![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
Emerging Communication Technologies Based on Wireless Sensor Networks: Current Research and Future Applications fills a gap in the existing literature by combining a plethora of WSN-based emerging technologies into a single source so that researchers can form opinions regarding these technologies. It presents different types of emerging communication technologies based on WSNs and describes how wireless sensor networks can be integrated with other communication technologies. It covers many of the new techniques and demonstrates the application of WSNs. The book's 14 chapters are divided into four parts. The first part covers the basics of wireless sensor networks and their principal working methods. The authors then move on to discuss different types of WSNs, characteristics of different types of emerging technologies based on WSNs, renewable energy sources, battery replenishment strategies, and application-specific energy challenges of WSNs. The second part is dedicated to issues related to wireless body area networks (WBANs). It discusses wearable WSNs and their applications, standards, and research trends. The authors also discuss routing schemes devised for WBANs and thermal-aware routing protocols for WBANs. The third part focuses on different emerging communication technologies based on WSNs, including electromagnetic wireless nanosensor networks, WSNs in the IoT, management of WSNs through satellite networks, WSNs in smart homes, and cognitive radio technology in conjunction with WSNs. The last part of the book covers topics generally related to typical WSNs, including energy-efficient data collection in WSNs, key distribution mechanisms in WSNs, distributed data gathering algorithms for mobile WSNs, and finally, a novel mobility scheme for WSNs that supports IPv6.
Cable and Wireless Networks: Theory and Practice presents a comprehensive approach to networking, cable and wireless communications, and networking security. It describes the most important state-of-the-art fundamentals and system details in the field, as well as many key aspects concerning the development and understanding of current and emergent services. In this book, the author gathers in a single volume current and emergent cable and wireless network services and technologies. Unlike other books, which cover each one of these topics independently without establishing their natural relationships, this book allows students to quickly learn and improve their mastering of the covered topics with a deeper understanding of their interconnection. It also collects in a single source the latest developments in the area, typically only within reach of an active researcher. Each chapter illustrates the theory of cable and wireless communications with relevant examples, hands-on exercises, and review questions suitable for readers with a BSc degree or an MSc degree in computer science or electrical engineering. This approach makes the book well suited for higher education students in courses such as networking, telecommunications, mobile communications, and network security. This is an excellent reference book for academic, institutional, and industrial professionals with technical responsibilities in planning, design and development of networks, telecommunications and security systems, and mobile communications, as well as for Cisco CCNA and CCNP exam preparation.
Until the 1990s, almost all spectrum licenses were given away practically for free-even the first mobile licenses which laid the foundation for multi-billion dollar companies that dominate stock markets around the world. In the past fifteen years, there has been a concerted attempt to liberalise the sector and make it more open to market forces. This book examines this attempt. Exploring the new frontier for spectrum policy, Understanding Spectrum Liberalisation identifies the successes and failures of the main policy initiatives of the past decade. It explains, in layman's terms, the technical and policy background needed to understand these debates. For those already working in the field, the book provides a lively analysis of recent policy initiatives along with an authoritative interpretation of the latest developments in spectrum policy. It examines individual liberalisation initiatives in detail and explains the logic behind moves towards spectrum sharing, which is seen as the next policy phase. This book will help non-specialists climb the formidable learning curve quickly. It is ideal for those who have just become involved in the spectrum field, whether in industry, government, or as a regulator, as well as those with expertise in one area of spectrum management who want to learn more about the other areas. History is about the concerns of the present, so the saying goes, and the authors hope that their interpretation of the very recent past will stimulate debate about future policy and help you make substantive contributions to ongoing policy debates.
Wireless Sensor Networks overcome the difficulties of other monitoring systems. However, they require further efficiencies for Outdoor Environment Monitoring (OEM) applications due to their harsh operational conditions, huge targeted areas, limited energy budget, and required 3D setups. A fundamental issue in defeating these practical challenges is deployment planning. The deployment plan is a key factor of many intrinsic properties of OEM networks, summarized in connectivity, lifetime, fault-tolerance, and cost-effectiveness. This book investigates the problem of WSNs deployments that address these properties in order to overcome the unique challenges and circumstances in OEM applications.
