![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
The steady evolution of wireless communication technologies continues to pave the way for the implementation of innovative services and devices in modern vehicles. These include analog and digital audio broadcasting radio, satellite radio, GPS, cell phones, and short range communication devices. Such applications require the use multiple antennas operating in different frequency ranges. Automotive Antenna Design and Applications thoroughly examines traditional and new advanced automotive antennas, including the principles, designs, and techniques used to reduce antenna dimensions without significant degradation of communication quality. The contents of this book are based on cutting-edge data collected from numerous technical papers, patents, and patent applications. It presents an overview of many commercially available automotive antennas and covers features that have become standard in automotive applications, such as printed-on car glass antennas, reduced-size helical antennas, multiband compact, printed-on dielectric and patch designs in a single package. Includes simulation examples of antenna parameters that significantly speed up the design process using software packages such as FEKO, NEC, IE3D, and Genesys Highlighting the practical aspects of antenna design, the authors present passive and active designs and describe the entire design process, including antenna simulation, prototype sample fabrication, and laboratory test measurements. The book also covers the production adjustments that can result from the demands of the real car environment. The presentation of numerous examples of passive and active automotive antennas greatly enhances this reference s value to professionals, students, and anyone else working in the ever-evolving field of antenna design and application.
This book on SDP is the first of this kind that attempts to put all SDP related RFCs together with their mandatory and optional texts in a chronological systematic way as if people can use a single "super-SDP RFC" with almost one-to-one integrity from beginning to end to see the big picture of SDP in addition to base SDP functionalities.
Beyond 2020, wireless communication systems will have to support more than 1,000 times the traffic volume of today's systems. This extremely high traffic load is a major issue faced by 5G designers and researchers. This challenge will be met by a combination of parallel techniques that will use more spectrum more flexibly, realize higher spectral efficiency, and densify cells. Novel techniques and paradigms must be developed to meet these goals. The book addresses diverse key-point issues of next-generation wireless communications systems and identifies promising solutions. The book's core is concentrated to techniques and methods belonging to what is generally called radio access network.
Spectrum Sharing in Wireless Networks: Fairness, Efficiency, and Security provides a broad overview of wireless network spectrum sharing in seven distinct sections: The first section examines the big picture and basic principles, explaining the concepts of spectrum sharing, hardware/software function requirements for efficient sharing, and future trends of sharing strategies. The second section contains more than 10 chapters that discuss differing approaches to efficient spectrum sharing. The authors introduce a new coexistence and sharing scheme for multi-hop networks, describe the space-time sharing concept, introduce LTE-U, and examine sharing in broadcast and unicast environments. They then talk about different cooperation strategies to achieve mutual benefits for primary users (PU) and secondary users (SU), discuss protocols in a spectrum sharing context, and provide different game theory models between PUs and SUs. The third section explains how to model the interactions of PUs and SUs, using an efficient calculation method to determine spectrum availability. Additionally, this section explains how to use scheduling models to achieve efficient SU traffic delivery. The subject of the fourth section is MIMO-oriented design. It focuses on how directional antennas and MIMO antennas greatly enhance wireless network performance. The authors include a few chapters on capacity/rate calculations as well as beamforming issues under MIMO antennas. Power control is covered in the fifth section which also describes the interference-aware power allocation schemes among cognitive radio users and the power control schemes in cognitive radios. The sixth section provides a comprehensive look at security issues, including different types of spectrum sharing attacks and threats as well as corresponding countermeasure schemes. The seventh and final section covers issues pertaining to military applications and examines how the military task protects its data flows when sharing the spectrum with civilian applications.
Although comprehensive knowledge of cyber-physical systems (CPS) is becoming a must for researchers, practitioners, system designers, policy makers, system managers, and administrators, there has been a need for a comprehensive and up-to-date source of research and information on cyber-physical systems. This book fills that need. Cyber-Physical Systems: From Theory to Practice provides state-of-the-art research results and reports on emerging trends related to the science, technology, and engineering of CPS, including system architecture, development, modeling, simulation, security, privacy, trust, and energy efficiency. It presents the research results of esteemed professionals on cutting-edge advances in cyber-physical systems that include communications, computing, and control. The book consists of eight sections, each containing chapters contributed by leading experts in the field. Each section covers a different area that impacts the design, modeling, and evaluation of CPS, including: Control systems Modeling and design Communications and signal processing Mobility issues Architecture Security issues Sensors and applications Computing issues The book's coverage includes cyber-physical system architecture, mobile cyber-physical systems, cyber-physical systems for intelligent (road/air) transportation, and cyber-physical system applications and standardization. With the CPS field advancing so rapidly, this book is an ideal reference to help researchers, system designers, and practitioners manufacture devices that are compatible with CPS standards. Presenting numerous examples that illustrate practical applications derived from theory, the book is also suitable for use as a textbook in upper undergraduate and graduate-level university courses.
Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry. CPS emerged from traditional engineered systems in the areas of power and energy, automotive, healthcare, and aerospace. By introducing pervasive communication support in those systems, CPS made the systems more flexible, high-performing, and responsive. In general, these systems are mission-critical-their availability and correct operation is essential. This book focuses on the security of such mission-critical systems. Securing Cyber-Physical Systems brings together engineering and IT experts who have been dealing separately with these issues. The contributed chapters in this book cover a broad range of CPS security topics, including: Securing modern electrical power systems Using moving target defense (MTD) techniques to secure CPS Securing wireless sensor networks (WSNs) used for critical infrastructures Mechanisms to improve cybersecurity and privacy in transportation CPS Anticipated cyberattacks and defense approaches for next-generation autonomous vehicles Security issues, vulnerabilities, and challenges in the Internet of Things Machine-to-machine (M2M) communication security Security of industrial control systems Designing "trojan-resilient" integrated circuits While CPS security techniques are constantly evolving, this book captures the latest advancements from many different fields. It should be a valuable resource for both professionals and students working in network, web, computer, or embedded system security.
This book focuses on the most critical technical aspects of vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communications. It covers the smart city concept and architecture and explains how V2V and V2I fit into it. It describes the wireless communication protocols for V2V and V2I. It then explains the hardware design process for vehicle communication transceiver and antenna systems. It explains next-generation wireless technologies and their requirements for vehicle communication protocols. Case studies provide the latest V2V and V2I commercial design details. Finally, it describes how to implement vehicle communication protocol from practical hardware design angle.
This book gives an overview of best effort data and real-time multipath routing protocols in WMSN. It provides results of recent research in design issues affecting the development of strategic multipath routing protocols that support multimedia data traffic in WMSN from an IoT perspective, plus detailed analysis on the appropriate traffic models.
This book presents insights, interpretations, concepts, and interdependent views-in the landscape of mobile connectivity and service-that emphasize the significance of a harmonious interplay, cooperation, and coalescing of a variety of interdisciplinary domains of science and art. Mobile Evolution: Insights on Connectivity and Service explores the forward-looking and enabling capabilities of mobile connectivity and service in the context of long term evolution (LTE) systems and multimedia services, as viewed through a lens of human experience. It provides information and guidelines pertaining to the strategies and technologies associated with the next-generation mobile ecosystem. The book examines the intersection between the technology and the human dimension in the context of the ever-changing landscape. It arms you with ideas that you can apply to design, innovation, strategy, and business models for the various facets of mobile communication connectivity and service.
The design and development of low radar cross section (RCS) phased array has been a challenging subject in stealth technology. The frequency selective surface elements act as absorbers in specific frequency band and facilitate gain enhancement and reduction of antenna RCS. This book presents a comprehensive EM design and analysis of such low-profile patch arrays with high impedance surface-based ground plane. It explains how to determine radiation mode RCS of low-profile antenna arrays with arbitrary configurations. Detailed descriptions of design, workflow of determining radiation and scattering behavior of antenna arrays have been supported with schematics, tables, and illustrations. Aimed at engineers and researchers for RCS, antenna engineers and graduate students in electrical engineering and electromagnetics, it * Discusses both radiation and scattering features of both planar and conformal HIS-based low profile antennas * Describes the theoretical background, design, simulations and analysis of low RCS phased array in detail * Presents the physics behind the resultant radiation and scattering characteristics of designed antenna array * Helps readers understand design and analysis of low RCS antenna array without any degradation in its radiation performance * Includes figures, schematics and illustrations to provide comprehensive descriptions of both radiation and scattering characteristics of phased arrays of different configurations
C-RAN and virtualized Small Cell technology poses several major research challenges. These include dynamic resource allocation, self-configuration in the baseband pool, high latency in data transfer between radio unit and baseband unit, the cost of data delivery, high volume of data in the network, software networking aspects, potential energy savings, security concerns, privacy of user's personal data at a remote place, limitations of virtualized environment, etc. This book provides deeper insights into the next generation RAN architecture and surveys the coexistence of SDN, C-RAN and Small Cells solutions proposed in the literature at different levels.
