![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
This book focuses on picturing B-IoT techniques from a few perspectives, which are architecture, key technologies, security and privacy, service models and framework, practical use cases and more. Main contents of this book derive from most updated technical achievements or breakthroughs in the field. A number of representative IoT service offerings will be covered by this book, such as vehicular networks, document sharing system, and telehealth. Both theoretical and practical contents will be involved in this book in order to assist readers to have a comprehensive and deep understanding the mechanism of using blockchain for powering up IoT systems. The blockchain-enabled Internet of Things (B-IoT) is deemed to be a novel technical alternative that provides network-based services with additional functionalities, benefits, and implementations in terms of decentralization, immutability, and auditability. Towards the enhanced secure and privacy-preserving Internet of Things (IoT), this book introduces a few significant aspects of B-IoT, which includes fundamental knowledge of both blockchain and IoT, state-of-the-art reviews of B-IoT applications, crucial components in the B-IoT system and the model design, and future development potentials and trends. IoT technologies and services, e.g. cloud data storage technologies and vehicular services, play important roles in wireless technology developments. On the other side, blockchain technologies are being adopted in a variety of academic societies and professional realms due to its promising characteristics. It is observable that the research and development on integrating these two technologies will provide critical thinking and solid references for contemporary and future network-relevant solutions. This book targets researchers and advanced level students in computer science, who are focused on cryptography, cloud computing and internet of things, as well as electrical engineering students and researchers focused on vehicular networks and more. Professionals working in these fields will also find this book to be a valuable resource.
This book offers an essential guide to Wireless Sensor Networks, IoT Security, Image Processing, Secure Information Systems, and Data Encryption. In addition, it introduces students and aspiring practitioners to the subject of destination marketing in a structured manner. It is chiefly intended for researcher students in the areas of Wireless Sensor Networks and Secure Data Communication (including image encryption, and intrusion detection systems), academics at universities and colleges, IT professionals, policymakers and legislators. Given its content, the book can be used as a reference text for both undergraduate and graduate studies, in courses on Wireless Sensor Networks, Secure Image Processing, and Data Encryption applications. The book is written in plain and easy-to-follow language and explains each main concept the first time it appears, helping readers with no prior background in the field. As such, it is a "must-read" guide to the subject matter.
A comprehensive presentation of the video communication techniques and systems, this book examines 4G wireless systems which are set to revolutionise ubiquitous multimedia communication."4G Wireless Video Communications" covers the fundamental theory and looks at systems' descriptions with a focus on digital video. It addresses the key topics associated with multimedia communication on 4G networks, including advanced video coding standards, error resilience and error concealment techniques, as well as advanced content-analysis and adaptation techniques for video communications, cross-layer design and optimization frameworks and methods. It also provides a high-level overview of the digital video compression standard MPEG-4 AVC/H.264 that is expected to play a key role in 4G networks. Material is presented logically allowing readers to turn directly to specific points of interest. The first half of the book covers fundamental theory and systems, while the second half moves onto advanced techniques and applications. This book is a timely reflection of the latest advances in video communications for 4G wireless systems.One of the first books to study the latest video communications developments for emerging 4G wireless systemsConsiders challenges and techniques in video delivery over 4G wireless systemsExamines system architecture, key techniques and related standards of advanced wireless multimedia applicationsWritten from both the perspective of industry and academia
This book provides an overview of technologies to maximize the quality of user experience for mobile, data-centric applications. Chapters cover techniques mobile network operators can use to maximize the effectiveness of congested networks, techniques that mobile application developers can use to minimize the impact of congested networks on user experience, and techniques that websites and data center operators can use to support a growing number of mobile users. With no technical jargon and a practical approach, this book offers a useful resource for a wide range of mobile network developers and managers.
This concise reference book for Android Studio 3 presents the essential Android Studio functions in a well-organized format that can be used as a handy reference. It will quickly demonstrate the usage of the Android Studio IDE to build an Android mobile app step by step. You won't find any technical jargon, bloated samples, drawn out history lessons, or witty stories in this book. What you will find is a reference that is concise, to the point and highly accessible. The Android Studio IDE Quick Reference is packed with useful information and is a must-have for any mobile or Android app developer or programmer. What You Will Learn Discover the workflow basics in Android Studio 3 Make tasks efficient with keyboard shortcuts Carry out unit testing in Android Studio 3 Use time-saving techniques such as templates Master debugging basics Configure your project using Gradle Use the profiler to monitor app performance Who This Book Is For Those who already know how to build applications in Android using Java. This book will serve as a handy and quick reference on how to get things done in Android Studio 3.
This book constitutes the proceedings of the Second International Conference on 5G for Future Wireless Networks, 5GWN 2019, held in Changsa, China, in February 2019. The 13 full papers were selected from 34 submissions and present the state of the art and practical applications of 5G technologies. The papers are arranged thematically on optimization theory and applications, intelligent computing technology for 5G applications, resource allocation and management, and security and privacy in emerging 5G applications.