MIMO systems have been known to better the quality of service for wireless communication systems. This book discusses emerging techniques in MIMO systems to reduce complexities and keep benefits unaffected at the same time. It discusses about benefits and shortcomings of various MIMO technologies like spatial multiplexing, space time coding, spatial modulation, transmit antenna selection and various power allocation schemes to optimize the performance. Crux of the book is focus on MIMO communication over generalized fading channels as they can model the propagation of signals in a non-homogeneous environment. Relevant MATLAB codes are also included in the appendices. Book is aimed at graduate students and researchers in electronics and wireless engineering specifically interested in electromagnetic theory, antennas and propagation, future wireless systems, signal processing.
The study of electromagnetic field theory is required for proper understanding of every device wherein electricity is used for operation. The proposed textbook on electromagnetic fields covers all the generic and unconventional topics including electrostatic boundary value problems involving two- and three-dimensional Laplacian fields and one- and two- dimensional Poissonion fields, magnetostatic boundary value problems, eddy currents, and electromagnetic compatibility. The subject matter is supported by practical applications, illustrations to supplement the theory, solved numerical problems, solutions manual and Powerpoint slides including appendices and mathematical relations. Aimed at undergraduate, senior undergraduate students of electrical and electronics engineering, it: Presents fundamental concepts of electromagnetic fields in a simplified manner Covers one two- and three-dimensional electrostatic boundary value problems involving Laplacian fields and Poissonion fields Includes exclusive chapters on eddy currents and electromagnetic compatibility Discusses important aspects of magneto static boundary value problems Explores all the basic vector algebra and vector calculus along with couple of two- and three-dimensional problems
This thesis focuses on the key technologies involved in magnetically coupled Wireless Power Transfer (WPT). Starting from the basic structures and theories of WPT, it addresses four fundamental aspects of these systems. Firstly, it analyzes the factors affecting transfer efficiency and compares various methods for reducing the working frequency. Secondly, it discusses frequency splitting and offers a physical explanation. Thirdly, it proposes and assesses three multiple-load transfer structures. Lastly, it investigates WPT systems with active voltage-source and current-source load. As such, the thesis offers readers a deeper understanding of WPT technology, while also proposing insightful new advances.
This book describes and compares both the IPv4 and IPv6 versions of OSPF and IS-IS. It explains OSPF and IS-IS by grounding the analysis on the principles of Link State Routing (LSR). It deliberately separates principles from technologies. Understanding the principles behind the technologies makes the learning process easier and more solid. Moreover, it helps uncovering the dissimilarities and commonalities of OSPF and IS-IS and exposing their stronger and weaker features. The chapters on principles explain the features of LSR protocols and discuss the alternative design options, independently of technologies. The chapters on technologies provide a comprehensive description of OSPF and IS-IS with enough detail for professionals that need to work with these technologies. The final part of the book describes and discusses a large set of experiments with Cisco routers designed to illustrate the various features of OSPF and IS-IS. In particular, the experiments related to the synchronization mechanisms are not usually found in the literature.
This book investigates in detail some new spoof surface plasmon polaritons (SSPPs) structures and their applications to antenna. It introduces the working principle and radiation characteristics of directional antenna, omnidirectional antenna, reconfigurable antenna and phase-mode antenna based on SSPPs structure. Especially, the irregular SSPPs structure, such as T-shaped and m-shaped SSPPs structures, is introduced to low-profile end-fire antenna with vertical polarization; the rotated SSPPs structure is applied to CP end-fire antenna and omnidirectional antenna; PIN circuit combining with SSPPs structure is used to pattern reconfigurable antenna; the novel phase-mode SSPPs antennas with multi-modes are performed too. This book proposes a continuous method to develop the potentialities of the SSPPs antenna. And the readers can study the method or ideas of the SSPPs antenna, even graft the methods to other SSPPs antenna. The book is intended for undergraduate and graduate students who are interested in SSPPs antenna technology, researchers investigating high-performance antenna, and antenna design engineers working on multi-function antenna applications.
This book focuses on the development of circuit and system design techniques for millimeter wave wireless communication systems above 90GHz and fabricated in nanometer scale CMOS technologies. The authors demonstrate a hands-on methodology that was applied to design six different chips, in order to overcome a variety of design challenges. Behavior of both actives and passives, and how to design them to achieve high performance is discussed in detail. This book serves as a valuable reference for millimeter wave designers, working at both the transistor level and system level.