The study of electromagnetic field theory is required for proper understanding of every device wherein electricity is used for operation. The proposed textbook on electromagnetic fields covers all the generic and unconventional topics including electrostatic boundary value problems involving two- and three-dimensional Laplacian fields and one- and two- dimensional Poissonion fields, magnetostatic boundary value problems, eddy currents, and electromagnetic compatibility. The subject matter is supported by practical applications, illustrations to supplement the theory, solved numerical problems, solutions manual and Powerpoint slides including appendices and mathematical relations. Aimed at undergraduate, senior undergraduate students of electrical and electronics engineering, it: Presents fundamental concepts of electromagnetic fields in a simplified manner Covers one two- and three-dimensional electrostatic boundary value problems involving Laplacian fields and Poissonion fields Includes exclusive chapters on eddy currents and electromagnetic compatibility Discusses important aspects of magneto static boundary value problems Explores all the basic vector algebra and vector calculus along with couple of two- and three-dimensional problems
Ultrawideband (UWB) technology, positioned as the cutting edge of research and development, paves the way to meet the emerging demands set by broadband wireless applications, such as high-speed data transmission, medical imaging, short-range radars, electromagnetic testing, etc. This breathtaking resource builds upon the basics of UWB technology to provide a complete compilation of figures of merit along with a vital state-of-the-art of the different antenna alternatives that are to be employed according to the specific application. Without excessive recourse to mathematics, this volume emphasizes on the UWB antenna design and equips readers with practical prediction techniques based on simple formulas and models. The big picture of UWB antenna technology would not be complete without addressing its applications, and this will serve to provide consultants with key clues for market gap analysis. Containing over 150 supporting illustrations and figures, this comprehensive overview of UWB technology, antenna design and applications is a vital source of information and reference for R&D organizations, researchers, practitioners, consultants, RF professionals and communication engineers.
This book provides a comprehensive overview for the use of femtocells in smart Internet of Things (IoT) environments. Femtocells will help mobile operators to provide a basis for the next generation of services which are a combination of voice, video, and data services to mobile users. This book discusses modelling traffic and deployment strategies in femtocells and provides a review for the use of femtocells and their applications in IoT environments. Moreover, it highlights the efficient real-time medium access, data delivery, caching and security aspects in smart spaces. It concludes by presenting open research issues associated with smart IoT-femtocell based applications.
This book features the major research advances on integrated networking, caching, and computing. Information-centric networking-based caching is one of the promising techniques for future networks. The cloud computing paradigm has been widely adopted to enable convenient, on-demand network access to a shared pool of configurable computing resources. In addition, fog/edge computing is proposed to deploy computing resources closer to end devices. From the perspective of applications, network, cache and compute are underlying enabling resources. How to manage, control and optimize these resources can have significant impacts on application performance.
This book shows how to build a "INFelecPHY GPS Unit" (IEP-GPS) tracking system for fleet management that is based on 3G and GPRS modules. This model should provide reliability since it deals with several protocols: 1) HTTP and HTTPS to navigate, download and upload in real time the information to a web server, 2) FTTP and FTTPS to handle in a non-real time the files to the web application, and 3) SMTP and POP3 to send and receive email directly from the unit in case of any alert. Similar to a mobile device, but without screen for display, it is multifunctional because it links to a GPRS module, a camera, a speaker, headphone, a keypad and screen.
The International Conference on Communications, Management, and Information Technology (ICCMIT'16) provides a discussion forum for scientists, engineers, educators and students about the latest discoveries and realizations in the foundations, theory, models and applications of systems inspired on nature, using computational intelligence methodologies, as well as in emerging areas related to the three tracks of the conference: Communication Engineering, Knowledge, and Information Technology. The best 25 papers to be included in the book will be carefully reviewed and selected from numerous submissions, then revised and expanded to provide deeper insight into trends shaping future ICT.
Opportunistic networking, by definition, allows devices to communicate whenever a window of opportunity is available. Many emerging technologies employ opportunistic exchanges of information. This book addresses this trend in communications engineering, taking into account three specific areas-vehicular, device-to-device (D2D), and cognitive radio-while describing the opportunistic communication methods of each. From smart homes to smart cities, smart agriculture to never-die-networks and beyond, the text explores the state of the art of opportunistic networking, providing the latest research, developments, and practices in one concise source.
