![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
This book provides a timely and comprehensive study of developing efficient network slicing frameworks in both 5G wireless and core networks. It also presents protocol stack layer perspectives, which includes virtual network topology design, end-to-end delay modeling, dynamic resource slicing, and link-layer and transport-layer protocol customization. This book provides basic principles, concepts and technologies for communication, computing and networking. Optimization and queueing analysis techniques are applied to solving different problems for network slicing illustrated in this book as well. Researchers working in the area of network slicing in 5G networks and beyond, and advanced-level students majoring in electrical engineering, computer engineering and computer science will find this book useful as a reference or secondary textbook. Professionals in industry seeking solutions to resource management for 5G networks and beyond will also want to purchase this book.
The exponential increase in mobile device users and high-bandwidth applications has pushed the current 3G and 4G wireless networks to their capacity. Moreover, it is predicted that mobile data traffic will continue to grow by over 300 percent by 2017. To handle this spectacular growth, the development of improved wireless networks for the future has been of paramount importance. The Future of Wireless Networks: Architectures, Protocols, and Services discusses the future of wireless networks, including the emerging network architectures, underlying protocols, services, and applications. The first part of the book focuses on new wireless network architectures that are being developed, such as mobile SDN, wireless local area networks (i.e., 802.11), and wireless sensor networks for the Smart Grid. In the second part of the book, the authors discuss the new protocols and enabling technologies for the different wireless network architectures. These include wireless MAC protocols, resource allocation in cognitive radio networks, multicast transmission, and femtocells, which provide enhanced indoor coverage and increased network capacity. The book's final section discusses several new services and applications that are springing up, such as multisource selection for wireless peer-to-peer (P2P) networks and device-to-device (D2D) content sharing, which reduces duplicated downloads of the same contents on cellular links by offloading the traffic onto other networks. This section also covers the next generation of wireless security and privacy control techniques that service providers can use to ensure that their infrastructures and services are adequately protected against all kinds of threats.
This book covers connectivity and edge computing solutions for representative Internet of Things (IoT) use cases, including industrial IoT, rural IoT, Internet of Vehicles (IoV), and mobile virtual reality (VR). Based on their unique characteristics and requirements, customized solutions are designed with targets such as supporting massive connections or seamless mobility and achieving low latency or high energy efficiency. Meanwhile, the book highlights the role of artificial intelligence (AI) in future IoT networks and showcases AI-based connectivity and edge computing solutions. The solutions presented in this book serve the overall purpose of facilitating an increasingly connected and intelligent world. The potential benefits of the solutions include increased productivity in factories, improved connectivity in rural areas, enhanced safety for vehicles, and enriched entertainment experiences for mobile users. Featuring state-of-the-art research in the IoT field, this book can help answer the question of how to connect billions of diverse devices and enable seamless data collection and processing in future IoT. The content also provides insights regarding the significance of customizing use case-specific solutions as well as approaches of using various AI methods to empower IoT. This book targets researchers and graduate students working in the areas of electrical engineering, computing engineering, and computer science as a secondary textbook or reference. Professionals in industry who work in the field of IoT will also find this book useful.
This book gathers selected papers presented at the 4th International Conference on Wireless Communications and Applications (ICWCA 2020), held at Hainan University, China. The second volume will involve research works aimed at the contemporary applications: emerging wireless/mobile applications, context and location-aware wireless services; wireless telemedicine and e-health services; intelligent transportation systems; RFID technology and application; cognitive radio and sensor-based applications; content distribution in wireless home environment and many others.
