![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
This book gathers selected papers presented at the Fourth International Conference on Mechatronics and Intelligent Robotics (ICMIR 2020), held in Kunming, China, on May 22-24, 2020. The proceedings cover new findings in the following areas of research: mechatronics, intelligent mechatronics, robotics and biomimetics; novel and unconventional mechatronic systems; modeling and control of mechatronic systems; elements, structures and mechanisms of micro- and nano-systems; sensors, wireless sensor networks and multi-sensor data fusion; biomedical and rehabilitation engineering, prosthetics and artificial organs; artificial intelligence (AI), neural networks and fuzzy logic in mechatronics and robotics; industrial automation, process control and networked control systems; telerobotics and human-computer interaction; human-robot interaction; robotics and artificial intelligence; bio-inspired robotics; control algorithms and control systems; design theories and principles; evolutional robotics; field robotics; force sensors, accelerometers and other measuring devices; healthcare robotics; kinematics and dynamics analysis; manufacturing robotics; mathematical and computational methodologies in robotics; medical robotics; parallel robots and manipulators; robotic cognition and emotion; robotic perception and decisions; sensor integration, fusion and perception; and social robotics.
Wireless Sensor Networks: Theory and Practice for Deployment addresses WSNs deployment, a mandatory and critical step in the process of developing WSNs solutions for real-life applications. The authors address simple approaches to deploy static WSNs, then exploring more sophisticated approaches to deploy mobile WSNs. Featuring detailed investigations of deployment-related issues such as deployment cost, coverage, connectivity, sensors reliability, and harsh deployment environments, this book will equip you with the basics and an advanced view of both the theoretical and practical aspects, along with knowledge of the guidelines for WSNs deployment.
This book presents best selected papers presented at the International Conference on Emerging Wireless Communication Technologies and Information Security (EWCIS 2020), held from 8th & 9th October 2020 at Amity University Jharkhand, Ranchi, India. The book includes papers in the research area of wireless communications and intelligent systems, signal and image processing in engineering applications, data communication and information security, IoT and cloud computing. The contribution ranges from scientists, engineers and technologists from academia as well as from industry.
Overview and Goals Wireless communication technologies are undergoing rapid advancements. The last few years have experienced a steep growth in research in the area of wireless sensor networks (WSNs). In WSNs, communication takes place with the help of spatially distributedautonomoussensornodesequippedtosensespeci?cinformation. WSNs, especially the ones that have gained much popularity in the recent years, are, ty- cally, ad hoc in nature and they inherit many characteristics/features of wireless ad hoc networks such as the ability for infrastructure-less setup, minimal or no reliance on network planning, and the ability of the nodes to self-organize and self-con?gure without the involvement of a centralized network manager, router, access point, or a switch. These features help to set up WSNs fast in situations where there is no existing network setup or in times when setting up a ?xed infrastructure network is considered infeasible, for example, in times of emergency or during relief - erations. WSNs ?nd a variety of applications in both the military and the civilian population worldwide such as in cases of enemy intrusion in the battle?eld, object tracking, habitat monitoring, patient monitoring, ?re detection, and so on. Even though sensor networks have emerged to be attractive and they hold great promises for our future, there are several challenges that need to be addressed. Some of the well-known challenges are attributed to issues relating to coverage and deployment, scalability, quality-of-service, size, computational power, energy ef?ciency, and security.
This book gathers selected papers presented at the 3rd International Conference on Wireless Communications and Applications (ICWCA 2019), held at Hainan University, China. It covers up-to-date smart theories and approaches, as reflected in contemporary technical achievements in the area. The topics covered include: software-defined networking (SDN) and network function virtualization (NFV), future data center networks, 5G/6G mobile networks, QoS/QoE support in future networks, future Internet of things (IoT) networks, network fault management and service availability, and many others.
This book offers a comprehensive snapshot of practically-relevant developments in the field of smart information technologies. Including selected papers presented at the First International Conference on Smart Information and Communication Technologies, SmartICT 2019, held on September 26-28, in 2019, Saidia, Morocco, it reports on practical findings, and includes useful tutorials concerning current technologies and suggestions to improve them. It covers a wide range of applications, from health and energy management, to digital education, agriculture and cybersecurity, providing readers with a source of new ideas for future research and collaborations.