Written by a leading expert in the field, this unique book describes the technical requirements for three-tier shared spectrum as well as key policy rationale and the impact for 5G. Detail is provided on the inception of the concept and its implementation in the US Citizens Broadband Radio Service (CBRS), along with descriptions of standards for deployment, algorithms required for implementation, and the broader consequences for wireless network and service architectures. The economic and innovation incentives offered by three-tier spectrum are described, along with potential outcomes such as widely deployed neutral host networks. There is also detailed technical analysis of the unique challenges introduced by three-tier spectrum, such as co-existence among non-cooperating networks. Covering a wide range of spectrum bands, International Telecommunication Union (ITU) international allocations, and rule structures that can be adapted for different regimes, this is ideal for an international readership of communications engineers, policy-makers, regulators, and industry strategic planners.
SECURING and EVOLVING ARCHITECTURES 5G initiates a period of technological evolution where the benefits transcend faster data download speeds and enable services that will change the way we all live and consume technology. Leveraging 5G's openness, a new developer ecosystem is building breakthrough services that billions of people will consume, delivering immense value to enterprises and subscribers alike. For 5G to achieve its potential, organizations must embrace multi-layered security that goes far beyond 3GPP specifications. Now, leading security architect Pramod Nair helps network professionals climb the steep learning curve associated with securing 5G, fully understand its threat surfaces, systematically mitigate its risks, and maximize the value of their security investments. This coherent, pragmatic, and vendor-agnostic guide will help you plan for security from the outset, make better choices throughout the lifecycle, and develop the mindset needed to secure new generations of networks. You'll find all you need: from high-level 5G security concepts to in-depth coverage of specific security controls, end-to-end architectural guidance, 5G security use cases, and cutting-edge "quantum proofing." Throughout, practical examples and real-life scenarios help you apply Nair's insights---whether you're a service provider, an enterprise, an industry vertical, a startup, a cybersecurity vendor, a systems integrator, or even in a defense environment. Securing 5G and Evolving Architectures is for technical and management audiences at all levels of 5G experience---from enterprise and security architects to network engineers, cloud computing and data center professionals, to CSO and CTO teams. Explore new 5G security challenges---and why you still need external controls, even with recent 3GPP improvements Implement network component security controls for RAN, Transport, 5GC, and devices Safeguard Multi-Access Edge Compute (MEC), SDNs, virtualized 5G cores, and massive IOT Protect Public and Non-Public Networks (Private 5G) deployment scenarios Secure Critical Infrastructure, Vehicle to Everything (V2X), and Smart Factory use cases Optimize end-to-end 5G security architecture across all 5G domains based on zero trust Prioritize 5G security investments in service provider or enterprise environments Preview emerging 5G use cases and ML/AI-based security enhancements
This book covers ideas, methods, algorithms, and tools for the in-depth study of the performance and reliability of dependable fault-tolerant systems. The chapters identify the current challenges that designers and practitioners must confront to ensure the reliability, availability, and performance of systems, with special focus on their dynamic behaviors and dependencies. Topics include network calculus, workload and scheduling; simulation, sensitivity analysis and applications; queuing networks analysis; clouds, federations and big data; and tools. This collection of recent research exposes system researchers, performance analysts, and practitioners to a spectrum of issues so that they can address these challenges in their work.
This book constitutes the refereed proceedings of the 13th EAI International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2018, held in Ghent, Belgium, in September 2018. The 20 revised full papers were selected from 26 submissions. The papers are organized thematically in tracks: Experimental, Licensed Shared Access and Dynamic Spectrum Access, and PHX and Sensing.
This book presents the outcomes of the workshop sponsored by the National Natural Sciences Foundation of China and the UK Newton Fund, British Council Researcher Links. The Workshop was held in Harbin, China, from 14 to 17 July 2017, and brought together some thirty young (postdoctoral) researchers from China and the UK specializing in geosciences, sensor signal networks and their applications to natural disaster recovery. The Workshop presentations covered the state of the art in the area of disaster recovery and blended wireless sensor systems that act as early warning systems to mitigate the consequences of disasters and function as post-disaster recovery vehicles. This book promotes knowledge transfer and helps readers explore and identify research opportunities by highlighting research outcomes in the internationally relevant area of disaster recovery and mitigation.
This book comprises selected articles from the International Communications Conference (ICC) 2018 held in Hyderabad, India in 2018. It offers in-depth information on the latest developments in voice-, data-, image- and multimedia processing research and applications, and includes contributions from both academia and industry.
