![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
This book covers issues related to 5G network security. The authors start by providing details on network architecture and key requirements. They then outline the issues concerning security policies and various solutions that can handle these policies. Use of SDN-NFV technologies for security enhancement is also covered. The book includes intelligent solutions by utilizing the features of artificial intelligence and machine learning to improve the performance of the 5G security protocols and models. Optimization of security models is covered as a separate section with a detailed information on the security of 5G-based edge, fog, and osmotic computing. This book provides detailed guidance and reference material for academicians, professionals, and researchers. Presents extensive information and data on research and challenges in 5G networks; Covers basic architectures, models, security frameworks, and software-defined solutions for security issues in 5G networks; Provides solutions that can help in the growth of new startups as well as research directions concerning the future of 5G networks.
The Wireless Metropolitan Area Network (WirelessMAN) is a promising Broadband Wireless Access (BWA) technology that provides high-speed, high-bandwidth efficiency and high-capacity multimedia services for both residential and enterprise applications. Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks examines the basic concepts, recent advances, and latest standard specifications pertinent to WirelessMANs, placing emphasis on IEEE 802.16-based WiMAX. After introducing the basics of WirelessMAN, the book addresses topics in three accessible parts. The first part focuses on radio frequency (RF), signal processing, multiple in-multiple out (MIMO) technology, and identifying challenges and possible solutions in the physical layer. An examination of protocol issues follows, including those involving medium access control (MAC), quality of service (QoS) in point-to-multi-point (PMP) and mesh networks, cross layer optimization, mobility management, handoff in heterogeneous networks, energy management, and link adaptation mechanisms. The final part considers issues regarding security, economy, and system capacity in the WiMAX. Mobile WiMAX: Toward Broadband Wireless Metropolitan Area Networks is an important resource for those interested in understanding all aspects relevant to the technical, practical, economic, and policy issues concerning WirelessMANs. It offers comprehensive practical and technical guidance on the fundamentals and recent advances in general WirelessMAN, as well as the latest standard specifications in IEEE 802.16a/c/d/e families.
Intellectual property owners must continually exploit new ways of reproducing, distributing, and marketing their products. However, the threat of piracy looms as a major problem with digital distribution and storage technologies. Multimedia Watermarking Techniques and Applications covers all current and future trends in the design of modern systems that use watermarking to protect multimedia content. Containing the works of contributing authors who are worldwide experts in the field, this volume is intended for researchers and practitioners, as well as for those who want a broad understanding of multimedia security. In the wake of the explosive growth of digital entertainment and Internet applications, this book is the definitive resource on the subject for scientists, researchers, programmers, engineers, business managers, entrepreneurs, and investors.
Digital signal processing is ubiquitous. It is an essential ingredient in many of today's electronic devices, ranging from medical equipment to weapon systems. It makes the difference between dumb and intelligent systems. This book is organized into five parts: (1) Introduction, which contains an account of Prof. Constantinides' contribution to the field and brief summaries of the remaining chapters of this festschrift, (2) Digital Filters and Transforms, which covers efficient digital filtering techniques for improving signal quality, (3) Signal Processing, which provides an insight into fundamental theories, (4) Communications, which deals with some important applications of signal processing techniques, and (5) Finale, which contains a discussion on the impact of digital signal processing on our society and the closing remarks on this festschrift.
This book covers various aspects of security, privacy and reliability in Internet of Things (IoT) and Cyber-Physical System design, analysis and testing. In particular, various established theories and practices both from academia and industry are presented and suitably organized targeting students, engineers and researchers. Fifteen leading academicians and practitioners wrote this book, pointing to the open problems and biggest challenges on which research in the near future will be focused.
Design of Ultra Wideband Antenna Matching Networks: via Simplified Real Frequency Technique (SRFT) will open up a new horizon for design engineers, researchers, undergraduate and graduate students to construct multi-band and ultra wideband antenna matching networks for antennas which in turn will push the edge of technology to manufacture new generation of complex communication systems beyond microwave frequencies both in commercial and military line. In Design of Ultra Wideband Antenna Matching Networks, many real life examples are presented to design antenna matching networks over HF and cellular commercial multi-band frequencies. For each example, open MatLab source codes are provided so that the reader can easily generate and verify the results of the examples included in the book.
