![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
This book presents how multimedia data analysis, information retrieval and indexing are central for comprehensive, personalized, adaptive quality care and the prolongation of independent living at home. With sophisticated technologies in monitoring, diagnosis, and treatment, multimodal data plays an increasingly central role in healthcare. Experts in computer vision, image processing, medical imaging, biomedical engineering, medical informatics, physical education and motor control, visual learning, nursing and human sciences, information retrieval, content based image retrieval, eHealth, information fusion, multimedia communications and human computer interaction come together to provide a thorough overview of multimedia analysis in medicine and daily life.
The Newnes Know It All Series takes the best of what our authors
have written to create hard-working desk references that will be an
engineer's first port of call for key information, design
techniques and rules of thumb. Guaranteed not to gather dust on a
shelf
ZigBee is a standard based on the IEEE 802.15.4 standard for
wireless personal networks. This standard allows for the creation
of very lost cost and low power networks - these applications run
for years rather than months. These networks are created from
sensors and actuators and can wireless control many electrical
products such as remote controls, medical, industrial, and security
sensors.
Over the past decade, the world has witnessed an explosion in the
development and deployment of new wireless network technologies.
From cellular mobile telephony to the ubiquitous "WiFi" networks in
coffee-shops and airports, to the emerging WiMAX wireless broadband
access networks, the menu of wireless access systems has become so
comprehensive that wireline access to user devices may soon become
a relic of the past. Wireless Networking serves as a one-stop view
of cellular, WiFi, and WiMAX networks, as well as the emerging
wireless ad hoc and sensor networks. Rather than provide
descriptive accounts of these technologies and standards, the book
emphasizes conceptual perspectives on the modeling, analysis,
design and optimization of such networks. Furthermore, the authors
present wireless networking within the unifying framework of
resource allocation, using simple abstractions of the underlying
physical wireless communication. In short, Wireless Networking is
an in-depth, exhaustive, and invaluable asset to anyone working in
this rapidly evolving field.
Wireless technology and handheld devices are dramatically changing the degrees of interaction throughout the world, further creating a ubiquitous network society. The emergence of advanced wireless telecommunication technologies and devices in today's society has increased accuracy and access rate, all of which are increasingly essential as the volume of information handled by users expands at an accelerated pace. The requirement for mobility leads to increasing pressure for applications and wireless systems to revolve around the concept of continuous communication with anyone, anywhere, and anytime. With the wireless technology and devices come ?exibility in network design and quicker deployment time. Over the past decades, numerous wireless telecommu- cation topics have received increasing attention from industry professionals, a- demics, and government agencies. Among these topics are the wireless Internet; multimedia; 3G/4G wireless networks and systems; mobile and wireless network security; wireless network modeling, algorithms, and simulation; satellite based s- tems; 802.11x; RFID; and broadband wireless access.
Microwave dielectric materials play a key role in our global
society with a wide range of applications, from terrestrial and
satellite communication including software radio, GPS, and DBS TV
to environmental monitoring via satellite.
Intra-system EMC problems are becoming increasingly common in
mobile devices, ranging from notebook PCs to cell phones, with
RF/wireless capbilities. These issues range from minor annoyances
to serious glitches which impede the functioning of the device.
This book gives a thourough review of electromagnetic theory
(including Maxwell's equations), discusses possible sources and
causes of intra-system interference, shows to use models and
analysis to discover potential sources of intra-system EMC in a
design, how to use appropriate tests and measurements to detect
intra-system EMC problems, and finally extensively discusses
measures to mitigate or totally eliminate intra-system EMC
problems. With more and more mobile devices incorporating wirless
capability (often with multiple wireless systems, such as Bluetooth
and WiFi), this book should be part of the reference shelf of every
RF/wireless engineer and mobile device designer.
Anyone who has ever shopped for a new smart phone, laptop, or other tech gadget knows that staying connected is crucial. There is a lot of discussion over which service provider offers the best coverage-enabling devices to work anywhere and at any time-with 4G and LTE becoming a pervasive part of our everyday language. The Handbook of Research on Next Generation Mobile Communication Systems offers solutions for optimal connection of mobile devices. From satellite signals to cloud technologies, this handbook focuses on the ways communication is being revolutionized, providing a crucial reference source for consumers, researchers, and business professionals who want to be on the frontline of the next big development in wireless technologies. This publication features a wide variety of research-based articles that discuss the future of topics such as bandwidth, energy-efficient power, device-to-device communication, network security and privacy, predictions for 5G communication systems, spectrum sharing and connectivity, and many other relevant issues that will influence our everyday use of technology.
