![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
This SpringerBrief introduces the current research status on emerging multiple access schemes for mMTC, which provides an integrated reference for future research works. A brief introduction on mMTC scenario is provided, and then the suitable random access procedure is discussed. Various multiple access schemes for mMTC are also described and analyzed in detail. It assumes a background in communication theory and wireless communication fundamentals. With the thriving of Internet of Things (IoT) industry, an emerging scenario named massive machine-type communication (mMTC) is considered in the future 5G networks. One main challenge in mMTC is how to support massive connections with limited radio resources and low energy consumption. Therein, novel multiple access scheme is the key to overcome the challenge. This SpringerBrief targets researchers and engineers, who are engaged in 5G and future IoT related communications system. It can also be a used as a reference book or a secondary text for graduate students, who major in communications.
This book covers ideas, methods, algorithms, and tools for the in-depth study of the performance and reliability of dependable fault-tolerant systems. The chapters identify the current challenges that designers and practitioners must confront to ensure the reliability, availability, and performance of systems, with special focus on their dynamic behaviors and dependencies. Topics include network calculus, workload and scheduling; simulation, sensitivity analysis and applications; queuing networks analysis; clouds, federations and big data; and tools. This collection of recent research exposes system researchers, performance analysts, and practitioners to a spectrum of issues so that they can address these challenges in their work.
This book provides a comprehensive overview of signal filtering, including an introduction, definitions of the terms and algorithms for numerical calculation of the properties of the transfer function in frequency and time domains. All the chapters discuss the theoretical background and explain the underlying algorithms including the iterative numerical procedures necessary to obtain the solutions. It starts by considering polynomial filters, offering a broad range of solutions and introducing critical monotonic passband amplitude characteristics (CMAC). It also describes modifications to the classical Chebyshev and elliptic filters to overcome their limitations. In the context linear phase low-pass prototypes, it presents filters approximating constant group delay in the equi-ripple manner for the first time. Further, it discusses new procedures to improve the selectivity of all polynomial filters by introducing transmission zeros, such as filters with multiple transmission zeros on the omega axis, as well as phase correction of selective filters for both low-pass and band-pass filters. Other topics explored include linear phase all-pass (exhibiting low-pass group delay approximation) filters; all-pass filters (exhibiting band-pass group delay approximation) with linear and parabolic phase synthesized directly as band-pass; high-pass, and band-stop amplitude characteristic frequency transformations to produce band-pass; and direct synthesis of linear and parabolic phase selective band-pass filters synthesized directly as band-pass. Lastly, for system (physical) synthesis, the book describes the algorithms and procedures for the following: cascade passive LC; active cascade RC; active parallel RC (for the first time); active parallel SC; Gm-C based on LC prototypes; and parallel IIR based on bilinear transformation of analog prototypes. Every algorithm, be it in transfer function synthesis or in system synthesis, is accompanied by a proper nontrivial comprehensive example produced by the RM software.
The last decade has witnessed an unprecedented development and growth in global wireless communications systems, technologies and network "traffic" generated over network infrastructures.This book presents state-of-the-art energy-efficient techniques, designs and implementations that pertain to wireless communication networks such as cellular networks, wireless local area networks (WLANs) and wireless ad hoc networks (WAHNs) including mobile ad hoc networks (MANETs), and wireless sensor networks (WSNs) as they are deployed across the world to facilitate "always on" reliable high-speed wireless access from anywhere, at anytime to accommodate the new paradigm of the "Internet of Things" (IoT).The pervasive and exponential growth of Wi-Fi and the impact of bandwidth-intensive applications on the energy consumption of Wi-Fi-enabled devices are discussed along with energy harvesting as an advantageous option to power WAHNs.The book aims to serve as a useful reference for researchers, students, regulatory authorities, and educators.
This book constitutes the refereed proceedings of the 13th EAI International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2018, held in Ghent, Belgium, in September 2018. The 20 revised full papers were selected from 26 submissions. The papers are organized thematically in tracks: Experimental, Licensed Shared Access and Dynamic Spectrum Access, and PHX and Sensing.
