![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
This book focuses on core functionalities for wireless real-time multi-hop networking with TDMA (time-division multiple access) and their integration into a flexible, versatile, fully operational, self-contained communication system. The use of wireless real-time communication technologies for the flexible networking of sensors, actuators, and controllers is a crucial building block for future production and control systems. WirelessHART and ISA 100.11a, two technologies that have been developed predominantly for industrial use, are currently available. However, a closer analysis of these approaches reveals certain deficits. Current research on wireless real-time communication systems shows potential to remove these limitations, resulting in flexible, versatile, and robust solutions that can be implemented on today's low-cost and resource-constrained hardware platforms. Unlike other books on wireless communication, this book presents protocols located on MAC layer and above, and build on the physical (PHY) layer of standard wireless communication technologies.
This work aims at understanding behavior around location information, including why users share such information, why they protect the data, and what kind of other factors influence the decision to behave in a certain way. This book explores privacy in the context of location data, and answers questions such as what are the privacy related behaviors in this context, and what are the factors influencing such behaviors. The book gives an overview to what privacy means for users in terms of understandings, attitudes and valuations. This book discusses reasons for why research around this topic is challenging, and presents various methods for diving into the topic through empirical studies. The work is relevant for professionals, researchers, and users of technology.
LTE (long-term evolution) mobile communication system is offering high bitrates in IP communications. Fourth Generation Mobile Communications/LTE describes various aspects of LTE as well as the change of paradigm, which it is bringing to mobile communications. The book is a vital resource for the entire mobile communication community. Coverage includes: LTE standards and architecture, Radio access sub-system, Signaling on the radio path, Macrocells, microcells, femtocells, SIM card and security, SIM card description, GPS driven applications, The Apple model, and much more more.
Understand the theoretical principles, key technologies and applications of UDNs with this authoritative survey. Theory is explained in a clear, step-by-step manner, and recent advances and open research challenges in UDN physical layer design, resource allocation and network management are described, with examples, in the context of B5G and 6G standardization. Topics covered include NOMA-based physical layer design, physical layer security. Interference management, 3D base station deployment, software defined UDNs, wireless edge caching in UDNs, UDN-based UAVs and field trials and tests. A perfect resource for graduate students, researchers and professionals who need to get up to speed on the state of the art and future opportunities in UDNs.
This timely book provides broad coverage of vehicular ad-hoc network (VANET) issues, such as security, and network selection. Machine learning based methods are applied to solve these issues. This book also includes four rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues. This book will also help readers understand how to use machine learning to address the security and communication challenges in VANETs. Vehicular ad-hoc networks (VANETs) support vehicle-to-vehicle communications and vehicle-to-infrastructure communications to improve the transmission security, help build unmanned-driving, and support booming applications of onboard units (OBUs). The high mobility of OBUs and the large-scale dynamic network with fixed roadside units (RSUs) make the VANET vulnerable to jamming. The anti-jamming communication of VANETs can be significantly improved by using unmanned aerial vehicles (UAVs) to relay the OBU message. UAVs help relay the OBU message to improve the signal-to-interference-plus-noise-ratio of the OBU signals, and thus reduce the bit-error-rate of the OBU message, especially if the serving RSUs are blocked by jammers and/or interference, which is also demonstrated in this book. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to VANET communication and security related issues.
This book introduces the impact of channel aggregation (CA) and channel fragmentation (CF) on traffic flows, through analytical models, computer simulations, and test-bed implementations. Its content includes the concept of CA and CF, the basic concept and calculation of Markov chains (MCs), the modeling process of the CA and CF enabled system via MCs, the process of simulations, and a test-bed study based on a software defined radio. This book can serve as a study guide for advanced-level students, who are interested in studying the impact of CA and CF techniques on traffic flows. This book would also interest communication engineers, who would like to learn MC modeling for performance evaluations, as it includes a step-by-step guidance for the modeling process via MCs, as well as its simulation approaches.