This textbook introduces Wireless Powered Communication Networks (WPCNs) as a promising paradigm to overcome the energy bottleneck suffered by traditional wireless communication networks, as well as emerging Internet-of-Things networks. It selectively spans a coherent spectrum of fundamental aspects in WPCNs, such as wireless energy transfer (WEH) techniques, radio frequency (RF) energy harvesting receiver model, simultaneous wireless information and power transfer (SWIPT), as well as the rate-energy tradeoff arising from the joint transmission of information and energy using the same waveform. It covers network models for WPCNs, including the baseline and dual-hop WPCN models and a variety of related extensions. This book further examines the key factors including throughput, fairness, and security that must be taken into account for impeccable operation of WPCNs. The new IoT applications are targeted as a key element in those factors. It will also include exercises and examples throughout the book, as well as their PLS solutions. This is the first textbook examining the current research to provide a unified view of wireless power transfer (WPT) and information transmission in WPCNs from a physical layer security (PLS) perspective. Focused on designing efficient secure transmission schemes, analyzing energy evolvement process, and evaluating secrecy outage performance under different channel state information (CSI), the results presented in this book shed light on how to best balance security and throughput with prudent use of harvested energy in WCNs. It also provides an overview of the WPCNs by introducing the background of WPT, followed by a summary of the research conducted in the field. The authors describe the physical-layer security (PLS) problem in WPCNs, including the causes and the impacts of the problem on the performance of WPCNs. The authors extend the discussions by introducing the applications of WPCNs in the IoT. From the Internet of Things (IoT) point of view, this textbook reviews the opportunities and challenges for the lately-emerged WPCN to seamlessly integrate into the IoT ecosystem. It specifically addresses the maximization problem of uplink and downlink sum-throughout in a dual-hop WPCN, while taking fairness among WPCN users as a constraint. The results provided in this book reveal valuable insights into improving the design and deployment of future WPCNs in the upcoming IoT environment. This textbook targets advanced-level students studying wireless communications and research engineers working in this field. Industry engineers in mobile device and network development business with an interest in WPCNs and IoT, as well as their PLS solutions, will also find this book useful.
This book is a collection of papers from international experts presented at International Conference on NextGen Electronic Technologies (ICNETS2-2016). ICNETS2 encompassed six symposia covering all aspects of electronics and communications domains, including relevant nano/micro materials and devices. Presenting recent research on wireless communication networks and Internet of Things, the book will prove useful to researchers, professionals and students working in the core areas of electronics and their applications, especially in signal processing, embedded systems and networking.
This book constitutes the refereed post-conference proceedings of the 11th International Conference on Wireless Internet , WiCON 2018, held in Taipei, Taiwan, in October 2018. The 36 full papers were selected from 79 submissions and are grouped into the following topics: wireless network, artificial intelligence, security, IoT, location-based services, financial applicatiosn, vehicular ad hoc network, services and applications.
This book presents comprehensive coverage of current and emerging multiple access, random access, and waveform design techniques for 5G wireless networks and beyond. A definitive reference for researchers in these fields, the book describes recent research from academia, industry, and standardization bodies. The book is an all-encompassing treatment of these areas addressing orthogonal multiple access and waveform design, non-orthogonal multiple access (NOMA) via power, code, and other domains, and orthogonal, non-orthogonal, and grant-free random access. The book builds its foundations on state of the art research papers, measurements, and experimental results from a variety of sources.
This book features selected papers presented at Third International Conference on Nanoelectronics, Circuits and Communication Systems (NCCS 2017). Covering topics such as MEMS and nanoelectronics, wireless communications, optical communication, instrumentation, signal processing, Internet of Things, image processing, bioengineering, green energy, hybrid vehicles, environmental science, weather forecasting, cloud computing, renewable energy, RFID, CMOS sensors, actuators, transducers, telemetry systems, embedded systems, and sensor network applications in mines, it is a valuable resource for young scholars, researchers, and academics.
Up-to-date coverage of the cutting-edge research on UWB Systems with Multiple Antennas In this book, the authors investigate the benefits of combining UWB and MIMO technologies; highlighting five aspects of this promising research field: channel capacity, space-time coding, beamforming and localization, time-reversal transmission, and UWB-MIMO relay. The book presents a systematic and in-depth discussion for each of the hot topics, providing an insight into the cutting-edge research currently undertaken. It is expected that the ideas and approaches illustrated in this book will inspire sparks for the emerging technologies in short-range high data-rate wireless communications and other related applications. Key Features: Provides a thorough coverage combining the UWB and MIMO, outlining the opportunities and benefits created by the combination of these technologies Highlights five aspects of this promising research field: channel capacity, space-time coding, beamforming and localization, time-reversal transmission, and UWB-MIMO relay Covers UWB-MIMO channel measurement and models This book will serve as an invaluable reference for academic and professional researchers in wireless communications, and graduate students. Engineers and technical professionals will also find the book insightful
This two-volume set LNICST 280-281 constitutes the post-conference proceedings of the 10th EAI International Conference on Wireless and Satellite Services, WiSATS 2019, held in Harbin, China, in January 2019. The conference was formerly known as the International Conference on Personal Satellite Services (PSATS) mainly covering topics in the satellite domain. The 137 full papers were carefully reviewed and selected from 289 submissions. The papers are organized in topical sections on machine learning for satellite-terrestrial networks, human-machine interactive sensing, monitoring, and communications, integrated space and onboard networks, intelligent signal processing, wireless communications and networks, vehicular communications and networks, intelligent 5G communication and digital image processing technology, security, reliability and resilience in internet of things, advances in communications and computing for internet of things.