The book presents design methods for analog integrated circuits with improved electrical performance. It describes different equivalent transistor models, design methods, and fabrication considerations for high-density integrated circuits in nanometer CMOS processes, and it analyzes circuit architectures that are suitable for analog building blocks. Highlighting various design challenges, the text offers a complete understanding of architectural- and transistor-level design issues of analog integrated circuits. It examines important trends in the design of high-speed and power-efficient front-end analog circuits that can be used for signal conditioning, filtering, and detection applications. Offers a comprehensive resource for mastering the analysis of analog integrated circuits. Describes circuit-level details of high-speed and power-efficient analog building blocks. Explores design methods based on various MOS transistor models (MOSFET, FinFET). Provides mathematical derivations of all equations and formulas. Emphasizes practical aspects relevant to integrated circuit implementation. Includes open-ended circuit design case studies.
Digital worlds and cultures-social media, web 2.0, youtube, wearable technologies, health and fitness apps-dominate, if not order, our everyday lives. We are no longer 'just' consumers or readers of digital culture but active producers through facebook, twitter, Instagram, youtube and other emerging technologies. This book is predicated on the assumption that out understanding of our everyday lives should be informed by what is taking place in and through emerging technologies given these (virtual) environments provide a crucial context where traditional, categorical assumptions about the body, identity and leisure may be contested. Far from being 'virtual', the body is constituted within and through emerging technologies in material ways. Recent 'moral panics' over the role of digital cultures in teen suicide, digital drinking games, an endless array of homoerotic images of young bodies being linked with steroid use, disordered eating and body dissatisfaction, facebook games/fundraising campaigns (e.g. for breast cancer), movements devoted to exposing 'everyday sexism' / metoo, twitter abuse (of feminists, of athletes, of racist nature to name but a few), speak to the need for critical engagement with digital cultures. While some of the earlier techno-utopian visions offered the promise of digitality to give rise to participatory, user generator collaborations, within this book we provide critical engagement with digital technologies and what this means for our understandings of leisure cultures. The chapters originally published in a special issue in Leisure Studies.
Crowd computing, crowdsourcing, crowd-associated network (CrAN), crowd-assisted sensing are some examples of crowd-based concepts that harness the power of people on the web or connected via web-like infrastructure to do tasks that are often difficult for individual users or computers to do alone. This creates many challenging issues like assessing reliability and correctness of crowd generated information, delivery of data and information via crowd, middleware for supporting crowdsourcing and crowd computing tasks, crowd associated networking and its security, Quality of Information (QoI) issues, etc. This book compiles the latest advances in the relevant fields.
The book offers unique insight into the modern world of wireless communication that included 5G generation, implementation in Internet of Things (IoT), and emerging biomedical applications. To meet different design requirements, gaining perspective on systems is important. Written by international experts in industry and academia, the intended audience is practicing engineers with some electronics background. It presents the latest research and practices in wireless communication, as industry prepares for the next evolution towards a trillion interconnected devices. The text further explains how modern RF wireless systems may handle such a large number of wireless devices. Covers modern wireless technologies (5G, IoT), and emerging biomedical applications Discusses novel RF systems, CMOS low power circuit implementation, antennae arrays, circuits for medical imaging, and many other emerging technologies in wireless co-space. Written by a mixture of top industrial experts and key academic professors.
This book presents a unified framework for the tractable analysis of large-scale, multi-antenna wireless networks using stochastic geometry. This mathematical analysis is essential for assessing and understanding the performance of complicated multi-antenna networks, which are one of the foundations of 5G and beyond networks to meet the ever-increasing demands for network capacity. Describing the salient properties of the framework, which makes the analysis of multi-antenna networks comparable to that of their single-antenna counterparts, the book discusses effective design approaches that do not require complex system-level simulations. It also includes various application examples with different multi-antenna network models to illustrate the framework's effectiveness.
