![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
Since the discovery of electromagnetic waves less than 150 years ago, the application of wireless communications technology has not only revolutionized our daily lives, but also fundamentally changed the course of world history. A Brief History of Everything Wireless charts the fascinating story of wireless communications. The book leads the reader on an intriguing journey of personal triumphs and stinging defeats, relating the prominent events, individuals and companies involved in each progressive leap in technology, with a particular focus on the phenomenal impact of each new invention on society. Beginning at the early days of spark-gap transmitters, this tale touches on the emergence of radio and television broadcasting, as well as radio navigation and radar, before moving on to the rise of satellite, near-field and light-based communications. Finally, the development of wireless home networks and the explosive growth of modern cellular technologies are revealed, complete with a captivating account of their corresponding company histories and behind-the-scenes battles over standards. For those wishing to peek behind the magic curtain of friendly user interfaces and clever engineering, and delve further into various processes underlying the ubiquitous technology we depend upon yet take for granted, the book also contains special "TechTalk" chapters that explain the theoretical basics in an intuitive way.
This two-volume set LNICST 280-281 constitutes the post-conference proceedings of the 10th EAI International Conference on Wireless and Satellite Services, WiSATS 2019, held in Harbin, China, in January 2019. The conference was formerly known as the International Conference on Personal Satellite Services (PSATS) mainly covering topics in the satellite domain. The 137 full papers were carefully reviewed and selected from 289 submissions. The papers are organized in topical sections on machine learning for satellite-terrestrial networks, human-machine interactive sensing, monitoring, and communications, integrated space and onboard networks, intelligent signal processing, wireless communications and networks, vehicular communications and networks, intelligent 5G communication and digital image processing technology, security, reliability and resilience in internet of things, advances in communications and computing for internet of things.
This book constitutes the proceedings of the Second International Conference on 5G for Future Wireless Networks, 5GWN 2019, held in Changsa, China, in February 2019. The 13 full papers were selected from 34 submissions and present the state of the art and practical applications of 5G technologies. The papers are arranged thematically on optimization theory and applications, intelligent computing technology for 5G applications, resource allocation and management, and security and privacy in emerging 5G applications.
This concise reference book for Android Studio 3 presents the essential Android Studio functions in a well-organized format that can be used as a handy reference. It will quickly demonstrate the usage of the Android Studio IDE to build an Android mobile app step by step. You won't find any technical jargon, bloated samples, drawn out history lessons, or witty stories in this book. What you will find is a reference that is concise, to the point and highly accessible. The Android Studio IDE Quick Reference is packed with useful information and is a must-have for any mobile or Android app developer or programmer. What You Will Learn Discover the workflow basics in Android Studio 3 Make tasks efficient with keyboard shortcuts Carry out unit testing in Android Studio 3 Use time-saving techniques such as templates Master debugging basics Configure your project using Gradle Use the profiler to monitor app performance Who This Book Is For Those who already know how to build applications in Android using Java. This book will serve as a handy and quick reference on how to get things done in Android Studio 3.
This SpringerBrief introduces the current research status on emerging multiple access schemes for mMTC, which provides an integrated reference for future research works. A brief introduction on mMTC scenario is provided, and then the suitable random access procedure is discussed. Various multiple access schemes for mMTC are also described and analyzed in detail. It assumes a background in communication theory and wireless communication fundamentals. With the thriving of Internet of Things (IoT) industry, an emerging scenario named massive machine-type communication (mMTC) is considered in the future 5G networks. One main challenge in mMTC is how to support massive connections with limited radio resources and low energy consumption. Therein, novel multiple access scheme is the key to overcome the challenge. This SpringerBrief targets researchers and engineers, who are engaged in 5G and future IoT related communications system. It can also be a used as a reference book or a secondary text for graduate students, who major in communications.
5G is becoming a critically important supporting technology for industrial evolvement.The World of 5G series consists of five salient volumes - Internet of Everything, Intelligent Manufacturing, Intelligent Home, Intelligent Transportation, and Intelligent Medicine.Aim to capture new opportunities brought by 5G, this compendium set focuses on the key technologies, requirements, users' experiences, industry applications, and industrial reforms from the perspective of experts, and comprehensively introduces the related knowledge of 5G.These reference volumes inform readers the essences of 5G, potential changes to the development of public life and society brought by 5G, as well as the potential security and risks such as the legal, moral and ethical aspects.The set also prominently reflects the latest business status in different industrial and social fields, and the great changes that follow.