Learn about the key technologies and understand the state of the art in research for full-duplex communication networks and systems with this comprehensive and interdisciplinary guide. Incorporating physical, MAC, network, and application layer perspectives, it explains the fundamental theories on which full-duplex communications are built, and lays out the techniques needed for network design, analysis and optimization. Techniques covered in detail include self-interference cancellation and signal processing algorithms, physical layer algorithms, methods for efficient resource allocation, and game theory. Potential applications and networking schemes are discussed, including full-duplex cognitive radio networks, cooperative networks, and heterogeneous networks. The first book to focus exclusively on full-duplex communications, this is an indispensable reference for both researchers and practitioners designing the next generation of wireless networks.
This SpringerBrief introduces the current research status on emerging multiple access schemes for mMTC, which provides an integrated reference for future research works. A brief introduction on mMTC scenario is provided, and then the suitable random access procedure is discussed. Various multiple access schemes for mMTC are also described and analyzed in detail. It assumes a background in communication theory and wireless communication fundamentals. With the thriving of Internet of Things (IoT) industry, an emerging scenario named massive machine-type communication (mMTC) is considered in the future 5G networks. One main challenge in mMTC is how to support massive connections with limited radio resources and low energy consumption. Therein, novel multiple access scheme is the key to overcome the challenge. This SpringerBrief targets researchers and engineers, who are engaged in 5G and future IoT related communications system. It can also be a used as a reference book or a secondary text for graduate students, who major in communications.
This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief.
Understand the fundamentals of wireless and MIMO communication with this accessible and comprehensive text. Viewing the subject through an information theory lens, but also drawing on other perspectives, it provides a sound treatment of the key concepts underpinning contemporary wireless communication and MIMO, all the way to massive MIMO. Authoritative and insightful, it includes over 330 worked examples and 450 homework problems, with solutions and MATLAB code and data available online. Altogether, this is an excellent resource for instructors and graduate students, as well as an outstanding reference for researchers and practicing engineers.
This book looks at how digital economy can help energy businesses to meet their sustainability goals. It will further generates a new debate among policymakers about encouraging green technologies to reduce global carbon emissions. Our modern society requires a long-term, sustainable, and secure energy supply that not only generates and preserves renewable energy. It is also creating universal intelligent machines for power systems, and vital infrastructure is considered in terms of digital economy requirements. The idea of sharing information is an essential principle of sustainable thinking. In such instances, open internet and data access are required to enable any human being to acquire knowledge. Furthermore, the energy industry is changing worldwide, necessitating the consideration of potential implications and modifications. Thus, its most distinguishing feature is moving from a centrally organized system to one with many market players. Consequently, information and communication technologies and human growth have significant main and interactive effects on environmental sustainability. Simultaneously, energy industry is a major player in resolving the digital economy’s development issues.
Learn about an information-theoretic approach to managing interference in future generation wireless networks. Focusing on cooperative schemes motivated by Coordinated Multi-Point (CoMP) technology, the book develops a robust theoretical framework for interference management that uses recent advancements in backhaul design, and practical pre-coding schemes based on local cooperation, to deliver the increased speed and reliability promised by interference alignment. Gain insight into how simple, zero-forcing pre-coding schemes are optimal in locally connected interference networks, and discover how significant rate gains can be obtained by making cell association decisions and allocating backhaul resources based on centralized (cloud) processing and knowledge of network topology. Providing a link between information-theoretic analyses and interference management schemes that are easy to implement, this is an invaluable resource for researchers, graduate students and practicing engineers in wireless communications. |
![]() ![]() You may like...
Grammatical and Syntactical Approaches…
Juhyun Lee, Michael J. Ostwald
Hardcover
R6,062
Discovery Miles 60 620
2nd EAI International Conference on Big…
Anandakumar Haldorai, Arulmurugan Ramu, …
Hardcover
R5,966
Discovery Miles 59 660
Design of FPGA-Based Computing Systems…
Hasitha Muthumala Waidyasooriya, Masanori Hariyama, …
Hardcover
R3,843
Discovery Miles 38 430
|