Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
The text provides a comprehensive overview of the design aspects of the internet of things devices and covers the fundamentals of big data and data science. It explores various scenarios such as what are the middleware and frameworks available and how to build a stable, standards-based, and Secure internet of things device. It discusses important concepts including embedded programming techniques, machine-to-machine architecture, and the internet of things for smart city applications. It will serve as an ideal design book for professionals, senior undergraduate, and graduate students in the fields including electrical engineering, electronics and communication engineering, and computer engineering. The book- Covers applications and architecture needed to deliver solutions to end customers and readers. Discusses practical aspects of implementing the internet of things in diverse areas including manufacturing, and software development. Highlights big data concepts and embedded programming techniques. Presents technologies including machine to machine, integrated sensors, and radio-frequency identification. Introduces global system for mobile communication and precise details of standards based on internet of things architecture models. The book focuses on practical design aspects such as how to finalize a processor integrated circuit, which operating system to use, etc. in a single volume. It will serve as an ideal text for professionals, senior undergraduate, and graduate students in diverse engineering domains including electrical, electronics and communication, computer.
1. Understand the audit culture, challenges, and benefits of the CAE role in digitally transforming business environment in smart cities 2. Identify ways to advance the value of Internal Audit in digital era 3. Use and control the resources of the city efficiently, and to ensure that the system units work properly in an integrated way.
This book is unique in presenting channels, techniques and
standards for the next generation of MIMO wireless networks.
Through a unified framework, it emphasizes how propagation
mechanisms impact the system performance under realistic power
constraints. Combining a solid mathematical analysis with a
physical and intuitive approach to space-time signal processing,
the book progressively derives innovative designs for space-time
coding and precoding as well as multi-user and multi-cell
techniques, taking into consideration that MIMO channels are often
far from ideal. Reflecting developments since the first edition was
published, this book has been thoroughly revised, and now includes
new sections and five new chapters, respectively dealing with
receiver design, multi-user MIMO, multi-cell MIMO, MIMO
implementation in standards, and MIMO system-level
evaluation. Extended introduction to multi-dimensional propagation, including polarization aspects Detailed and comparative description of physical models and analytical representations of single- and multi-link MIMO channels, covering the latest standardized models Thorough overview of space-time coding techniques, covering both classical and more recent schemes under information theory and error probability perspectives Intuitive illustration of how real-world propagation affects the capacity and the error performance of MIMO transmission schemes Detailed information theoretic analysis of multiple access, broadcast and interference channels In-depth presentation of multi-user diversity, resource allocation and (non-)linear MU-MIMO precoding techniques with perfect and imperfect channel knowledge Extensive coverage of cooperative multi-cell MIMO-OFDMA networks, including network resource allocation optimization, coordinated scheduling, beamforming and power control, interference alignment, joint processing, massive and network MIMO Applications of MIMO and Coordinated Multi-Point (CoMP) in LTE, LTE-A and WiMAX Theoretical derivations and results contrasted with practical system level evaluations highlighting the performance of single- and multi-cell MIMO techniques in realistic deployments"
Unique selling point: * Provides IT managers and audit professionals with relevant knowledge directly applicable to various blockchain-related organizational projects. Core audience: * An educational and professional reference resource for information systems researchers, IT managers, and audit professionals. Place in the market: * Unlike most current blockchain titles on the market, The Auditor's Guide to Blockchain Technology also deals with security and assurance issues
The Most Complete and Up-to-Date Account of Advanced Sensor Networking Technologies Handbook of Sensor Networking: Advanced Technologies and Applications provides a complete professional reference and practitioner's guide to today's advanced sensor networking technologies. The handbook focuses on both established and recent sensor networking theory, technology, and practice. Specialists at the forefront of the field address immediate and long-term challenges in their respective areas of expertise and explore practical solutions to a wide range of sensor networking issues. This comprehensive handbook is suitable for a range of readers, including researchers and practitioners, upper-division undergraduate and graduate students, sensor networking technologists and engineers, and security, law enforcement, and governmental agencies. The book gives readers a thorough understanding of the hardware of sensor networks, wireless communication protocols, sensor networks software and architectures, wireless information networks, data manipulation, signal processing, localization, and object tracking through sensor networks.
