Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
This book presents comprehensive coverage of current and emerging multiple access, random access, and waveform design techniques for 5G wireless networks and beyond. A definitive reference for researchers in these fields, the book describes recent research from academia, industry, and standardization bodies. The book is an all-encompassing treatment of these areas addressing orthogonal multiple access and waveform design, non-orthogonal multiple access (NOMA) via power, code, and other domains, and orthogonal, non-orthogonal, and grant-free random access. The book builds its foundations on state of the art research papers, measurements, and experimental results from a variety of sources.
In this book, three different methods are presented to enhance the capacity and coverage area in LTE-A cellular networks. The scope involves the evaluation of the effect of the RN location in terms of capacity and the determination of the optimum location of the relay that provides maximum achievable data rate for users with limited interference at the cell boundaries. This book presents a new model to enhance both capacity and coverage area in LTE-A cellular network by determining the optimum location for the RN with limited interference. The new model is designed to enhance the capacity of the relay link by employing two antennas in RN. This design enables the relay link to absorb more users at cell edge regions. An algorithm called the Balance Power Algorithm (BPA) is developed to reduce MR power consumption. The book pertains to postgraduate students and researchers in wireless & mobile communications.
Internet of Things (IoT)-enabled spaces have made revolutionary advances in the utility grid. Among these advances, intelligent and energy-efficient services are gaining considerable interest. The use of the smart grid is increasing day after day around us and is not only used in saving energy but also in our daily life for intelligent health, traffic, and even farming systems. The grid enabled with IoT features is also expected to communicate with cellular networks smoothly in the next-generation networks (6G and beyond). This will open the door for other interesting research areas. In this book, we consider the most significant and emergent research topics in this domain, addressing major issues and challenges in IoT-based solutions proposed for the smart grid. The chapters provide insight on comprehensive topics in IoT-based smart grids, combining technical aspects with the most up-to-date theory. It investigates the grid under varying and potential emerging paradigms such as edge/fog computing, in addition to big data aspects considerations in the IoT era. With comprehensive surveys and case studies, this book explores basic and high-level grid aspects in the emerging smart city paradigm, which makes it especially attractive to researchers, academics, and higher-level students. This authored book can be used by computer science undergraduate and postgraduate students, researchers and practitioners, city administrators, policymakers, and government regulators.
In the NGN world, no truer words are spoken than "the future is now." And the competition in the information networking arena will only intensify in the next 5-10 years. Choosing the correct NGN-VAS strategy now will set your company apart. Value Added Services for Next Generation Networks examines the quest for the real added value in modern communication systems. The author covers more than just the technology itself, but also examines how it is being used and how it could be used to gain a strategic advantage. The book starts with a SOTW analysis for PSTN/GSM operators and new entrants and the threats they will undoubtedly face. The author examines the fundamentals of genuine communication services and the service providers' starting position, then takes you on a tour through the landscape of NGN standards, contrasting the 3GPP IMS architecture with that of IETF, UMA, and OMA. He discusses practical ways to build an NGN SDP and the essential business aspects involved in this enterprise. The book highlights how, technically, the NGN can be interconnected, or glued, to the existing GSM/PSTN infrastructure, justifying the choice of protocols and network architecture. It also describes general concepts, architectural requirements, and technologies in modern VAS platform and new VAS for the NGN in terms of network implementation, end user experience, business scope, and cost/revenue projections. But is NGN just a game of investments in equipment, of CAPEX and OPEX savings? Is the so-called triple play just a matter of marketing, partnerships, and mergers? How will the market play out? Where will the NGN and VAS ultimately go? And more importantly, what is your NGN-VAS strategy? By addressing these questions and more, this book prepares you for success in the emerging telecommunications environment.
Resource allocation in wireless networks is traditionally
approached either through information theory or communications
networks. To break down the barriers between these distinct
approaches, this book (whose preparation is carried out under the
auspices of the EC Network of Excellence in Wireless Communications
NEWCOM++) bridges the physical and network layers by providing
cross-layer resource allocation techniques, models and
methodologies.
The book systematically introduces the design theory and method of multi-band RF filtering circuits for the modern wireless communication systems or radar systems, which are required to operate at multi-bands. These multi-band filtering RF circuits have drawn more and more attention from the engineers and scientists in the field of RF circuits design. The book proposes the detailed theoretical analysis and abundant experimental data of multi-mode resonators, multi-band bandpass filter with high selectivity, reflectionless multi-band bandpass filter, balanced filter with high suppression, slotline based multi-band balun filter, switchable filtering diplexer based on reused L-shape resonator and miniaturized 55-/95-GHz on-chip dual-band bandpass Filter. The book is intended for undergraduate and graduate students who are interested in filtering circuits design, researchers who are investigating RF & microwave systems, as well as design engineers who are working in the RF & microwave circuits field. Readers can get an in-depth understanding about the multi-band RF filtering circuits design theory and method.
