![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
What debates have caused spectrum policy to change course and which will determine its future direction? This book examines these issues through a series of chapters from a range of notable experts. The backdrop is a period of turbulent change in what was once a quiet backwater. The past quarter century has seen wireless connectivity go from nice-to-have luxury to the cornerstone of success as nations battle for leadership of the digital economy. The change has been reflected in the crucial role now played by market's mechanisms in a field once dominated by administrative decisions. Spectrum policy's goals have moved far beyond the efficient use of the airwaves to include encouraging economic development, investment, innovation, sustainability and digital inclusivity. Are historic procedures still appropriate in the face of this multiplicity of demands? Are market mechanisms like auctions still the best way to deliver what has become essential infrastructure? Does the process of international coordination need to change? Is spectrum policy's effectiveness limited by the power of global economic forces? Can it reduce rather than add to global warming? Where does 6G and AI fit in? Is public perception the new spectrum policy battle ground? These are all issues examined in The Debates Shaping Spectrum Policy.
The scarcity of radio spectrum is one of the most urgent issues at the forefront of future network research that is yet to be addressed. To address the problem of spectrum usage efficiency, the cognitive radio (CR) concept was proposed. The challenges of employing CRs include ensuring secure device operations and data transmission with advanced computing techniques. Successful development of CR systems will involve attainment of the following key objectives: Increasing the rate and capacity of CR-based networks How the power is utilized in CR hardware devices with CMOS circuits How the framework is needed in complex networks Vedic multipliers on CR networks Spatial analysis and clustering methods for traffic management To transmit a large volume of data like video compression Swarm optimization algorithms Resource sharing in peer-to-peer networking This book gathers the latest research works focusing on the issues, challenges, and solutions in the field of Cognitive Radio Networks, with various techniques. The chapters in this book will give solutions to the problems that Industry 4.0 faces, and will be an essential resource for scholars in all areas of the field.
The latest edition provides a comprehensive foundation for image and video compression. It covers HEVC/H.265 and future video coding activities, in addition to Internet Video Coding. The book features updated chapters and content, along with several new chapters and sections. It adheres to the current international standards, including the JPEG standard.
This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which could change "the easy-to-attack and difficult-to-defend game" in cyberspace. The endogenous uncertain effects from the targets of the software/hardware based on this architecture can produce magic "mimic defense fog", and suppress in a normalized mode random disturbances caused by physical or logic elements, as well as effects of non-probability disturbances brought by uncertain security threats. Although progress has been made in the current security defense theories in cyberspace and various types of security technologies have come into being, the effectiveness of such theories and technologies often depends on the scale of the prior knowledge of the attackers, on the part of the defender and on the acquired real-timing and accuracy regarding the attackers' behavior features and other information. Hence, there lacks an efficient active defense means to deal with uncertain security threats from the unknown. Even if the bottom-line defense technologies such as encrypted verification are adopted, the security of hardware/software products cannot be quantitatively designed, verified or measured. Due to the "loose coupling" relationship and border defense modes between the defender and the protected target, there exist insurmountable theoretical and technological challenges in the protection of the defender and the target against the utilization of internal vulnerabilities or backdoors, as well as in dealing with attack scenarios based on backdoor-activated collaboration from both inside and outside, no matter how augmented or accumulated protective measures are adopted. Therefore, it is urgent to jump out of the stereotyped thinking based on conventional defense theories and technologies, find new theories and methods to effectively reduce the utilization of vulnerabilities and backdoors of the targets without relying on the priori knowledge and feature information, and to develop new technological means to offset uncertain threats based on unknown vulnerabilities and backdoors from an innovative perspective. This book provides a solution both in theory and engineering implementation to the difficult problem of how to avoid the uncontrollability of product security caused by globalized marketing, COTS and non-trustworthy software/hardware sources. It has been proved that this revolutionary enabling technology has endowed software/hardware products in IT/ICT/CPS with endogenous security functions and has overturned the attack theories and methods based on hardware/software design defects or resident malicious codes. This book is designed for educators, theoretical and technological researchers in cyber security and autonomous control and for business technicians who are engaged in the research on developing a new generation of software/hardware products by using endogenous security enabling technologies and for other product users. Postgraduates in IT/ICT/CPS/ICS will discover that (as long as the law of "structure determines the nature and architecture determines the security is properly used), the problem of software/hardware design defects or malicious code embedding will become the swelling of Achilles in the process of informationization and will no longer haunt Pandora's box in cyberspace. Security and opening-up, advanced progressiveness and controllability seem to be contradictory, but there can be theoretically and technologically unified solutions to the problem.