The topics addressed in this book are crucial for both the academic community and industry, since the vehicular network has become an essential building block for intelligent transportation systems. The systematic principle of this book provides valuable guidance on the deployment and implementation of V2X-enabled road-safety applications. In addition, this book carries out structured technologies from the MAC layer to the link and network layer, which can provide a general introduction for interested readers with a comprehensive understanding of applying vehicular networks in enhancing road safety, and offers a systematized view for researchers and practitioners in the field of vehicular networks to help them optimize and improve the desired vehicular communication systems. Road safety has always been the first priority for daily commuters on the road. Vehicular networks can be an effective solution to enhance road safety, via which vehicles can exchange cooperative awareness messages rapidly, contributing to better situation awareness and maneuvering cooperation. However, with the fast-changing network topology, intermittent wireless link, and dynamic traffic density, it is challenging to achieve satisfying network performance. This book introduces the background of vehicular networks, provides a comprehensive overview of networking techniques in supporting road-safety applications, states the technical motivations per the MAC, link, and network layer, and proposes/designs vehicular networking technologies at the corresponding layer respectively to guarantee low-latency and reliable V2X communications for road-safety applications. By extending the proposed networking technologies to support all types of vehicular services, this book also outlines open issues and research directions in future 5G and beyond vehicular networks.
This book comprises select peer-reviewed papers from the International Conference on VLSI, Signal Processing, Power Electronics, IoT, Communication and Embedded Systems (VSPICE-2020). The book provides insights into various aspects of the emerging fields in the areas Electronics and Communication Engineering as a holistic approach. The various topics covered in this book include VLSI, embedded systems, signal processing, communication, power electronics and internet of things. This book mainly focuses on the most recent innovations, trends, concerns and practical challenges and their solutions. This book will be useful for academicians, professionals and researchers in the area of electronics and communications and electrical engineering.
This book presents architectural solutions of wireless network and its variations. It basically deals with modeling, analysis, design and enhancement of different architectural parts of wireless network. The main aim of this book is to enhance the applications of wireless network by reducing and controlling its architectural issues. The book discusses efficiency and robustness of wireless network as a platform for communication and data transmission and also discusses some challenges and security issues such as limited hardware resources, unreliable communication, dynamic topology of some wireless networks, vulnerability and unsecure environment. This book is edited for users, academicians and researchers of wireless network. Broadly, topics include modeling of security enhancements, optimization model for network lifetime, modeling of aggregation systems and analyzing of troubleshooting techniques.
This book presents the proceedings of the 3rd International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2020), sponsored by Ryerson University, Toronto, Canada, May 6-8, 2020. The WIDECOM conference solicits papers addressing issues related to new dependability paradigms, design, and performance of dependable network computing and mobile systems, as well as issues related to the security of these systems. The goal of the conference is to provide a forum for researchers, students, scientists and engineers working in academia and industry to share their experiences, new ideas and research results in the above-mentioned areas. Presents the proceedings of the International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2020), Ryerson University, Toronto, Canada, May 6-8, 2020; Includes an array of topics networking computing, mobile/ubiquitous systems, cloud systems, and IoT systems; Addresses issues related to protecting information security and establishing trust in the digital space.
This book focuses primarily on the nature-inspired approach for designing smart applications. It includes several implementation paradigms such as design and path planning of wireless network, security mechanism and implementation for dynamic as well as static nodes, learning method of cloud computing, data exploration and management, data analysis and optimization, decision taking in conflicting environment, etc. The book fundamentally highlights the recent research advancements in the field of engineering and science.
The book reports two approaches of implementation of the essential components of a Digital Phase Locked Loop based system for dealing with wireless channels showing Nakagami-m fading. It is mostly observed in mobile communication. In the first approach, the structure of a Digital phase locked loop (DPLL) based on Zero Crossing (ZC) algorithm is proposed. In a modified form, the structure of a DPLL based systems for dealing with Nakagami-m fading based on Least Square Polynomial Fitting Filter is proposed, which operates at moderate sampling frequencies. A sixth order Least Square Polynomial Fitting (LSPF) block and Roots Approximator (RA) for better phase-frequency detection has been implemented as a replacement of Phase Frequency Detector (PFD) and Loop Filter (LF) of a traditional DPLL, which has helped to attain optimum performance of DPLL. The results of simulation of the proposed DPLL with Nakagami-m fading and QPSK modulation is discussed in detail which shows that the proposed method provides better performance than existing systems of similar type.