This book presents the outcomes of the workshop sponsored by the National Natural Sciences Foundation of China and the UK Newton Fund, British Council Researcher Links. The Workshop was held in Harbin, China, from 14 to 17 July 2017, and brought together some thirty young (postdoctoral) researchers from China and the UK specializing in geosciences, sensor signal networks and their applications to natural disaster recovery. The Workshop presentations covered the state of the art in the area of disaster recovery and blended wireless sensor systems that act as early warning systems to mitigate the consequences of disasters and function as post-disaster recovery vehicles. This book promotes knowledge transfer and helps readers explore and identify research opportunities by highlighting research outcomes in the internationally relevant area of disaster recovery and mitigation.
This book comprises selected articles from the International Communications Conference (ICC) 2018 held in Hyderabad, India in 2018. It offers in-depth information on the latest developments in voice-, data-, image- and multimedia processing research and applications, and includes contributions from both academia and industry.
This book presents comprehensive coverage of current and emerging multiple access, random access, and waveform design techniques for 5G wireless networks and beyond. A definitive reference for researchers in these fields, the book describes recent research from academia, industry, and standardization bodies. The book is an all-encompassing treatment of these areas addressing orthogonal multiple access and waveform design, non-orthogonal multiple access (NOMA) via power, code, and other domains, and orthogonal, non-orthogonal, and grant-free random access. The book builds its foundations on state of the art research papers, measurements, and experimental results from a variety of sources.
This textbook introduces Wireless Powered Communication Networks (WPCNs) as a promising paradigm to overcome the energy bottleneck suffered by traditional wireless communication networks, as well as emerging Internet-of-Things networks. It selectively spans a coherent spectrum of fundamental aspects in WPCNs, such as wireless energy transfer (WEH) techniques, radio frequency (RF) energy harvesting receiver model, simultaneous wireless information and power transfer (SWIPT), as well as the rate-energy tradeoff arising from the joint transmission of information and energy using the same waveform. It covers network models for WPCNs, including the baseline and dual-hop WPCN models and a variety of related extensions. This book further examines the key factors including throughput, fairness, and security that must be taken into account for impeccable operation of WPCNs. The new IoT applications are targeted as a key element in those factors. It will also include exercises and examples throughout the book, as well as their PLS solutions. This is the first textbook examining the current research to provide a unified view of wireless power transfer (WPT) and information transmission in WPCNs from a physical layer security (PLS) perspective. Focused on designing efficient secure transmission schemes, analyzing energy evolvement process, and evaluating secrecy outage performance under different channel state information (CSI), the results presented in this book shed light on how to best balance security and throughput with prudent use of harvested energy in WCNs. It also provides an overview of the WPCNs by introducing the background of WPT, followed by a summary of the research conducted in the field. The authors describe the physical-layer security (PLS) problem in WPCNs, including the causes and the impacts of the problem on the performance of WPCNs. The authors extend the discussions by introducing the applications of WPCNs in the IoT. From the Internet of Things (IoT) point of view, this textbook reviews the opportunities and challenges for the lately-emerged WPCN to seamlessly integrate into the IoT ecosystem. It specifically addresses the maximization problem of uplink and downlink sum-throughout in a dual-hop WPCN, while taking fairness among WPCN users as a constraint. The results provided in this book reveal valuable insights into improving the design and deployment of future WPCNs in the upcoming IoT environment. This textbook targets advanced-level students studying wireless communications and research engineers working in this field. Industry engineers in mobile device and network development business with an interest in WPCNs and IoT, as well as their PLS solutions, will also find this book useful.
This book is a collection of papers from international experts presented at International Conference on NextGen Electronic Technologies (ICNETS2-2016). ICNETS2 encompassed six symposia covering all aspects of electronics and communications domains, including relevant nano/micro materials and devices. Presenting recent research on wireless communication networks and Internet of Things, the book will prove useful to researchers, professionals and students working in the core areas of electronics and their applications, especially in signal processing, embedded systems and networking.