This book introduces the Internet access for vehicles as well as novel communication and computing paradigms based on the Internet of vehicles. To enable efficient and reliable Internet connection for mobile vehicle users, this book first introduces analytical modelling methods for the practical vehicle-to-roadside (V2R) Internet access procedure, and employ the interworking of V2R and vehicle-to-vehicle (V2V) to improve the network performance for a variety of automotive applications. In addition, the wireless link performance between a vehicle and an Internet access station is investigated, and a machine learning based algorithm is proposed to improve the link throughout by selecting an efficient modulation and coding scheme. This book also investigates the distributed machine learning algorithms over the Internet access of vehicles. A novel broadcasting scheme is designed to intelligently adjust the training users that are involved in the iteration rounds for an asynchronous federated learning scheme, which is shown to greatly improve the training efficiency. This book conducts the fully asynchronous machine learning evaluations among vehicle users that can utilize the opportunistic V2R communication to train machine learning models. Researchers and advanced-level students who focus on vehicular networks, industrial entities for internet of vehicles providers, government agencies target on transportation system and road management will find this book useful as reference. Network device manufacturers and network operators will also want to purchase this book.
This book defines what IoT Systems manageability looks like and what the associated resources and costs are of that manageability. It identifies IoT Systems performance expectations and addresses the difficult challenges of determining actual costs of IoT Systems implementation, operation, and management across multiple institutional organizations. It details the unique challenges that cities and institutions have in implementing and operating IoT Systems.
The three-volume set constitutes the proceedings of the 17th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2022, which was held during November 24th-26th, 2022. The conference took place in Dalian, China.The 95 full and 62 short papers presented in these proceedings were carefully reviewed and selected from 265 submissions. The contributions in cyber-physical systems including intelligent transportation systems and smart healthcare systems; security and privacy; topology control and coverage; energy-efficient algorithms, systems and protocol design
The three-volume set constitutes the proceedings of the 17th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2022, which was held during October 28-30, 2022. The conference took place in Dalian, China.The 95 full and 62 short papers presented in these proceedings were carefully reviewed and selected from 265 submissions. The contributions in theoretical frameworks and analysis of fundamental cross-layer protocol and network design and performance issues; distributed and localized algorithm design and analysis; information and coding theory for wireless networks; localization; mobility models and mobile social networking; underwater and underground networks; vehicular networks; algorithms, systems, and applications of edge computing
The three-volume set constitutes the proceedings of the 17th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2022, which was held during October 28-30, 2022. The conference took place in Dalian, China.The 95 full and 62 short papers presented in these proceedings were carefully reviewed and selected from 265 submissions. The contributions in algorithms, systems; and applications of internet of things;information processing and data management;radar and sonar networks
This book provides a preview of emerging wireless technologies and their architectural impact on the future mobile Internet. The reader will find an overview of architectural considerations for the mobile Internet, along with more detailed technical discussion of new protocol concepts currently being considered at the research stage. The first chapter starts with a discussion of anticipated mobile/wireless usage scenarios, leading to an identification of new protocol features for the future Internet. This is followed by several chapters that provide in-depth coverage of next-generation wireless standards, ad hoc and mesh network protocols, opportunistic delivery and delay tolerant networks, sensor network architectures and protocols, cognitive radio networks, vehicular networks, security and privacy, and experimental systems for future Internet research. Each of these contributed chapters includes a discussion of new networking requirements for the wireless scenario under consideration, architectural concepts, and specific protocol designs, many still at research stage.