This book presents the state of the art of Internet of Things (IoT) from the perspective of healthcare and Ambient Assisted Living (AAL). It discusses the emerging technologies in healthcare services used for healthcare professionals and patients for enhanced living environments and public health. The topics covered in this book include emerging eHealth IoT applications, Internet of Medical Things, health sensors, and wearable sensors for pervasive and personalized healthcare, and smart homes applications for enhanced health and well-being. The book also presents various ideas for the design and development of IoT solutions for healthcare and AAL. It will be useful for bioengineers and professionals working in the areas of healthcare as well as health informatics.
Distributed MIMO and cell-free mobile communication are emerging technologies of wireless communication. This book introduces the fundamental theory, key technology and the prototype system of distributed MIMO and cellular free mobile communication system, including the unified system model, capacity and spectral efficiency analysis under imperfect channel information, cell edge effect, optimal power allocation and energy efficiency optimization, cache optimization, low complexity wireless transmission technology and new network assisted full duplex technology. In addition, the implementation of software and hardware and test results of distributed MIMO and cell free system based on cloud architecture are introduced in detail.This book will benefit senior undergraduates, postgraduates, scholars and engineers who are engaged in wireless mobile communication research. It can also be used as a reference book for postgraduates and researchers in the field of electronic and information engineering.
Green communications is a very hot topic. As mobile networks evolve in terms of higher rates/throughput, a consequent impact on operating costs is due to (aggregate) network energy consumption. As such, design on 4G networks and beyond have increasingly started to focus on 'energy efficiency or so-called green networks. Many techniques and solutions have been proposed to enhance the energy efficiency of mobile networks, yet no book has provided an in-depth analysis of the energy consumption issues in mobile networks nor has detailed theories, tools and solutions for solving the energy efficiency problems. This book presents the techniques and solutions for enhancing energy efficiency of future mobile networks, and consists of three major parts. The first part presents a general description of mobile network evolution in terms of both capacity and energy efficiency. The second part discusses the advanced techniques to green mobile networks. The third part discusses the solutions that enhance mobile network energy efficiency as well as provides future directions. Whilst the reader is expected to have basic knowledge of wireless communications, the authors present a brief introduction of the evolution of mobile networks, providing the knowledge base for understanding the content of the book. In addition, complicated network problems are illustrated using simple examples. This will help the reader understand the concept and intuition of various techniques and solutions. * Incorporates the latest research results from both academia and industry, providing an up-to-date overview of existing technologies and solutions on making mobile networks greener * Consists of three sections with a gradually increasing technical depth on green mobile networks, providing the reader with a systematic view of the research area, and helping those with different technical backgrounds to better understand the content * Covers existing enabling technologies for green mobile networking, including an innovative discussion of state-of-the-art solutions and algorithms
This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which could change "the easy-to-attack and difficult-to-defend game" in cyberspace. The endogenous uncertain effects from the targets of the software/hardware based on this architecture can produce magic "mimic defense fog", and suppress in a normalized mode random disturbances caused by physical or logic elements, as well as effects of non-probability disturbances brought by uncertain security threats. Although progress has been made in the current security defense theories in cyberspace and various types of security technologies have come into being, the effectiveness of such theories and technologies often depends on the scale of the prior knowledge of the attackers, on the part of the defender and on the acquired real-timing and accuracy regarding the attackers' behavior features and other information. Hence, there lacks an efficient active defense means to deal with uncertain security threats from the unknown. Even if the bottom-line defense technologies such as encrypted verification are adopted, the security of hardware/software products cannot be quantitatively designed, verified or measured. Due to the "loose coupling" relationship and border defense modes between the defender and the protected target, there exist insurmountable theoretical and technological challenges in the protection of the defender and the target against the utilization of internal vulnerabilities or backdoors, as well as in dealing with attack scenarios based on backdoor-activated collaboration from both inside and outside, no matter how augmented or accumulated protective measures are adopted. Therefore, it is urgent to jump out of the stereotyped thinking based on conventional defense theories and technologies, find new theories and methods to effectively reduce the utilization of vulnerabilities and backdoors of the targets without relying on the priori knowledge and feature information, and to develop new technological means to offset uncertain threats based on unknown vulnerabilities and backdoors from an innovative perspective. This book provides a solution both in theory and engineering implementation to the difficult problem of how to avoid the uncontrollability of product security caused by globalized marketing, COTS and non-trustworthy software/hardware sources. It has been proved that this revolutionary enabling technology has endowed software/hardware products in IT/ICT/CPS with endogenous security functions and has overturned the attack theories and methods based on hardware/software design defects or resident malicious codes. This book is designed for educators, theoretical and technological researchers in cyber security and autonomous control and for business technicians who are engaged in the research on developing a new generation of software/hardware products by using endogenous security enabling technologies and for other product users. Postgraduates in IT/ICT/CPS/ICS will discover that (as long as the law of "structure determines the nature and architecture determines the security is properly used), the problem of software/hardware design defects or malicious code embedding will become the swelling of Achilles in the process of informationization and will no longer haunt Pandora's box in cyberspace. Security and opening-up, advanced progressiveness and controllability seem to be contradictory, but there can be theoretically and technologically unified solutions to the problem.