Printed antennas have become an integral part of next-generation wireless communications and have been found to be commonly used to improve system capacity, data rate, reliability, etc. This book covers theory, design techniques, and the chronological regression of the printed antennas for various applications. This book will provide readers with the basic conceptual knowledge about antennas along with advanced techniques for antenna design. It covers a variety of analytical techniques and their CAD applications and discusses new applications of printed antenna technology such as sensing. The authors also present special reconfigurable antennas such as ME dipole, polarization, feeding, and DGS. The book will be useful to students as an introduction to design and applications of antennas. Additionally, experienced researchers in this field will find this book a ready reference and benefit from the techniques of research in printed antennas included in this book. Following are some of the salient features of this book: Covers a variety of analytical techniques and their CAD applications Discusses new applications of printed antenna technology such as sensing Examines the state of design techniques of printed antenna Presents special reconfigurable antennas such as ME dipole, polarization, feeding, and DGS
The text provides a comprehensive overview of the design aspects of the internet of things devices and covers the fundamentals of big data and data science. It explores various scenarios such as what are the middleware and frameworks available and how to build a stable, standards-based, and Secure internet of things device. It discusses important concepts including embedded programming techniques, machine-to-machine architecture, and the internet of things for smart city applications. It will serve as an ideal design book for professionals, senior undergraduate, and graduate students in the fields including electrical engineering, electronics and communication engineering, and computer engineering. The book- Covers applications and architecture needed to deliver solutions to end customers and readers. Discusses practical aspects of implementing the internet of things in diverse areas including manufacturing, and software development. Highlights big data concepts and embedded programming techniques. Presents technologies including machine to machine, integrated sensors, and radio-frequency identification. Introduces global system for mobile communication and precise details of standards based on internet of things architecture models. The book focuses on practical design aspects such as how to finalize a processor integrated circuit, which operating system to use, etc. in a single volume. It will serve as an ideal text for professionals, senior undergraduate, and graduate students in diverse engineering domains including electrical, electronics and communication, computer.
When choosing the technology options to develop a wireless sensor
network (WSN), it is vital that their performance levels can be
assessed for the type of application intended. This book describes
the different technology options - MAC protocols, routing
protocols, localisation and data fusion techniques - and provides
the means to numerically measure their performance, whether by
simulation, mathematical models or experimental test beds. Case
studies, based on the authors' direct experience of implementing
wireless sensor networks, describe the design methodology and the
type of measurements used, together with samples of the performance
measurements attained.
1. Understand the audit culture, challenges, and benefits of the CAE role in digitally transforming business environment in smart cities 2. Identify ways to advance the value of Internal Audit in digital era 3. Use and control the resources of the city efficiently, and to ensure that the system units work properly in an integrated way.
Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues
Since its recent introduction, the ZigBee protocol has created an
enormous amount of buzz in venues from magazine covers to trade
show floors to water coolers. Its promise of providing a simpler,
cheaper, more power-efficient WPAN (Wireless Personal Area Network)
alternative to WiFi and Bluetooth has opened up new data collection
possibilities in application areas from industrial controls to
medical devices to intruder alarms. Yet, despite this widespread
interest, there is still little information available that goes
beyond detailing the spec itself. Missing from the current ZigBee
lexicon is practical, application-oriented guidance from an expert,
specifically geared to aid engineers in implementing this new
technology. Enter respected designer and popular columnist Fred
Eady! With his new book, he provides the only comprehensive how-to
ZigBee guide available.
Wireless Sensor Networks presents the latest practical solutions to the design issues presented in wireless-sensor-network-based systems. Novel features of the text, distributed throughout, include workable solutions, demonstration systems and case studies of the design and application of wireless sensor networks (WSNs) based on the first-hand research and development experience of the author, and the chapters on real applications: building fire safety protection; smart home automation; and logistics resource management. Case studies and applications illustrate the practical perspectives of: * sensor node design; * embedded software design; * routing algorithms; * sink node positioning; * co-existence with other wireless systems; * data fusion; * security; * indoor location tracking; * integrating with radio-frequency identification; and * Internet of things Wireless Sensor Networks brings together multiple strands of research in the design of WSNs, mainly from software engineering, electronic engineering, and wireless communication perspectives, into an over-arching examination of the subject, benefiting students, field engineers, system developers and IT professionals. The contents have been well used as the teaching material of a course taught at postgraduate level in several universities making it suitable as an advanced text book and a reference book for final-year undergraduate and postgraduate students.
