![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
This book provides a comprehensive overview of signal filtering, including an introduction, definitions of the terms and algorithms for numerical calculation of the properties of the transfer function in frequency and time domains. All the chapters discuss the theoretical background and explain the underlying algorithms including the iterative numerical procedures necessary to obtain the solutions. It starts by considering polynomial filters, offering a broad range of solutions and introducing critical monotonic passband amplitude characteristics (CMAC). It also describes modifications to the classical Chebyshev and elliptic filters to overcome their limitations. In the context linear phase low-pass prototypes, it presents filters approximating constant group delay in the equi-ripple manner for the first time. Further, it discusses new procedures to improve the selectivity of all polynomial filters by introducing transmission zeros, such as filters with multiple transmission zeros on the omega axis, as well as phase correction of selective filters for both low-pass and band-pass filters. Other topics explored include linear phase all-pass (exhibiting low-pass group delay approximation) filters; all-pass filters (exhibiting band-pass group delay approximation) with linear and parabolic phase synthesized directly as band-pass; high-pass, and band-stop amplitude characteristic frequency transformations to produce band-pass; and direct synthesis of linear and parabolic phase selective band-pass filters synthesized directly as band-pass. Lastly, for system (physical) synthesis, the book describes the algorithms and procedures for the following: cascade passive LC; active cascade RC; active parallel RC (for the first time); active parallel SC; Gm-C based on LC prototypes; and parallel IIR based on bilinear transformation of analog prototypes. Every algorithm, be it in transfer function synthesis or in system synthesis, is accompanied by a proper nontrivial comprehensive example produced by the RM software.
This book presents a novel methodology for the computation of RCS of metallic structures using a parallelized version of NEC in conjunction with a finite element preprocessor which has been strategically incorporated for simplifying geometry modelling catering to NEC guidelines. It includes a thorough overview of the theoretical background of NEC including all relevant aspects of formulation and modelling. The revised methodology including all the required steps and details is discussed elaborately along with case studies and validations. This book will serve as a valuable resource for students, researchers, scientists, and engineers working in the field of RCS predictions and measurements.
This book highlights practical solutions for flight safety improvement techniques, which are currently the focus of the International Civil Aviation Organization (ICAO). It has become clear that, in order to rapidly and significantly improve flight safety, the integrated use of new aeronautical technologies is called for. Considering the size of the aviation fleet, its constant growth and the long service lives of aircraft, new technologies should be adapted both to cutting-edge air navigation systems and to those that have been used for over a decade. Concretely, the book discusses methodological approaches to the construction of ground and on-board avionics that make it possible to achieve improved flight safety using innovative new methods. The proposed approaches are illustrated with real-world examples of e.g. satellite-based navigation systems and enhanced ground proximity warning systems. The book is written for professionals involved in the development of avionics systems, as well as students, researchers and experts in the field of radiolocation, radio navigation and air traffic control, the book will support the development and modeling of radio technical complexes, as well as the analysis of complex radio technical systems.
This book offers an essential guide to Wireless Sensor Networks, IoT Security, Image Processing, Secure Information Systems, and Data Encryption. In addition, it introduces students and aspiring practitioners to the subject of destination marketing in a structured manner. It is chiefly intended for researcher students in the areas of Wireless Sensor Networks and Secure Data Communication (including image encryption, and intrusion detection systems), academics at universities and colleges, IT professionals, policymakers and legislators. Given its content, the book can be used as a reference text for both undergraduate and graduate studies, in courses on Wireless Sensor Networks, Secure Image Processing, and Data Encryption applications. The book is written in plain and easy-to-follow language and explains each main concept the first time it appears, helping readers with no prior background in the field. As such, it is a "must-read" guide to the subject matter.
This book systematically presents the operating principles and technical characteristics of the main radio navigating systems (RNSs) that make it possible to adequately evaluate the corresponding scratch indexes and levels of air safety for air vehicles, the chief concern of the International Civil Aviation Organization (ICAO). The book discusses how RNS systems substantially determine navigation accuracy and reliability, and therefore air safety; in addition, it presents practical solutions to problems arising in the operation and development of RNS systems.
