![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
Understand the theoretical principles, key technologies and applications of UDNs with this authoritative survey. Theory is explained in a clear, step-by-step manner, and recent advances and open research challenges in UDN physical layer design, resource allocation and network management are described, with examples, in the context of B5G and 6G standardization. Topics covered include NOMA-based physical layer design, physical layer security. Interference management, 3D base station deployment, software defined UDNs, wireless edge caching in UDNs, UDN-based UAVs and field trials and tests. A perfect resource for graduate students, researchers and professionals who need to get up to speed on the state of the art and future opportunities in UDNs.
Over the last two decades, fieldbus has totally revolutionized the way communication takes place in the fields of process control, automation, and manufacturing industries. Recent introduction of real-time fieldbuses has opened up its application in multi-axis motor control and other time-critical applications. Fieldbus is designed to ensure easy interoperability, smarter network designs, increased data availability, and lessened stress on the design aspects of safety protocols. This second edition of Fieldbus and Networking in Process Automation discusses the different facets of fieldbus technology including design, wiring, installation, and commissioning as well as safety aspects in hostile application areas. The book: * Explains basic communication principles and networking-a must for understanding fieldbuses * Considers the advantages and shortcomings of individual fieldbuses * Provides a broad spectrum of different fieldbuses used in both process control and manufacturing industries in a precise and to-the-point manner * Introduces Common Industrial Protocol (CIP), EtherNet/IP, EtherCAT, SERCOS III, Powerlink, and Profinet IRT, which are mostly sought after in control and automation fields * Discusses hard real-time communication in a succinct manner-so essential in today's multi-axis motor control systems * Updates and streamlines the extra details from the original book to make it more concise and reader friendly Sunit Kumar Sen, a member of IET, holds advanced degrees from St Xavier's College and University of Calcutta, both in Kolkata, India. He was an ex-professor in the Instrumentation Engineering section of the Department of Applied Physics, University of Calcutta, and taught courses in digital electronics, communication, industrial instrumentation, microprocessors, electrical networks, and fieldbuses. He was the head of the Department of Applied Physics and University Science Instrumentation Center from 2008-2010 at the University of Calcutta. Previously, he was assistant manager, instrumentation (oprn.) at the Bokaro Steel Plant, Jharkhand, India, under the Steel Authority of India (SAIL). He has already written four books in the areas of instrumentation, microprocessors, and industrial automation technologies. He has been published in approximately 70 national and international journals and conferences.
Wireless communications have become indispensable part of our lives. The book deals with the security of such wireless communication. The technological background of these applications have been presented in detail. Special emphasis has been laid on the IEEE 802.11x-standards that have been developed for this technology. A major part of the book is devoted to security risks, encryption and authentication. Checklists have been provided to help IT administrators and security officers to achieve the maximum possible security in their installations, when using wireless technology. This is the second edition of the book. The updates include the latest the IEEE 802.11-standard, an updated chapter on PDA, the increased relevance of smart phones and tablets, widespread use of WLAN with increased security risks.
A comprehensive and invaluable guide to 5G technology, implementation and practice in one single volume. For all things 5G, this book is a must-read. Signal processing techniques have played the most important role in wireless communications since the second generation of cellular systems. It is anticipated that new techniques employed in 5G wireless networks will not only improve peak service rates significantly, but also enhance capacity, coverage, reliability , low-latency, efficiency, flexibility, compatibility and convergence to meet the increasing demands imposed by applications such as big data, cloud service, machine-to-machine (M2M) and mission-critical communications. This book is a comprehensive and detailed guide to all signal processing techniques employed in 5G wireless networks. Uniquely organized into four categories, New Modulation and Coding, New Spatial Processing, New Spectrum Opportunities and New System-level Enabling Technologies, it covers everything from network architecture, physical-layer (down-link and up-link), protocols and air interface, to cell acquisition, scheduling and rate adaption, access procedures and relaying to spectrum allocations. All technology aspects and major roadmaps of global 5G standard development and deployments are included in the book. Key Features: * Offers step-by-step guidance on bringing 5G technology into practice, by applying algorithms and design methodology to real-time circuit implementation, taking into account rapidly growing applications that have multi-standards and multi-systems. * Addresses spatial signal processing for 5G, in particular massive multiple-input multiple-output (massive-MIMO), FD-MIMO and 3D-MIMO along with orbital angular momentum multiplexing, 3D beamforming and diversity. * Provides detailed algorithms and implementations, and compares all multicarrier modulation and multiple access schemes that offer superior data transmission performance including FBMC, GFDM, F-OFDM, UFMC, SEFDM, FTN, MUSA, SCMA and NOMA. * Demonstrates the translation of signal processing theories into practical solutions for new spectrum opportunities in terms of millimeter wave, full-duplex transmission and license assisted access. * Presents well-designed implementation examples, from individual function block to system level for effective and accurate learning. * Covers signal processing aspects of emerging system and network architectures, including ultra-dense networks (UDN), software-defined networks (SDN), device-to-device (D2D) communications and cloud radio access network (C-RAN).