This book provides a comprehensive review and in-depth discussion of the state-of-the-art research literature and propose energy-efficient computation offloading and resources management for mobile edge computing (MEC), covering task offloading, channel allocation, frequency scaling and resource scheduling. Since the task arrival process and channel conditions are stochastic and dynamic, the authors first propose an energy efficient dynamic computing offloading scheme to minimize energy consumption and guarantee end devices' delay performance. To further improve energy efficiency combined with tail energy, the authors present a computation offloading and frequency scaling scheme to jointly deal with the stochastic task allocation and CPU-cycle frequency scaling for minimal energy consumption while guaranteeing the system stability. They also investigate delay-aware and energy-efficient computation offloading in a dynamic MEC system with multiple edge servers, and introduce an end-to-end deep reinforcement learning (DRL) approach to select the best edge server for offloading and allocate the optimal computational resource such that the expected long-term utility is maximized. Finally, the authors study the multi-task computation offloading in multi-access MEC via non-orthogonal multiple access (NOMA) and accounting for the time-varying channel conditions. An online algorithm based on DRL is proposed to efficiently learn the near-optimal offloading solutions. Researchers working in mobile edge computing, task offloading and resource management, as well as advanced level students in electrical and computer engineering, telecommunications, computer science or other related disciplines will find this book useful as a reference. Professionals working within these related fields will also benefit from this book.
This timely book provides broad coverage of security and privacy issues in the macro and micro perspective. In macroperspective, the system and algorithm fundamentals of next-generation wireless networks are discussed. In micro-perspective, this book focuses on the key secure and privacy techniques in different emerging networks from the interconnection view of human and cyber-physical world. This book includes 7 chapters from prominent international researchers working in this subject area. This book serves as a useful reference for researchers, graduate students, and practitioners seeking solutions to wireless security and privacy related issues Recent advances in wireless communication technologies have enabled the large-scale deployment of next-generation wireless networks, and many other wireless applications are emerging. The next generation of mobile networks continues to transform the way people communicate and access information. As a matter of fact, next-generation emerging networks are exploiting their numerous applications in both military and civil fields. For most applications, it is important to guarantee high security of the deployed network in order to defend against attacks from adversaries, as well as the privacy intrusion. The key target in the development of next-generation wireless networks is to promote the integration of the human, cyber, and physical worlds. Previous work in Cyber Physical Systems (CPS) considered the connection between the cyber world and the physical world. In the recent studies, human involvement brings new channels and initiatives in this interconnection. In this integration process, security and privacy are critical issues to many wireless network applications, and it is a paramount concern for the growth of next-generation wireless networks. This is due to the open nature of wireless communication and the involvement of humans. New opportunities for tackling these security and privacy issues in next-generation wireless networks will be achieved by leveraging the properties of interaction among human, computers and things.
5G is becoming a critically important supporting technology for industrial evolvement.The World of 5G series consists of five salient volumes - Internet of Everything, Intelligent Manufacturing, Intelligent Home, Intelligent Transportation, and Intelligent Medicine.Aim to capture new opportunities brought by 5G, this compendium set focuses on the key technologies, requirements, users' experiences, industry applications, and industrial reforms from the perspective of experts, and comprehensively introduces the related knowledge of 5G.These reference volumes inform readers the essences of 5G, potential changes to the development of public life and society brought by 5G, as well as the potential security and risks such as the legal, moral and ethical aspects.The set also prominently reflects the latest business status in different industrial and social fields, and the great changes that follow.
5G is becoming a critically important supporting technology for industrial evolvement.The World of 5G series consists of five salient volumes - Internet of Everything, Intelligent Manufacturing, Intelligent Home, Intelligent Transportation, and Intelligent Medicine.Aim to capture new opportunities brought by 5G, this compendium set focuses on the key technologies, requirements, users' experiences, industry applications, and industrial reforms from the perspective of experts, and comprehensively introduces the related knowledge of 5G.These reference volumes inform readers the essences of 5G, potential changes to the development of public life and society brought by 5G, as well as the potential security and risks such as the legal, moral and ethical aspects.The set also prominently reflects the latest business status in different industrial and social fields, and the great changes that follow.