This book highlights new methods and parametric algorithms for the digital coherent processing of signals in airborne radar systems located on air vehicles. Using the autoregressive (AR) model, it delivers more accurate danger assessments for flight in wind shear and atmospheric turbulence, while also suggesting how they could be implemented. Given its scope, the book is intended for technical experts whose work involves the development, production and operation of airborne radio-electronic systems.
Covers theoretical and practical aspects related to the behavioral modelling and predistortion of wireless transmitters and power amplifiers. It includes simulation software that enables the users to apply the theory presented in the book. In the first section, the reader is given the general background of nonlinear dynamic systems along with their behavioral modelling from all its aspects. In the second part, a comprehensive compilation of behavioral models formulations and structures is provided including memory polynomial based models, box oriented models such as Hammerstein-based and Wiener-based models, and neural networks-based models. The book will be a valuable resource for design engineers, industrial engineers, applications engineers, postgraduate students, and researchers working on power amplifiers modelling, linearization, and design.
This book focuses on picturing B-IoT techniques from a few perspectives, which are architecture, key technologies, security and privacy, service models and framework, practical use cases and more. Main contents of this book derive from most updated technical achievements or breakthroughs in the field. A number of representative IoT service offerings will be covered by this book, such as vehicular networks, document sharing system, and telehealth. Both theoretical and practical contents will be involved in this book in order to assist readers to have a comprehensive and deep understanding the mechanism of using blockchain for powering up IoT systems. The blockchain-enabled Internet of Things (B-IoT) is deemed to be a novel technical alternative that provides network-based services with additional functionalities, benefits, and implementations in terms of decentralization, immutability, and auditability. Towards the enhanced secure and privacy-preserving Internet of Things (IoT), this book introduces a few significant aspects of B-IoT, which includes fundamental knowledge of both blockchain and IoT, state-of-the-art reviews of B-IoT applications, crucial components in the B-IoT system and the model design, and future development potentials and trends. IoT technologies and services, e.g. cloud data storage technologies and vehicular services, play important roles in wireless technology developments. On the other side, blockchain technologies are being adopted in a variety of academic societies and professional realms due to its promising characteristics. It is observable that the research and development on integrating these two technologies will provide critical thinking and solid references for contemporary and future network-relevant solutions. This book targets researchers and advanced level students in computer science, who are focused on cryptography, cloud computing and internet of things, as well as electrical engineering students and researchers focused on vehicular networks and more. Professionals working in these fields will also find this book to be a valuable resource.
Indoor Wireless Communications: From Theory to Implementation provides an in-depth reference for design engineers, system planners and post graduate students interested in the vastly popular field of indoor wireless communications. It contains wireless applications and services for in-building scenarios and knowledge of key elements in the design and implementation of these systems. Technologies such as Wireless Local Area Networks, Bluetooth, ZigBee, Indoor Optical Communications, WiMAX, UMTS and GSM for indoor environments are fully explained and illustrated with examples. Antennas and propagation issues for in-building scenarios are also discussed, emphasizing models and antenna types specifically developed for indoor communications. An exhaustive survey on indoor wireless communication equipment is also presented, covering all available technologies including antennas, distribution systems, transceivers and base stations.
Understand the theoretical principles, key technologies and applications of UDNs with this authoritative survey. Theory is explained in a clear, step-by-step manner, and recent advances and open research challenges in UDN physical layer design, resource allocation and network management are described, with examples, in the context of B5G and 6G standardization. Topics covered include NOMA-based physical layer design, physical layer security. Interference management, 3D base station deployment, software defined UDNs, wireless edge caching in UDNs, UDN-based UAVs and field trials and tests. A perfect resource for graduate students, researchers and professionals who need to get up to speed on the state of the art and future opportunities in UDNs.
This book focuses on the convergence of energy, communication and computation in the beyond 5G (B5G) cellular Internet of Things (IoT). It addresses both theory and techniques, with more weight placed on the latter. This is achieved by providing in-depth studies on a number of major topics such as wireless power transfer, non-orthogonal multiple access, massive multiple-input multiple-output, and over-air computation. In turn, four typical convergence scenarios are studied in detail: the convergence of energy and communication, convergence of energy and computation, convergence of communication and computation, and convergence of energy, communication and computation. The comprehensive and systematic coverage of key techniques in the convergence of energy, communication and computation in the B5G cellular IoT is one of the book's major features, making it particularly well suited for readers who are interested in learning about practical solutions in B5G wireless networks. Accordingly, the book offers a valuable resource for researchers, engineers, and graduate students in the fields of information engineering, telecommunications engineering, computer engineering, etc.