While most books on the subject focus on resource allocation in just one type of network, this book is the first to examine the common characteristics of multiple distributed video communication systems. Comprehensive and systematic, Optimal Resource Allocation for Distributed Video Communication presents a unified optimization framework for resource allocation across these systems. The book examines the techniques required for optimal resource allocation over Internet, wireless cellular networks, wireless ad hoc networks, and wireless sensor networks. It provides you with the required foundation in video communications, including Peer-to-Peer (P2P) networks, wireless networks, and visual sensor networks. Whether you're in industry or academia, you'll value how the book outlines current challenges facing the field and outlines a general solution framework for addressing these challenges. From problem formulations and theoretical analysis to practical algorithms, it facilitates the comprehensive understanding required to achieve optimized video and multimedia communications. Presents the resource allocation techniques for scalable video communications over Internet or wireless networks Examines two resource allocation problems-distributed throughput maximization for scalable P2P Video-on-Demand (VoD) systems and streaming capacity for P2P VoD systems Outlines an optimal prefetching framework for reducing seeking delays in P2P VoD applications Examines distributed optimization techniques for unicast and multicast video streaming over wireless ad hoc networks Considers the network lifetime maximization problem in wireless visual sensor networks Detailing methods that can immediately improve the performance of your video communication systems, this book presents multiple applications of optimal resource allocation. For each of the applications,
This book covers the basic theory of mean field game (MFG) and its applications in wireless networks. It starts with an overview of the current and future state-of-the-art in 5G and 6G wireless networks. Then, a tutorial is presented for MFG, mean-field-type game (MFTG), and prerequisite fields of study such as optimal control theory and differential games. This book also includes a literature survey of MFG-based research in wireless network technologies such as ultra-dense networks (UDNs), device-to-device (D2D) communications, internet-of-things (IoT), unmanned aerial vehicles (UAVs), and mobile edge networks (MENs). Several applications of MFG and MFTG in UDNs, social networks, and multi-access edge computing networks (MECNs) are introduced as well. Applications of MFG covered in this book are divided in three parts. The first part covers three single-population MFG research works or case studies in UDNs including ultra-dense D2D networks, ultra-dense UAV networks, and dense-user MECNs. The second part centers on a multiple-population MFG (MPMFG) modeling of belief and opinion evolution in social networks. It focuses on a recently developed MPMFG framework and its application in analyzing the behavior of users in a multiple-population social network. Finally, the last part concentrates on an MFTG approach to computation offloading in MECN. The computation offloading algorithms are designed for energy- and time-efficient offloading of computation-intensive tasks in an MECN. This book targets advanced-level students, professors, researchers, scientists, and engineers in the fields of communications and networks. Industry managers and government employees working in these same fields will also find this book useful.
This book provides a comprehensive review and in-depth study on efficient beamforming design and rigorous performance analysis in mmWave networks, covering beam alignment, beamforming training and beamforming-aided caching. Due to significant beam alignment latency between the transmitter and the receiver in existing mmWave systems, this book proposes a machine learning based beam alignment algorithm for mmWave networks to determine the optimal beam pair with a low latency. Then, to analyze and enhance the performance of beamforming training (BFT) protocol in 802.11ad mmWave networks, an analytical model is presented to evaluate the performance of BFT protocol and an enhancement scheme is proposed to improve its performance in high user density scenarios. Furthermore, it investigates the beamforming-aided caching problem in mmWave networks, and proposes a device-to-device assisted cooperative edge caching to alleviate backhaul congestion and reduce content retrieval delay. This book concludes with future research directions in the related fields of study. The presented beamforming designs and the corresponding research results covered in this book, provides valuable insights for practical mmWave network deployment and motivate new ideas for future mmWave networking. This book targets researchers working in the fields of mmWave networks, beamforming design, and resource management as well as graduate students studying the areas of electrical engineering, computing engineering and computer science. Professionals in industry who work in this field will find this book useful as a reference.
This book discusses synthesis of Gm-C filter for modern radio frequency systems. Analogue filters are an inevitable part of the chain of signal processing in modern radio and telecommunication systems. Among the technologies implemented for these purposes are the so-called Gm-C filters which are built of operational transconductance amplifiers and capacitors. This technology allows for integration of the filter into a CMOS system-on-chip so making it very attractive for application in low-power (battery operated) devices. The objective of this book is to achieve three goals: (1) to fully describe the circuit synthesis procedures for parallel, cascade, and a realization based on LC prototypes; (2) to make a thorough evaluation of the advantages and disadvantages of these methods and to recommend the "preferable" one; and (3) to create an extensive table of element values of cascaded Gm-C filters realizing the best-known low-pass filter functions. The book will influence the design community to embrace this technology even for non-communication applications.
Wi-Fi has become the preferred means for connecting to the internet - at home, in the office, in hotels and at airports. Increasingly, Wi-Fi also provides internet access for remote communities where it is deployed by volunteers in community-based networks, by operators in 'hotspots' and by municipalities in 'hotzones'. This book traces the global success of Wi-Fi to the landmark change in radio spectrum policy by the US FCC in 1985, the initiative by NCR Corporation to start development of Wireless-LANs and the drive for an open standard IEEE 802.11, released in 1997. It also singles out and explains the significance of the initiative by Steve Jobs at Apple to include Wireless-LAN in the iBook, which moved the product from the early adopters to the mass market. The book explains these developments through first-hand accounts by industry practitioners and concludes with reflections and implications for government policy and firm strategy.