Wireless networks represent an inexpensive and convenient way to connect to the Internet. However, despite their applications across several technologies, one challenge still remains: to understand the behavior of wireless sensor networks and assess their performance in large-scale scenarios. When a large number of network nodes need to interact, developing suitable analytical models is essential to ensure the appropriate coverage and throughput of these networks and to enhance user mobility. This is intrinsically difficult due to the size and number of different network nodes and users. This book highlights some examples which show how this problem can be overcome with the use of different techniques. An intensive parameter analysis shows the reader how to the exploit analytical models for an effective development and management of different types of wireless networks.
Network coding promises to significantly impact the way communications networks are designed, operated, and understood. The first book to present a unified and intuitive overview of the theory, applications, challenges, and future directions of this emerging field, this is a must-have resource for those working in wireline or wireless networking. *Uses an engineering approach - explains the ideas and practical techniques *Covers mathematical underpinnings, practical algorithms, code selection, security, and network management *Discusses key topics of inter-session (non-multicast) network coding, lossy networks, lossless networks, and subgraph-selection algorithms Starting with basic concepts, models, and theory, then covering a core subset of results with full proofs, Ho and Lun provide an authoritative introduction to network coding that supplies both the background to support research and the practical considerations for designing coded networks. This is an essential resource for graduate students and researchers in electronic and computer engineering and for practitioners in the communications industry.
Propagation Engineering in Wireless Communications covers the basic
principles needed for understanding of radiowaves propagation for
common frequency bands used
The new edition of "Advanced Wireless Communications: 4G Cognitive and" "Cooperative Broadband Technology, 2nd Edition, " including the latest developments In the evolution of wireless communications, the dominant challenges are in the areas of networking and their integration with the Future Internet. Even the classical concept of cellular networks is changing and new technologies are evolving to replace it. To reflect these new trends, "Advanced Wireless Communications & INTERNET" builds upon the previous volumes, enhancing the existing chapters, and including a number of new topics. Systematically guiding readers from the fundamentals through to advanced areas, each chapter begins with an introductory explanation of the basic problems and solutions followed with an analytical treatment in greater detail. The most important aspects of new emerging technologies in wireless communications are comprehensively covered including: next generation Internet; cloud computing and network virtualization; economics of utility computing and wireless grids and clouds. This gives readers an essential understanding of the overall environment in which future wireless networks will be operating. Furthermore, a number of methodologies for maintaining the network connectivity, by using tools ranging from genetic algorithms to stochastic geometry and random graphs theory, and a discussion on percolation and connectivity, are also offered. The book includes a chapter on network formation games, covering the general models, knowledge based network formation games, and coalition games in wireless ad hoc networks.Illustrates points throughout using real-life case studies drawn from the author's extensive international experience in the field of telecommunicationsFully updated to include the latest developments, key topics covered include: Advanced routing and network coding; Network stability control; Relay-assisted Wireless Networks; Multicommodity flow optimization problems, flow optimization in heterogeneous networks, and dynamic resource allocation in computing cloudsMethodically guides readers through each topic from basic to advanced areasFocuses on system elements that provide adaptability and re-configurability, and discusses how these features can improve wireless communications system performance