Modern transceiver systems require diversified design aspects as various radio and sensor applications have emerged. Choosing the right architecture and understanding interference and linearity issues are important for multi-standard cellular transceivers and software-defined radios. A millimeter-wave complementary metal-oxide-semiconductor (CMOS) transceiver design for multi-Gb/s data transmission is another challenging area. Energy-efficient short-range radios for body area networks and sensor networks have recently received great attention. To meet different design requirements, gaining good system perspectives is important. Wireless Transceiver Circuits: System Perspectives and Design Aspects offers an in-depth look at integrated circuit (IC) design for modern transceiver circuits and wireless systems. Ranging in scope from system perspectives to practical circuit design for emerging wireless applications, this cutting-edge book: Provides system design considerations in modern transceiver design Covers both systems and circuits for the millimeter-wave transceiver design Introduces four energy-efficient short-range radios for biomedical and wireless connectivity applications Emphasizes key building blocks in modern transceivers and transmitters, including frequency synthesizers and digital-intensive phase modulators Featuring contributions from renowned international experts in industry and academia, Wireless Transceiver Circuits: System Perspectives and Design Aspects makes an ideal reference for engineers and researchers in the area of wireless systems and circuits.
Wireless networks are under constant pressure to provide ever higher data rates to increasing numbers of users with greater reliability. Space-time processing technology, which uses multiple antennas and sophisticated signal processing techniques, is a powerful new tool for improving system performance. The technology already features in the UMTS and CDMA2000 mobile standards. This book is an accessible introduction to the theory of space-time wireless communications. The authors discuss the basics of space-time propagation, space-time channels, channel capacity, spatial diversity and space-time coding. They highlight important trade-offs in the design of practical systems and cover advanced topics such as space-time OFDM and spread-spectrum modulation, co-channel interference cancellation, and multiuser MIMO. The book is an ideal introduction to this rapidly growing field for graduate students taking courses on wireless communications and for practitioners in the wireless industry. Homework problems and other supporting material are available on a companion website.
LTE (long-term evolution) mobile communication system is offering high bitrates in IP communications. Fourth Generation Mobile Communications/LTE describes various aspects of LTE as well as the change of paradigm, which it is bringing to mobile communications. The book is a vital resource for the entire mobile communication community. Coverage includes: LTE standards and architecture, Radio access sub-system, Signaling on the radio path, Macrocells, microcells, femtocells, SIM card and security, SIM card description, GPS driven applications, The Apple model, and much more more.
This book shares valuable insights into high-efficiency data transmission scheduling and into a group intelligent search and rescue approach for artificial intelligence (AI)-powered maritime networks. Its goal is to highlight major research directions and topics that are critical for those who are interested in maritime communication networks, equipping them to carry out further research in this field. The authors begin with a historical overview and address the marine business, emerging technologies, and the shortcomings of current network architectures (coverage, connectivity, reliability, etc.). In turn, they introduce a heterogeneous space/air/sea/ground maritime communication network architecture and investigate the transmission scheduling problem in maritime communication networks, together with solutions based on deep reinforcement learning. To accommodate the computation demands of maritime communication services, the authors propose a multi-vessel offloading algorithm for maritime mobile edge computing networks. In closing, they discuss the applications of swarm intelligence in maritime search and rescue.
Discover a fresh approach for designing more efficient and cooperative wireless communications networks with this systematic guide. Covering everything from fundamental theory to current research topics, leading researchers describe a new, network-aware coding strategy that exploits the signal interactions that occur in dense wireless networks directly at the waveform level. Using an easy-to-follow, layered structure, this unique text begins with a gentle introduction for those new to the subject, before moving on to explain key information-theoretic principles and establish a consistent framework for wireless physical layer network coding (WPNC) strategies. It provides a detailed treatment of Network Coded Modulation, covers a range of WPNC techniques such as Noisy Network Coding, Compute and Forward, and Hierarchical Decode and Forward, and explains how WPNC can be applied to parametric fading channels, frequency selective channels, and complex stochastic networks. This is essential reading whether you are a researcher, graduate student, or professional engineer.