This book presents best selected papers presented at the International Conference on Evolving Technologies for Computing, Communication and Smart World (ETCCS 2020) held on 31 January-1 February 2020 at C-DAC, Noida, India. It is co-organized by Southern Federal University, Russia; University of Jan Wyzykowski (UJW), Polkowice, Poland; and CSI, India. C-DAC, Noida received funding from MietY during the event. The technical services are supported through EasyChair, Turnitin, MailChimp and IAC Education. The book includes current research works in the areas of network and computing technologies, wireless networks and Internet of things (IoT), futuristic computing technologies, communication technologies, security and privacy.
First Published in 2018. Routledge is an imprint of Taylor & Francis, an Informa company.
This book presents the peer-reviewed contributions of ICMWT2016, an international conference devoted to mobile and wireless technology. Researchers and professionals from academia and industry met to discuss the cutting-edge developments in the field. The book includes papers on mobile and wireless networks, the increasingly important security issues, data management, as well as the latest developments in mobile software development.
Advanced Electromagnetic Computation with MATLAB (R) discusses commercial electromagnetic software, widely used in the industry. Algorithms of Finite Differences, Moment method, Finite Element method and Finite Difference Time Domain method are illustrated. Hand-computed simple examples and MATLAB-coded examples are used to explain the concepts behind the algorithms. Case studies of practical examples from transmission lines, waveguides, and electrostatic problems are given so students are able to develop the code and solve the problems. Two new chapters including advanced methods based on perturbation techniques and three dimensional finite element examples from radiation scattering are included.
Transforms and Applications Primer for Engineers with Examples and MATLAB is required reading for engineering and science students, professionals, and anyone working on problems involving transforms. This invaluable primer contains the most essential integral transforms that both practicing engineers and students need to understand. It provides a large number of examples to explain the use of transforms in different areas, including circuit analysis, differential equations, signals and systems, and mechanical vibrations. Includes an appendix with suggestions and explanations to help you optimize your use of MATLAB Laplace and Fourier transforms are by far the most widely used and most useful of all integral transforms, so they are given a more extensive treatment in this book, compared to other texts that include them. Offering numerous MATLAB functions created by the author, this comprehensive book contains several appendices to complement the main subjects. Perhaps the most important feature is the extensive tables of transforms, which are provided to supplement the learning process. This book presents advanced material in a format that makes it easier to understand, further enhancing its immense value as a teaching tool for engineers and research scientists in academia and industry, as well as students in science and engineering.
An in-depth overview of the emerging concept; Mobile Health (mHealth), mHealth Multidisciplinary Verticals links applications and technologies to key market and vendor players. It also highlights interdependencies and synergies between various stakeholders which drive the research forces behind mHealth. The book explores the trends and directions where this vertical market is headed. Divided into nine sections, the book covers a number of multidisciplinary verticals within the field of mHealth such as: Preventive and curative medicine Consumer and patient-centric approaches Psychological, behavioral, and mental verticals Social perspectives Education, adoption, and acceptance Aged care and the aging population Regional, geographical, and public-health perspectives Technology implications Cloud applications The book collates emerging and diverse mHealth applications into a single resource. The result of extensive research, the book is a collaborative effort between experts from more than 20 countries, who have been carefully reviewed and selected by the team of reviewers. It takes a multidisciplinary approach to health informatics and provides a roadmap to current and future directions of mHealth.
Presenting encryption algorithms with diverse characteristics, Image Encryption: A Communication Perspective examines image encryption algorithms for the purpose of secure wireless communication. It considers two directions for image encryption: permutation-based approaches and substitution-based approaches. Covering the spectrum of image encryption principles and techniques, the book compares image encryption with permutation- and diffusion-based approaches. It explores number theory-based encryption algorithms such as the Data Encryption Standard, the Advanced Encryption Standard, and the RC6 algorithms. It not only details the strength of various encryption algorithms, but also describes their ability to work within the limitations of wireless communication systems. Since some ciphers were not designed for image encryption, the book explains how to modify these ciphers to work for image encryption. It also provides instruction on how to search for other approaches suitable for this task. To make this work comprehensive, the authors explore communication concepts concentrating on the orthogonal frequency division multiplexing (OFDM) system and present a simplified model for the OFDM communication system with its different implementations. Complete with simulation experiments and MATLAB (R) codes for most of the simulation experiments, this book will help you gain the understanding required to select the encryption method that best fulfills your application requirements.