This book provides an essential overview of IoT, energy-efficient topology control protocols, motivation, and challenges for topology control for Wireless Sensor Networks, and the scope of the research in the domain of IoT. Further, it discusses the different design issues of topology control and energy models for IoT applications, different types of simulators with their advantages and disadvantages. It also discusses extensive simulation results and comparative analysis for various algorithms. The key point of this book is to present a solution to minimize energy and extend the lifetime of IoT networks using optimization methods to improve the performance. Features: Describes various facets necessary for energy optimization in IoT domain. Covers all aspects to achieve energy optimization using latest technologies and algorithms, in wireless sensor networks. Presents various IoT and Topology Control Methods and protocols, various network models, and model simulation using MATLAB (R). Reviews methods and results of optimization with Simulation Hardware architecture leading to prolonged life of IoT networks. First time introduces bio-inspired algorithms in the IoT domain for performance optimization This book aims at Graduate Students, Researchers in Information Technology, Computer Science and Engineering, Electronics and Communication Engineering.
This book is intended to be used as both a text book and as an aide memoire handbook by forensic radio survey engineers, particularly those working for official police agencies. The book provides a simple but detailed overview of the operation of cellular networks (GSM, UMTS and LTE, US CDMAOne/CDMA2000, amongst others). In addition, the author also provides an overview of the technical theories that underpin cellular radio systems basic radio theory and a simple explanation of the mathematical concepts that underlie measurements scales such as dB and dBm. The main part of the book, however, focuses on radio surveys, the various types of survey, the techniques employed for each survey and the considerations and potential problems that can be encountered when surveying different types of network. The final section deals with processing and interpreting the results of radio surveys and examines the information that can be gained from them.
This book presents novel hybrid encryption algorithms that possess many different characteristics. In particular, "Hybrid Encryption Algorithms over Wireless Communication Channels", examines encrypted image and video data for the purpose of secure wireless communications. A study of two different families of encryption schemes are introduced: namely, permutation-based and diffusion-based schemes. The objective of the book is to help the reader selecting the best suited scheme for the transmission of encrypted images and videos over wireless communications channels, with the aid of encryption and decryption quality metrics. This is achieved by applying number-theory based encryption algorithms, such as chaotic theory with different modes of operations, the Advanced Encryption Standard (AES), and the RC6 in a pre-processing step in order to achieve the required permutation and diffusion. The Rubik's cube is used afterwards in order to maximize the number of permutations. Transmission of images and videos is vital in today's communications systems. Hence, an effective encryption and modulation schemes are a must. The author adopts Orthogonal Frequency Division Multiplexing (OFDM), as the multicarrier transmission choice for wideband communications. For completeness, the author addresses the sensitivity of the encrypted data to the wireless channel impairments, and the effect of channel equalization on the received images and videos quality. Complete simulation experiments with MATLAB (R) codes are included. The book will help the reader obtain the required understanding for selecting the suitable encryption method that best fulfills the application requirements.
Provides an introductory level discussion that covers the functions and architectures of the switch/router Focuses on the fundamental concepts that underline the design of switch/routers in general Explains how a routing protocol uses a routing metric to select the best path to a network destination when multiple paths exist Discusses in greater detail the various design methods, and the well-known architectures associated with switch/routers Provides example architectures that illustrate how real-world switch/routers are designed
The text is written to provide readers with a comprehensive study of information security and management system, audit planning and preparation, audit techniques and collecting evidence, international information security (ISO) standard 27001, and asset management. It further discusses important topics such as security mechanisms, security standards, audit principles, audit competence and evaluation methods, and the principles of asset management. It will serve as an ideal reference text for senior undergraduate, graduate students, and researchers in fields including electrical engineering, electronics and communications engineering, computer engineering, and information technology. The book explores information security concepts and applications from an organizational information perspective and explains the process of audit planning and preparation. It further demonstrates audit techniques and collecting evidence to write important documentation by following the ISO 27001 standards. The book: Elaborates on the application of confidentiality, integrity, and availability (CIA) in the area of audit planning and preparation Covers topics such as managing business assets, agreements on how to deal with business assets, and media handling Demonstrates audit techniques and collects evidence to write the important documentation by following the ISO 27001 standards Explains how the organization's assets are managed by asset management, and access control policies Presents seven case studies
Provides an introductory level discussion that covers the functions and architectures of the switch/router Focuses on the fundamental concepts that underline the design of switch/routers in general Explains how a routing protocol uses a routing metric to select the best path to a network destination when multiple paths exist Discusses in greater detail the various design methods, and the well-known architectures associated with switch/routers Provides example architectures that illustrate how real-world switch/routers are designed
Experts in research, industry, and academia cover recent trends and state-of-the art solutions in computer and communications engineering, focusing specifically on real-time applications of electronics, communications, computing, and information technology. The volume provides sound theoretical and application-oriented knowledge with a special focus on the development of safety-critical networks and integrated electrical and electronics systems. The volume also features numerous new algorithms that assist in solving computer and communication engineering problems.