The Acclaimed RF Microelectronics Best-Seller, Expanded and Updated for the Newest Architectures, Circuits, and Devices Wireless communication has become almost as ubiquitous as electricity, but RF design continues to challenge engineers and researchers. In the 15 years since the first edition of this classic text, the demand for higher performance has led to an explosive growth of RF design techniques. In RF Microelectronics, Second Edition, Behzad Razavi systematically teaches the fundamentals as well as the state-of-the-art developments in the analysis and design of RF circuits and transceivers. Razavi has written the second edition to reflect today's RF microelectronics, covering key topics in far greater detail. At nearly three times the length of the first edition, the second edition is an indispensable tome for both students and practicing engineers. With his lucid prose, Razavi now Offers a stronger tutorial focus along with hundreds of examples and problems Teaches design as well as analysis with the aid of step-by-step design procedures and a chapter dedicated to the design of a dual-band WiFi transceiver Describes new design paradigms and analysis techniques for circuits such as low-noise amplifiers, mixers, oscillators, and frequency dividers This edition's extensive coverage includes brand new chapters on mixers, passive devices, integer-N synthesizers, and fractional-N synthesizers. Razavi's teachings culminate in a new chapter that begins with WiFi's radio specifications and, step by step, designs the transceiver at the transistor level. Coverage includes Core RF principles, including noise and nonlinearity, with ties to analog design, microwave theory, and communication systems An intuitive treatment of modulation theory and wireless standards from the standpoint of the RF IC designer Transceiver architectures such as heterodyne, sliding-IF, directconversion, image-reject, and low-IF topologies. Low-noise amplifiers, including cascode common-gate and commonsource topologies, noise-cancelling schemes, and reactance-cancelling configurations Passive and active mixers, including their gain and noise analysis and new mixer topologies Voltage-controlled oscillators, phase noise mechanisms, and various VCO topologies dealing with noisepower-tuning trade-offs All-new coverage of passive devices, such as integrated inductors, MOS varactors, and transformers A chapter on the analysis and design of phase-locked loops with emphasis on low phase noise and low spur levels Two chapters on integer-N and fractional-N synthesizers, including the design of frequency dividers Power amplifier principles and circuit topologies along with transmitter architectures, such as polar modulation and outphasing
This book highlights new methods and parametric algorithms for the digital coherent processing of signals in airborne radar systems located on air vehicles. Using the autoregressive (AR) model, it delivers more accurate danger assessments for flight in wind shear and atmospheric turbulence, while also suggesting how they could be implemented. Given its scope, the book is intended for technical experts whose work involves the development, production and operation of airborne radio-electronic systems.
This book focuses on picturing B-IoT techniques from a few perspectives, which are architecture, key technologies, security and privacy, service models and framework, practical use cases and more. Main contents of this book derive from most updated technical achievements or breakthroughs in the field. A number of representative IoT service offerings will be covered by this book, such as vehicular networks, document sharing system, and telehealth. Both theoretical and practical contents will be involved in this book in order to assist readers to have a comprehensive and deep understanding the mechanism of using blockchain for powering up IoT systems. The blockchain-enabled Internet of Things (B-IoT) is deemed to be a novel technical alternative that provides network-based services with additional functionalities, benefits, and implementations in terms of decentralization, immutability, and auditability. Towards the enhanced secure and privacy-preserving Internet of Things (IoT), this book introduces a few significant aspects of B-IoT, which includes fundamental knowledge of both blockchain and IoT, state-of-the-art reviews of B-IoT applications, crucial components in the B-IoT system and the model design, and future development potentials and trends. IoT technologies and services, e.g. cloud data storage technologies and vehicular services, play important roles in wireless technology developments. On the other side, blockchain technologies are being adopted in a variety of academic societies and professional realms due to its promising characteristics. It is observable that the research and development on integrating these two technologies will provide critical thinking and solid references for contemporary and future network-relevant solutions. This book targets researchers and advanced level students in computer science, who are focused on cryptography, cloud computing and internet of things, as well as electrical engineering students and researchers focused on vehicular networks and more. Professionals working in these fields will also find this book to be a valuable resource.
