Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
The purpose of this book is to review the recent advances in E-health technologies and applications. In particular, the book investigates the recent advancements in physical design of medical devices, signal processing and emergent wireless technologies for E-health. In a second part, novel security and privacy solutions for IoT-based E-health applications are presented. The last part of the book is focused on applications, data mining and data analytics for E-health using artificial intelligence and cloud infrastructure. E-health has been an evolving concept since its inception, due to the numerous technologies that can be adapted to offer new innovative and efficient E-health applications. Recently, with the tremendous advancement of wireless technologies, sensors and wearable devices and software technologies, new opportunities have arisen and transformed the E-health field. Moreover, with the expansion of the Internet of Things, and the huge amount of data that connected E-health devices and applications are generating, it is also mandatory to address new challenges related to the data management, applications management and their security. Through this book, readers will be introduced to all these concepts. This book is intended for all practitioners (industrial and academic) interested in widening their knowledge in wireless communications and embedded technologies applied to E-health, cloud computing, artificial intelligence and big data for E-health applications and security issues in E-health.
This book discusses the development of promising technologies for compact antennas for high data-rate communications. It discusses and analyzes the design of compact ultra-wideband (UWB) and multiple input, multiple output (MIMO) antennas, providing essential know-how for designers, practicing engineers and scientists. These wireless communication technologies enable consumers to have convenient access to a wide range of services - anytime, anywhere. And the introduction of wireless mobile access points eliminates the limitations to communication imposed by geographical location. The Internet has allowed people to access and share information much more rapidly, but in order to achieve higher data rates with the limited available resources and imposed constraints, wireless communication technology needs to be pushed beyond the physical limits of the propagation channel. This book contributes to achieving this goal.
This book covers the fundamental principles, new theories and methodologies, and potential applications of hybrid intelligent networks. Chapters focus on hybrid neural networks and networked multi-agent networks, including their communication, control and optimization synthesis. This text also provides a succinct but useful guideline for designing neural network-based hybrid artificial intelligence for brain-inspired computation systems and applications in the Internet of Things. Artificial Intelligence has developed into a deep research field targeting robots with more brain-inspired perception, learning, decision-making abilities, etc. This text devoted to a tutorial on hybrid intelligent networks that have been identified in nature and engineering, especially in the brain, modeled by hybrid dynamical systems and complex networks, and have shown potential application to brain-inspired intelligence. Included in this text are impulsive neural networks, neurodynamics, multiagent networks, hybrid dynamics analysis, collective dynamics, as well as hybrid communication, control and optimization methods. Graduate students who are interested in artificial intelligence and hybrid intelligence, as well as professors and graduate students who are interested in neural networks and multiagent networks will find this textbook a valuable resource. AI engineers and consultants who are working in wireless communications and networking will want to buy this book. Also, professional and academic institutions in universities and Mobile vehicle companies and engineers and managers who concern humans in the loop of IoT will also be interested in this book.
Due to technological advancements in recent years, wireless systems have experienced significant improvements in reliability and performance. Now deeply integrated into daily life in modern society, these systems have become a widely studied topic. Emerging Innovations in Wireless Networks and Broadband Technologies is a pivotal reference source for the latest scholarly research on the various applications and functionality of wireless technologies. Highlighting critical issues relating to network optimization and efficiency, this book is ideally designed for researchers, upper-level students, practitioners, and professionals interested in the recent developments within the field of wireless systems.