The updated book presents Matlab illustrations on various digital signal processing (DSP) techniques such as random process, time varying wireless system model, and detection and estimation theory used in wireless communication. The book also covers recent wireless techniques like OFDM, massive MIMO techniques, non-orthogonal multiple access, millimeter wave MIMO, full duplex, cognitive radio, co-operating communication, unmanned aerial vehicles etc. This book is suitable for those who are doing basic and applied research in digital signal processing for wireless communication.
This book investigates in detail some new spoof surface plasmon polaritons (SSPPs) structures and their applications to antenna. It introduces the working principle and radiation characteristics of directional antenna, omnidirectional antenna, reconfigurable antenna and phase-mode antenna based on SSPPs structure. Especially, the irregular SSPPs structure, such as T-shaped and m-shaped SSPPs structures, is introduced to low-profile end-fire antenna with vertical polarization; the rotated SSPPs structure is applied to CP end-fire antenna and omnidirectional antenna; PIN circuit combining with SSPPs structure is used to pattern reconfigurable antenna; the novel phase-mode SSPPs antennas with multi-modes are performed too. This book proposes a continuous method to develop the potentialities of the SSPPs antenna. And the readers can study the method or ideas of the SSPPs antenna, even graft the methods to other SSPPs antenna. The book is intended for undergraduate and graduate students who are interested in SSPPs antenna technology, researchers investigating high-performance antenna, and antenna design engineers working on multi-function antenna applications.
This book provides a timely and comprehensive study of dynamic resource management for network slicing in service-oriented fifth-generation (5G) and beyond core networks. This includes the perspective of developing efficient computation resource provisioning and scheduling solutions to guarantee consistent service performance in terms of end-to-end (E2E) data delivery delay. Network slicing is enabled by the software defined networking (SDN) and network function virtualization (NFV) paradigms. For a network slice with a target traffic load, the E2E service delivery is enabled by virtual network function (VNF) placement and traffic routing with static resource allocations. When data traffic enters the network, the traffic load is dynamic and can deviate from the target value, potentially leading to QoS performance degradation and network congestion. Data traffic has dynamics in different time granularities. For example, the traffic statistics (e.g., mean and variance) can be non-stationary and experience significant changes in a coarse time granularity, which are usually predictable. Within a long time duration with stationary traffic statistics, there are traffic dynamics in small timescales, which are usually highly bursty and unpredictable. To provide continuous QoS performance guarantee and ensure efficient and fair operation of the network slices over time, it is essential to develop dynamic resource management schemes for the embedded services in the presence of traffic dynamics during virtual network operation. Queueing theory is used in system modeling, and different techniques including optimization and machine learning are applied to solving the dynamic resource management problems. Based on a simplified M/M/1 queueing model with Poisson traffic arrivals, an optimization model for flow migration is presented to accommodate the large-timescale changes in the average traffic rates with average E2E delay guarantee, while addressing a trade-off between load balancing and flow migration overhead. To overcome the limitations of Poisson traffic model, the authors present a machine learning approach for dynamic VNF resource scaling and migration. The new solution captures the inherent traffic patterns in a real-world traffic trace with non-stationary traffic statistics in large timescale, predicts resource demands for VNF resource scaling, and triggers adaptive VNF migration decision making, to achieve load balancing, migration cost reduction, and resource overloading penalty suppression in the long run. Both supervised and unsupervised machine learning tools are investigated for dynamic resource management. To accommodate the traffic dynamics in small time granularities, the authors present a dynamic VNF scheduling scheme to coordinate the scheduling among VNFs of multiple services, which achieves network utility maximization with delay guarantee for each service. Researchers and graduate students working in the areas of electrical engineering, computing engineering and computer science will find this book useful as a reference or secondary text. Professionals in industry seeking solutions to dynamic resource management for 5G and beyond networks will also want to purchase this book.