An introduction to technical details related to the Physical Layer of the LTE standard with MATLAB(R) The LTE (Long Term Evolution) and LTE-Advanced are among the latest mobile communications standards, designed to realize the dream of a truly global, fast, all-IP-based, secure broadband mobile access technology. This book examines the Physical Layer (PHY) of the LTE standards by incorporating three conceptual elements: an overview of the theory behind key enabling technologies; a concise discussion regarding standard specifications; and the MATLAB(R) algorithms needed to simulate the standard. The use of MATLAB(R), a widely used technical computing language, is one of the distinguishing features of this book. Through a series of MATLAB(R) programs, the author explores each of the enabling technologies, pedagogically synthesizes an LTE PHY system model, and evaluates system performance at each stage. Following this step-by-step process, readers will achieve deeper understanding of LTE concepts and specifications through simulations. Key Features: Accessible, intuitive, and progressive; one of the few books to focus primarily on the modeling, simulation, and implementation of the LTE PHY standard Includes case studies and testbenches in MATLAB(R), which build knowledge gradually and incrementally until a functional specification for the LTE PHY is attained Accompanying Web site includes all MATLAB(R) programs, together with PowerPoint slides and other illustrative examples Dr Houman Zarrinkoub has served as a development manager and now as a senior product manager with MathWorks, based in Massachusetts, USA. Within his 12 years at MathWorks, he has been responsible for multiple signal processing and communications software tools. Prior to MathWorks, he was a research scientist in the Wireless Group at Nortel Networks, where he contributed to multiple standardization projects for 3G mobile technologies. He has been awarded multiple patents on topics related to computer simulations. He holds a BSc degree in Electrical Engineering from McGill University and MSc and PhD degrees in Telecommunications from the Institut Nationale de la Recherche Scientifique, in Canada. www.wiley.com/go/zarrinkoub
This book discusses, for the first time, wireless power transfer in the ocean environment. Topics covered include power electronic techniques, advanced control strategies, as well as classic and emerging applications such as smart ocean energy systems and wireless power transfer and charging of underwater autonomous vehicles. Emerging research topics are presented, along with methodologies, approaches, and industrial development of intelligent and energy-efficient techniques. Apart from the basic principles with an emphasis on inductive power transfer and mathematical analysis, the book discusses the emerging implementation for underwater wireless power transfer such as energy encryption, power and data transfer through common links, and secured data- and cyber-security. Specifically, the book comprehensively introduces significant discussions on UWPT coil theoretical and experimental analysis in seawater, optimal design, and intelligent controls. For example, since fast communication is not viable in an underwater environment, the proposed book discusses Maximum Power Efficiency Tracking (MPET) control, which achieves a maximum power efficiency (>85%) without communication or feedback from the transmitting side of the UWPT system. A k-nearest-neighbors-based machine learning approach is used to estimate the coupling coefficiency between the coils. This machine learning-based intelligent control method can offer important guidance for graduate students, academic researchers, and industrial engineers who want to understand the working principles and realize the developing trends in underwater wireless power transfer. Finally, the book includes details on the modeling and design of a smart ocean energy system--a new type of power harvesting system designed to convert ocean energy into electricity, which has the capability of making underwater wireless power connections with distributed marine devices.
Continuous Signals and Systems with MATLAB (R) offers broad, detailed, and focused comprehensive coverage of continuous linear systems, based on basic mathematical principles. It presents many solved problems from various engineering disciplines using analytical tools as well as MATLAB. This book is intended primarily for undergraduate junior and senior electrical, mechanical, aeronautical, and aerospace engineering students. Practicing engineers will also find this book useful. This book is ideal for use in a one-semester course in continuous linear systems where the instructor can easily cover all of the chapters. Each chapter presents numerous examples that illustrate each concept. Most of the worked-out examples are first solved analytically, and then solved using MATLAB in a clear and understandable fashion. This book concentrates on explaining the subject matter with easy-to-follow mathematical development and numerous solved examples. The book covers traditional topics and includes an extensive coverage of state-space representation and analysis. The reader does not need to be fluent in MATLAB because the examples are presented in a self-explanatory way.