This book will be a comprehensive collection of advanced concepts related to 4th generation wireless communication systems. It will be divided into two main parts: resource allocation and transceiver architectures. These two research areas are at the core of the recent advances experimented by wireless communication systems. Each chapter will cover a relevant, timely, topic with two focuses: a first part which is of tutorial and survey nature, reviews the state of the art in that topic, followed by a more deep treatment including current research topics, case studies and performance analysis.
Mobile crowdsensing is a technology that allows large scale, cost-effective sensing of the physical world. In mobile crowdsensing, mobile personal devices such as smart phones or smart watches come equipped with a variety of sensors that can be leveraged to collect data related to environment, transportation, healthcare, safety and so on. This book presents the first extensive coverage of mobile crowdsensing, with examples and insights drawn from the authors' extensive research on this topic as well as from the research and development of a growing community of researchers and practitioners working in this emerging field. Throughout the text, the authors provide the reader with various examples of crowdsensing applications and the building blocks to creating the necessary infrastructure, explore the related concepts of mobile sensing and crowdsourcing, and examine security and privacy issues introduced by mobile crowdsensing platforms. Provides a comprehensive description of mobile crowdsensing, a one-stop shop for all relevant issues pertaining to mobile crowdsensing, including motivation, applications, design and implementation, incentive mechanisms, and reliability and privacy. Describes the design and implementations of mobile crowdsensing platforms of great interest for the readers working in research and industry to quickly implement and test their systems. Identifies potential issues in building such mobile crowdsensing applications to ensure their usability in real life and presents future directions in mobile crowdsensing by emphasizing the open problems that have to be addressed.
This comprehensive book unveils the working relationship of blockchain and the fog/edge computing. The contents of the book have been designed in such a way that the reader will not only understand blockchain and fog/edge computing but will also understand their co-existence and their collaborative power to solve a range of versatile problems. The first part of the book covers fundamental concepts and the applications of blockchain-enabled fog and edge computing. These include: Internet of Things, Tactile Internet, Smart City; and E-challan in the Internet of Vehicles. The second part of the book covers security and privacy related issues of blockchain-enabled fog and edge computing. These include, hardware primitive based Physical Unclonable Functions; Secure Management Systems; security of Edge and Cloud in the presence of blockchain; secure storage in fog using blockchain; and using differential privacy for edge-based Smart Grid over blockchain. This book is written for students, computer scientists, researchers and developers, who wish to work in the domain of blockchain and fog/edge computing. One of the unique features of this book is highlighting the issues, challenges, and future research directions associated with Blockchain-enabled fog and edge computing paradigm. We hope the readers will consider this book a valuable addition in the domain of Blockchain and fog/edge computing.
The design and development of low radar cross section (RCS) phased array has been a challenging subject in stealth technology. The frequency selective surface elements act as absorbers in specific frequency band and facilitate gain enhancement and reduction of antenna RCS. This book presents a comprehensive EM design and analysis of such low-profile patch arrays with high impedance surface-based ground plane. It explains how to determine radiation mode RCS of low-profile antenna arrays with arbitrary configurations. Detailed descriptions of design, workflow of determining radiation and scattering behavior of antenna arrays have been supported with schematics, tables, and illustrations. Aimed at engineers and researchers for RCS, antenna engineers and graduate students in electrical engineering and electromagnetics, it * Discusses both radiation and scattering features of both planar and conformal HIS-based low profile antennas * Describes the theoretical background, design, simulations and analysis of low RCS phased array in detail * Presents the physics behind the resultant radiation and scattering characteristics of designed antenna array * Helps readers understand design and analysis of low RCS antenna array without any degradation in its radiation performance * Includes figures, schematics and illustrations to provide comprehensive descriptions of both radiation and scattering characteristics of phased arrays of different configurations
This book provides a broad understanding of the fundamental tools and methods from information theory and mathematical programming, as well as specific applications in 6G and beyond system designs. The contents focus on not only both theories but also their intersection in 6G. Motivations are from the multitude of new developments which will arise once 6G systems integrate new communication networks with AIoT (Artificial Intelligence plus Internet of Things). Design issues such as the intermittent connectivity, low latency, federated learning, IoT security, etc., are covered. This monograph provides a thorough picture of new results from information and optimization theories, as well as how their dialogues work to solve aforementioned 6G design issues.