This book includes best selected, high-quality research papers presented at International Conference on Data Driven Computing and IoT (DDCIoT 2021) organized jointly by Geetanjali Institute of Technical Studies (GITS), Udaipur, and Rajasthan Technical University, Kota, India, during March 20-21, 2021. This book presents influential ideas and systems in the field of data driven computing, information technology, and intelligent systems.
This practically-oriented, all-inclusive guide covers all the major enabling techniques for current and next-generation cellular communications and wireless networking systems. Technologies covered include CDMA, OFDM, UWB, turbo and LDPC coding, smart antennas, wireless ad hoc and sensor networks, MIMO, and cognitive radios, providing readers with everything they need to master wireless systems design in a single volume. Uniquely, a detailed introduction to the properties, design, and selection of RF subsystems and antennas is provided, giving readers a clear overview of the whole wireless system. It is also the first textbook to include a complete introduction to speech coders and video coders used in wireless systems. Richly illustrated with over 400 figures, and with a unique emphasis on practical and state-of-the-art techniques in system design, rather than on the mathematical foundations, this book is ideal for graduate students and researchers in wireless communications, as well as for wireless and telecom engineers.
This book investigates compressive sensing techniques to provide a robust and general framework for network data analytics. The goal is to introduce a compressive sensing framework for missing data interpolation, anomaly detection, data segmentation and activity recognition, and to demonstrate its benefits. Chapter 1 introduces compressive sensing, including its definition, limitation, and how it supports different network analysis applications. Chapter 2 demonstrates the feasibility of compressive sensing in network analytics, the authors we apply it to detect anomalies in the customer care call dataset from a Tier 1 ISP in the United States. A regression-based model is applied to find the relationship between calls and events. The authors illustrate that compressive sensing is effective in identifying important factors and can leverage the low-rank structure and temporal stability to improve the detection accuracy. Chapter 3 discusses that there are several challenges in applying compressive sensing to real-world data. Understanding the reasons behind the challenges is important for designing methods and mitigating their impact. The authors analyze a wide range of real-world traces. The analysis demonstrates that there are different factors that contribute to the violation of the low-rank property in real data. In particular, the authors find that (1) noise, errors, and anomalies, and (2) asynchrony in the time and frequency domains lead to network-induced ambiguity and can easily cause low-rank matrices to become higher-ranked. To address the problem of noise, errors and anomalies in Chap. 4, the authors propose a robust compressive sensing technique. It explicitly accounts for anomalies by decomposing real-world data represented in matrix form into a low-rank matrix, a sparse anomaly matrix, an error term and a small noise matrix. Chapter 5 addresses the problem of lack of synchronization, and the authors propose a data-driven synchronization algorithm. It can eliminate misalignment while taking into account the heterogeneity of real-world data in both time and frequency domains. The data-driven synchronization can be applied to any compressive sensing technique and is general to any real-world data. The authors illustrates that the combination of the two techniques can reduce the ranks of real-world data, improve the effectiveness of compressive sensing and have a wide range of applications. The networks are constantly generating a wealth of rich and diverse information. This information creates exciting opportunities for network analysis and provides insight into the complex interactions between network entities. However, network analysis often faces the problems of (1) under-constrained, where there is too little data due to feasibility and cost issues in collecting data, or (2) over-constrained, where there is too much data, so the analysis becomes unscalable. Compressive sensing is an effective technique to solve both problems. It utilizes the underlying data structure for analysis. Specifically, to solve the under-constrained problem, compressive sensing technologies can be applied to reconstruct the missing elements or predict the future data. Also, to solve the over-constraint problem, compressive sensing technologies can be applied to identify significant elements To support compressive sensing in network data analysis, a robust and general framework is needed to support diverse applications. Yet this can be challenging for real-world data where noise, anomalies and lack of synchronization are common. First, the number of unknowns for network analysis can be much larger than the number of measurements. For example, traffic engineering requires knowing the complete traffic matrix between all source and destination pairs, in order to properly configure traffic and avoid congestion. However, measuring the flow between all source and destination pairs is very expensive or even infeasible. Reconstructing data from a small number of measurements is an underconstrained problem. In addition, real-world data is complex and heterogeneous, and often violate the low-level assumptions required by existing compressive sensing techniques. These violations significantly reduce the applicability and effectiveness of existing compressive sensing methods. Third, synchronization of network data reduces the data ranks and increases spatial locality. However, periodic time series exhibit not only misalignment but also different frequencies, which makes it difficult to synchronize data in the time and frequency domains. The primary audience for this book is data engineers, analysts and researchers, who need to deal with big data with missing anomalous and synchronization problems. Advanced level students focused on compressive sensing techniques will also benefit from this book as a reference.