The accurate design of earth-space systems requires a comprehensive understanding of the various propagation media and phenomena that differ depending on frequencies and types of applications. The choice of the relevant channel models is crucial in the design process and constitutes a key step in performance evaluation and testing of earth-space systems. The subject of this book is built around the two characteristic cases of satellite systems: fixed satellites and mobile satellite systems. Radio Wave Propagation and Channel Modeling for Earth-Space Systems discusses the state of the art in channel modeling and characterization of next-generation fixed multiple-antennas and mobile satellite systems, as well as propagation phenomena and fade mitigation techniques. The frequencies of interest range from 100 MHz to 100 GHz (from VHF to W band), whereas the use of optical free-space communications is envisaged. Examining recent research advances in space-time tropospheric propagation fields and optical satellite communication channel models, the book covers land mobile multiple antennas satellite- issues and relative propagation campaigns and stratospheric channel models for various applications and frequencies. It also presents research and well-accepted satellite community results for land mobile satellite and tropospheric attenuation time-series single link and field synthesizers. The book examines aeronautical communications channel characteristics and modeling, relative radio wave propagation campaigns, and stratospheric channel model for various applications and frequencies. Propagation effects on satellite navigation systems and the corresponding models are also covered.
The Internet of Things (IoT) has attracted strong interest from both academia and industry. Unfortunately, it has also attracted the attention of hackers. Security and Privacy in Internet of Things (IoTs): Models, Algorithms, and Implementations brings together some of the top IoT security experts from around the world who contribute their knowledge regarding different IoT security aspects. It answers the question "How do we use efficient algorithms, models, and implementations to cover the four important aspects of IoT security, i.e., confidentiality, authentication, integrity, and availability?" The book consists of five parts covering attacks and threats, privacy preservation, trust and authentication, IoT data security, and social awareness. The first part introduces all types of IoT attacks and threats and demonstrates the principle of countermeasures against those attacks. It provides detailed introductions to specific attacks such as malware propagation and Sybil attacks. The second part addresses privacy-preservation issues related to the collection and distribution of data, including medical records. The author uses smart buildings as an example to discuss privacy-protection solutions. The third part describes different types of trust models in the IoT infrastructure, discusses access control to IoT data, and provides a survey of IoT authentication issues. The fourth part emphasizes security issues during IoT data computation. It introduces computational security issues in IoT data processing, security design in time series data aggregation, key generation for data transmission, and concrete security protocols during data access. The fifth and final part considers policy and human behavioral features and covers social-context-based privacy and trust design in IoT platforms as well as policy-based informed consent in the IoT.
Wireless sensor networks (WSNs) are a special class of ad hoc network in which network nodes composed of tiny sensors pass data such as temperature, pressure, and humidity through the network to a central location. Wireless sensor multimedia networks (WSMNs) are a special category of WSNs in which the sensor nodes are small cameras and microphones that can send voice, image, or video data through the network. This book presents the latest advances and research in WSMN architecture, algorithms, and protocols. WSMNs are attracting great attention from academia and industry due to the variety of applications in which they can be deployed. Wireless Sensor Multimedia Networks: Architectures, Protocols, and Applications explores the many benefits of WSMNs and the variety of applications in which they can be used-surveillance, traffic monitoring, advanced healthcare (blood pressure and heart rate monitoring), habitat monitoring, and localization services (finding missing children or wanted criminals). The contributed chapters in this book explore current research into key areas such as New quality-of-service-aware routing protocols that support a high data rate in WSMNs Cognitive radio capability that increases efficiency of spectrum utilization and decreases the probability of collision and contention Multimedia streaming optimization techniques New security schemes for real-time video streaming Various ways of optimizing power consumption in WSMNs Wireless Sensor Multimedia Networks: Architectures, Protocols, and Applications discusses open research issues and future trends in WSMNs. With this book, academic researchers, engineers, and graduate students will be well-equipped to advance the research in this emerging field.