Sealed Lead Acid...Nickel Cadmium...Lithium Ion...
Wireless sensor networks are currently being employed in a variety of applications ranging from medical to military, and from home to industry. Wireless Sensor Networks and Applications aims to provide a reference tool for the increasing number of scientists who depend upon sensor networks in some way. The topics covered include network design and modeling, network management, data management, security and applications. The topic covered in each chapter is given expository but also scholarly treatment, covering the history of the topic, reviewing state-of-the-art thinking relative to the topic, and discussing currently unsolved problems of special interest.
Securing communications is a challenging task. A ?rst attempt at security involves learning basic cryptography, and applying encryption algorithms to make messages unintelligible to adversaries. However, rarely is the task of securing a message - changesosimple.Whenonestepsbackandcontemplateshowtosecuretheexchange of communications, one realizes that the challenge is fundamentally one of bui- ing a complete solution. For example, one must ensure that all entities involved have proper and authenticated cryptographic material, or one must ensure that one veri?ably knows to whom one is communicating, or one must understand how the communication process takes place so as to make certain there are no vulnerabilities introduced by the communication process itself. Thislastissue, namelythatsecuritymethodsareoftenbuiltwithoutconsideration to how communication takes place, represents a fundamental gap where much of modern security research has fallen short.The security literature is ?lled with a mass of articles on cryptographic primitives and, although there are still many theoretical hurdlestobeovercomebythecryptographiccommunity,mostoftheseshortcomings areacademicandtherearenownumeroustextbooksoncryptographythatcanprovide thebasicintroductionneededtoemploycryptographicprimitives. Ontheothersideof thecoin,thesecurityliteratureisalso?lledwithamassofarticlesdevotedtobuilding secure protocols and, similarly, there are now numerous textbooks on computer securitythatprovidetheinstructionneededtodesignsecureprotocols.Unfortunately, the issue of how communication takes place or, more speci?cally, whether there are any speci?c issues that might arise or be circumvented because message exchanges aretakingplaceononemediumversusanother(e.g., wirelesscommunicationversus wired communication), is generally neglected.
This book provides an introduction to software-defined radio and cognitive radio, along with methodologies for applying knowledge representation, semantic web, logic reasoning and artificial intelligence to cognitive radio, enabling autonomous adaptation and flexible signaling. Readers from the wireless communications and software-defined radio communities will use this book as a reference to extend software-defined radio to cognitive radio, using the semantic technology described.
Advances in information technologies now enable the incorporation of Internet services into vehicles, allowing the transfer of digital data from the smart nodes inside the vehicle to central servers on the Internet. Telematics Communication Technologies and Vehicular Networks: Wireless Architectures and Applications examines critical issues involved with telematics such as vehicular network infrastructure, vehicular network communication protocols, and vehicular services and applications. A defining collection of latest findings and cutting-edge solutions, this highly esteemed reference publication provides useful techniques, tools, and assessments for those involved with computer science, computer engineering, and management information systems.
Awarded by the International Calabria's Prize!
This book presents the state of the art technologies and solutions to tackle the critical challenges faced by the building and development of the WSN and ecological monitoring system but also potential impact on society at social, medical and technological level. This book is dedicated to Sensing systems for Sensors, Wireless Sensor Networks and Ecological Monitoring. The book aims at Master and PhD degree students, researchers, practitioners, especially WSN engineers involved with ecological monitoring. The book will provide an opportunity of a dedicated and a deep approach in order to improve their knowledge in this specific field.
This book not only introduces the principles of INS, CNS and GNSS, the related filters and semi-physical simulation, but also systematically discusses the key technologies needed for integrated navigations of INS/GNSS, INS/CNS, and INS/CNS/GNSS, respectively. INS/CNS/GNSS integrated navigation technology has established itself as an effective tool for precise positioning navigation, which can make full use of the complementary characteristics of different navigation sub-systems and greatly improve the accuracy and reliability of the integrated navigation system. The book offers a valuable reference guide for graduate students, engineers and researchers in the fields of navigation and its control. Dr. Wei Quan, Dr. Jianli Li, Dr. Xiaolin Gong and Dr. Jiancheng Fang are all researchers at the Beijing University of Aeronautics and Astronautics.
Mobile Broadband Multimedia Networks: Techniques, Models and Tools
for 4th Generation Communication Networks provides the main results
of the prestigious and well known European COST 273 research
project on the development of next generation mobile and wireless
communication systems.