This book offers an essential guide to Wireless Sensor Networks, IoT Security, Image Processing, Secure Information Systems, and Data Encryption. In addition, it introduces students and aspiring practitioners to the subject of destination marketing in a structured manner. It is chiefly intended for researcher students in the areas of Wireless Sensor Networks and Secure Data Communication (including image encryption, and intrusion detection systems), academics at universities and colleges, IT professionals, policymakers and legislators. Given its content, the book can be used as a reference text for both undergraduate and graduate studies, in courses on Wireless Sensor Networks, Secure Image Processing, and Data Encryption applications. The book is written in plain and easy-to-follow language and explains each main concept the first time it appears, helping readers with no prior background in the field. As such, it is a "must-read" guide to the subject matter.
A comprehensive presentation of the video communication techniques and systems, this book examines 4G wireless systems which are set to revolutionise ubiquitous multimedia communication."4G Wireless Video Communications" covers the fundamental theory and looks at systems' descriptions with a focus on digital video. It addresses the key topics associated with multimedia communication on 4G networks, including advanced video coding standards, error resilience and error concealment techniques, as well as advanced content-analysis and adaptation techniques for video communications, cross-layer design and optimization frameworks and methods. It also provides a high-level overview of the digital video compression standard MPEG-4 AVC/H.264 that is expected to play a key role in 4G networks. Material is presented logically allowing readers to turn directly to specific points of interest. The first half of the book covers fundamental theory and systems, while the second half moves onto advanced techniques and applications. This book is a timely reflection of the latest advances in video communications for 4G wireless systems.One of the first books to study the latest video communications developments for emerging 4G wireless systemsConsiders challenges and techniques in video delivery over 4G wireless systemsExamines system architecture, key techniques and related standards of advanced wireless multimedia applicationsWritten from both the perspective of industry and academia
This book provides an overview of technologies to maximize the quality of user experience for mobile, data-centric applications. Chapters cover techniques mobile network operators can use to maximize the effectiveness of congested networks, techniques that mobile application developers can use to minimize the impact of congested networks on user experience, and techniques that websites and data center operators can use to support a growing number of mobile users. With no technical jargon and a practical approach, this book offers a useful resource for a wide range of mobile network developers and managers.
This concise reference book for Android Studio 3 presents the essential Android Studio functions in a well-organized format that can be used as a handy reference. It will quickly demonstrate the usage of the Android Studio IDE to build an Android mobile app step by step. You won't find any technical jargon, bloated samples, drawn out history lessons, or witty stories in this book. What you will find is a reference that is concise, to the point and highly accessible. The Android Studio IDE Quick Reference is packed with useful information and is a must-have for any mobile or Android app developer or programmer. What You Will Learn Discover the workflow basics in Android Studio 3 Make tasks efficient with keyboard shortcuts Carry out unit testing in Android Studio 3 Use time-saving techniques such as templates Master debugging basics Configure your project using Gradle Use the profiler to monitor app performance Who This Book Is For Those who already know how to build applications in Android using Java. This book will serve as a handy and quick reference on how to get things done in Android Studio 3.
This book constitutes the proceedings of the Second International Conference on 5G for Future Wireless Networks, 5GWN 2019, held in Changsa, China, in February 2019. The 13 full papers were selected from 34 submissions and present the state of the art and practical applications of 5G technologies. The papers are arranged thematically on optimization theory and applications, intelligent computing technology for 5G applications, resource allocation and management, and security and privacy in emerging 5G applications.
Written by a leading expert in the field, this unique book describes the technical requirements for three-tier shared spectrum as well as key policy rationale and the impact for 5G. Detail is provided on the inception of the concept and its implementation in the US Citizens Broadband Radio Service (CBRS), along with descriptions of standards for deployment, algorithms required for implementation, and the broader consequences for wireless network and service architectures. The economic and innovation incentives offered by three-tier spectrum are described, along with potential outcomes such as widely deployed neutral host networks. There is also detailed technical analysis of the unique challenges introduced by three-tier spectrum, such as co-existence among non-cooperating networks. Covering a wide range of spectrum bands, International Telecommunication Union (ITU) international allocations, and rule structures that can be adapted for different regimes, this is ideal for an international readership of communications engineers, policy-makers, regulators, and industry strategic planners.