This timely book provides broad coverage of vehicular ad-hoc network (VANET) issues, such as security, and network selection. Machine learning based methods are applied to solve these issues. This book also includes four rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues. This book will also help readers understand how to use machine learning to address the security and communication challenges in VANETs. Vehicular ad-hoc networks (VANETs) support vehicle-to-vehicle communications and vehicle-to-infrastructure communications to improve the transmission security, help build unmanned-driving, and support booming applications of onboard units (OBUs). The high mobility of OBUs and the large-scale dynamic network with fixed roadside units (RSUs) make the VANET vulnerable to jamming. The anti-jamming communication of VANETs can be significantly improved by using unmanned aerial vehicles (UAVs) to relay the OBU message. UAVs help relay the OBU message to improve the signal-to-interference-plus-noise-ratio of the OBU signals, and thus reduce the bit-error-rate of the OBU message, especially if the serving RSUs are blocked by jammers and/or interference, which is also demonstrated in this book. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues.
This book introduces the impact of channel aggregation (CA) and channel fragmentation (CF) on traffic flows, through analytical models, computer simulations, and test-bed implementations. Its content includes the concept of CA and CF, the basic concept and calculation of Markov chains (MCs), the modeling process of the CA and CF enabled system via MCs, the process of simulations, and a test-bed study based on a software defined radio. This book can serve as a study guide for advanced-level students, who are interested in studying the impact of CA and CF techniques on traffic flows. This book would also interest communication engineers, who would like to learn MC modeling for performance evaluations, as it includes a step-by-step guidance for the modeling process via MCs, as well as its simulation approaches.
A comprehensive presentation of the video communication techniques and systems, this book examines 4G wireless systems which are set to revolutionise ubiquitous multimedia communication."4G Wireless Video Communications" covers the fundamental theory and looks at systems' descriptions with a focus on digital video. It addresses the key topics associated with multimedia communication on 4G networks, including advanced video coding standards, error resilience and error concealment techniques, as well as advanced content-analysis and adaptation techniques for video communications, cross-layer design and optimization frameworks and methods. It also provides a high-level overview of the digital video compression standard MPEG-4 AVC/H.264 that is expected to play a key role in 4G networks. Material is presented logically allowing readers to turn directly to specific points of interest. The first half of the book covers fundamental theory and systems, while the second half moves onto advanced techniques and applications. This book is a timely reflection of the latest advances in video communications for 4G wireless systems.One of the first books to study the latest video communications developments for emerging 4G wireless systemsConsiders challenges and techniques in video delivery over 4G wireless systemsExamines system architecture, key techniques and related standards of advanced wireless multimedia applicationsWritten from both the perspective of industry and academia
This book provides an overview of technologies to maximize the quality of user experience for mobile, data-centric applications. Chapters cover techniques mobile network operators can use to maximize the effectiveness of congested networks, techniques that mobile application developers can use to minimize the impact of congested networks on user experience, and techniques that websites and data center operators can use to support a growing number of mobile users. With no technical jargon and a practical approach, this book offers a useful resource for a wide range of mobile network developers and managers.