This book covers ideas, methods, algorithms, and tools for the in-depth study of the performance and reliability of dependable fault-tolerant systems. The chapters identify the current challenges that designers and practitioners must confront to ensure the reliability, availability, and performance of systems, with special focus on their dynamic behaviors and dependencies. Topics include network calculus, workload and scheduling; simulation, sensitivity analysis and applications; queuing networks analysis; clouds, federations and big data; and tools. This collection of recent research exposes system researchers, performance analysts, and practitioners to a spectrum of issues so that they can address these challenges in their work.
This book is a collection of papers from international experts presented at International Conference on NextGen Electronic Technologies (ICNETS2-2016). ICNETS2 encompassed six symposia covering all aspects of electronics and communications domains, including relevant nano/micro materials and devices. Presenting recent research on wireless communication networks and Internet of Things, the book will prove useful to researchers, professionals and students working in the core areas of electronics and their applications, especially in signal processing, embedded systems and networking.
This book presents the outcomes of the workshop sponsored by the National Natural Sciences Foundation of China and the UK Newton Fund, British Council Researcher Links. The Workshop was held in Harbin, China, from 14 to 17 July 2017, and brought together some thirty young (postdoctoral) researchers from China and the UK specializing in geosciences, sensor signal networks and their applications to natural disaster recovery. The Workshop presentations covered the state of the art in the area of disaster recovery and blended wireless sensor systems that act as early warning systems to mitigate the consequences of disasters and function as post-disaster recovery vehicles. This book promotes knowledge transfer and helps readers explore and identify research opportunities by highlighting research outcomes in the internationally relevant area of disaster recovery and mitigation.
This book comprises selected articles from the International Communications Conference (ICC) 2018 held in Hyderabad, India in 2018. It offers in-depth information on the latest developments in voice-, data-, image- and multimedia processing research and applications, and includes contributions from both academia and industry.
This book presents comprehensive coverage of current and emerging multiple access, random access, and waveform design techniques for 5G wireless networks and beyond. A definitive reference for researchers in these fields, the book describes recent research from academia, industry, and standardization bodies. The book is an all-encompassing treatment of these areas addressing orthogonal multiple access and waveform design, non-orthogonal multiple access (NOMA) via power, code, and other domains, and orthogonal, non-orthogonal, and grant-free random access. The book builds its foundations on state of the art research papers, measurements, and experimental results from a variety of sources.
This SpringerBrief covers the security and privacy challenges in fog computing, and proposes a new secure and privacy-preserving mechanisms to resolve these challenges for securing fog-assisted IoT applications. Chapter 1 introduces the architecture of fog-assisted IoT applications and the security and privacy challenges in fog computing. Chapter 2 reviews several promising privacy-enhancing techniques and illustrates examples on how to leverage these techniques to enhance the privacy of users in fog computing. Specifically, the authors divide the existing privacy-enhancing techniques into three categories: identity-hidden techniques, location privacy protection and data privacy enhancing techniques. The research is of great importance since security and privacy problems faced by fog computing impede the healthy development of its enabled IoT applications. With the advanced privacy-enhancing techniques, the authors propose three secure and privacy-preserving protocols for fog computing applications, including smart parking navigation, mobile crowdsensing and smart grid. Chapter 3 introduces identity privacy leakage in smart parking navigation systems, and proposes a privacy-preserving smart parking navigation system to prevent identity privacy exposure and support efficient parking guidance retrieval through road-side units (fogs) with high retrieving probability and security guarantees. Chapter 4 presents the location privacy leakage, during task allocation in mobile crowdsensing, and propose a strong privacy-preserving task allocation scheme that enables location-based task allocation and reputation-based report selection without exposing knowledge about the location and reputation for participators in mobile crowdsensing. Chapter 5 introduces the data privacy leakage in smart grid, and proposes an efficient and privacy-preserving smart metering protocol to allow collectors (fogs) to achieve real-time measurement collection with privacy-enhanced data aggregation. Finally, conclusions and future research directions are given in Chapter 6. This brief validates the significant feature extension and efficiency improvement of IoT devices without sacrificing the security and privacy of users against dishonest fog nodes. It also provides valuable insights on the security and privacy protection for fog-enabled IoT applications. Researchers and professionals who carry out research on security and privacy in wireless communication will want to purchase this SpringerBrief. Also, advanced level students, whose main research area is mobile network security will also be interested in this SpringerBrief.