Much energy has been spent on the subject of spectrum scarcity that would threaten to stunt the growth of wireless technologies and services. This concern comes on the heels of the great successes of both cellular communications and consumer oriented communications like Wi-Fi and Bluetooth that have changed the way people use computers and communications and that have led to the creation of large new markets for products and services. The response of many spectrum regulators throughout the world in addressing these concerns has been to consider releasing more spectrum for unlicensed or for shared use. An example is the spectrum that is released by the transition to digital TV: the frequencies freed up are destined, in part, to new applications that would be license exempt. A possible beneficiary of new spectrum releases would be "the smart grid," a networked application of digital sensor and control technology to the energy delivery segment of the energy utility industry. This policy has heightened the interests of all involved in spectrum sharing and many proposals are being considered or brought forward. However, theory in this area is scarce and practice proves resistive of quick solutions. A case in point is RLAN/radar spectrum sharing in the 5GHz range: six years after the ITU-R allocated this shared spectrum, the rules for sharing as well as the means to verify compliance with these rules are not fully mature. Another recent development is the interest in spectrum pricing and trading which tend to focus on the economic aspects of spectrum sharing at the expense understanding of the limitations as well as the technical possibilities of spectrum sharing.
The study of Wireless Sensor Networks (WSN) is a continually growing, as these networks have the advantage of easy deployment for a number of different applications. Wireless Sensor Networks and Energy Efficiency: Protocols, Routing and Management focuses on wireless sensor networks and their operation, covering topics including routing, energy efficiency and management. Containing 27 chapters authored by a group of internationally experienced professionals and researchers in the fields of computer science, communication, and networking, this book discusses critical issues in wireless sensor network research including MAC, Routing Protocols, TCP, performance and traffic management, time synchronization, and security.
Digital worlds and cultures-social media, web 2.0, youtube, wearable technologies, health and fitness apps-dominate, if not order, our everyday lives. We are no longer 'just' consumers or readers of digital culture but active producers through facebook, twitter, Instagram, youtube and other emerging technologies. This book is predicated on the assumption that out understanding of our everyday lives should be informed by what is taking place in and through emerging technologies given these (virtual) environments provide a crucial context where traditional, categorical assumptions about the body, identity and leisure may be contested. Far from being 'virtual', the body is constituted within and through emerging technologies in material ways. Recent 'moral panics' over the role of digital cultures in teen suicide, digital drinking games, an endless array of homoerotic images of young bodies being linked with steroid use, disordered eating and body dissatisfaction, facebook games/fundraising campaigns (e.g. for breast cancer), movements devoted to exposing 'everyday sexism' / metoo, twitter abuse (of feminists, of athletes, of racist nature to name but a few), speak to the need for critical engagement with digital cultures. While some of the earlier techno-utopian visions offered the promise of digitality to give rise to participatory, user generator collaborations, within this book we provide critical engagement with digital technologies and what this means for our understandings of leisure cultures. The chapters originally published in a special issue in Leisure Studies.
Beyond 2020, wireless communication systems will have to support more than 1,000 times the traffic volume of today's systems. This extremely high traffic load is a major issue faced by 5G designers and researchers. This challenge will be met by a combination of parallel techniques that will use more spectrum more flexibly, realize higher spectral efficiency, and densify cells. Novel techniques and paradigms must be developed to meet these goals. The book addresses diverse key-point issues of next-generation wireless communications systems and identifies promising solutions. The book's core is concentrated to techniques and methods belonging to what is generally called radio access network.
This book gives an overview of best effort data and real-time multipath routing protocols in WMSN. It provides results of recent research in design issues affecting the development of strategic multipath routing protocols that support multimedia data traffic in WMSN from an IoT perspective, plus detailed analysis on the appropriate traffic models.
This book provides a comprehensive overview for the use of femtocells in smart Internet of Things (IoT) environments. Femtocells will help mobile operators to provide a basis for the next generation of services which are a combination of voice, video, and data services to mobile users. This book discusses modelling traffic and deployment strategies in femtocells and provides a review for the use of femtocells and their applications in IoT environments. Moreover, it highlights the efficient real-time medium access, data delivery, caching and security aspects in smart spaces. It concludes by presenting open research issues associated with smart IoT-femtocell based applications.