This is an open access book. Important tasks must be completed on time and with guaranteed quality; that is the consensus reached by system designers and users. However, for too long, important tasks have often been given unnecessary urgency, and people intuitively believe that important tasks should be executed first so that their performance can be guaranteed. Actually, in most cases, their performance can be guaranteed even if they are executed later, and the "early" resources can be utilized for other, more urgent tasks. Therefore, confusing importance with urgency hinders the proper use of system resources. In 2007, mixed criticality was proposed to indicate that a system may contain tasks of various importance levels. Since then, system designers and users have distinguished between importance and urgency. In the industrial field, due to the harsh environment they operate in, industrial wireless networks' quality of service (QoS) has always been a bottleneck restricting their applications. Therefore, this book introduces criticality to label important data, which is then allocated more transmission resources, ensuring that important data's QoS requirements can be met to the extent possible. To help readers understand how to apply mixed-criticality data to industrial wireless networks, the content is divided into three parts. First, we introduce how to integrate the model of mixed-criticality data into industrial wireless networks. Second, we explain how to analyze the schedulability of mixed-criticality data under existing scheduling algorithms. Third, we present a range of novel scheduling algorithms for mixed-criticality data. If you want to improve the QoS of industrial wireless networks, this book is for you.
There is no doubt that we are facing a wireless data explosion. Modern wireless networks need to satisfy increasing demand, but are faced with challenges such as limited spectrum, expensive resources, green communication requirements and security issues. In the age of internet of things (IoT) with massive data transfers and huge numbers of connected devices, including high-demand QoS (4G, 5G networks and beyond), signal processing is producing data sets at the gigabyte and terabyte scales. Modest-sized optimisation problems can be handled by online algorithms with fast speed processing and a huge amount of computer memory. With the rapid increase in powerful computers, more efficient algorithms and advanced parallel computing promise an enormous reduction in calculation time, solving modern optimisation problems on strict deadlines at microsecond or millisecond time scales. Finally, the interplay between machine learning and optimisation is an efficient and practical approach to optimisation in real-time applications. Real-time optimisation is becoming a reality in signal processing and wireless networks. This book considers advanced real-time optimisation methods for 5G and beyond networks. The authors discuss the fundamentals, technologies, practical questions and challenges around real-time optimisation of 5G and beyond communications, providing insights into relevant theories, models and techniques. The book should benefit a wide audience of researchers, practitioners, scientists, professors and advanced students in engineering, computer science, ubiquitous computing, information technology, and networking and communications engineering, as well as professionals in government agencies.
This book provides an essential overview of IoT, energy-efficient topology control protocols, motivation, and challenges for topology control for Wireless Sensor Networks, and the scope of the research in the domain of IoT. Further, it discusses the different design issues of topology control and energy models for IoT applications, different types of simulators with their advantages and disadvantages. It also discusses extensive simulation results and comparative analysis for various algorithms. The key point of this book is to present a solution to minimize energy and extend the lifetime of IoT networks using optimization methods to improve the performance. Features: Describes various facets necessary for energy optimization in IoT domain. Covers all aspects to achieve energy optimization using latest technologies and algorithms, in wireless sensor networks. Presents various IoT and Topology Control Methods and protocols, various network models, and model simulation using MATLAB (R). Reviews methods and results of optimization with Simulation Hardware architecture leading to prolonged life of IoT networks. First time introduces bio-inspired algorithms in the IoT domain for performance optimization This book aims at Graduate Students, Researchers in Information Technology, Computer Science and Engineering, Electronics and Communication Engineering.
This book describes and compares both the IPv4 and IPv6 versions of OSPF and IS-IS. It explains OSPF and IS-IS by grounding the analysis on the principles of Link State Routing (LSR). It deliberately separates principles from technologies. Understanding the principles behind the technologies makes the learning process easier and more solid. Moreover, it helps uncovering the dissimilarities and commonalities of OSPF and IS-IS and exposing their stronger and weaker features. The chapters on principles explain the features of LSR protocols and discuss the alternative design options, independently of technologies. The chapters on technologies provide a comprehensive description of OSPF and IS-IS with enough detail for professionals that need to work with these technologies. The final part of the book describes and discusses a large set of experiments with Cisco routers designed to illustrate the various features of OSPF and IS-IS. In particular, the experiments related to the synchronization mechanisms are not usually found in the literature.