This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be valuable to industry developers, as it explains the state-of-the-art algorithms for offering privacy. By discussing a wide range of privacy techniques, providing in-depth coverage of the most important ones, and highlighting promising avenues for future research, this handbook also aims at attracting computer science and statistics students to this interesting field of research. The advances in mobile devices and positioning technologies, together with the progress in spatiotemporal database research, have made possible the tracking of mobile devices (and their human companions) at very high accuracy, while supporting the efficient storage of mobility data in data warehouses, which this handbook illustrates. This has provided the means to collect, store and process mobility data of an unprecedented quantity, quality and timeliness. As ubiquitous computing pervades our society, user mobility data represents a very useful but also extremely sensitive source of information. On one hand, the movement traces that are left behind by the mobile devices of the users can be very useful in a wide spectrum of applications such as urban planning, traffic engineering, and environmental pollution management. On the other hand, the disclosure of mobility data to third parties may severely jeopardize the privacy of the users whose movement is recorded, leading to abuse scenarios such as user tailing and profiling. A significant amount of research work has been conducted in the last 15 years in the area of mobility data privacy and important research directions, such as privacy-preserving mobility data management, privacy in location sensing technologies and location-based services, privacy in vehicular communication networks, privacy in location-based social networks, privacy in participatory sensing systems which this handbook addresses.. This handbook also identifies important privacy gaps in the use of mobility data and has resulted to the adoption of international laws for location privacy protection (e.g., in EU, US, Canada, Australia, New Zealand, Japan, Singapore), as well as to a large number of interesting technologies for privacy-protecting mobility data, some of which have been made available through open-source systems and featured in real-world applications.
The development of new mobile multimedia services is certain to create new issues for future mobile communication systems. This second volume on the latest research and developments in the field offers a survey of the management and network optimization methods that will help you overcome the challenges that lie ahead. Like its companion volumes, research results from the Information Society Technologies (IST) program has been gathered to give you details in the most critical areas. The key topics include the management of heterogeneous and hybrid networks, advanced resource management techniques, cutting-edge radio technologies, advances in the development of satellite systems as part of a global integrated communication system, research on interactive broadcasting, and end-to-end solutions for delivery of services and guaranteed QoS. The DVD included contains further details on critical topics related to the research discussed in the book.
The popularity of smart phones and other mobile devices has brought about major expansion in the realm of wireless communications. With this growth comes the need to improve upon network capacity and overall user experience, and game-based methods can offer further enhancements in this area. Game Theory Framework Applied to Wireless Communication Networks is a pivotal reference source for the latest scholarly research on the application of game-theoretic approaches to enhance wireless networking. Featuring prevailing coverage on a range of topics relating to the advanced game model, mechanism designs, and effective equilibrium concepts, this publication is an essential reference source for researchers, students, technology developers, and engineers. This publication features extensive, research-based chapters across a broad scope of relevant topics, including potential games, coalition formation game, heterogeneous networks, radio resource allocation, coverage optimization, distributed dynamic resource allocation, dynamic spectrum access, physical layer security, and cooperative video transmission.
Unwired Business: Cases in Mobile Business, aims to provide a source of high quality, practical case studies of the planning, implementation and use of mobile and wireless data solutions in modern business. The case studies are selected both as exemplars of wireless and mobile solutions and as typical cases in a variety of areas of common development. The book provides a number of insightful analyses of business applications of mobile technologies that help the practitioner understand the nature of the technology and how its value can be best harnessed in a wide variety of organizational settings. The focus is to present how these emerging technologies can help business to create a strategic advantage in the market, typically by becoming more efficient, effective and profitable. The examples should provide ideas and points of reference for managers as they seek to devise and implement mobile applications for business advantage. In particular, this book is aimed at managers that would like to better understand the implications of wireless and mobile technologies for today's organizations.
The first of a three-volume series on the latest research and developments in the field of mobile communications, this cutting-edge resource offers practical insight into the next generation of wireless systems, services, and applications. Culled from groundbreaking research associated with the Information Society Technologies (IST) program, this unique book helps professionals understand how the networks of tomorrow will evolve into a common, open platform, capable of delivering a range of voice, video, and data services in a combined and seamless manner. This forward-looking volume covers a wide-range of important topics, from the architectures of future wireless systems and the importance of short-range systems in the global communication society, to service platforms/technologies and application platforms. The DVD included contains further details on critical topics related to the research discussed in the book.
