![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
This book gathers selected papers presented at the 3rd International Conference on Wireless Communications and Applications (ICWCA 2019), held at Hainan University, China. It covers up-to-date smart theories and approaches, as reflected in contemporary technical achievements in the area. The topics covered include: software-defined networking (SDN) and network function virtualization (NFV), future data center networks, 5G/6G mobile networks, QoS/QoE support in future networks, future Internet of things (IoT) networks, network fault management and service availability, and many others.
This book gathers selected papers presented at the Fourth International Conference on Mechatronics and Intelligent Robotics (ICMIR 2020), held in Kunming, China, on May 22-24, 2020. The proceedings cover new findings in the following areas of research: mechatronics, intelligent mechatronics, robotics and biomimetics; novel and unconventional mechatronic systems; modeling and control of mechatronic systems; elements, structures and mechanisms of micro- and nano-systems; sensors, wireless sensor networks and multi-sensor data fusion; biomedical and rehabilitation engineering, prosthetics and artificial organs; artificial intelligence (AI), neural networks and fuzzy logic in mechatronics and robotics; industrial automation, process control and networked control systems; telerobotics and human-computer interaction; human-robot interaction; robotics and artificial intelligence; bio-inspired robotics; control algorithms and control systems; design theories and principles; evolutional robotics; field robotics; force sensors, accelerometers and other measuring devices; healthcare robotics; kinematics and dynamics analysis; manufacturing robotics; mathematical and computational methodologies in robotics; medical robotics; parallel robots and manipulators; robotic cognition and emotion; robotic perception and decisions; sensor integration, fusion and perception; and social robotics.
This book presents the proceedings of the 3rd International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2020), sponsored by Ryerson University, Toronto, Canada, May 6-8, 2020. The WIDECOM conference solicits papers addressing issues related to new dependability paradigms, design, and performance of dependable network computing and mobile systems, as well as issues related to the security of these systems. The goal of the conference is to provide a forum for researchers, students, scientists and engineers working in academia and industry to share their experiences, new ideas and research results in the above-mentioned areas. Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2020), Ryerson University, Toronto, Canada, May 6-8, 2020; Includes an array of topics networking computing, mobile/ubiquitous systems, cloud systems, and IoT systems; Addresses issues related to protecting information security and establishing trust in the digital space.
This book presents the selected peer-reviewed papers from the International Conference on Communication Systems and Networks (ComNet) 2019. Highlighting the latest findings, ideas, developments and applications in all areas of advanced communication systems and networking, it covers a variety of topics, including next-generation wireless technologies such as 5G, new hardware platforms, antenna design, applications of artificial intelligence (AI), signal processing and optimization techniques. Given its scope, this book can be useful for beginners, researchers and professionals working in wireless communication and networks, and other allied fields.
This book features best selected research papers presented at the International Conference on Machine Learning, Internet of Things and Big Data (ICMIB 2020) held at Indira Gandhi Institute of Technology, Sarang, India, during September 2020. It comprises high-quality research work by academicians and industrial experts in the field of machine learning, mobile computing, natural language processing, fuzzy computing, green computing, human-computer interaction, information retrieval, intelligent control, data mining and knowledge discovery, evolutionary computing, IoT and applications in smart environments, smart health, smart city, wireless networks, big data, cloud computing, business intelligence, internet security, pattern recognition, predictive analytics applications in healthcare, sensor networks and social sensing and statistical analysis of search techniques.
This book presents selected research papers on current developments in the fields of soft computing and signal processing from the Third International Conference on Soft Computing and Signal Processing (ICSCSP 2020). The book covers topics such as soft sets, rough sets, fuzzy logic, neural networks, genetic algorithms and machine learning and discusses various aspects of these topics, e.g., technological considerations, product implementation and application issues.