The text is written to provide readers with a comprehensive study of information security and management system, audit planning and preparation, audit techniques and collecting evidence, international information security (ISO) standard 27001, and asset management. It further discusses important topics such as security mechanisms, security standards, audit principles, audit competence and evaluation methods, and the principles of asset management. It will serve as an ideal reference text for senior undergraduate, graduate students, and researchers in fields including electrical engineering, electronics and communications engineering, computer engineering, and information technology. The book explores information security concepts and applications from an organizational information perspective and explains the process of audit planning and preparation. It further demonstrates audit techniques and collecting evidence to write important documentation by following the ISO 27001 standards. The book: Elaborates on the application of confidentiality, integrity, and availability (CIA) in the area of audit planning and preparation Covers topics such as managing business assets, agreements on how to deal with business assets, and media handling Demonstrates audit techniques and collects evidence to write the important documentation by following the ISO 27001 standards Explains how the organization's assets are managed by asset management, and access control policies Presents seven case studies
Provides an introductory level discussion that covers the functions and architectures of the switch/router Focuses on the fundamental concepts that underline the design of switch/routers in general Explains how a routing protocol uses a routing metric to select the best path to a network destination when multiple paths exist Discusses in greater detail the various design methods, and the well-known architectures associated with switch/routers Provides example architectures that illustrate how real-world switch/routers are designed
Provides an introductory level discussion that covers the functions and architectures of the switch/router Focuses on the fundamental concepts that underline the design of switch/routers in general Explains how a routing protocol uses a routing metric to select the best path to a network destination when multiple paths exist Discusses in greater detail the various design methods, and the well-known architectures associated with switch/routers Provides example architectures that illustrate how real-world switch/routers are designed
This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, "Hybrid Encryption Algorithms over Wireless Communication Channels", examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik's cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today's communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB (R) codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.
This book focuses on picturing B-IoT techniques from a few perspectives, which are architecture, key technologies, security and privacy, service models and framework, practical use cases and more. Main contents of this book derive from most updated technical achievements or breakthroughs in the field. A number of representative IoT service offerings will be covered by this book, such as vehicular networks, document sharing system, and telehealth. Both theoretical and practical contents will be involved in this book in order to assist readers to have a comprehensive and deep understanding the mechanism of using blockchain for powering up IoT systems. The blockchain-enabled Internet of Things (B-IoT) is deemed to be a novel technical alternative that provides network-based services with additional functionalities, benefits, and implementations in terms of decentralization, immutability, and auditability. Towards the enhanced secure and privacy-preserving Internet of Things (IoT), this book introduces a few significant aspects of B-IoT, which includes fundamental knowledge of both blockchain and IoT, state-of-the-art reviews of B-IoT applications, crucial components in the B-IoT system and the model design, and future development potentials and trends. IoT technologies and services, e.g. cloud data storage technologies and vehicular services, play important roles in wireless technology developments. On the other side, blockchain technologies are being adopted in a variety of academic societies and professional realms due to its promising characteristics. It is observable that the research and development on integrating these two technologies will provide critical thinking and solid references for contemporary and future network-relevant solutions. This book targets researchers and advanced level students in computer science, who are focused on cryptography, cloud computing and internet of things, as well as electrical engineering students and researchers focused on vehicular networks and more. Professionals working in these fields will also find this book to be a valuable resource.
Experts in research, industry, and academia cover recent trends and state-of-the art solutions in computer and communications engineering, focusing specifically on real-time applications of electronics, communications, computing, and information technology. The volume provides sound theoretical and application-oriented knowledge with a special focus on the development of safety-critical networks and integrated electrical and electronics systems. The volume also features numerous new algorithms that assist in solving computer and communication engineering problems.
|
You may like...
Trends in Wireless Communication and…
Mithun Chakraborty, Raman Kr. Jha, …
Hardcover
R8,126
Discovery Miles 81 260
Algorithms, Methods, and Applications in…
Agustinus Borgy Waluyo
Hardcover
R5,372
Discovery Miles 53 720
Handbook of Research on Advances in Data…
P. Venkata Krishna
Hardcover
R9,808
Discovery Miles 98 080
Handbook of Research on Emerging Designs…
Jamal Zbitou, Mostafa Hefnawi, …
Hardcover
R8,461
Discovery Miles 84 610
Solutions for High-Touch Communications…
Michael A. Brown Sr.
Hardcover
R4,850
Discovery Miles 48 500
|