5G is becoming a critically important supporting technology for industrial evolvement.The World of 5G series consists of five salient volumes - Internet of Everything, Intelligent Manufacturing, Intelligent Home, Intelligent Transportation, and Intelligent Medicine.Aim to capture new opportunities brought by 5G, this compendium set focuses on the key technologies, requirements, users' experiences, industry applications, and industrial reforms from the perspective of experts, and comprehensively introduces the related knowledge of 5G.These reference volumes inform readers the essences of 5G, potential changes to the development of public life and society brought by 5G, as well as the potential security and risks such as the legal, moral and ethical aspects.The set also prominently reflects the latest business status in different industrial and social fields, and the great changes that follow.
5G is becoming a critically important supporting technology for industrial evolvement.The World of 5G series consists of five salient volumes - Internet of Everything, Intelligent Manufacturing, Intelligent Home, Intelligent Transportation, and Intelligent Medicine.Aim to capture new opportunities brought by 5G, this compendium set focuses on the key technologies, requirements, users' experiences, industry applications, and industrial reforms from the perspective of experts, and comprehensively introduces the related knowledge of 5G.These reference volumes inform readers the essences of 5G, potential changes to the development of public life and society brought by 5G, as well as the potential security and risks such as the legal, moral and ethical aspects.The set also prominently reflects the latest business status in different industrial and social fields, and the great changes that follow.
This book provides a comprehensive review and in-depth study on efficient beamforming design and rigorous performance analysis in mmWave networks, covering beam alignment, beamforming training and beamforming-aided caching. Due to significant beam alignment latency between the transmitter and the receiver in existing mmWave systems, this book proposes a machine learning based beam alignment algorithm for mmWave networks to determine the optimal beam pair with a low latency. Then, to analyze and enhance the performance of beamforming training (BFT) protocol in 802.11ad mmWave networks, an analytical model is presented to evaluate the performance of BFT protocol and an enhancement scheme is proposed to improve its performance in high user density scenarios. Furthermore, it investigates the beamforming-aided caching problem in mmWave networks, and proposes a device-to-device assisted cooperative edge caching to alleviate backhaul congestion and reduce content retrieval delay. This book concludes with future research directions in the related fields of study. The presented beamforming designs and the corresponding research results covered in this book, provides valuable insights for practical mmWave network deployment and motivate new ideas for future mmWave networking. This book targets researchers working in the fields of mmWave networks, beamforming design, and resource management as well as graduate students studying the areas of electrical engineering, computing engineering and computer science. Professionals in industry who work in this field will find this book useful as a reference.
This book investigates energy management approaches for energy efficient or energy-centric system design and architecture and presents end-to-end energy management in the recent heterogeneous-type wireless network medium. It also considers energy management in wireless sensor and mesh networks by exploiting energy efficient transmission techniques and protocols. and explores energy management in emerging applications, services and engineering to be facilitated with 5G networks such as WBANs, VANETS and Cognitive networks. A special focus of the book is on the examination of the energy management practices in emerging wireless cellular and ad hoc networks. Considering the broad scope of energy management in wireless cellular and ad hoc networks, this book is organized into six sections covering range of Energy efficient systems and architectures; Energy efficient transmission and techniques; Energy efficient applications and services.
This book discusses the smooth integration of optical and RF networks in 5G and beyond (5G+) heterogeneous networks (HetNets), covering both planning and operational aspects. The integration of high-frequency air interfaces into 5G+ wireless networks can relieve the congested radio frequency (RF) bands. Visible light communication (VLC) is now emerging as a promising candidate for future generations of HetNets. Heterogeneous RF-optical networks combine the high throughput of visible light and the high reliability of RF. However, when implementing these HetNets in mobile scenarios, several challenges arise from both planning and operational perspectives. Since the mmWave, terahertz, and visible light bands share similar wave propagation characteristics, the concepts presented here can be broadly applied in all such bands. To facilitate the planning of RF-optical HetNets, the authors present an algorithm that specifies the joint optimal densities of the base stations by drawing on stochastic geometry in order to satisfy the users' quality-of-service (QoS) demands with minimum network power consumption. From an operational perspective, the book explores vertical handovers and multi-homing using a cooperative framework. For vertical handovers, it employs a data-driven approach based on deep neural networks to predict abrupt optical outages; and, on the basis of this prediction, proposes a reinforcement learning strategy that ensures minimal network latency during handovers. In terms of multi-homing support, the authors examine the aggregation of the resources from both optical and RF networks, adopting a two-timescale multi-agent reinforcement learning strategy for optimal power allocation. Presenting comprehensive planning and operational strategies, the book allows readers to gain an in-depth grasp of how to integrate future coexisting networks at high-frequency bands in a cooperative manner, yielding reliable and high-speed 5G+ HetNets.