This book constitutes the refereed post-conference proceedings of the 11th International Conference on Wireless Internet , WiCON 2018, held in Taipei, Taiwan, in October 2018. The 36 full papers were selected from 79 submissions and are grouped into the following topics: wireless network, artificial intelligence, security, IoT, location-based services, financial applicatiosn, vehicular ad hoc network, services and applications.
This book features selected papers presented at Third International Conference on Nanoelectronics, Circuits and Communication Systems (NCCS 2017). Covering topics such as MEMS and nanoelectronics, wireless communications, optical communication, instrumentation, signal processing, Internet of Things, image processing, bioengineering, green energy, hybrid vehicles, environmental science, weather forecasting, cloud computing, renewable energy, RFID, CMOS sensors, actuators, transducers, telemetry systems, embedded systems, and sensor network applications in mines, it is a valuable resource for young scholars, researchers, and academics.
This book focuses on picturing B-IoT techniques from a few perspectives, which are architecture, key technologies, security and privacy, service models and framework, practical use cases and more. Main contents of this book derive from most updated technical achievements or breakthroughs in the field. A number of representative IoT service offerings will be covered by this book, such as vehicular networks, document sharing system, and telehealth. Both theoretical and practical contents will be involved in this book in order to assist readers to have a comprehensive and deep understanding the mechanism of using blockchain for powering up IoT systems. The blockchain-enabled Internet of Things (B-IoT) is deemed to be a novel technical alternative that provides network-based services with additional functionalities, benefits, and implementations in terms of decentralization, immutability, and auditability. Towards the enhanced secure and privacy-preserving Internet of Things (IoT), this book introduces a few significant aspects of B-IoT, which includes fundamental knowledge of both blockchain and IoT, state-of-the-art reviews of B-IoT applications, crucial components in the B-IoT system and the model design, and future development potentials and trends. IoT technologies and services, e.g. cloud data storage technologies and vehicular services, play important roles in wireless technology developments. On the other side, blockchain technologies are being adopted in a variety of academic societies and professional realms due to its promising characteristics. It is observable that the research and development on integrating these two technologies will provide critical thinking and solid references for contemporary and future network-relevant solutions. This book targets researchers and advanced level students in computer science, who are focused on cryptography, cloud computing and internet of things, as well as electrical engineering students and researchers focused on vehicular networks and more. Professionals working in these fields will also find this book to be a valuable resource.
Up-to-date coverage of the cutting-edge research on UWB Systems with Multiple Antennas In this book, the authors investigate the benefits of combining UWB and MIMO technologies; highlighting five aspects of this promising research field: channel capacity, space-time coding, beamforming and localization, time-reversal transmission, and UWB-MIMO relay. The book presents a systematic and in-depth discussion for each of the hot topics, providing an insight into the cutting-edge research currently undertaken. It is expected that the ideas and approaches illustrated in this book will inspire sparks for the emerging technologies in short-range high data-rate wireless communications and other related applications. Key Features: Provides a thorough coverage combining the UWB and MIMO, outlining the opportunities and benefits created by the combination of these technologies Highlights five aspects of this promising research field: channel capacity, space-time coding, beamforming and localization, time-reversal transmission, and UWB-MIMO relay Covers UWB-MIMO channel measurement and models This book will serve as an invaluable reference for academic and professional researchers in wireless communications, and graduate students. Engineers and technical professionals will also find the book insightful
This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief.
Learn about the key technologies and understand the state of the art in research for full-duplex communication networks and systems with this comprehensive and interdisciplinary guide. Incorporating physical, MAC, network, and application layer perspectives, it explains the fundamental theories on which full-duplex communications are built, and lays out the techniques needed for network design, analysis and optimization. Techniques covered in detail include self-interference cancellation and signal processing algorithms, physical layer algorithms, methods for efficient resource allocation, and game theory. Potential applications and networking schemes are discussed, including full-duplex cognitive radio networks, cooperative networks, and heterogeneous networks. The first book to focus exclusively on full-duplex communications, this is an indispensable reference for both researchers and practitioners designing the next generation of wireless networks.