SECURING and EVOLVING ARCHITECTURES 5G initiates a period of technological evolution where the benefits transcend faster data download speeds and enable services that will change the way we all live and consume technology. Leveraging 5G's openness, a new developer ecosystem is building breakthrough services that billions of people will consume, delivering immense value to enterprises and subscribers alike. For 5G to achieve its potential, organizations must embrace multi-layered security that goes far beyond 3GPP specifications. Now, leading security architect Pramod Nair helps network professionals climb the steep learning curve associated with securing 5G, fully understand its threat surfaces, systematically mitigate its risks, and maximize the value of their security investments. This coherent, pragmatic, and vendor-agnostic guide will help you plan for security from the outset, make better choices throughout the lifecycle, and develop the mindset needed to secure new generations of networks. You'll find all you need: from high-level 5G security concepts to in-depth coverage of specific security controls, end-to-end architectural guidance, 5G security use cases, and cutting-edge "quantum proofing." Throughout, practical examples and real-life scenarios help you apply Nair's insights---whether you're a service provider, an enterprise, an industry vertical, a startup, a cybersecurity vendor, a systems integrator, or even in a defense environment. Securing 5G and Evolving Architectures is for technical and management audiences at all levels of 5G experience---from enterprise and security architects to network engineers, cloud computing and data center professionals, to CSO and CTO teams. Explore new 5G security challenges---and why you still need external controls, even with recent 3GPP improvements Implement network component security controls for RAN, Transport, 5GC, and devices Safeguard Multi-Access Edge Compute (MEC), SDNs, virtualized 5G cores, and massive IOT Protect Public and Non-Public Networks (Private 5G) deployment scenarios Secure Critical Infrastructure, Vehicle to Everything (V2X), and Smart Factory use cases Optimize end-to-end 5G security architecture across all 5G domains based on zero trust Prioritize 5G security investments in service provider or enterprise environments Preview emerging 5G use cases and ML/AI-based security enhancements
This book covers ideas, methods, algorithms, and tools for the in-depth study of the performance and reliability of dependable fault-tolerant systems. The chapters identify the current challenges that designers and practitioners must confront to ensure the reliability, availability, and performance of systems, with special focus on their dynamic behaviors and dependencies. Topics include network calculus, workload and scheduling; simulation, sensitivity analysis and applications; queuing networks analysis; clouds, federations and big data; and tools. This collection of recent research exposes system researchers, performance analysts, and practitioners to a spectrum of issues so that they can address these challenges in their work.
This book constitutes the refereed proceedings of the 13th EAI International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2018, held in Ghent, Belgium, in September 2018. The 20 revised full papers were selected from 26 submissions. The papers are organized thematically in tracks: Experimental, Licensed Shared Access and Dynamic Spectrum Access, and PHX and Sensing.
This book presents the outcomes of the workshop sponsored by the National Natural Sciences Foundation of China and the UK Newton Fund, British Council Researcher Links. The Workshop was held in Harbin, China, from 14 to 17 July 2017, and brought together some thirty young (postdoctoral) researchers from China and the UK specializing in geosciences, sensor signal networks and their applications to natural disaster recovery. The Workshop presentations covered the state of the art in the area of disaster recovery and blended wireless sensor systems that act as early warning systems to mitigate the consequences of disasters and function as post-disaster recovery vehicles. This book promotes knowledge transfer and helps readers explore and identify research opportunities by highlighting research outcomes in the internationally relevant area of disaster recovery and mitigation.
This book comprises selected articles from the International Communications Conference (ICC) 2018 held in Hyderabad, India in 2018. It offers in-depth information on the latest developments in voice-, data-, image- and multimedia processing research and applications, and includes contributions from both academia and industry.