Simulation is a widely used mechanism for validating the theoretical models of networking and communication systems. Although the claims made based on simulations are considered to be reliable, how reliable they really are is best determined with real-world implementation trials. Simulation Technologies in Networking and Communications: Selecting the Best Tool for the Test addresses the spectrum of issues regarding the different mechanisms related to simulation technologies in networking and communications fields. Focusing on the practice of simulation testing instead of the theory, it presents the work of more than 50 experts from around the world. Considers superefficient Monte Carlo simulations Describes how to simulate and evaluate multicast routing algorithms Covers simulation tools for cloud computing and broadband passive optical networks Reports on recent developments in simulation tools for WSNs Examines modeling and simulation of vehicular networks The book compiles expert perspectives about the simulation of various networking and communications technologies. These experts review and evaluate popular simulation modeling tools and recommend the best tools for your specific tests. They also explain how to determine when theoretical modeling would be preferred over simulation. This book does not provide a verdict on the best suitable tool for simulation. Instead, it supplies authoritative analyses of the different kinds of networks and systems. Presenting best practices and insights from global experts, the book provides you with an understanding of what to simulate, where to simulate, whether to simulate or not, when to simulate, and how to simulate for a wide range of issues.
The third edition of Digital Logic Techniques provides a clear and comprehensive treatment of the representation of data, operations on data, combinational logic design, sequential logic, computer architecture, and practical digital circuits. A wealth of exercises and worked examples in each chapter give students valuable experience in applying the concepts and techniques discussed. Beginning with an objective comparison between analogue and digital representation of data, the author presents the Boolean algebra framework for digital electronics, develops combinational logic design from first principles, and presents cellular logic as an alternative structure more relevant than canonical forms to VLSI implementation. He then addresses sequential logic design and develops a strategy for designing finite state machines, giving students a solid foundation for more advanced studies in automata theory. The second half of the book focuses on the digital system as an entity. Here the author examines the implementation of logic systems in programmable hardware, outlines the specification of a system, explores arithmetic processors, and elucidates fault diagnosis. The final chapter examines the electrical properties of logic components, compares the different logic families, and highlights the problems that can arise in constructing practical hardware systems.
Until recently, most network design techniques employed a bottom-up approach with lower protocol layer mechanisms affecting the development of higher ones. This approach, however, has not yielded fascinating results in the case of wireless distributed networks. Addressing the emerging aspects of modern network analysis and design, Evolutionary Dynamics of Complex Communications Networks introduces and develops a top-bottom approach where elements of the higher layer can be exploited in modifying the lowest physical topology-closing the network design loop in an evolutionary fashion similar to that observed in natural processes. This book provides a complete overview of contemporary design approaches from the viewpoint of network science and complex/social network analysis. A significant part of the text focuses on the classification and analysis of various network modification mechanisms for wireless decentralized networks that exploit social features from relevant online social networks. Each chapter begins with learning objectives and introductory material and slowly builds to more detailed analysis and advanced concepts. Each chapter also identifies open issues, while by the end of the book, potential research directions are summarized for the more interested researcher or graduate student. The approach outlined in the book will help network designers and administrators increase the value of their infrastructure without requiring any significant additional investment. Topics covered include: basic network graph models and properties, cognitive methods and evolutionary computing, complex and social network analysis metrics and features, and analysis and development of the distinctive structure and features of complex networks. Considering all aspects of modern network analysis and design, the text covers the necessary material and background to make it a suitable source of reference for graduate students, postdoctoral researchers, and scientists
