![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
This book focuses primarily on the nature-inspired approach for designing smart applications. It includes several implementation paradigms such as design and path planning of wireless network, security mechanism and implementation for dynamic as well as static nodes, learning method of cloud computing, data exploration and management, data analysis and optimization, decision taking in conflicting environment, etc. The book fundamentally highlights the recent research advancements in the field of engineering and science.
The book reports two approaches of implementation of the essential components of a Digital Phase Locked Loop based system for dealing with wireless channels showing Nakagami-m fading. It is mostly observed in mobile communication. In the first approach, the structure of a Digital phase locked loop (DPLL) based on Zero Crossing (ZC) algorithm is proposed. In a modified form, the structure of a DPLL based systems for dealing with Nakagami-m fading based on Least Square Polynomial Fitting Filter is proposed, which operates at moderate sampling frequencies. A sixth order Least Square Polynomial Fitting (LSPF) block and Roots Approximator (RA) for better phase-frequency detection has been implemented as a replacement of Phase Frequency Detector (PFD) and Loop Filter (LF) of a traditional DPLL, which has helped to attain optimum performance of DPLL. The results of simulation of the proposed DPLL with Nakagami-m fading and QPSK modulation is discussed in detail which shows that the proposed method provides better performance than existing systems of similar type.
Wireless Sensor Networks: Theory and Practice for Deployment addresses WSNs deployment, a mandatory and critical step in the process of developing WSNs solutions for real-life applications. The authors address simple approaches to deploy static WSNs, then exploring more sophisticated approaches to deploy mobile WSNs. Featuring detailed investigations of deployment-related issues such as deployment cost, coverage, connectivity, sensors reliability, and harsh deployment environments, this book will equip you with the basics and an advanced view of both the theoretical and practical aspects, along with knowledge of the guidelines for WSNs deployment.
This book introduces the various approaches and tools used for modelling different propagation environments and lays the foundation for developing a unified theoretical framework for future integrated communication networks. In the case of each type of network, the book uses basic concepts of physics, mathematics, geometry and probability theory to study the impact of the dimension and shape of the propagation environment and relative transmit-receive position on the information flow. The book provides an introduction into wireless communication systems and networks and their applications. For both systems and networks, the basic hard (encoder, modulator, etc.) and soft components (information, signal, etc.) are discussed through schematic block diagrams. Next each of the modes of communication, namely radio waves, acoustic waves, magnetic induction, optical waves, biological particles (molecules, aerosols, neural synapse etc.) and quantum field, are discussed. For each communication scenario presented, the impact of different environmental factors on the propagation phenomenon is articulated, followed by different channel modelling (deterministic, analytical, and stochastic) techniques that are used to characterize the propagation environment. Finally future trends in wireless communication networks are examined and envisioned for next generations 6G/7G of communication systems, like space information networks, sea-to-sky internet of vehicles, and internet of bio-nano things. Based on the future trends of integrated networks, the book drives the need for a generalized channel model irrespective of the media and mode of information transfer. The primary audience for the book is post-graduate students, researchers and academics in electronics and communications engineering, electrical engineering and computer science.
This book presents the state of the art of Internet of Things (IoT) from the perspective of healthcare and Ambient Assisted Living (AAL). It discusses the emerging technologies in healthcare services used for healthcare professionals and patients for enhanced living environments and public health. The topics covered in this book include emerging eHealth IoT applications, Internet of Medical Things, health sensors, and wearable sensors for pervasive and personalized healthcare, and smart homes applications for enhanced health and well-being. The book also presents various ideas for the design and development of IoT solutions for healthcare and AAL. It will be useful for bioengineers and professionals working in the areas of healthcare as well as health informatics.
Distributed MIMO and cell-free mobile communication are emerging technologies of wireless communication. This book introduces the fundamental theory, key technology and the prototype system of distributed MIMO and cellular free mobile communication system, including the unified system model, capacity and spectral efficiency analysis under imperfect channel information, cell edge effect, optimal power allocation and energy efficiency optimization, cache optimization, low complexity wireless transmission technology and new network assisted full duplex technology. In addition, the implementation of software and hardware and test results of distributed MIMO and cell free system based on cloud architecture are introduced in detail.This book will benefit senior undergraduates, postgraduates, scholars and engineers who are engaged in wireless mobile communication research. It can also be used as a reference book for postgraduates and researchers in the field of electronic and information engineering.