This textbook introduces Wireless Powered Communication Networks (WPCNs) as a promising paradigm to overcome the energy bottleneck suffered by traditional wireless communication networks, as well as emerging Internet-of-Things networks. It selectively spans a coherent spectrum of fundamental aspects in WPCNs, such as wireless energy transfer (WEH) techniques, radio frequency (RF) energy harvesting receiver model, simultaneous wireless information and power transfer (SWIPT), as well as the rate-energy tradeoff arising from the joint transmission of information and energy using the same waveform. It covers network models for WPCNs, including the baseline and dual-hop WPCN models and a variety of related extensions. This book further examines the key factors including throughput, fairness, and security that must be taken into account for impeccable operation of WPCNs. The new IoT applications are targeted as a key element in those factors. It will also include exercises and examples throughout the book, as well as their PLS solutions. This is the first textbook examining the current research to provide a unified view of wireless power transfer (WPT) and information transmission in WPCNs from a physical layer security (PLS) perspective. Focused on designing efficient secure transmission schemes, analyzing energy evolvement process, and evaluating secrecy outage performance under different channel state information (CSI), the results presented in this book shed light on how to best balance security and throughput with prudent use of harvested energy in WCNs. It also provides an overview of the WPCNs by introducing the background of WPT, followed by a summary of the research conducted in the field. The authors describe the physical-layer security (PLS) problem in WPCNs, including the causes and the impacts of the problem on the performance of WPCNs. The authors extend the discussions by introducing the applications of WPCNs in the IoT. From the Internet of Things (IoT) point of view, this textbook reviews the opportunities and challenges for the lately-emerged WPCN to seamlessly integrate into the IoT ecosystem. It specifically addresses the maximization problem of uplink and downlink sum-throughout in a dual-hop WPCN, while taking fairness among WPCN users as a constraint. The results provided in this book reveal valuable insights into improving the design and deployment of future WPCNs in the upcoming IoT environment. This textbook targets advanced-level students studying wireless communications and research engineers working in this field. Industry engineers in mobile device and network development business with an interest in WPCNs and IoT, as well as their PLS solutions, will also find this book useful.
This book constitutes the refereed post-conference proceedings of the 11th International Conference on Wireless Internet , WiCON 2018, held in Taipei, Taiwan, in October 2018. The 36 full papers were selected from 79 submissions and are grouped into the following topics: wireless network, artificial intelligence, security, IoT, location-based services, financial applicatiosn, vehicular ad hoc network, services and applications.
This book features selected papers presented at Third International Conference on Nanoelectronics, Circuits and Communication Systems (NCCS 2017). Covering topics such as MEMS and nanoelectronics, wireless communications, optical communication, instrumentation, signal processing, Internet of Things, image processing, bioengineering, green energy, hybrid vehicles, environmental science, weather forecasting, cloud computing, renewable energy, RFID, CMOS sensors, actuators, transducers, telemetry systems, embedded systems, and sensor network applications in mines, it is a valuable resource for young scholars, researchers, and academics.
This handbook covers the fundamental principles and theory, and the state-of-the-art research, systems and applications, in the area of mobility data privacy. It is primarily addressed to computer science and statistics researchers and educators, who are interested in topics related to mobility privacy. This handbook will also be valuable to industry developers, as it explains the state-of-the-art algorithms for offering privacy. By discussing a wide range of privacy techniques, providing in-depth coverage of the most important ones, and highlighting promising avenues for future research, this handbook also aims at attracting computer science and statistics students to this interesting field of research. The advances in mobile devices and positioning technologies, together with the progress in spatiotemporal database research, have made possible the tracking of mobile devices (and their human companions) at very high accuracy, while supporting the efficient storage of mobility data in data warehouses, which this handbook illustrates. This has provided the means to collect, store and process mobility data of an unprecedented quantity, quality and timeliness. As ubiquitous computing pervades our society, user mobility data represents a very useful but also extremely sensitive source of information. On one hand, the movement traces that are left behind by the mobile devices of the users can be very useful in a wide spectrum of applications such as urban planning, traffic engineering, and environmental pollution management. On the other hand, the disclosure of mobility data to third parties may severely jeopardize the privacy of the users whose movement is recorded, leading to abuse scenarios such as user tailing and profiling. A significant amount of research work has been conducted in the last 15 years in the area of mobility data privacy and important research directions, such as privacy-preserving mobility data management, privacy in location sensing technologies and location-based services, privacy in vehicular communication networks, privacy in location-based social networks, privacy in participatory sensing systems which this handbook addresses.. This handbook also identifies important privacy gaps in the use of mobility data and has resulted to the adoption of international laws for location privacy protection (e.g., in EU, US, Canada, Australia, New Zealand, Japan, Singapore), as well as to a large number of interesting technologies for privacy-protecting mobility data, some of which have been made available through open-source systems and featured in real-world applications.