This book provides a comprehensive review and in-depth study on efficient beamforming design and rigorous performance analysis in mmWave networks, covering beam alignment, beamforming training and beamforming-aided caching. Due to significant beam alignment latency between the transmitter and the receiver in existing mmWave systems, this book proposes a machine learning based beam alignment algorithm for mmWave networks to determine the optimal beam pair with a low latency. Then, to analyze and enhance the performance of beamforming training (BFT) protocol in 802.11ad mmWave networks, an analytical model is presented to evaluate the performance of BFT protocol and an enhancement scheme is proposed to improve its performance in high user density scenarios. Furthermore, it investigates the beamforming-aided caching problem in mmWave networks, and proposes a device-to-device assisted cooperative edge caching to alleviate backhaul congestion and reduce content retrieval delay. This book concludes with future research directions in the related fields of study. The presented beamforming designs and the corresponding research results covered in this book, provides valuable insights for practical mmWave network deployment and motivate new ideas for future mmWave networking. This book targets researchers working in the fields of mmWave networks, beamforming design, and resource management as well as graduate students studying the areas of electrical engineering, computing engineering and computer science. Professionals in industry who work in this field will find this book useful as a reference.
This book covers the design and optimization of hybrid RF-baseband precoding for massive multiple-input multiple-output (MIMO)-enabled cloud radio access networks (RANs), where use cases such as millimeter-wave wireless backhauling, fully-loaded cellular networks are of interest. The suitability and practical implementation of the proposed precoding solutions for the Cloud RAN architecture are also discussed. Novel techniques are examined for RF precoding optimization in combination with nonlinear precoding at baseband, and the superiority of joint RF-baseband design is verified. Moreover, the efficacy of hybrid RF-baseband precoding to combat intercell interference in a multi-cell environment with universal frequency reuse is investigated, which is concluded to be a promising enabler for the dense deployment of base stations. This book mainly targets researchers and engineers interested in the challenges, optimization, and implementation of massive MIMO precoding in 5G Cloud RAN. Graduate students in electrical engineering and computer science interested in the application of mathematical optimization to model and solve precoding problems in massive MIMO cellular systems will also be interested in this book.
Physical layer security is emerging as a promising means of ensuring secrecy in wireless communications. The key idea is to exploit the characteristics of wireless channels such as fading or noise to transmit a message from the source to the intended receiver while keeping this message confidential from eavesdroppers. Topics covered in Trusted Communications with Physical Layer Security for 5G and Beyond include secrecy metrics for physical layer security over fading channels; trusted wireless communications with spatial multiplexing; directional modulation enabled physical layer wireless security; secure waveform for 5G systems; confidential and energy efficient communications using physical layer security; secure data networks with channel uncertainty; antenna selection strategies for wiretap channels; physical layer security for massive MIMO systems, millimeter wave cellular networks, non-orthogonal multiple access, multiuser relay networks, cognitive radio networks, MIMOME-OFDM systems; wirelessly powered communication systems and D2D-enabled cellular networks; and security solutions and applications at the physical layer, including case studies of secret key generation and secrecy coding in communication nodes and terminals.
This book describes design techniques for wideband quadrature LO generation for software defined radio transceivers, with frequencies spanning 4GHz to around 80GHz. The authors discuss several techniques that can be used to reduce the cost and/or power consumption of one of the key component of the RF front-end, the quadrature local oscillator. The discussion includes simple and useful insights into quadrature VCOs, along with numerous examples of practical techniques.
With increased consumer use and adoption, mobile communication technologies are faced with the challenge of creating an adequate wireless networking architecture that can support a high degree of scalability, performance, and reliability in a cost-effective manner without comprising security or quality of service. Self-Organized Mobile Communication Technologies explores self-organizing networks (SONs) as a proposed solution for the automation of mobile communication tasks that currently require significant efforts for planning, operation, and management. Emphasizing research on the latest generation of mobile communication networks, the 5th generation (5G), this publication proposes timely solutions and presents the latest developments in the field of mobile communication technologies. IT developers, engineers, graduate-level students, and researchers will find this publication to be essential to their research needs.