SECURING and EVOLVING ARCHITECTURES 5G initiates a period of technological evolution where the benefits transcend faster data download speeds and enable services that will change the way we all live and consume technology. Leveraging 5G's openness, a new developer ecosystem is building breakthrough services that billions of people will consume, delivering immense value to enterprises and subscribers alike. For 5G to achieve its potential, organizations must embrace multi-layered security that goes far beyond 3GPP specifications. Now, leading security architect Pramod Nair helps network professionals climb the steep learning curve associated with securing 5G, fully understand its threat surfaces, systematically mitigate its risks, and maximize the value of their security investments. This coherent, pragmatic, and vendor-agnostic guide will help you plan for security from the outset, make better choices throughout the lifecycle, and develop the mindset needed to secure new generations of networks. You'll find all you need: from high-level 5G security concepts to in-depth coverage of specific security controls, end-to-end architectural guidance, 5G security use cases, and cutting-edge "quantum proofing." Throughout, practical examples and real-life scenarios help you apply Nair's insights---whether you're a service provider, an enterprise, an industry vertical, a startup, a cybersecurity vendor, a systems integrator, or even in a defense environment. Securing 5G and Evolving Architectures is for technical and management audiences at all levels of 5G experience---from enterprise and security architects to network engineers, cloud computing and data center professionals, to CSO and CTO teams. Explore new 5G security challenges---and why you still need external controls, even with recent 3GPP improvements Implement network component security controls for RAN, Transport, 5GC, and devices Safeguard Multi-Access Edge Compute (MEC), SDNs, virtualized 5G cores, and massive IOT Protect Public and Non-Public Networks (Private 5G) deployment scenarios Secure Critical Infrastructure, Vehicle to Everything (V2X), and Smart Factory use cases Optimize end-to-end 5G security architecture across all 5G domains based on zero trust Prioritize 5G security investments in service provider or enterprise environments Preview emerging 5G use cases and ML/AI-based security enhancements
This concise reference book for Android Studio 3 presents the essential Android Studio functions in a well-organized format that can be used as a handy reference. It will quickly demonstrate the usage of the Android Studio IDE to build an Android mobile app step by step. You won't find any technical jargon, bloated samples, drawn out history lessons, or witty stories in this book. What you will find is a reference that is concise, to the point and highly accessible. The Android Studio IDE Quick Reference is packed with useful information and is a must-have for any mobile or Android app developer or programmer. What You Will Learn Discover the workflow basics in Android Studio 3 Make tasks efficient with keyboard shortcuts Carry out unit testing in Android Studio 3 Use time-saving techniques such as templates Master debugging basics Configure your project using Gradle Use the profiler to monitor app performance Who This Book Is For Those who already know how to build applications in Android using Java. This book will serve as a handy and quick reference on how to get things done in Android Studio 3.
Written by a leading expert in the field, this unique book describes the technical requirements for three-tier shared spectrum as well as key policy rationale and the impact for 5G. Detail is provided on the inception of the concept and its implementation in the US Citizens Broadband Radio Service (CBRS), along with descriptions of standards for deployment, algorithms required for implementation, and the broader consequences for wireless network and service architectures. The economic and innovation incentives offered by three-tier spectrum are described, along with potential outcomes such as widely deployed neutral host networks. There is also detailed technical analysis of the unique challenges introduced by three-tier spectrum, such as co-existence among non-cooperating networks. Covering a wide range of spectrum bands, International Telecommunication Union (ITU) international allocations, and rule structures that can be adapted for different regimes, this is ideal for an international readership of communications engineers, policy-makers, regulators, and industry strategic planners.
This two-volume set LNICST 280-281 constitutes the post-conference proceedings of the 10th EAI International Conference on Wireless and Satellite Services, WiSATS 2019, held in Harbin, China, in January 2019. The conference was formerly known as the International Conference on Personal Satellite Services (PSATS) mainly covering topics in the satellite domain. The 137 full papers were carefully reviewed and selected from 289 submissions. The papers are organized in topical sections on machine learning for satellite-terrestrial networks, human-machine interactive sensing, monitoring, and communications, integrated space and onboard networks, intelligent signal processing, wireless communications and networks, vehicular communications and networks, intelligent 5G communication and digital image processing technology, security, reliability and resilience in internet of things, advances in communications and computing for internet of things.
This book constitutes the proceedings of the Second International Conference on 5G for Future Wireless Networks, 5GWN 2019, held in Changsa, China, in February 2019. The 13 full papers were selected from 34 submissions and present the state of the art and practical applications of 5G technologies. The papers are arranged thematically on optimization theory and applications, intelligent computing technology for 5G applications, resource allocation and management, and security and privacy in emerging 5G applications. |
![]() ![]() You may like...
Spying And The Crown - The Secret…
Richard J. Aldrich, Rory Cormac
Paperback
R388
Discovery Miles 3 880
Comedy Techniques for Variety Artists
Bruce "Charlie" Johnson
Hardcover
The Arnold-Gelfand Mathematical Seminars
V. Arnold, I.M. Gel'fand, …
Hardcover
R4,770
Discovery Miles 47 700
|