UAV swarm network has been used in many critical applications, such as disaster recovery, area surveillance, weather monitoring, and military communications. There are many challenging R&D issues in UAV network designs, such as the hardware/software integration for a large-scale UAV network management, long-distance data transmissions among UAVs, swarm shape/formation control, and intelligent UAV mobility/position prediction. This book will be the first one to cover the engineering designs (especially network protocol designs) for dynamic, large-scale UAV network. It has the technical models/algorithms and protocol specifications for practical UAV swarm network deployment. Features: Includes chapters written by professors, researchers, engineers, and experts in UAV networking fields Details network protocol descriptions for practical engineering designs Covers 7-layer protocols (particularly data routing layer) Presents novel AI models/algorithms for intelligent UAV swarming/networking control Highlights practical hardware/software implementations for advanced UAV networks This book is suitable to a variety of audiences: (1) industry UAV R&D engineers, administrators, or technicians, who would like to grasp the latest trends in UAV communications; (2) college graduate students or researchers, who may want to pursue some advanced research on large-scale UAV swarming and networking technologies; (3) government agencies that determine the future society development in this exciting field; and (4) other interested readers with a strong desire to understand the challenges of designing a QoS-oriented UAV network. The book editors are: Dr. Fei Hu, Professor in Electrical and Computer Engineering at University of Alabama, Tuscaloosa, Alabama, USA; Dr. Xin-Lin Huang, Professor in Information and Communication Engineering, Tongji University, Shanghai, China; and Dr. DongXiu Ou, Professor in Transportation Information Institute at Tongji University, Shanghai, China.
User-Centric Networks (UCN) and Information-Centric Networks (ICN) are new communication paradigms to increase the efficiency of content delivery and also content availability. In this new concept, the network infrastructure actively contributes to content caching and distribution. This book presents the basic concepts of UCN and ICN, describes the main architecture proposals for these networks, and discusses the main challenges to their development. The book also looks at the current challenges for this concept, including naming, routing and caching on the network-core elements, several aspects of content security, user privacy, and practical issues in implementing UCN and ICN.
This book provides comprehensive coverage of the major aspects in designing, implementing, and deploying wireless sensor networks by discussing present research on WSNs and their applications in various disciplines. It familiarizes readers with the current state of WSNs and how such networks can be improved to achieve effectiveness and efficiency. It starts with a detailed introduction of wireless sensor networks and their applications and proceeds with layered architecture of WSNs. It also addresses prominent issues such as mobility, heterogeneity, fault-tolerance, intermittent connectivity, and cross layer optimization along with a number of existing solutions to stimulate future research.
In the NGN world, no truer words are spoken than "the future is now." And the competition in the information networking arena will only intensify in the next 5-10 years. Choosing the correct NGN-VAS strategy now will set your company apart. Value Added Services for Next Generation Networks examines the quest for the real added value in modern communication systems. The author covers more than just the technology itself, but also examines how it is being used and how it could be used to gain a strategic advantage. The book starts with a SOTW analysis for PSTN/GSM operators and new entrants and the threats they will undoubtedly face. The author examines the fundamentals of genuine communication services and the service providers' starting position, then takes you on a tour through the landscape of NGN standards, contrasting the 3GPP IMS architecture with that of IETF, UMA, and OMA. He discusses practical ways to build an NGN SDP and the essential business aspects involved in this enterprise. The book highlights how, technically, the NGN can be interconnected, or glued, to the existing GSM/PSTN infrastructure, justifying the choice of protocols and network architecture. It also describes general concepts, architectural requirements, and technologies in modern VAS platform and new VAS for the NGN in terms of network implementation, end user experience, business scope, and cost/revenue projections. But is NGN just a game of investments in equipment, of CAPEX and OPEX savings? Is the so-called triple play just a matter of marketing, partnerships, and mergers? How will the market play out? Where will the NGN and VAS ultimately go? And more importantly, what is your NGN-VAS strategy? By addressing these questions and more, this book prepares you for success in the emerging telecommunications environment.