This book unites two different technologies: parasitic antenna arrays driven via analogue circuits that control the electromagnetic waves generated by the antenna array; and MIMO technology for multi-antenna arrays, typically driven by digital techniques in the baseband domain. The combination of these two technologies has revealed a novel functionality that breaks through the conventional MIMO paradigm, allowing MIMO transmission over the air with the use of antenna arrays that may consist of only a single active element, that is surrounded by a number of passive neighboring antennas. The contributions in the book show the capability of such systems to also perform MIMO transmission. This fact holds the potential of revolutionizing the way small-form wireless terminals operate and seems to set the scene for a win-win situation, achieving MIMO transmission with very small and cheap antenna arrays. The book is structured to provide a well-rounded treatment of the various facets of this newly discovered wireless communication capability. All relevant technical angles, ranging from information theoretic to electromagnetic considerations; from analogue circuit to digital baseband control for signal generation; and from channel modeling to communication theoretic aspects are taken into account. A good balance between theory, practical considerations and over-the-air experimentation is proposed and reflected in the chapter outline. Finally, a discussion and early evidence related to potential applications as well as the relevance to current and upcoming wireless standards is provided.
This book comprises select peer-reviewed papers from the International Conference on VLSI, Communication and Signal processing (VCAS) 2019, held at Motilal Nehru National Institute of Technology (MNNIT) Allahabad, Prayagraj, India. The contents focus on latest research in different domains of electronics and communication engineering, in particular microelectronics and VLSI design, communication systems and networks, and signal and image processing. The book also discusses the emerging applications of novel tools and techniques in image, video and multimedia signal processing. This book will be useful to students, researchers and professionals working in the electronics and communication domain.
Wireless Body Area Networks (WBANs) are expected to promote new applications for the ambulatory health monitoring of chronic patients and elderly population, aiming to improve their quality of life and independence. These networks are composed by wireless sensor nodes (WSNs) used for measuring physiological variables (e.g., glucose level in blood or body temperature) or controlling therapeutic devices (e.g., implanted insulin pumps). These nodes should exhibit a high degree of energy autonomy in order to extend their battery lifetime or even make the node supply to rely on harvesting techniques. Typically, the power budget of WSNs is dominated by the wireless link and, hence, many efforts have been directed during the last years toward the implementation of power efficient transceivers. Because of the short range (typically no more than a few meters) and low data rate (typically in between 10 kb/s and 1 Mb/s), simple communication protocols can be employed. One of these protocols, specifically tailored for WBAN applications, is the Bluetooth low energy (BLE) standard. This book describes the challenges and solutions for the design of ultra-low power transceivers for WBANs applications and presents the implementation details of a BLE transceiver prototype. Coverage includes not only the main concepts and architectures for achieving low power consumption, but also the details of the circuit design and its implementation in a standard CMOS technology."
This book discusses current theory regarding global mobile satellite communications (GMSC) for maritime, land (road and rail), and aeronautical applications. It covers how these can enable connections between moving objects such as ships, road and rail vehicles and aircrafts on one hand, and on the other ground telecommunications subscribers through the medium of communications satellites, ground earth stations, Terrestrial Telecommunication Networks (TTN), Internet Service Providers (ISP) and other wireless and landline telecommunications providers. This new edition covers new developments and initiatives that have resulted in land and aeronautical applications and the introduction of new satellite constellations in non-geostationary orbits and projects of new hybrid satellite constellations. The book presents current GMSC trends, mobile system concepts and network architecture using a simple mode of style with understandable technical information, characteristics, graphics, illustrations and mathematics equations. The first edition of Global Mobile Satellite Communications (Springer, 2005) was split into two books for the second edition-one on applications and one on theory. This book presents global mobile satellite communications theory.