This comprehensive book unveils the working relationship of blockchain and the fog/edge computing. The contents of the book have been designed in such a way that the reader will not only understand blockchain and fog/edge computing but will also understand their co-existence and their collaborative power to solve a range of versatile problems. The first part of the book covers fundamental concepts and the applications of blockchain-enabled fog and edge computing. These include: Internet of Things, Tactile Internet, Smart City; and E-challan in the Internet of Vehicles. The second part of the book covers security and privacy related issues of blockchain-enabled fog and edge computing. These include, hardware primitive based Physical Unclonable Functions; Secure Management Systems; security of Edge and Cloud in the presence of blockchain; secure storage in fog using blockchain; and using differential privacy for edge-based Smart Grid over blockchain. This book is written for students, computer scientists, researchers and developers, who wish to work in the domain of blockchain and fog/edge computing. One of the unique features of this book is highlighting the issues, challenges, and future research directions associated with Blockchain-enabled fog and edge computing paradigm. We hope the readers will consider this book a valuable addition in the domain of Blockchain and fog/edge computing.
Convex Optimization for Signal Processing and Communications: From Fundamentals to Applications provides fundamental background knowledge of convex optimization, while striking a balance between mathematical theory and applications in signal processing and communications. In addition to comprehensive proofs and perspective interpretations for core convex optimization theory, this book also provides many insightful figures, remarks, illustrative examples, and guided journeys from theory to cutting-edge research explorations, for efficient and in-depth learning, especially for engineering students and professionals. With the powerful convex optimization theory and tools, this book provides you with a new degree of freedom and the capability of solving challenging real-world scientific and engineering problems.
Mobile crowdsensing is a technology that allows large scale, cost-effective sensing of the physical world. In mobile crowdsensing, mobile personal devices such as smart phones or smart watches come equipped with a variety of sensors that can be leveraged to collect data related to environment, transportation, healthcare, safety and so on. This book presents the first extensive coverage of mobile crowdsensing, with examples and insights drawn from the authors' extensive research on this topic as well as from the research and development of a growing community of researchers and practitioners working in this emerging field. Throughout the text, the authors provide the reader with various examples of crowdsensing applications and the building blocks to creating the necessary infrastructure, explore the related concepts of mobile sensing and crowdsourcing, and examine security and privacy issues introduced by mobile crowdsensing platforms. Provides a comprehensive description of mobile crowdsensing, a one-stop shop for all relevant issues pertaining to mobile crowdsensing, including motivation, applications, design and implementation, incentive mechanisms, and reliability and privacy. Describes the design and implementations of mobile crowdsensing platforms of great interest for the readers working in research and industry to quickly implement and test their systems. Identifies potential issues in building such mobile crowdsensing applications to ensure their usability in real life and presents future directions in mobile crowdsensing by emphasizing the open problems that have to be addressed.
This book explains the 3GPP technical specifications for the upcoming 5G Internet of Things (IoT) technology based on latest release which is Release 15. It details the LTE protocol stack of an IoT device, architecture and framework, how they are functioning and communicate with cellular infrastructure, and supported features and capability. NB-IoT is designed to connect a large number of devices in a wide range of application domains forming so-called Internet of Things (IoT). Connected devices are to communicate through cellular infrastructure. This technology is new within the 3GPP specifications and is part of upcoming new wireless technology known as 5G. Table of Contents Preface. Acknowledgments. Author. List of Abbreviations. 1. Internet of Things. 2. 4G and 5G Systems. 3. Radio Resource Control Sublayer. 4. Packet Data Convergence Protocol Sublayer. 5. Radio Link Control Sublayer. 6. Medium Access Control Sublayer. 7. Physical Sublayer. 8. Quality of Service Architecture. 9. Use Cases and Deployment. References. Index. |
![]() ![]() You may like...
Mathematical Foundations of Data Science…
Frank Emmert-Streib, Salissou Moutari, …
Hardcover
A Course on Small Area Estimation and…
Domingo Morales, Maria Dolores Esteban, …
Hardcover
R3,939
Discovery Miles 39 390
Computational and Methodological…
Andriette Bekker, (Din) Ding-Geng Chen, …
Hardcover
R4,276
Discovery Miles 42 760
Grammaticalization Scenarios from…
Walter Bisang, Andrej Malchukov
Hardcover
R9,866
Discovery Miles 98 660
Two Oceans - A Guide To The Marine Life…
George Branch, Charles Griffiths
Paperback
Coastal Zone Management Imperative for…
B.U. Haq, Gunnar Kullenberg, …
Hardcover
R6,552
Discovery Miles 65 520
|