This book presents recent advances in intrusion detection systems (IDSs) using state-of-the-art deep learning methods. It also provides a systematic overview of classical machine learning and the latest developments in deep learning. In particular, it discusses deep learning applications in IDSs in different classes: generative, discriminative, and adversarial networks. Moreover, it compares various deep learning-based IDSs based on benchmarking datasets. The book also proposes two novel feature learning models: deep feature extraction and selection (D-FES) and fully unsupervised IDS. Further challenges and research directions are presented at the end of the book. Offering a comprehensive overview of deep learning-based IDS, the book is a valuable reerence resource for undergraduate and graduate students, as well as researchers and practitioners interested in deep learning and intrusion detection. Further, the comparison of various deep-learning applications helps readers gain a basic understanding of machine learning, and inspires applications in IDS and other related areas in cybersecurity.
This book constitutes the thoroughly refereed conference proceedings of the 12th International Conference on Cognitive Radio Oriented Wireless Networks, CROWNCOM 2017, held in Lisbon, Portugal, in September 2017. The 28 revised full papers presented were carefully reviewed and selected from numerous submissions and cover the evolution of cognitive radio technology pertaining to 5G networks. The papers are clustered to topics on spectrum management; network management; trials, test beds, and tools; PHY and sensing; spectrum management.
Wireless communications have become indispensable part of our lives. The book deals with the security of such wireless communication. The technological background of these applications have been presented in detail. Special emphasis has been laid on the IEEE 802.11x-standards that have been developed for this technology. A major part of the book is devoted to security risks, encryption and authentication. Checklists have been provided to help IT administrators and security officers to achieve the maximum possible security in their installations, when using wireless technology. This is the second edition of the book. The updates include the latest the IEEE 802.11-standard, an updated chapter on PDA, the increased relevance of smart phones and tablets, widespread use of WLAN with increased security risks.
This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the Internet of Things (IoT). Technically, this book categorizes and introduces a collection of secure and privacy-preserving data communication schemes/protocols in three traditional scenarios of IoT: wireless sensor networks, smart grid and vehicular ad-hoc networks recently. This book presents three advantages which will appeal to readers. Firstly, it broadens reader's horizon in IoT by touching on three interesting and complementary topics: data aggregation, privacy protection, and key agreement and management. Secondly, various cryptographic schemes/protocols used to protect data confidentiality and integrity is presented. Finally, this book will illustrate how to design practical systems to implement the algorithms in the context of IoT communication. In summary, readers can simply learn and directly apply the new technologies to communicate data in IoT after reading this book.
This book provides a dual perspective on the Internet of Things and ubiquitous computing, along with their applications in healthcare and smart cities. It also covers other interdisciplinary aspects of the Internet of Things like big data, embedded Systems and wireless Sensor Networks. Detailed coverage of the underlying architecture, framework, and state-of the art methodologies form the core of the book.
This book presents the design requirements of antenna integration for modern commercial devices such as smartphones, dongles, and access points. Practical use-case scenarios of smartphone and the design process of the antenna system for the same are highlighted. The feasibility of scaling up sub-6GHz to mmWave antennas is also discussed in detail followed by a plethora of design examples which could be panel mounted to modern-day commercial smartphones. The unique requirement of gain switchability is introduced with feasible practical antenna designs. High efficiency antennas for 5G base stations is introduced along with a design example on planar all-metallic antenna. Beam switchability requirement for base station is illustrated with a couple of compact antenna system examples. Variety of feeding techniques for mmWave antennas is elaborated in this book. Finally, low-cost antenna designs for future wireless devices are illustrated.