Think about someone taking control of your car while you're driving. Or, someone hacking into a drone and taking control. Both of these things have been done, and both are attacks against cyber-physical systems (CPS). Securing Cyber-Physical Systems explores the cybersecurity needed for CPS, with a focus on results of research and real-world deployment experiences. It addresses CPS across multiple sectors of industry. CPS emerged from traditional engineered systems in the areas of power and energy, automotive, healthcare, and aerospace. By introducing pervasive communication support in those systems, CPS made the systems more flexible, high-performing, and responsive. In general, these systems are mission-critical-their availability and correct operation is essential. This book focuses on the security of such mission-critical systems. Securing Cyber-Physical Systems brings together engineering and IT experts who have been dealing separately with these issues. The contributed chapters in this book cover a broad range of CPS security topics, including: Securing modern electrical power systems Using moving target defense (MTD) techniques to secure CPS Securing wireless sensor networks (WSNs) used for critical infrastructures Mechanisms to improve cybersecurity and privacy in transportation CPS Anticipated cyberattacks and defense approaches for next-generation autonomous vehicles Security issues, vulnerabilities, and challenges in the Internet of Things Machine-to-machine (M2M) communication security Security of industrial control systems Designing "trojan-resilient" integrated circuits While CPS security techniques are constantly evolving, this book captures the latest advancements from many different fields. It should be a valuable resource for both professionals and students working in network, web, computer, or embedded system security.
While there are many scholarly books and papers that cover the technical issues behind the public switched telephone network (PSTN) migration, few books describe exactly how to manage the migration process economically. Filling this need, Managing the PSTN Transformation: A Blueprint for a Successful Migration to IP-Based Networks reflects the latest understanding of the challenges behind migrating customers from the old PSTN network to an IP infrastructure. The IP transformation blueprint described in this book is not a theoretical cookbook that describes how this could work. Instead, the book presents a blueprint that is the product of countless hours of work by hundreds of individuals at Deutsche Telekom (DT) over almost two years. The book presents insights gained as the DT team migrated the entire public switched telephone network in Macedonia to an Internet protocol-based platform. It illustrates the various types of challenges the team faced in integrating complex systems, including flight control at their airports, alarms for fire and police response, and large enterprise customers. Detailing new conceptual approaches and the best practices developed for ensuring knowledge transfer within the DT group, the book presents the information in a step-by-step manner to enable you to easily adapt the blueprint for particular service provider requirements. Since successful migration relies on key aspects beyond the technological side, this work provides you with a product portfolio roadmap, migration plan, IT roadmap, business case framework, and a go-to-market plan. Although the book discusses the experiences of the Deutsche Telekom team as they worked to migrate the telephone network in Macedonia to an Internet protocol-based platform, the IP transformation blueprint and lessons learned presented can easily be scaled up and applied to any market around the world.
C-RAN and virtualized Small Cell technology poses several major research challenges. These include dynamic resource allocation, self-configuration in the baseband pool, high latency in data transfer between radio unit and baseband unit, the cost of data delivery, high volume of data in the network, software networking aspects, potential energy savings, security concerns, privacy of user's personal data at a remote place, limitations of virtualized environment, etc. This book provides deeper insights into the next generation RAN architecture and surveys the coexistence of SDN, C-RAN and Small Cells solutions proposed in the literature at different levels.
First Published in 2018. Routledge is an imprint of Taylor & Francis, an Informa company. |
You may like...
Solutions for High-Touch Communications…
Michael A. Brown Sr.
Hardcover
R4,624
Discovery Miles 46 240
Digital Transformation and Its Role in…
Sam B Edwards III, Diogo Santos
Hardcover
R5,094
Discovery Miles 50 940
New Horizons in Mobile and Wireless…
Ramjee Prasad, Albena Mihovska
Hardcover
R3,886
Discovery Miles 38 860
The Thabo Bester Story - The Facebook…
Marecia Damons, Daniel Steyn
Paperback
Understanding Crime and Place - A…
Elizabeth R. Groff, Cory P. Haberman
Hardcover
R3,099
Discovery Miles 30 990
|