This book looks at how digital economy can help energy businesses to meet their sustainability goals. It will further generates a new debate among policymakers about encouraging green technologies to reduce global carbon emissions. Our modern society requires a long-term, sustainable, and secure energy supply that not only generates and preserves renewable energy. It is also creating universal intelligent machines for power systems, and vital infrastructure is considered in terms of digital economy requirements. The idea of sharing information is an essential principle of sustainable thinking. In such instances, open internet and data access are required to enable any human being to acquire knowledge. Furthermore, the energy industry is changing worldwide, necessitating the consideration of potential implications and modifications. Thus, its most distinguishing feature is moving from a centrally organized system to one with many market players. Consequently, information and communication technologies and human growth have significant main and interactive effects on environmental sustainability. Simultaneously, energy industry is a major player in resolving the digital economy’s development issues.
This book focuses on mobile data and its applications in the wireless networks of the future. Several topics form the basis of discussion, from a mobile data mining platform for collecting mobile data, to mobile data processing, and mobile feature discovery. Usage of mobile data mining is addressed in the context of three applications: wireless communication optimization, applications of mobile data mining on the cellular networks of the future, and how mobile data shapes future cities. In the discussion of wireless communication optimization, both licensed and unlicensed spectra are exploited. Advanced topics include mobile offloading, resource sharing, user association, network selection and network coexistence. Mathematical tools, such as traditional convexappl/non-convex, stochastic processing and game theory are used to find objective solutions. Discussion of the applications of mobile data mining to cellular networks of the future includes topics such as green communication networks, 5G networks, and studies of the problems of cell zooming, power control, sleep/wake, and energy saving. The discussion of mobile data mining in the context of smart cities of the future covers applications in urban planning and environmental monitoring: the technologies of deep learning, neural networks, complex networks, and network embedded data mining. Mobile Data Mining and Applications will be of interest to wireless operators, companies, governments as well as interested end users.
This book mainly discusses the most important issues in artificial intelligence-aided future networks, such as applying different ML approaches to investigate solutions to intelligently monitor, control and optimize networking. The authors focus on four scenarios of successfully applying machine learning in network space. It also discusses the main challenge of network traffic intelligent awareness and introduces several machine learning-based traffic awareness algorithms, such as traffic classification, anomaly traffic identification and traffic prediction. The authors introduce some ML approaches like reinforcement learning to deal with network control problem in this book. Traditional works on the control plane largely rely on a manual process in configuring forwarding, which cannot be employed for today's network conditions. To address this issue, several artificial intelligence approaches for self-learning control strategies are introduced. In addition, resource management problems are ubiquitous in the networking field, such as job scheduling, bitrate adaptation in video streaming and virtual machine placement in cloud computing. Compared with the traditional with-box approach, the authors present some ML methods to solve the complexity network resource allocation problems. Finally, semantic comprehension function is introduced to the network to understand the high-level business intent in this book. With Software-Defined Networking (SDN), Network Function Virtualization (NFV), 5th Generation Wireless Systems (5G) development, the global network is undergoing profound restructuring and transformation. However, with the improvement of the flexibility and scalability of the networks, as well as the ever-increasing complexity of networks, makes effective monitoring, overall control, and optimization of the network extremely difficult. Recently, adding intelligence to the control plane through AI&ML become a trend and a direction of network development This book's expected audience includes professors, researchers, scientists, practitioners, engineers, industry managers, and government research workers, who work in the fields of intelligent network. Advanced-level students studying computer science and electrical engineering will also find this book useful as a secondary textbook.
This book highlights the design principles of ground based radio-navigation systems used in solving navigation tasks in the airfield and on air routes. Mathematical correlations are illustrated that describe its operation, peculiarities of disposition, main technical characteristics, generalized structural diagrams as well as the inter-operation with onboard equipment. Examples of building, construction, functional diagrams, and characteristics of Russian made radio-navigation systems are discussed. This book is written for students of electronics and aviation disciplines. It can also be useful for aviation specialists as well as for those interested in air radio-navigation.