The success of all-IP networking and wireless technology has changed the ways of living the people around the world. The progress of electronic integration and wireless communications is going to pave the way to offer people the access to the wireless networks on the fly, based on which all electronic devices will be able to exchange the information with each other in ubiquitous way whenever necessary. The aim of the volume is to provide latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of broadband and wireless computing. This proceedings volume presents the results of the 11th International Conference on Broad-Band Wireless Computing, Communication And Applications (BWCCA-2016), held November 5-7, 2016, at Soonchunhyang University, Asan, Korea.
Examine the challenges of 4G in the light of impending and crucial future communication needs, and review the lessons learned from an implementation and system operation perspective with an eye towards the next generation - 5G. You'll investigate key changes and additions to 5G in terms of use cases. You'll also learn about the applications for and explorations of the technology. Among all of the technological disruptions, two stand out in particular - mmWave and spectrum sharing technologies. Rolling Out 5G features detailed coverage of these two critical topics, and for the first time among 5G learning resources presents a holistic perspective on key ingredients for mobile communication in a 5G world. The authors represent highly experienced experts with valuable know-how in the field of wireless communications related research projects defining future technological trends. This unique group of talents will be able to consider the 5G technology evolution from all angles mentioned: long-term research, standardization and regulation, product design and marketization. This approach allows this much-needed book to capture the views of all key decision making stake-holders involved in the 5G definition process, and to serve readers in their roles connected with wireless communication's next generation of products and services. What You'll Learn See how 5G is expected to overcome 4G insufficiencies and challenges Examine expected 5G features, including usage of millimeter wave communication and licensed shared access Review key milestones of the next generation wireless communication technology including key standardization and regulation bodies Study new technologies and upcoming changes in feature sets and client expectations. Who This Book Is For Engineers of mobile device and infrastructure manufacturing industries, development engineers of semiconductor manufacturing industries, and engineers with a general interest in the field. Mobile network operators, along with students and business professionals in the telecommunications domain will also find the topic of interest.
This book focuses on determination of scattering of parallel-fed planar dipole arrays in terms of reflection and transmission coefficients at different levels of the array system. In aerospace vehicles, the phased arrays are often in planar configuration. The radar cross section (RCS) of the vehicle is mainly due to its structure and the antennas mounted over it. There can be situation when the signatures due to antennas dominate over the structural RCS of the platform. This necessitates the study towards the reduction and control of antenna/ array RCS. The planar dipole array is considered as a stacked linear dipole array. A systematic, step-by-step approach is used to determine the RCS pattern including the finite dimensions of dipole antenna elements. The mutual impedance between the dipole elements for planar configuration is determined. The scattering till second-level of couplers in parallel feed network is taken into account. The phase shifters are modelled as delay line. All the couplers in the feed network are assumed to be four port devices. It is shown that the array RCS can be reduced considerably for a low observable platform by an optimization of array design parameters even in the presence of mutual coupling. This book presents a systematic step-by-step analytical formulation for RCS of planar half-wavelength centre-fed dipole arrays through various schematics and illustrations. The analytical description and analysis provided in this book should be useful for students, researchers, and design engineers of phased arrays. |
You may like...
Handbook of Research on Emerging Designs…
Jamal Zbitou, Mostafa Hefnawi, …
Hardcover
R8,027
Discovery Miles 80 270
Cross-Layer Resource Allocation in…
Ana I. Perez-Neira, Marc Realp Campalans
Hardcover
R1,930
Discovery Miles 19 300
Handbook of Research on Advanced…
Niranjan K. Ray, Ashok Kumar Turuk
Hardcover
R7,161
Discovery Miles 71 610
RF / Microwave Circuit Design for…
Ulrich L. Rohde, Matthias Rudolph
Hardcover
R4,952
Discovery Miles 49 520
Ubiquitous Intelligence and Computing
Braylen Stevenson
Hardcover
The COVID-19 Pandemic and the…
Floribert Patrick Calvain Endong
Hardcover
R5,848
Discovery Miles 58 480
Wireless Sensor and Actuator Networks…
Roberto Verdone, Davide Dardari, …
Hardcover
R2,237
Discovery Miles 22 370
Wireless Mesh Networks for IoT and Smart…
Luca Davoli, Gianluigi Ferrari
Hardcover
Computing in Communication Networks…
Frank H. P. Fitzek, Fabrizio Granelli, …
Paperback
R2,667
Discovery Miles 26 670
|