This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which could change "the easy-to-attack and difficult-to-defend game" in cyberspace. The endogenous uncertain effects from the targets of the software/hardware based on this architecture can produce magic "mimic defense fog", and suppress in a normalized mode random disturbances caused by physical or logic elements, as well as effects of non-probability disturbances brought by uncertain security threats. Although progress has been made in the current security defense theories in cyberspace and various types of security technologies have come into being, the effectiveness of such theories and technologies often depends on the scale of the prior knowledge of the attackers, on the part of the defender and on the acquired real-timing and accuracy regarding the attackers' behavior features and other information. Hence, there lacks an efficient active defense means to deal with uncertain security threats from the unknown. Even if the bottom-line defense technologies such as encrypted verification are adopted, the security of hardware/software products cannot be quantitatively designed, verified or measured. Due to the "loose coupling" relationship and border defense modes between the defender and the protected target, there exist insurmountable theoretical and technological challenges in the protection of the defender and the target against the utilization of internal vulnerabilities or backdoors, as well as in dealing with attack scenarios based on backdoor-activated collaboration from both inside and outside, no matter how augmented or accumulated protective measures are adopted. Therefore, it is urgent to jump out of the stereotyped thinking based on conventional defense theories and technologies, find new theories and methods to effectively reduce the utilization of vulnerabilities and backdoors of the targets without relying on the priori knowledge and feature information, and to develop new technological means to offset uncertain threats based on unknown vulnerabilities and backdoors from an innovative perspective. This book provides a solution both in theory and engineering implementation to the difficult problem of how to avoid the uncontrollability of product security caused by globalized marketing, COTS and non-trustworthy software/hardware sources. It has been proved that this revolutionary enabling technology has endowed software/hardware products in IT/ICT/CPS with endogenous security functions and has overturned the attack theories and methods based on hardware/software design defects or resident malicious codes. This book is designed for educators, theoretical and technological researchers in cyber security and autonomous control and for business technicians who are engaged in the research on developing a new generation of software/hardware products by using endogenous security enabling technologies and for other product users. Postgraduates in IT/ICT/CPS/ICS will discover that (as long as the law of "structure determines the nature and architecture determines the security is properly used), the problem of software/hardware design defects or malicious code embedding will become the swelling of Achilles in the process of informationization and will no longer haunt Pandora's box in cyberspace. Security and opening-up, advanced progressiveness and controllability seem to be contradictory, but there can be theoretically and technologically unified solutions to the problem.
Focusing on inductive wireless power transfer (WPT), which relies on coil resonators and power converters, this book begins by providing the background and basic theories of WPT, which are essential for newcomers to the field. Then two major challenges of WPT - power transfer distance and efficiency - are subsequently addressed, and multi-resonator WPT systems, which not only offer a way to extend power transfer distance but also provide more flexibility, are investigated. Recent findings on techniques to maximize the power transfer efficiency of WPT systems, e.g. maximum efficiency point tracking, are also introduced. Without the constraint of cables, wireless power transfer (WPT) is an elegant technique for charging or powering a range of electrical devices, e.g. electric vehicles, mobile phones, artificial hearts, etc. Given its depth of coverage, the book can serve as a technical guideline or reference guide for engineers and researchers working on WPT.
This book comprises select peer-reviewed proceedings of the international conference on Research in Intelligent and Computing in Engineering (RICE 2020) held at Thu Dau Mot University, Vietnam. The volume primarily focuses on latest research and advances in various computing models such as centralized, distributed, cluster, grid, and cloud computing. Practical examples and real-life applications of wireless sensor networks, mobile ad hoc networks, and internet of things, data mining and machine learning are also covered in the book. The contents aim to enable researchers and professionals to tackle the rapidly growing needs of network applications and the various complexities associated with them.
This book explores various challenging problems and applications areas of wireless sensor networks (WSNs), and identifies the current issues and future research challenges. Discussing the latest developments and advances, it covers all aspects of in WSNs, from architecture to protocols design, and from algorithm development to synchronization issues. As such the book is an essential reference resource for undergraduate and postgraduate students as well as scholars and academics working in the field.