This book provides a comprehensive overview of blockchain for 6G-enabled network-based applications. Following the key services of blockchain technology, this book will be instrumental to ideate and understand the necessities, challenges, and various case studies of different 6G-based applications. The emphasis is on understanding the contributions of blockchain technology in 6G-enabled applications, and its aim is to give insights into evolution, research directions, challenges, and the ways to empower 6G applications through blockchain. The book consistently emphasizes the missing connection between blockchain and 6G-enabled network applications. The entire ecosystem between these two futuristic technologies is explained in a comprehensive manner. The book constitutes a one-stop guide to students, researchers, and industry professionals. The book progresses from a general introduction toward more technical aspects while remaining easy to understand throughout. Comprehensive elaboration of material is supplemented with examples and diagrams, followed by easily understandable approaches with regard to technical information given thereon. Blockchain and its applications in 6G-enabled applications can drive many powerful solutions to real-world technical, scientific, and social problems. This book presents the most recent and exciting advances in blockchain for 6G-enabled network applications. Overall, this book is a complete outlet and is designed exclusively for professionals, scientists, technologists, developers, designers, and researchers in network technologies around blockchain integration with IoT, blockchain technology, information technology, and 6G-enabled industrial applications. Secondary readers include professionals involved in policy making and administration, security of public data and law, network policy developers, blockchain technology experts, regulators, and decision makers in government administrations.
Computational Intelligence for Wireless Sensor Networks: Principles and Applications provides an integrative overview of the computational intelligence (CI) in wireless sensor networks and enabled technologies. It aims to demonstrate how the paradigm of computational intelligence can benefit Wireless Sensor Networks (WSNs) and sensor-enabled technologies to overcome their existing issues. This book provides extensive coverage of the multiple design challenges of WSNs and associated technologies such as clustering, routing, media access, security, mobility, and design of energy-efficient network operations. It also describes various CI strategies such as fuzzy computing, evolutionary computing, reinforcement learning, artificial intelligence, swarm intelligence, teaching learning-based optimization, etc. It also discusses applying the techniques mentioned above in wireless sensor networks and sensor-enabled technologies to improve their design. The book offers comprehensive coverage of related topics, including: Emergence of intelligence in wireless sensor networks Taxonomy of computational intelligence Detailed discussion of various metaheuristic techniques Development of intelligent MAC protocols Development of intelligent routing protocols Security management in WSNs This book mainly addresses the challenges pertaining to the development of intelligent network systems via computational intelligence. It provides insights into how intelligence has been pursued and can be further integrated in the development of sensor-enabled applications.
Covers the very latest developments in the field Provides a comprehensive treatment of wireless and mobile networking algorithms and protocols In-text example of solving key problems facing each topic Multiple Choice Questions and Exercises for each chapter with solutions available for instructors Ready-to-Use slides for instructors Ready to use on-line quiz for each chapter topics in Moodle format for instructors Designed for Computer Science students who are more interested in higher layers of networking protocol stack The contents have been successfully used in recent courses by the authors
With the evolution of technology and sudden growth in the number of smart vehicles, traditional Vehicular Ad hoc NETworks (VANETs) face several technical challenges in deployment and management due to less flexibility, scalability, poor connectivity, and inadequate intelligence. VANETs have raised increasing attention from both academic research and industrial aspects resulting from their important role in driving assistant system. Vehicular Ad Hoc Networks focuses on recent advanced technologies and applications that address network protocol design, low latency networking, context-aware interaction, energy efficiency, resource management, security, human-robot interaction, assistive technology and robots, application development, and integration of multiple systems that support Vehicular Networks and smart interactions. Simulation is a key tool for the design and evaluation of Intelligent Transport Systems (ITS) that take advantage of communication-capable vehicles in order to provide valuable safety, traffic management, and infotainment services. It is widely recognized that simulation results are only significant when realistic models are considered within the simulation tool chain. However, quite often research works on the subject are based on simplistic models unable to capture the unique characteristics of vehicular communication networks. The support that different simulation tools offer for such models is discussed, as well as the steps that must be undertaken to fine-tune the model parameters in order to gather realistic results. Moreover, the book provides handy hints and references to help determine the most appropriate tools and models. This book will promote best simulation practices in order to obtain accurate results.