Wireless and mobile communications have grown exponentially. The average individual now possesses a minimum of two smart mobile devices. The consistent advancement of mobile devices feeds the ever-growing appetite for faster bandwidth, uninterrupted connectivity, applications to fulfill the needs of consumers and businesses, and security for all of this information. Mobile Devices: Tools and Technologies provides readers at all levels of technical expertise with an understanding of mobile device concepts, application development processes, networking and infrastructure, and security methods. This book is organized into four sections, with chapters contributed by engineers with extensive real-world experience in the mobile and wireless field. The first section discusses the current mobile device landscape, including the latest technology innovations, personal and business use trends, and mobile operating systems and applications. The second section focuses on the application development process, from strategy and process through the development phases, to production and launch. This section covers both Android and iOS application development. In the third section, the authors explore mobile access standards, network types, and infrastructure components. This section also covers proximity communications standards, including Bluetooth, NFC, and RFID. The book concludes with a look at mobile device security, including mobile encryption methods, wireless security levels, and corporate security and workforce management strategies. Throughout the book, the contributors illustrate proven best practices and methodologies using real-world case studies drawn from their extensive experiences with mobile software and infrastructures for enterprise customers.
This Springerbrief presents a deep reinforcement learning approach to wireless systems to improve system performance. Particularly, deep reinforcement learning approach is used in cache-enabled opportunistic interference alignment wireless networks and mobile social networks. Simulation results with different network parameters are presented to show the effectiveness of the proposed scheme. There is a phenomenal burst of research activities in artificial intelligence, deep reinforcement learning and wireless systems. Deep reinforcement learning has been successfully used to solve many practical problems. For example, Google DeepMind adopts this method on several artificial intelligent projects with big data (e.g., AlphaGo), and gets quite good results.. Graduate students in electrical and computer engineering, as well as computer science will find this brief useful as a study guide. Researchers, engineers, computer scientists, programmers, and policy makers will also find this brief to be a useful tool.
The operational theme permeating most definitions of the IoT concept, is the wireless communication of networked objects, in particular, smart sensing devices and machines, exchanging data a la Internet. In this book, a detailed look is taken at the fundamental principles of devices and techniques whose exploitation will facilitate the development of compact, power-efficient, autonomous, smart, networked sensing nodes underlying and encompassing the emerging IoT era. The book provides an understanding of nanoelectromechanical quantum circuits and systems (NEMX), as exemplified by firstly the uncovering of their origins, impetus and motivation, and secondly by developing an understanding of their device physics, including, the topics of actuation, mechanical vibration and sensing. Next the fundamentals of key devices, namely, MEMS/NEMS switches, varactors and resonators are covered, including a wide range of implementations. The book then looks at their energy supply via energy harvesting, as derived from wireless energy and mechanical vibrations. Finally, after an introduction to the fundamentals of IoT networks and nodes, the book concludes with an exploration of how the NEMX components are encroaching in a variety of emerging IoT applications.
We are always surrounded by electromagnetic waves and fields of various spectra. This book explains basic electromagnetic theory with the help of design formulations i.e. mathematical background on antennas along with experimentations, which has made this book unique. The main purpose of this book is to embed mathematical EM theory of dielectric resonator antennas with experimental validation so that understanding of concepts takes place. Initially, basic understanding of philosophy of dielectric resonators has been discussed, then it is supported with mathematical modeling and later same is implemented with its prototype model along with experimentations. The modes theory gives important analysis on currents distribution, impedance analysis and radiation pattern in DRA. Circular polarization can built signal robustness, case studies on circular polarization has been included. Equivalent RLC circuit concept has been introduced. Challenges of switching from microwave to terahertz has been briefly discussed. Nano DRA will revolutionize the wireless technology. Nano DRA ,Terahertz DRA and Quantum DRA have analyzed and studied.
Mobile Applications Development with Android: Technologies and Algorithms presents advanced techniques for mobile app development, and addresses recent developments in mobile technologies and wireless networks. The book covers advanced algorithms, embedded systems, novel mobile app architecture, and mobile cloud computing paradigms.
This SpringerBrief addresses the main security concerns for smart grid, e.g., the privacy of electricity consumers, the exchanged messages integrity and confidentiality, the authenticity of participated parties, and the false data injection attacks. Moreover, the authors demonstrate in detail the various proposed techniques to secure the smart grid's different communication networks and preserve the privacy of the involved. Over many years, power grid has generated electricity from central generators and distributed it in one direction from the generation stations to end-users; also, information is one directional so that the grid's control center doesn't get enough information about customers' requirements and consequently can't prevent electricity losses. So, the electricity grid is merged with information and communication technology to form smart grid. The main target of this incorporation is to connect different parties of power grid to exchange information about grid conditions and customers' requirements, and consequently, improve the reliability and efficiency of electricity generation and distribution. That upgrade of the power grid exposes it to the cyber security threats that the communication networks suffer from, such as malicious attacks to forge the electricity consumption readings or price, extract personal information for residential consumers, such as daily habits and life style, or attack some grid's resources and equipment availability using denial-of-service attacks. Also, novel threats are introduced in smart grid due to the power grid nature, such as false data injection attack, in which the adversary compromises several measurement units and injects false information about the grid conditions that mislead the grid's control center to make wrong decisions for the grid and consequently impact on its stability and efficiency.