This book discusses how to plan the time-variant placements of the UAVs served as base station (BS)/relay, which is very challenging due to the complicated 3D propagation environments, as well as many other practical constraints such as power and flying speed. Spectrum sharing with existing cellular networks is also investigated in this book. The emerging unmanned aerial vehicles (UAVs) have been playing an increasing role in the military, public, and civil applications. To seamlessly integrate UAVs into future cellular networks, this book will cover two main scenarios of UAV applications as follows. The first type of applications can be referred to as UAV Assisted Cellular Communications. Second type of application is to exploit UAVs for sensing purposes, such as smart agriculture, security monitoring, and traffic surveillance. Due to the limited computation capability of UAVs, the real-time sensory data needs to be transmitted to the BS for real-time data processing. The cellular networks are necessarily committed to support the data transmission for UAVs, which the authors refer to as Cellular assisted UAV Sensing. To support real-time sensing streaming, the authors design joint sensing and communication protocols, develop novel beamforming and estimation algorithms, and study efficient distributed resource optimization methods. This book targets signal processing engineers, computer and information scientists, applied mathematicians and statisticians, as well as systems engineers to carve out the role that analytical and experimental engineering has to play in UAV research and development. Undergraduate students, industry managers, government research agency workers and general readers interested in the fields of communications and networks will also want to read this book.
This work aims at understanding behavior around location information, including why users share such information, why they protect the data, and what kind of other factors influence the decision to behave in a certain way. This book explores privacy in the context of location data, and answers questions such as what are the privacy related behaviors in this context, and what are the factors influencing such behaviors. The book gives an overview to what privacy means for users in terms of understandings, attitudes and valuations. This book discusses reasons for why research around this topic is challenging, and presents various methods for diving into the topic through empirical studies. The work is relevant for professionals, researchers, and users of technology.
This book gathers selected research papers presented at the 7th International Conference on Computers and Devices for Communication (CODEC 2019), held at the Department of Radio Physics and Electronic, University of Calcutta, India, on 19 - 20 December 2019. It includes recent research in the field of nanomaterials, devices and circuits; microwave and light wave technology; communication and space science; and computer applications and control.
This book introduces readers to a reconfigurable chip architecture for future wireless communication systems, such as 5G and beyond. The proposed architecture perfectly meets the demands for future mobile communication solutions to support different standards, algorithms, and antenna sizes, and to accommodate the evolution of standards and algorithms. It employs massive MIMO detection algorithms, which combine the advantages of low complexity and high parallelism, and can fully meet the requirements for detection accuracy. Further, the architecture is implemented using ASIC, which offers high energy efficiency, high area efficiency and low detection error. After introducing massive MIMO detection algorithms and circuit architectures, the book describes the ASIC implementation for verifying the massive MIMO detection. In turn, it provides detailed information on the proposed reconfigurable architecture: the data path and configuration path for massive MIMO detection algorithms, including the processing unit, interconnections, storage mechanism, configuration information format, and configuration method.
This book comprises selected peer-reviewed papers from the International Conference on VLSI, Signal Processing, Power Systems, Illumination and Lighting Control, Communication and Embedded Systems (VSPICE-2019). The contents are divided into five broad topics - VLSI and embedded systems, signal processing, power systems, illumination and control, and communication and networking. The book focuses on the latest innovations, trends, and challenges encountered in the different areas of electronics and communication, and electrical engineering. It also offers potential solutions and provides an insight into various emerging areas such as image fusion, bio-sensors, and underwater sensor networks. This book can prove to be useful for academics and professionals interested in the various sub-fields of electronics and communication engineering.
Focusing on soft computing techniques and application in various engineering research domains, this book presents the state-of-the-art outcomes from ongoing research works being conducted in various research laboratories and educational institutions. The included research works deal with estimated models and give resolutions to complex real-life issues. In the field of evolutionary computing and other domains of applications, such as, data mining and fuzzy logic, soft computing techniques play an incomparable role, where it successfully handles contemporary computationally intensive and complex problems that have usually appeared to be inflexible to traditional mathematical methods. Comprising the concepts and applications of soft computing with other emerging research domains, this book cherishes varieties of modern applications in the fields of natural language processing, image processing, biomedical engineering, communication, control systems, circuit design etc.