This comprehensive reference text discusses fundamental concepts, applications, design techniques, and challenges in the field of planar antennas. The text focuses on recent advances in the field of planar antenna design and their applications in various fields of research, including space communication, mobile communication, wireless communication, and wearable applications. This resource presents planar antenna design concepts, methods, and techniques to enhance the performance parameters and applications for IoTs and device-to-device communication. The latest techniques used in antenna design, including their structures defected ground, MIMO, and fractal design, are discussed comprehensively. The text will be useful for senior undergraduate students, graduate students, and academic researchers in fields including electrical engineering, electronics, and communication engineering.
The rapid growth in communications and internet has changed our way of life, and our requirement for communication bandwidth. Optical networks can enable us to meet the continued demands for this bandwidth, although conventional optical networks struggle in achieving this, due to the limitation of the electrical bandwidth barrier. Flexgrid technology is a promising solution for future high-speed network design. To promote an efficient and scalable implementation of elastic optical technology in the telecommunications infrastructure, many challenging issues related to routing and spectrum allocation (RSA), resource utilization, fault management and quality of service provisioning must be addressed. This book reviews the development of elastic optical networks (EONs), and addresses RSA problems with spectrum fragment issues, which degrade the quality of service provisioning. The book starts with a brief introduction to optical fiber transmission system, and then provides an overview of the wavelength division multiplexing (WDM), and WDM optical networks. It discusses the limitations of conventional WDM optical networks, and discusses how EONs overcome these limitations. It presents the architecture of the EONs and its operation principle. To complete the discussion of network architecture, this book focuses on the different node architectures, and compares their performance in terms of scalability and flexibility. It reviews and classifies different RSA approaches, including their pros and cons. It focuses on different aspects related to RSA. The spectrum fragmentation is a serious issue in EONs, which needs to be managed. The book explains the fragmentation problem in EONs, discusses, and analyzes the major conventional spectrum allocation policies in terms of the fragmentation effect in a network. The taxonomies of the fragmentation management approaches are presented along with different node architectures. State-of-the-art fragmentation management approaches are looked at. A useful feature of this book is that it provides mathematical modeling and analyzes theoretical computational complexity for different problems in elastic optical networks. Finally, this book addresses the research challenges and open issues in EONs and provides future directions for future research.
This book provides a panoramic overview on wireless communication network technologies and its evolution, namely cellular mobile networks (especially 5G), Wireless Local Area Network (WLAN) and Narrow Band Internet of Things (NB-IoT).With rich experiences in teaching and scientific research, the renowned authors selectively analyze several key technologies that restrict the performance of wireless communication and computer networks.For easy reading, each chapter is illustrated in somewhat the style of lesson plan.The useful reference text will benefit both undergraduate and graduate students in the fields of wireless communication, computer networks, electronic engineering, automatic control, etc.
This book covers a wide range of topics from the smart transportation domain. It discusses protocols, applications and security concerns in various vehicular networks using examples and easy-to-understand figures. The first four chapters focus on vehicular network protocols and applications, while the remaining four chapters incorporate security, trust and privacy issues with examples from real-life cases. The book concludes with a vision of what to expect in the near future and will be an invaluable resource for anybody interested in this nascent technology and its variegated applications. Dr. Niaz Chowdhury is a postdoctoral research associate at the Knowledge Media Institute, the Open University in England. Dr. Lewis M. Mackenzie is a senior lecturer in computing science at the University of Glasgow.