This book provides insight into the challenges in providing data authentication over wireless communication channels. The authors posit that established standard authentication mechanisms - for wired devices - are not sufficient to authenticate data, such as voice, images, and video over wireless channels. The authors propose new mechanisms based on the so-called soft authentication algorithms, which tolerate some legitimate modifications in the data that they protect. The authors explain that the goal of these algorithms is that they are tolerant to changes in the content but are still able to identify the forgeries. The authors go on to describe how an additional advantage of the soft authentication algorithms is the ability to identify the locations of the modifications and correct them if possible. The authors show how to achieve this by protecting the data features with the help of error correcting codes. The correction methods are typically based on watermarking, as the authors discuss in the book. Provides a discussion of data (particularly image) authentication methods in the presence of noise experienced in wireless communication; Presents a new class of soft authentication methods, instead of the standard hard authentication methods, used to tolerate minor changes in image data; Features authentication methods based on the usage of authentication tags as well as digital watermarks.
In the last few years, a stimulating idea is fast emergingin the wireless scenario: the pervasive presence around us of a variety of "things" or "objects," such as RFID, sensors, actuators, mobile phones, which, through unique addressing schemes, are able to interact with each other and cooperate with their neighboring "smart" c- ponents to reach common goals. This novel paradigm, named "The Internet of Things" (IoT) continues on the path set by the concept of smart environments and paves the way to the depl- ment of numerous applications with a signi cant impact on many elds of future every-day life. In this context, logistics, Intelligent Transportation Systems (ITS), business/process management, assisted living, and e-health are only a few examples of possible application elds in which this novel paradigm will play a leading role in the next future. Actually, manychallengingissues still needto be addressedand both technolo- calandsocialnodesuntiedbeforethe IoTideabeingwidelyaccepted.Centralissues are making a full interoperabilityof such devices possible, enablingtheir adaptation and autonomousbehavior, as well as guaranteeingtrust, privacy, and security. Also, the IoT idea poses several new problemsconcerningthe networkingaspects. In fact, the "things" composing the IoT will be characterized by low resources in terms of both computation and energy capacity. Accordingly, the proposed solutions need to payspecial attentionto resourceef ciencybesides the obviousscalability problems. The papers included in this volume present a picture of the current state of the art on the above issues; more speci cally, concepts and ideas are discussed on n- working, middleware, security and privacy, RFID and sensor networks, as well as electromagnetic aspects.
Vehicle accidents on the roads and highways occur every minute of every day, most often resulting in a loss of life or property damage. With advancing technology, vehicle infrastructure integration can increase road safety and transport efficiency through wireless sensor communications and other systems. These recent developments can bring inestimable economic value and will play a role in the next generation of vehicle products and traffic safety. Global Advancements in Connected and Intelligent Mobility: Emerging Research and Opportunities is an essential reference source that discusses the recent advances, safety, and efficiency in connected vehicles, as well as the next generation of communication network development. Featuring research on topics such as vehicular networks, telematics, and context-aware intelligence, this book is ideally designed for policymakers, traffic safety specialists, traffic control technicians, auto technicians, planning agencies, environmental managers, standardization governors, academicians, students, researchers, and industry practitioners seeking coverage on intelligent transportation systems.
For the technological progress in communication technology it is necessary that the advanced studies in circuit and software design are accompanied with recent results of the technological research and physics in order to exceed its limitations. This book is a guide which treats many components used in mobile communications, and in particular focuses on non-volatile memories. It emerges following the conducting line of the non-volatile memory in the wireless system: On the one hand it develops the foundations of the interdisciplinary issues needed for design analysis and testing of the system. On the other hand it deals with many of the problems appearing when the systems are realized in industrial production. These cover the difficulties from the mobile system to the different types of non-volatile memories. The book explores memory cards, multichip technologies, and algorithms of the software management as well as error handling. It also presents techniques of assurance for the single components and a guide through the Datasheet lectures.
In this brand new volume, Ian Poole begins with a fine introduction
to radio, suitable for almost all readers. ...the book is an
excellent way for neophytes to step into radio and learn something
about it. It begins with the basics and gradually brings in more
advanced concepts. We recommend it as an additon to the technical
libraries of intermediate-level technical readers. It is an
interesting read even for the advanced engineer. - QEX July/August
2004 |
You may like...
The Anthropology of Resource Extraction
Robert Jan Pijpers, Lorenzo D'Angelo
Hardcover
R4,218
Discovery Miles 42 180
|