Focusing on inductive wireless power transfer (WPT), which relies on coil resonators and power converters, this book begins by providing the background and basic theories of WPT, which are essential for newcomers to the field. Then two major challenges of WPT - power transfer distance and efficiency - are subsequently addressed, and multi-resonator WPT systems, which not only offer a way to extend power transfer distance but also provide more flexibility, are investigated. Recent findings on techniques to maximize the power transfer efficiency of WPT systems, e.g. maximum efficiency point tracking, are also introduced. Without the constraint of cables, wireless power transfer (WPT) is an elegant technique for charging or powering a range of electrical devices, e.g. electric vehicles, mobile phones, artificial hearts, etc. Given its depth of coverage, the book can serve as a technical guideline or reference guide for engineers and researchers working on WPT.
This book comprises select peer-reviewed proceedings of the international conference on Research in Intelligent and Computing in Engineering (RICE 2020) held at Thu Dau Mot University, Vietnam. The volume primarily focuses on latest research and advances in various computing models such as centralized, distributed, cluster, grid, and cloud computing. Practical examples and real-life applications of wireless sensor networks, mobile ad hoc networks, and internet of things, data mining and machine learning are also covered in the book. The contents aim to enable researchers and professionals to tackle the rapidly growing needs of network applications and the various complexities associated with them.
This book covers how Internet of Things (IoT) has a role in shaping the future of our communities. The author shows how the research and education ecosystem promoting impactful solutions-oriented science can help citizenry, government, industry, and other stakeholders to work collaboratively in order to make informed, socially-responsible, science-based decisions. Accordingly, he shows how communities can address complex, interconnected socio-environmental challenges. This book addresses the key inter-related challenges in areas such as the environment, climate change, mining, energy, agro-economic, water, and forestry that are limiting the development of a sustainable and resilient society -- each of these challenges are tied back to IoT based solutions. Presents research into sustainable IoT with respect to wireless communications, sensing, and systems Provides coverage of IoT technologies in sustainability, health, agriculture, climate change, mining, energy, water management, and forestry Relevant for academics, researchers, policy makers, city planners and managers, technicians, and industry professionals in IoT and sustainability
Focusing on soft computing techniques and application in various engineering research domains, this book presents the state-of-the-art outcomes from ongoing research works being conducted in various research laboratories and educational institutions. The included research works deal with estimated models and give resolutions to complex real-life issues. In the field of evolutionary computing and other domains of applications, such as, data mining and fuzzy logic, soft computing techniques play an incomparable role, where it successfully handles contemporary computationally intensive and complex problems that have usually appeared to be inflexible to traditional mathematical methods. Comprising the concepts and applications of soft computing with other emerging research domains, this book cherishes varieties of modern applications in the fields of natural language processing, image processing, biomedical engineering, communication, control systems, circuit design etc.