This book provides a system-level approach to making packaging decisions for millimeter-wave transceivers. In electronics, the packaging forms a bridge between the integrated circuit or individual device and the rest of the electronic system, encompassing all technologies between the two. To be able to make well-founded packaging decisions, researchers need to understand a broad range of aspects, including: concepts of transmission bands, antennas and propagation, integrated and discrete package substrates, materials and technologies, interconnects, passive and active components, as well as the advantages and disadvantages of various packages and packaging approaches, and package-level modeling and simulation. Packaging also needs to be considered in terms of system-level testing, as well as associated testing and production costs, and reducing costs. This peer-reviewed work contributes to the extant scholarly literature by addressing the aforementioned concepts and applying them to the context of the millimeter-wave regime and the unique opportunities that this transmission approach offers.
The book covers a variety of topics in Information and Communications Technology (ICT) and their impact on innovation and business. The authors discuss various innovations, business and industrial motivations, and impact on humans and the interplay between those factors in terms of finance, demand, and competition. Topics discussed include the convergence of Machine to Machine (M2M), Internet of Things (IoT), Social, and Big Data. They also discuss AI and its integration into technologies from machine learning, predictive analytics, security software, to intelligent agents, and many more. Contributions come from academics and professionals around the world. Covers the most recent practices in ICT related topics pertaining to technological growth, innovation, and business; Presents a survey on the most recent technological areas revolutionizing how humans communicate and interact; Features four sections: IoT, Wireless Ad Hoc & Sensor Networks, Fog Computing, and Big Data Analytics.
This book introduces readers to a reconfigurable chip architecture for future wireless communication systems, such as 5G and beyond. The proposed architecture perfectly meets the demands for future mobile communication solutions to support different standards, algorithms, and antenna sizes, and to accommodate the evolution of standards and algorithms. It employs massive MIMO detection algorithms, which combine the advantages of low complexity and high parallelism, and can fully meet the requirements for detection accuracy. Further, the architecture is implemented using ASIC, which offers high energy efficiency, high area efficiency and low detection error. After introducing massive MIMO detection algorithms and circuit architectures, the book describes the ASIC implementation for verifying the massive MIMO detection. In turn, it provides detailed information on the proposed reconfigurable architecture: the data path and configuration path for massive MIMO detection algorithms, including the processing unit, interconnections, storage mechanism, configuration information format, and configuration method.
Understand the fundamentals of wireless and MIMO communication with this accessible and comprehensive text. Viewing the subject through an information theory lens, but also drawing on other perspectives, it provides a sound treatment of the key concepts underpinning contemporary wireless communication and MIMO, all the way to massive MIMO. Authoritative and insightful, it includes over 330 worked examples and 450 homework problems, with solutions and MATLAB code and data available online. Altogether, this is an excellent resource for instructors and graduate students, as well as an outstanding reference for researchers and practicing engineers.
This book covers issues related to 5G network security. The authors start by providing details on network architecture and key requirements. They then outline the issues concerning security policies and various solutions that can handle these policies. Use of SDN-NFV technologies for security enhancement is also covered. The book includes intelligent solutions by utilizing the features of artificial intelligence and machine learning to improve the performance of the 5G security protocols and models. Optimization of security models is covered as a separate section with a detailed information on the security of 5G-based edge, fog, and osmotic computing. This book provides detailed guidance and reference material for academicians, professionals, and researchers. Presents extensive information and data on research and challenges in 5G networks; Covers basic architectures, models, security frameworks, and software-defined solutions for security issues in 5G networks; Provides solutions that can help in the growth of new startups as well as research directions concerning the future of 5G networks. |
![]() ![]() You may like...
Don't Upset ooMalume - A Guide To…
Hombakazi Mercy Nqandeka
Paperback
|