensable tool! Here's just a sampling of what the tips, tricks, and strategies offered in this book will help you accomplish: * Discover how to take full advantage of powerful iOS 7 features, such as Control Center and AirDrop. * Create and maintain a reliable backup of your iOS 7 device. * Learn secrets for using preinstalled apps, such as Contacts, Calendars, Reminders, Maps, Notes, Safari, Mail, and Music. * Find, download, and install the most powerful and versatile apps and content for your iPad, iPad mini, or iPhone. * Synchronize files, documents, data, photos, and content with iCloud, your computer, or other iOS mobile devices. * Learn how to interact with your tablet or phone using your voice with Siri and the Dictation feature. * Discover how to take visually impressive photos using the cameras built in to your iPad, iPad mini, or iPhone, and then share them using iCloud Shared Photo Streams, Facebook, Twitter, email, or other methods. * Use your iOS mobile device as an eBook reader, portable gaming machine, and feature-packed music and video player.
Mobile technology continues to shape our society, delivering information and knowledge right to our finger tips. It is only fitting that these advancements and opportunities are applied to the area of electronic services. Mobile Opportunities and Applications for E-Service Innovations brings together different perspectives on the understanding of e-service and mobile communication, as well as their effects on the fields of marketing, management, and information systems. The growth of e-services as it relates to business -to-business, business-to-consumer, consumer-to-consumer, are essential to the interests of professionals, academics, and researchers, as well as industry consultants.
The "Multimedia Messaging Service" (MMS) is regarded as the best-of-the breed of proven messaging technologies, surpassing SMS and electronic mail to offer a truly multimedia experience to mobile users. The first commercial solutions appeared on the market in 2002 and the penetration rate of MMS is now quickly approaching the required level for mass-market adoption. By leveraging accessible technologies, MMS has gained wide acceptance from major market players and provides great business opportunities for the whole telecommunications industry. This book introduces usage scenarios and provides a comprehensive description of enabling technologies for MMS, from version 1.0 to version 1.2 (featuring message content classes, video support, online message boxes, digital rights management, etc.). It demystifies MMS standards by clearly illustrating technical explanations with numerous practical examples, from the design of multimedia messages to the interfacing of applications with MMS centres. It sheds light on common implementation pitfalls and known interoperability issues. it is based on the author's own experience as a standardization expert and software architect for one of the major handset vendors, "Multimedia Messaging Service" provides a stimulating practical reference book for network operators, content designers, device manufacturers and developers of messaging applications, and will also appeal to researchers and students.
Stable Throughput Regions in Wireless Networks examines the fundamentals of stable throughput in wireless networks. It reviews the notion of stability and of stable throughput regions in wireless networks, with emphasis on network layer cooperation between interacting users. After a brief introduction, it examines in detail specific instances of the stability issue. These instances differ from each other in terms of the network, channel and traffic models they use. What they share is the notion of how stability is affected by node cooperation, as well as the notion of ""interacting queues"" that makes the stable throughput analysis difficult and often intractable. This review is intended to provide a reference point for the rich set of network control problems that arise in the context of queue stability in modern and future networks.
Mobile computing and multimedia technologies continue to expand and change the way we interact with each other on a business and social level. With the increased use of mobile devices and the exchange of information over wireless networks, information systems are able to process and transmit multimedia data in various areas. Contemporary Challenges and Solutions for Mobile and Multimedia Technologies provides comprehensive knowledge on the growth and changes in the field of multimedia and mobile technologies. This reference source highlights the advancements in mobile technology that are beneficial for developers, researchers, and designers.
It is widely accepted that nanonetworks will enable a plethora of long-awaited applications, ranging from healthcare to homeland security, industrial development and environmental protection. Enabling communication among nanomachines is still a major challenge. While it is acknowledged that there is still a long way to go before having a fully functional nanomachine, this book makes the case that hardware-oriented research and communication-focused investigations will benefit from being conducted in parallel from an early stage. Fundamentals of Electromagnetic Nanonetworks in the Terahertz Band defines the first steps towards enabling electromagnetic communication among nanomachines in the Terahertz Band (0.1-10 THz). The starting point is the development of novel graphene-based plasmonic nano-antennas, which efficiently operate in the Terahertz Band. The authors have developed a novel Terahertz Band channel model and investigated the potential of this frequency band by means of a channel capacity analysis. In light of the channel peculiarities and the nanomachine capabilities, they put forward a set of communication mechanisms for nanonetworks, which include femtosecond-long pulse-based modulations, low-weight channel coding schemes, a new symbol detection scheme at the receiver, and a new medium access control protocol for nanonetworks. In addition, the book analyzes the performance of perpetual nanonetworks by developing a joint energy harvesting and energy consumption model for self-powered nanomachines. Finally, an emulation platform has been developed to simulate a one-to-one nano-link between nanomachines and validate the developed models.
Step-by-step instructions with callouts to iPhone images that show you exactly what to do. Help when you run into iPhone problems or limitations. Tips and Notes to help you get the most from your iPhone. Full-color, step-by-step tasks walk you through getting and keeping your iPhone working just the way you want. The tasks include how to: * Connect to the Internet, Bluetooth devices, Wi-Fi networks, and other iPhones, iPods, and iPads * Use Siri to get information, write texts and emails, set reminders/appointments, and more just by speaking to your iPhone 4S and newer * Customize your iPhone with folders, wallpaper, ringtones, and much more * Configure and sync your information, and efficiently manage contacts, reminders, and calendars * Communicate via FaceTime videoconferences, conference calls, text, email, and more * Make the most of Safari to browse the Web and Mail to manage all of your email from one inbox * Listen to music, subscribe to podcasts, and watch video-including movies and TV shows * Capture and edit photos and video * Use your photos in slideshows, for wallpaper, and your contacts or share them via email, Cloud, and texts; use PhotoStream to automatically save and share your photos * Find, download, install, and use awesome iPhone apps * Take advantage of iCloud to keep your content and information in sync on all your devices BONUS MATERIAL: Download a bonus chapter titled, "Using Cool iPhone Apps," as well as additional tasks and other helpful information on this book's website at quepublishing.com/myiphone5. CATEGORY: Apple Digital Media COVERS: Apple iPhone USER LEVEL: Beginning-Intermediate
A short book with important concepts and instructions. This book is for those who want to find out more about Windows Phone and are familiar with functional programming languages, and in particular, F#. The book assumes that you know how to program using F# as a language. However, the book does take you through a brief introduction to Windows Phone as a platform and F# as a language. |
You may like...
Essentials of Mobile Handset Design
Abhi Naha, Peter Whale
Hardcover
Mobile Media Practices, Presence and…
Kathleen M. Cumiskey, Larissa Hjorth
Paperback
R1,294
Discovery Miles 12 940
Technology for Success - Computer…
Mark Ciampa, Jill West, …
Paperback
(1)
|