Globally considered as one of the key technologies in the field of wireless communications, cognitive radio has the capability to solve the issues related to radio spectrum scarcity with the help of dynamic spectrum allocation. It discusses topics including software defined radio architecture, linear predictive coding, variance fractal compression, optimal Codec design for mobile communication system, digital modulation techniques, spectrum sensing in cognitive radio networks and orthogonal frequency division multiplexing in depth. The text is primarily written for senior undergraduate and graduate students, in learning experimental techniques, designing and implementing models in the field wireless communication.
A wireless sensor network (WSN) uses a number of autonomous devices to cooperatively monitor physical or environmental conditions via a wireless network. Since its military beginnings as a means of battlefield surveillance, practical use of this technology has extended to a range of civilian applications including environmental monitoring, natural disaster prediction and relief, health monitoring and fire detection. Technological advancements, coupled with lowering costs, suggest that wireless sensor networks will have a significant impact on 21st century life. The design of wireless sensor networks requires consideration for several disciplines such as distributed signal processing, communications and cross-layer design. "Wireless Sensor Networks: Signal Processing and Communications" focuses on the theoretical aspects of wireless sensor networks and offers readers signal processing and communication perspectives on the design of large-scale networks. It explains state-of-the-art design theories and techniques to readers and places emphasis on the fundamental properties of large-scale sensor networks. "Wireless Sensor Networks: Signal Processing and Communications" Approaches WSNs from a new angle - distributed signal processing, communication algorithms and novel cross-layer design paradigms. Applies ideas and illustrations from classical theory to an emerging field of WSN applications. Presents important analytical tools for use in the design of application-specific WSNs. "Wireless Sensor Networks" will be of use to signal processing and communications researchers and practitioners in applying classical theory to network design. It identifies research directions for senior undergraduate and graduate students and offers a rich bibliography for further reading and investigation.
This book highlights routing protocols for wireless mesh networks (WMNs; IEEE 802.11s). It provides an overview of the wireless networks (history, MANET, family of IEEE 802.11, WMNS, etc.) and routing protocols, such as AODV, DSR, OLSR, etc, and also highlights two resolutions of routing protocols with respect to end-to-end delay, packet delivery ratio and routing overhead in WMNs. Wireless mesh networks have become a hot topic for researcher into the deployment of wireless networks, and they represents the connectivity of mesh networking in IEEE 802.11 amendment in static and ad-hoc networks. Moreover, WMNs have numerous attractive features, such as highly reliable connectivity, easy deployment, self-healing, self-configuring, and flexible network expansion. The book describes two routing mechanisms: novel cluster-based routing protocols (NCBRP), and decentralized hybrid wireless mesh protocol (DHWMP).
This book explains the theory, numerical modeling, and applications of a borehole electromagnetic telemetry system used for wireless communication between the downhole tool and the surface control center during oilfield drilling. The authors begin by introducing borehole electromagnetic telemetry and explaining each part of the system with schematics and illustrations. They describe the working principle and compare it with other borehole wireless communication methods, such as mud pulse telemetry. They then address 2D and 3D electromagnetic telemetry modelling, listing previous 2D and 3D modeling methods and detailing the advantages and limitations, before discussing their recent work on a novel layered finite element method for 2D electromagnetic telemetry modelling, and on 3D electromagnetic modelling based on integral equation, thin wire kernel, and layered medium Green's functions. Lastly, the authors show applications of electromagnetic telemetry, including single well borehole wireless communication and cross well communication in pad drilling. This includes photos, figures, and field data from real oilfield jobs. This book is a useful reference for drilling engineers, well logging tool research and development scientists and researchers, as well as for students in the areas of petroleum engineering and electrical engineering.