This book presents the proceedings of four conferences: The 16th International Conference on Frontiers in Education: Computer Science and Computer Engineering + STEM (FECS'20), The 16th International Conference on Foundations of Computer Science (FCS'20), The 18th International Conference on Software Engineering Research and Practice (SERP'20), and The 19th International Conference on e-Learning, e-Business, Enterprise Information Systems, & e-Government (EEE'20). The conferences took place in Las Vegas, NV, USA, July 27-30, 2020 as part of the larger 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20), which features 20 major tracks. Authors include academics, researchers, professionals, and students. This book contains an open access chapter entitled, "Advances in Software Engineering, Education, and e-Learning". Presents the proceedings of four conferences as part of the 2020 World Congress in Computer Science, Computer Engineering, & Applied Computing (CSCE'20); Includes the tracks Computer Engineering + STEM, Foundations of Computer Science, Software Engineering Research, and e-Learning, e-Business, Enterprise Information Systems, & e-Government; Features papers from FECS'20, FCS'20, SERP'20, EEE'20, including one open access chapter.
This book comprises select proceedings of the 4th International Conference on Optical and Wireless Technologies (OWT 2020). The contents of this volume focus on research carried out in the areas of Optical Communication, Optoelectronics, Optics, Wireless Communication, Wireless Networks, Sensors, Mobile Communications and Antenna and Wave Propagation. The volume also explores the combined use of various optical and wireless technologies in next generation applications, and their latest developments in applications like photonics, high speed communication systems and networks, visible light communication, nanophotonics, wireless and MIMO systems. This book will serve as a useful reference to scientists, academicians, engineers and policy-makers interested in the field of optical and wireless technologies.
This two-volume set consists of "Principles of Electromagnetic Waves and Materials, Second Edition" and "Advanced Electromagnetic Computation, Second Edition". Volume I takes an integrative approach to the subject of electromagnetics by supplementing quintessential "old school" information and methods with MATLAB (R) software. Volume II consists of advanced electromagnetic computation which focuses on Algorithms of Finite Differences, Moment Method, Finite Element method and Finite Difference Time Domain method. Hand-computed simple examples and MATLAB-coded simple examples with only a few elements are used to explain the concepts behind the algorithms. Four new chapters are included.
This book highlights practical solutions for flight safety improvement techniques, which are currently the focus of the International Civil Aviation Organization (ICAO). It has become clear that, in order to rapidly and significantly improve flight safety, the integrated use of new aeronautical technologies is called for. Considering the size of the aviation fleet, its constant growth and the long service lives of aircraft, new technologies should be adapted both to cutting-edge air navigation systems and to those that have been used for over a decade. Concretely, the book discusses methodological approaches to the construction of ground and on-board avionics that make it possible to achieve improved flight safety using innovative new methods. The proposed approaches are illustrated with real-world examples of e.g. satellite-based navigation systems and enhanced ground proximity warning systems. The book is written for professionals involved in the development of avionics systems, as well as students, researchers and experts in the field of radiolocation, radio navigation and air traffic control, the book will support the development and modeling of radio technical complexes, as well as the analysis of complex radio technical systems. |
You may like...
Extension of Holomorphic Functions
Marek Jarnicki, Peter Pflug
Hardcover
R4,563
Discovery Miles 45 630
Study & Master Creative Arts Learner's…
Joseph Bolton, Gabby van Heerden, …
Paperback
R305
Discovery Miles 3 050
|