The first book on 6G wireless presents an overall vision for 6G - an era of intelligence-of-everything - with drivers, key capabilities, use cases, KPIs, and the technology innovations that will shape it. These innovations include immersive human-centric communication, sensing, localization, and imaging, connected machine learning and networked AI, Industry 4.0 and beyond with connected intelligence, smart cities and life, and the satellite mega-constellation for 3D full-Earth wireless coverage. Also covered are new air-interface and networking technologies, integrated sensing and communications, and integrated terrestrial and non-terrestrial networks. In addition, novel network architectures to enable network AI, user centric networks, native trustworthiness are discussed. Essential reading for researchers in academia and industry working on B5G wireless communications.
Resource allocation in wireless networks is traditionally
approached either through information theory or communications
networks. To break down the barriers between these distinct
approaches, this book (whose preparation is carried out under the
auspices of the EC Network of Excellence in Wireless Communications
NEWCOM++) bridges the physical and network layers by providing
cross-layer resource allocation techniques, models and
methodologies.
Nowadays, many aspects of electrical and electronic engineering are essentially applications of DSP. This is due to the focus on processing information in the form of digital signals, using certain DSP hardware designed to execute software. Fundamental topics in digital signal processing are introduced with theory, analytical tables, and applications with simulation tools. The book provides a collection of solved problems on digital signal processing and statistical signal processing. The solutions are based directly on the math-formulas given in extensive tables throughout the book, so the reader can solve practical problems on signal processing quickly and efficiently. FEATURES Explains how applications of DSP can be implemented in certain programming environments designed for real time systems, ex. biomedical signal analysis and medical image processing. Pairs theory with basic concepts and supporting analytical tables. Includes an extensive collection of solved problems throughout the text. Fosters the ability to solve practical problems on signal processing without focusing on extended theory. Covers the modeling process and addresses broader fundamental issues.
When choosing the technology options to develop a wireless sensor
network (WSN), it is vital that their performance levels can be
assessed for the type of application intended. This book describes
the different technology options - MAC protocols, routing
protocols, localisation and data fusion techniques - and provides
the means to numerically measure their performance, whether by
simulation, mathematical models or experimental test beds. Case
studies, based on the authors' direct experience of implementing
wireless sensor networks, describe the design methodology and the
type of measurements used, together with samples of the performance
measurements attained.
This book describes and compares both the IPv4 and IPv6 versions of OSPF and IS-IS. It explains OSPF and IS-IS by grounding the analysis on the principles of Link State Routing (LSR). It deliberately separates principles from technologies. Understanding the principles behind the technologies makes the learning process easier and more solid. Moreover, it helps uncovering the dissimilarities and commonalities of OSPF and IS-IS and exposing their stronger and weaker features. The chapters on principles explain the features of LSR protocols and discuss the alternative design options, independently of technologies. The chapters on technologies provide a comprehensive description of OSPF and IS-IS with enough detail for professionals that need to work with these technologies. The final part of the book describes and discusses a large set of experiments with Cisco routers designed to illustrate the various features of OSPF and IS-IS. In particular, the experiments related to the synchronization mechanisms are not usually found in the literature. |
You may like...
The Big Book of Drones
Ralph DeFrangesco, Stephanie DeFrangesco
Paperback
R879
Discovery Miles 8 790
Internet of Things and Cyber Physical…
Keshav Kaushik, Susheela Dahiya, …
Hardcover
R1,876
Discovery Miles 18 760
Biometry - Technology, Trends and…
Ricardo A. Ramirez-Mendoza, Jorge de J. Lozoya-Santos, …
Hardcover
R4,064
Discovery Miles 40 640
3D Printing of Sensors, Actuators, and…
Rupinder Singh, Balwinder Singh Dhaliwal, …
Hardcover
R2,355
Discovery Miles 23 550
Technology for Success - Computer…
Mark Ciampa, Jill West, …
Paperback
(1)
Artificial Intelligence Perspective for…
Sezer Bozkus Kahyaoglu, Vahap Tecim
Hardcover
R3,049
Discovery Miles 30 490
|