The book explores modern sensor technologies while also discussing security issues, which is the dominant factor for many types of Internet of Things (IoT) applications. It also covers recent (IoT) applications such as the Markovian Arrival Process, fog computing, real-time solar energy monitoring, healthcare, and agriculture. Fundamental concepts of gathering, processing, and analyzing different Artificial Intelligence (AI) models in IoT applications are covered along with recent detection mechanisms for different types of attacks for effective network communication. On par with the standards laid out by international organizations in related fields, the book focuses on both core concepts of IoT along with major application areas. Designed for technical developers, academicians, data scientists, industrial researchers, professionals, and students, this book is useful in uncovering the latest innovations in the field of IoT.
The future has already begin. The banking industry needs to adjust, or it will disappear in the next decade. With the help of 5G, next-generation intelligent ATM-like devices will have highly integrated functions and use technologies such as artificial intelligences-assisted self-service contactless interfaces with facial recognition and digital signatures. This book focuses on new experiences that clients can expect when connected to a 5G network with a 5G device. By 2022 we hope that 5G will: Drive accelerated mBanking growth Power augmented reality /virtual reality Make Video shopping experiences more widespread and compelling Enable banks to deploy highly personalized customer service experiences Support time-sensitive banking applications, like online stock trading where milliseconds can determine a gain or loss Improve security and fraud prevention bycomputing and exchanging more data traveling between parties in real-time Enhance mPOS transactions and utilization. 5G holds the potential to accelerate mobile point of sale (MPOS) transaction processing time and improve connectivity In order to explore these topics, this book covers: * Decentralization of the banks * Banking without banks * 5G will change the modern banking industry * Blockchain adoption by the banking industry
Provides an up-to-date literature in the field of visible light communication (VLC). Presents MATLAB Codes and simulations to help readers in understanding simulations. Discusses applications of VLC in enabling vehicle to vehicle (V2V) communication. Covers topics including radio frequency (RF) based wireless communications and visible light communication (VLC). Presents modulation formats along with the derivations of probability of error expressions pertaining to different variants of optical OFDM.
The rapid growth of the data traffic demands new ways to achieve high-speed wireless links. The backbone networks, data centers, mission-critical applications, as well as end-users sitting in office or home, all require ultra-high throughput and ultra-low latency wireless links. Sophisticated technological advancement and huge bandwidth are required to reduce the latency. Terahertz band, in this regard, has a huge potential to provide these high-capacity links where a user can download the file in a few seconds. To realize the high-capacity wireless links for future applications, in this book, different aspects of the Terahertz band wireless communication network are presented. This book highlights the Terahertz channel characteristics and modeling, antenna design and beamforming, device characterization, applications, and protocols. It also provides state-of-the-art knowledge on different communication aspects of Terahertz communication and techniques to realize the true potential of the Terahertz band for wireless communication.
Covers latest design and design parameters in the field of microstrip antenna. Discusses design of wearable antennas in detail. Presents design of conformal and miniaturized antenna structures for various applications. Covers methods and techniques for the enhancement of the performance parameters of the microstrip antenna. Discusses latest techniques in the field of microstrip antennas and it's applications
Wireless sensor Networks: Vehicle and Space Applications describes the practical perspectives in using wireless sensor networks (WSN) to develop real world applications that can be used for space exploration. These applications include sensor interfaces, remote wireless vehicles, space crew health monitoring and instrumentation. The material discusses how applications of WSN originally developed for space travel and exploration are being applied and used in multiple real world applications, allowing for the development of smart systems that have characteristics such as self healing, self diagnosis, and emergency healthcare notification.
This book analyses how key 'systems integration' technical pressures, and the increasing use of collaborative alliances for market and product development are impacting on the socio technical policy directives of Chinese State leaders and the strategic behaviour of key Chinese high technology firms operating in the global wireless sector. |
You may like...
Music and the Muses - The Culture of…
Penelope Murray, Peter Wilson
Hardcover
R6,668
Discovery Miles 66 680
Women as Producers and Consumers of…
Yorghos Apostolopoulos, Sevil F. Soenmez, …
Hardcover
R3,530
Discovery Miles 35 300
Intelligent Control and Computer…
Sio-Iong Ao, Oscar Castillo, …
Hardcover
R4,183
Discovery Miles 41 830
Carbon Sequestration
Suriyanarayanan Sarvajayakesavalu, Kannan Karthikeyan
Hardcover
R2,573
Discovery Miles 25 730
Carbon Cycling in the Baltic Sea
Karol Kulinski, Janusz Pempkowiak
Hardcover
R2,641
Discovery Miles 26 410
|