This textbook introduces Wireless Powered Communication Networks (WPCNs) as a promising paradigm to overcome the energy bottleneck suffered by traditional wireless communication networks, as well as emerging Internet-of-Things networks. It selectively spans a coherent spectrum of fundamental aspects in WPCNs, such as wireless energy transfer (WEH) techniques, radio frequency (RF) energy harvesting receiver model, simultaneous wireless information and power transfer (SWIPT), as well as the rate-energy tradeoff arising from the joint transmission of information and energy using the same waveform. It covers network models for WPCNs, including the baseline and dual-hop WPCN models and a variety of related extensions. This book further examines the key factors including throughput, fairness, and security that must be taken into account for impeccable operation of WPCNs. The new IoT applications are targeted as a key element in those factors. It will also include exercises and examples throughout the book, as well as their PLS solutions. This is the first textbook examining the current research to provide a unified view of wireless power transfer (WPT) and information transmission in WPCNs from a physical layer security (PLS) perspective. Focused on designing efficient secure transmission schemes, analyzing energy evolvement process, and evaluating secrecy outage performance under different channel state information (CSI), the results presented in this book shed light on how to best balance security and throughput with prudent use of harvested energy in WCNs. It also provides an overview of the WPCNs by introducing the background of WPT, followed by a summary of the research conducted in the field. The authors describe the physical-layer security (PLS) problem in WPCNs, including the causes and the impacts of the problem on the performance of WPCNs. The authors extend the discussions by introducing the applications of WPCNs in the IoT. From the Internet of Things (IoT) point of view, this textbook reviews the opportunities and challenges for the lately-emerged WPCN to seamlessly integrate into the IoT ecosystem. It specifically addresses the maximization problem of uplink and downlink sum-throughout in a dual-hop WPCN, while taking fairness among WPCN users as a constraint. The results provided in this book reveal valuable insights into improving the design and deployment of future WPCNs in the upcoming IoT environment. This textbook targets advanced-level students studying wireless communications and research engineers working in this field. Industry engineers in mobile device and network development business with an interest in WPCNs and IoT, as well as their PLS solutions, will also find this book useful.
This book is a collection of papers from international experts presented at International Conference on NextGen Electronic Technologies (ICNETS2-2016). ICNETS2 encompassed six symposia covering all aspects of electronics and communications domains, including relevant nano/micro materials and devices. Presenting recent research on wireless communication networks and Internet of Things, the book will prove useful to researchers, professionals and students working in the core areas of electronics and their applications, especially in signal processing, embedded systems and networking.
This book constitutes the refereed post-conference proceedings of the 11th International Conference on Wireless Internet , WiCON 2018, held in Taipei, Taiwan, in October 2018. The 36 full papers were selected from 79 submissions and are grouped into the following topics: wireless network, artificial intelligence, security, IoT, location-based services, financial applicatiosn, vehicular ad hoc network, services and applications.
This book presents comprehensive coverage of current and emerging multiple access, random access, and waveform design techniques for 5G wireless networks and beyond. A definitive reference for researchers in these fields, the book describes recent research from academia, industry, and standardization bodies. The book is an all-encompassing treatment of these areas addressing orthogonal multiple access and waveform design, non-orthogonal multiple access (NOMA) via power, code, and other domains, and orthogonal, non-orthogonal, and grant-free random access. The book builds its foundations on state of the art research papers, measurements, and experimental results from a variety of sources.
This book features selected papers presented at Third International Conference on Nanoelectronics, Circuits and Communication Systems (NCCS 2017). Covering topics such as MEMS and nanoelectronics, wireless communications, optical communication, instrumentation, signal processing, Internet of Things, image processing, bioengineering, green energy, hybrid vehicles, environmental science, weather forecasting, cloud computing, renewable energy, RFID, CMOS sensors, actuators, transducers, telemetry systems, embedded systems, and sensor network applications in mines, it is a valuable resource for young scholars, researchers, and academics. |
![]() ![]() You may like...
Advances in Mathematical and…
Mukesh Kumar Awasthi, Maitri Verma, …
Hardcover
R4,626
Discovery Miles 46 260
Highlighting the Importance of Big Data…
Mohammad Moshirpour, Behrouz Far, …
Hardcover
R3,129
Discovery Miles 31 290
Variable-Structure Approaches…
Andreas Rauh, Luise Senkel
Hardcover
Cancer Prediction for Industrial IoT 4.0…
Meenu Gupta, Rachna Jain, …
Hardcover
R3,876
Discovery Miles 38 760
Career Counselling And Guidance In The…
Melinda Coetzee, Herman Roythorne-Jacobs, …
Paperback
Extensions of Dynamic Programming for…
Hassan AbouEisha, Talha Amin, …
Hardcover
R2,904
Discovery Miles 29 040
Design and Control Advances in Robotics
Mohamed Arezk Mellal
Hardcover
R8,238
Discovery Miles 82 380
|