This book focuses on core functionalities for wireless real-time multi-hop networking with TDMA (time-division multiple access) and their integration into a flexible, versatile, fully operational, self-contained communication system. The use of wireless real-time communication technologies for the flexible networking of sensors, actuators, and controllers is a crucial building block for future production and control systems. WirelessHART and ISA 100.11a, two technologies that have been developed predominantly for industrial use, are currently available. However, a closer analysis of these approaches reveals certain deficits. Current research on wireless real-time communication systems shows potential to remove these limitations, resulting in flexible, versatile, and robust solutions that can be implemented on today's low-cost and resource-constrained hardware platforms. Unlike other books on wireless communication, this book presents protocols located on MAC layer and above, and build on the physical (PHY) layer of standard wireless communication technologies.
This book provides applications of wireless sensor networks (WSN) in environmental monitoring, with an emphasis on livestock disease detection and agricultural management in Africa to aid farmers. This proposed system entails current and innovative monitoring technologies intended to improve agricultural conditions in Africa, with a focus on Botswana, and addresses the Internet of Things (IoT) as a set of remote monitoring protocols using WSNs to improve and ensure proper environmental maintenance. In this book, the author introduces WSNs, and how the IoT can be applied to develop a system of "smart agriculture" in Africa, taking into account livestock health, climate change impacts on crops and wildlife, and technological innovations in response to climate change such as windmills and solar panels. The book will be interesting to students and researchers in engineering and life sciences, as well as practitioners working with sensing technologies for agricultural monitoring and improvement.
This book presents reinforcement learning (RL) based solutions for user-centric online network selection optimization. The main content can be divided into three parts. The first part (chapter 2 and 3) focuses on how to learning the best network when QoE is revealed beyond QoS under the framework of multi-armed bandit (MAB). The second part (chapter 4 and 5) focuses on how to meet dynamic user demand in complex and uncertain heterogeneous wireless networks under the framework of markov decision process (MDP). The third part (chapter 6 and 7) focuses on how to meet heterogeneous user demand for multiple users inlarge-scale networks under the framework of game theory. Efficient RL algorithms with practical constraints and considerations are proposed to optimize QoE for realizing intelligent online network selection for future mobile networks. This book is intended as a reference resource for researchers and designers in resource management of 5G networks and beyond.
This book gathers selected research papers presented at the International Conference on Power, Control and Communication Infrastructure 2019 (ICPCCI 2019), organized by the Institute of Infrastructure, Technology, Research and Management (IITRAM), Ahmedabad, Gujarat, India, on July 4-5, 2019. It presents technological developments in the fields of communications infrastructure which comprise of architecture, products, and network connections that allow for communications over the long distances. The book includes some innovative ideas in the field of communication infrastructure, specially satellite communication, navigation systems, artificial neural network, encryption techniques, and some other infrastructure-related developments. The solution approaches provided in this book encourage and inspire researchers, industry professionals, and policymakers to put these methods into practice.
This book provides a comprehensive overview of signal filtering, including an introduction, definitions of the terms and algorithms for numerical calculation of the properties of the transfer function in frequency and time domains. All the chapters discuss the theoretical background and explain the underlying algorithms including the iterative numerical procedures necessary to obtain the solutions. It starts by considering polynomial filters, offering a broad range of solutions and introducing critical monotonic passband amplitude characteristics (CMAC). It also describes modifications to the classical Chebyshev and elliptic filters to overcome their limitations. In the context linear phase low-pass prototypes, it presents filters approximating constant group delay in the equi-ripple manner for the first time. Further, it discusses new procedures to improve the selectivity of all polynomial filters by introducing transmission zeros, such as filters with multiple transmission zeros on the omega axis, as well as phase correction of selective filters for both low-pass and band-pass filters. Other topics explored include linear phase all-pass (exhibiting low-pass group delay approximation) filters; all-pass filters (exhibiting band-pass group delay approximation) with linear and parabolic phase synthesized directly as band-pass; high-pass, and band-stop amplitude characteristic frequency transformations to produce band-pass; and direct synthesis of linear and parabolic phase selective band-pass filters synthesized directly as band-pass. Lastly, for system (physical) synthesis, the book describes the algorithms and procedures for the following: cascade passive LC; active cascade RC; active parallel RC (for the first time); active parallel SC; Gm-C based on LC prototypes; and parallel IIR based on bilinear transformation of analog prototypes. Every algorithm, be it in transfer function synthesis or in system synthesis, is accompanied by a proper nontrivial comprehensive example produced by the RM software.