This book presents the state of the art in the field of mobile and wireless networks, and anticipates the arrival of new standards and architectures. It focuses on wireless networks, starting with small personal area networks and progressing onto the very large cells of wireless regional area networks, via local area networks dominated by WiFi technology, and finally metropolitan networks. After a description of the existing 2G and 3G standards, with LTE being the latest release, LTE-A is addressed, which is the first 4G release, and a first indication of 5G is provided as seen through the standardizing bodies. 4G technology is described in detail along with the different LTE extensions related to the massive arrival of femtocells, the increase to a 1 Gbps capacity, and relay techniques. 5G is also discussed in order to show what can be expected in the near future. The Internet of Things is explained in a specific chapter due to its omnipresence in the literature, ad hoc and mesh networks form another important chapter as they have made a comeback after a long period of near hibernation, and the final chapter discusses a particularly recent topic: Mobile-Edge Computing (MEC) servers.
In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due to their complementary nature, flexible combination, and the demand for ubiquitous computing. As always, adequate security remains one of the open areas of concern before wide deployment of RFID and WSNs can be achieved. Security in RFID and Sensor Networks is the first book to offer a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and integrated RFID and WSNs, providing an essential reference for those who regularly interface with these versatile technologies. Exposes Security Risks The book begins with a discussion of current security issues that threaten the effective use of RFID technology. The contributors examine multi-tag systems, relay attacks, authentication protocols, lightweight cryptography, and host of other topics related to RFID safety. The book then shifts the focus to WSNs, beginning with a background in sensor network security before moving on to survey intrusion detection, malicious node detection, jamming, and other issues of concern to WSNs and their myriad of applications. Offers Viable Solutions In each chapter, the contributors propose effective solutions to the plethora of security challenges that confront users, offering practical examples to aid in intuitive understanding. The last part of the book reviews the security problems inherent in integrated RFID & WSNs. The book ends with a glimpse of the future possibilities in these burgeoning technologies and provides recommendations for the proactive design of secure wireless embedded systems.
This book constitutes the proceedings of the First International Conference on 5G for Future Wireless Networks, 5GWN 2017, held in Beijing, China, in April 2017. The 64 full papers were selected from 135 submissions and present the state of the art and practical applications of 5G technologies. The exponentially growing data traffic caused by the development of mobile Internet and smart phones requires powerful networks. The fifth generation (5G) techniques are promising to meet the requirements of this explosive data traffic in future mobile communications.
This book gathers the Proceedings of the 12th International Conference on Broad-Band Wireless Computing, Communication and Applications, held on November 8-10, 2017 in Barcelona, Spain. Information networking is currently undergoing a rapid evolution. Different kinds of networks with different characteristics are emerging and being integrated in heterogeneous networks. As a result, there are many interconnected problems that can occur at different levels of the hardware and software design of communicating entities and communication networks. These networks are expected to manage increasing usage demand, provide support for a significant number of services, guarantee Quality of Service (QoS), and optimize the use of network resources. The success of all-IP networking and wireless technology has changed the lifestyles of people around the world, and advances in electronic integration and wireless communications will pave the way to providing access to wireless networks on the fly, as electronic devices can increasingly exchange information with each other virtually anytime and anywhere. The aim of this book is to provide the latest findings, methods and development techniques from both theoretical and practical perspectives regarding the emerging areas of broad-band and wireless computing. |
You may like...
Intelligent Sensing and Communications…
Zhengyu Zhu, Zheng Chu, …
Paperback
R2,941
Discovery Miles 29 410
The COVID-19 Pandemic and the…
Floribert Patrick Calvain Endong
Hardcover
R5,848
Discovery Miles 58 480
Cross-Layer Resource Allocation in…
Ana I. Perez-Neira, Marc Realp Campalans
Hardcover
R1,930
Discovery Miles 19 300
Wireless Mesh Networks for IoT and Smart…
Luca Davoli, Gianluigi Ferrari
Hardcover
5G NR and Enhancements - From R15 to R16
Hai Tang, Ning Yang, …
Paperback
R2,810
Discovery Miles 28 100
Computing in Communication Networks…
Frank H. P. Fitzek, Fabrizio Granelli, …
Paperback
R2,667
Discovery Miles 26 670
Handbook of Research on Emerging Designs…
Jamal Zbitou, Mostafa Hefnawi, …
Hardcover
R8,027
Discovery Miles 80 270
|