This book provides applications of wireless sensor networks (WSN) in environmental monitoring, with an emphasis on livestock disease detection and agricultural management in Africa to aid farmers. This proposed system entails current and innovative monitoring technologies intended to improve agricultural conditions in Africa, with a focus on Botswana, and addresses the Internet of Things (IoT) as a set of remote monitoring protocols using WSNs to improve and ensure proper environmental maintenance. In this book, the author introduces WSNs, and how the IoT can be applied to develop a system of "smart agriculture" in Africa, taking into account livestock health, climate change impacts on crops and wildlife, and technological innovations in response to climate change such as windmills and solar panels. The book will be interesting to students and researchers in engineering and life sciences, as well as practitioners working with sensing technologies for agricultural monitoring and improvement.
This book presents reinforcement learning (RL) based solutions for user-centric online network selection optimization. The main content can be divided into three parts. The first part (chapter 2 and 3) focuses on how to learning the best network when QoE is revealed beyond QoS under the framework of multi-armed bandit (MAB). The second part (chapter 4 and 5) focuses on how to meet dynamic user demand in complex and uncertain heterogeneous wireless networks under the framework of markov decision process (MDP). The third part (chapter 6 and 7) focuses on how to meet heterogeneous user demand for multiple users inlarge-scale networks under the framework of game theory. Efficient RL algorithms with practical constraints and considerations are proposed to optimize QoE for realizing intelligent online network selection for future mobile networks. This book is intended as a reference resource for researchers and designers in resource management of 5G networks and beyond.
This book discusses how to plan the time-variant placements of the UAVs served as base station (BS)/relay, which is very challenging due to the complicated 3D propagation environments, as well as many other practical constraints such as power and flying speed. Spectrum sharing with existing cellular networks is also investigated in this book. The emerging unmanned aerial vehicles (UAVs) have been playing an increasing role in the military, public, and civil applications. To seamlessly integrate UAVs into future cellular networks, this book will cover two main scenarios of UAV applications as follows. The first type of applications can be referred to as UAV Assisted Cellular Communications. Second type of application is to exploit UAVs for sensing purposes, such as smart agriculture, security monitoring, and traffic surveillance. Due to the limited computation capability of UAVs, the real-time sensory data needs to be transmitted to the BS for real-time data processing. The cellular networks are necessarily committed to support the data transmission for UAVs, which the authors refer to as Cellular assisted UAV Sensing. To support real-time sensing streaming, the authors design joint sensing and communication protocols, develop novel beamforming and estimation algorithms, and study efficient distributed resource optimization methods. This book targets signal processing engineers, computer and information scientists, applied mathematicians and statisticians, as well as systems engineers to carve out the role that analytical and experimental engineering has to play in UAV research and development. Undergraduate students, industry managers, government research agency workers and general readers interested in the fields of communications and networks will also want to read this book.
This book gathers high-quality peer-reviewed research papers presented at the International Conference on Intelligent Computing and Networking (IC-ICN 2020), organized by the Computer Department, Thakur College of Engineering and Technology, in Mumbai, Maharashtra, India, on February 28-29, 2020. The book includes innovative and novel papers in the areas of intelligent computing, artificial intelligence, machine learning, deep learning, fuzzy logic, natural language processing, human-machine interaction, big data mining, data science and mining, applications of intelligent systems in healthcare, finance, agriculture and manufacturing, high-performance computing, computer networking, sensor and wireless networks, Internet of Things (IoT), software-defined networks, cryptography, mobile computing, digital forensics and blockchain technology.
This book comprises selected peer-reviewed papers from the International Conference on VLSI, Signal Processing, Power Systems, Illumination and Lighting Control, Communication and Embedded Systems (VSPICE-2019). The contents are divided into five broad topics - VLSI and embedded systems, signal processing, power systems, illumination and control, and communication and networking. The book focuses on the latest innovations, trends, and challenges encountered in the different areas of electronics and communication, and electrical engineering. It also offers potential solutions and provides an insight into various emerging areas such as image fusion, bio-sensors, and underwater sensor networks. This book can prove to be useful for academics and professionals interested in the various sub-fields of electronics and communication engineering. |
![]() ![]() You may like...
Discovering Computers, Essentials…
Susan Sebok, Jennifer Campbell, …
Paperback
Focus On Map Skills - Grades 10, 11, 12…
J. Earle, P. Bowerman
Paperback
![]() R272 Discovery Miles 2 720
|