A comprehensive presentation of the video communication techniques and systems, this book examines 4G wireless systems which are set to revolutionise ubiquitous multimedia communication."4G Wireless Video Communications" covers the fundamental theory and looks at systems' descriptions with a focus on digital video. It addresses the key topics associated with multimedia communication on 4G networks, including advanced video coding standards, error resilience and error concealment techniques, as well as advanced content-analysis and adaptation techniques for video communications, cross-layer design and optimization frameworks and methods. It also provides a high-level overview of the digital video compression standard MPEG-4 AVC/H.264 that is expected to play a key role in 4G networks. Material is presented logically allowing readers to turn directly to specific points of interest. The first half of the book covers fundamental theory and systems, while the second half moves onto advanced techniques and applications. This book is a timely reflection of the latest advances in video communications for 4G wireless systems.One of the first books to study the latest video communications developments for emerging 4G wireless systemsConsiders challenges and techniques in video delivery over 4G wireless systemsExamines system architecture, key techniques and related standards of advanced wireless multimedia applicationsWritten from both the perspective of industry and academia
This book is focused on wireless infrastructure deployment in modern transportation markets, where the wireless infrastructure co-exists with the existing structure. It details the challenges this deployment may face and explores the mitigation measures to overcome the challenges. The book proposes a smart antenna structure to overcome airspace congestion, which improves the overall wireless performance and deployment cost. With the combination of practical know-how and theoretical estimation, this book provides insight on how the modern smart antenna techniques that support most cutting-edge wireless technology can be adopted into the existing infrastructure whilst minimising the distraction to the existing system. This book is suitable for industrial and academic researchers, practising engineers within the field of smart antennae, and wireless infrastructure designers and developers.
This book gathers high-quality peer-reviewed research papers presented at the International Conference on Intelligent Computing and Networking (IC-ICN 2020), organized by the Computer Department, Thakur College of Engineering and Technology, in Mumbai, Maharashtra, India, on February 28-29, 2020. The book includes innovative and novel papers in the areas of intelligent computing, artificial intelligence, machine learning, deep learning, fuzzy logic, natural language processing, human-machine interaction, big data mining, data science and mining, applications of intelligent systems in healthcare, finance, agriculture and manufacturing, high-performance computing, computer networking, sensor and wireless networks, Internet of Things (IoT), software-defined networks, cryptography, mobile computing, digital forensics and blockchain technology.
This book provides an overview of technologies to maximize the quality of user experience for mobile, data-centric applications. Chapters cover techniques mobile network operators can use to maximize the effectiveness of congested networks, techniques that mobile application developers can use to minimize the impact of congested networks on user experience, and techniques that websites and data center operators can use to support a growing number of mobile users. With no technical jargon and a practical approach, this book offers a useful resource for a wide range of mobile network developers and managers. |
You may like...
Learn Italian with Sherlock Holmes A…
Sir Arthur Conan Doyle, Weeve Languages
Paperback
R454
Discovery Miles 4 540
Learn Irish with Sherlock Holmes The…
Sir Arthur Conan Doyle, Weeve Languages
Paperback
R456
Discovery Miles 4 560
Learn German with Sherlock Holmes The…
Sir Arthur Conan Doyle, Weeve Languages
Paperback
R456
Discovery Miles 4 560
Learn French with Sherlock Holmes The…
Sir Arthur Conan Doyle, Weeve Languages
Paperback
R456
Discovery Miles 4 560
Learn Portuguese with The Great Gatsby…
F. Scott Fitzgerald, Weeve Languages
Paperback
R454
Discovery Miles 4 540
Learn French with Sherlock Holmes A…
Sir Arthur Conan Doyle, Weeve Languages
Paperback
R345
Discovery Miles 3 450
Learn French With Pride and Prejudice…
Jane Austen, Weeve Languages
Paperback
R473
Discovery Miles 4 730
|