This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which could change "the easy-to-attack and difficult-to-defend game" in cyberspace. The endogenous uncertain effects from the targets of the software/hardware based on this architecture can produce magic "mimic defense fog", and suppress in a normalized mode random disturbances caused by physical or logic elements, as well as effects of non-probability disturbances brought by uncertain security threats. Although progress has been made in the current security defense theories in cyberspace and various types of security technologies have come into being, the effectiveness of such theories and technologies often depends on the scale of the prior knowledge of the attackers, on the part of the defender and on the acquired real-timing and accuracy regarding the attackers' behavior features and other information. Hence, there lacks an efficient active defense means to deal with uncertain security threats from the unknown. Even if the bottom-line defense technologies such as encrypted verification are adopted, the security of hardware/software products cannot be quantitatively designed, verified or measured. Due to the "loose coupling" relationship and border defense modes between the defender and the protected target, there exist insurmountable theoretical and technological challenges in the protection of the defender and the target against the utilization of internal vulnerabilities or backdoors, as well as in dealing with attack scenarios based on backdoor-activated collaboration from both inside and outside, no matter how augmented or accumulated protective measures are adopted. Therefore, it is urgent to jump out of the stereotyped thinking based on conventional defense theories and technologies, find new theories and methods to effectively reduce the utilization of vulnerabilities and backdoors of the targets without relying on the priori knowledge and feature information, and to develop new technological means to offset uncertain threats based on unknown vulnerabilities and backdoors from an innovative perspective. This book provides a solution both in theory and engineering implementation to the difficult problem of how to avoid the uncontrollability of product security caused by globalized marketing, COTS and non-trustworthy software/hardware sources. It has been proved that this revolutionary enabling technology has endowed software/hardware products in IT/ICT/CPS with endogenous security functions and has overturned the attack theories and methods based on hardware/software design defects or resident malicious codes. This book is designed for educators, theoretical and technological researchers in cyber security and autonomous control and for business technicians who are engaged in the research on developing a new generation of software/hardware products by using endogenous security enabling technologies and for other product users. Postgraduates in IT/ICT/CPS/ICS will discover that (as long as the law of "structure determines the nature and architecture determines the security is properly used), the problem of software/hardware design defects or malicious code embedding will become the swelling of Achilles in the process of informationization and will no longer haunt Pandora's box in cyberspace. Security and opening-up, advanced progressiveness and controllability seem to be contradictory, but there can be theoretically and technologically unified solutions to the problem.
This book introduces the fundamentals of DCS, and shows how to include wireless technology in their design while guaranteeing the desired operation characteristics. The text also presents insights and results gained from extensive practical experience in implementing and testing systems within a specific industrial setting. Features: examines the operations that the DCS implements, covering human-machine interfaces, diagnostics and maintenance interfaces, and controllers; discusses industrial control system and wireless network protocols; reviews scheduling in wireless sensor networks; describes a latency model for heterogeneous DCS with wired and wireless parts, that predicts monitoring, command, and closed loop latencies; explains how to plan operation timings systematically; introduces measures and metrics for performance monitoring and debugging, and describes how to add these to a system; presents experimental results to validate the planning approach, based on an application test-bed. |
You may like...
Moving Broadband Mobile Communications…
Abdelfatteh Haidine
Hardcover
Algorithms, Methods, and Applications in…
Agustinus Borgy Waluyo
Hardcover
R5,372
Discovery Miles 53 720
Handbook of Research on Emerging Designs…
Jamal Zbitou, Mostafa Hefnawi, …
Hardcover
R8,461
Discovery Miles 84 610
Handbook of Research on Advances in Data…
P. Venkata Krishna
Hardcover
R9,808
Discovery Miles 98 080
Solutions for High-Touch Communications…
Michael A. Brown Sr.
Hardcover
R4,850
Discovery Miles 48 500
The COVID-19 Pandemic and the…
Floribert Patrick Calvain Endong
Hardcover
R6,143
Discovery Miles 61 430
|