Window functions-otherwise known as weighting functions, tapering functions, or apodization functions-are mathematical functions that are zero-valued outside the chosen interval. They are well established as a vital part of digital signal processing. Window Functions and their Applications in Signal Processing presents an exhaustive and detailed account of window functions and their applications in signal processing, focusing on the areas of digital spectral analysis, design of FIR filters, pulse compression radar, and speech signal processing. Comprehensively reviewing previous research and recent developments, this book: Provides suggestions on how to choose a window function for particular applications Discusses Fourier analysis techniques and pitfalls in the computation of the DFT Introduces window functions in the continuous-time and discrete-time domains Considers two implementation strategies of window functions in the time- and frequency domain Explores well-known applications of window functions in the fields of radar, sonar, biomedical signal analysis, audio processing, and synthetic aperture radar
The rapid advancement of various wireless communication system services has created the need to analyze the possibility of their performance improvement. Introducing the basic principles of digital communications performance analysis and its mathematical formalization, Fading and Interference Mitigation in Wireless Communications will help you stay up to date with recent developments in the performance analysis of space diversity reception over fading channels in the presence of cochannel interference. The book presents a unified method for computing the performance of digital communication systems characterized by a variety of modulation and detection types and channel models. Explaining the necessary concepts of digital communication system design, the book guides you step by step through the basics of performance analysis of digital communication receivers. Supplying you with the tools to perform an accurate performance evaluation of the proposed communication scenarios, the book includes coverage of multichannel reception in various fading environments, influence of cochannel interference, and macrodiversity reception when channels are simultaneously affected by various types of fading and shadowing. It also includes many numerical illustrations of applications that correspond to practical systems. The book presents a large collection of system performance curves to help researchers and system designers perform their own tradeoff studies. The presented collection of system performances will help you perform trade-off studies among the various communication type/drawback combinations in order to determine the optimal choice considering the available constraints. The concepts covered in this book can be useful across a range of applications, including wireless, satellite, terrestrial, and maritime communications.
This book describes the design and implementation of an electronic subsystem called the frequency synthesizer, which is a very important building block for any wireless transceiver. The discussion includes several new techniques for the design of such a subsystem which include the usage modes of the wireless device, including its support for several leading-edge wireless standards. This new perspective for designing such a demanding subsystem is based on the fact that optimizing the performance of a complete system is not always achieved by optimizing the performance of its building blocks separately. This book provides "hands-on" examples of this sort of co-design of optimized subsystems, which can make the vision of an always-best-connected scenario a reality."
Cooperative Cognitive Radio Networks: The Complete Spectrum Cycle provides a solid understanding of the foundations of cognitive radio technology, from spectrum sensing, access, and handoff to routing, trading, and security. Written in a tutorial style with several illustrative examples, this comprehensive book: Gives an overview of cognitive radio systems and explains the different components of the spectrum cycle Features step-by-step analyses of the different algorithms and systems, supported by extensive computer simulations, figures, tables, and references Fulfills the need for a single source of information on all aspects of the spectrum cycle, including the physical, link, medium access, network, and application layers Offering a unifying view of the various approaches and methodologies, Cooperative Cognitive Radio Networks: The Complete Spectrum Cycle presents the state of the art of cognitive radio technology, addressing all phases of the spectrum access cycle. |
You may like...
Wireless Sensor and Actuator Networks…
Roberto Verdone, Davide Dardari, …
Hardcover
R2,237
Discovery Miles 22 370
Cellular Internet of Things - From…
Olof Liberg, Marten Sundberg, …
Paperback
R2,403
Discovery Miles 24 030
Intelligent Wireless Communications
George Mastorakis, Constandinos X. Mavromoustakis, …
Hardcover
Advances in Body-Centric Wireless…
Qammer H. Abbasi, Masood Ur Rehman, …
Hardcover
Handbook of Research on Advances in Data…
P. Venkata Krishna
Hardcover
R9,276
Discovery Miles 92 760
Cross-Layer Resource Allocation in…
Ana I. Perez-Neira, Marc Realp Campalans
Hardcover
R1,930
Discovery Miles 19 300
Real Time Convex Optimisation for 5G…
Long D. Nguyen, Trung Q. Duong, …
Hardcover
RF / Microwave Circuit Design for…
Ulrich L. Rohde, Matthias Rudolph
Hardcover
R4,952
Discovery Miles 49 520
Sliding Mode in Intellectual Control and…
Vardan Mkrttchian, Ekaterina Aleshina
Hardcover
R3,515
Discovery Miles 35 150
Wireless Mesh Networks for IoT and Smart…
Luca Davoli, Gianluigi Ferrari
Hardcover
|