Green communications is a very hot topic. As mobile networks evolve in terms of higher rates/throughput, a consequent impact on operating costs is due to (aggregate) network energy consumption. As such, design on 4G networks and beyond have increasingly started to focus on 'energy efficiency or so-called green networks. Many techniques and solutions have been proposed to enhance the energy efficiency of mobile networks, yet no book has provided an in-depth analysis of the energy consumption issues in mobile networks nor has detailed theories, tools and solutions for solving the energy efficiency problems. This book presents the techniques and solutions for enhancing energy efficiency of future mobile networks, and consists of three major parts. The first part presents a general description of mobile network evolution in terms of both capacity and energy efficiency. The second part discusses the advanced techniques to green mobile networks. The third part discusses the solutions that enhance mobile network energy efficiency as well as provides future directions. Whilst the reader is expected to have basic knowledge of wireless communications, the authors present a brief introduction of the evolution of mobile networks, providing the knowledge base for understanding the content of the book. In addition, complicated network problems are illustrated using simple examples. This will help the reader understand the concept and intuition of various techniques and solutions. * Incorporates the latest research results from both academia and industry, providing an up-to-date overview of existing technologies and solutions on making mobile networks greener * Consists of three sections with a gradually increasing technical depth on green mobile networks, providing the reader with a systematic view of the research area, and helping those with different technical backgrounds to better understand the content * Covers existing enabling technologies for green mobile networking, including an innovative discussion of state-of-the-art solutions and algorithms
This book discusses uncertain threats, which are caused by unknown attacks based on unknown vulnerabilities or backdoors in the information system or control devices and software/hardware. Generalized robustness control architecture and the mimic defense mechanisms are presented in this book, which could change "the easy-to-attack and difficult-to-defend game" in cyberspace. The endogenous uncertain effects from the targets of the software/hardware based on this architecture can produce magic "mimic defense fog", and suppress in a normalized mode random disturbances caused by physical or logic elements, as well as effects of non-probability disturbances brought by uncertain security threats. Although progress has been made in the current security defense theories in cyberspace and various types of security technologies have come into being, the effectiveness of such theories and technologies often depends on the scale of the prior knowledge of the attackers, on the part of the defender and on the acquired real-timing and accuracy regarding the attackers' behavior features and other information. Hence, there lacks an efficient active defense means to deal with uncertain security threats from the unknown. Even if the bottom-line defense technologies such as encrypted verification are adopted, the security of hardware/software products cannot be quantitatively designed, verified or measured. Due to the "loose coupling" relationship and border defense modes between the defender and the protected target, there exist insurmountable theoretical and technological challenges in the protection of the defender and the target against the utilization of internal vulnerabilities or backdoors, as well as in dealing with attack scenarios based on backdoor-activated collaboration from both inside and outside, no matter how augmented or accumulated protective measures are adopted. Therefore, it is urgent to jump out of the stereotyped thinking based on conventional defense theories and technologies, find new theories and methods to effectively reduce the utilization of vulnerabilities and backdoors of the targets without relying on the priori knowledge and feature information, and to develop new technological means to offset uncertain threats based on unknown vulnerabilities and backdoors from an innovative perspective. This book provides a solution both in theory and engineering implementation to the difficult problem of how to avoid the uncontrollability of product security caused by globalized marketing, COTS and non-trustworthy software/hardware sources. It has been proved that this revolutionary enabling technology has endowed software/hardware products in IT/ICT/CPS with endogenous security functions and has overturned the attack theories and methods based on hardware/software design defects or resident malicious codes. This book is designed for educators, theoretical and technological researchers in cyber security and autonomous control and for business technicians who are engaged in the research on developing a new generation of software/hardware products by using endogenous security enabling technologies and for other product users. Postgraduates in IT/ICT/CPS/ICS will discover that (as long as the law of "structure determines the nature and architecture determines the security is properly used), the problem of software/hardware design defects or malicious code embedding will become the swelling of Achilles in the process of informationization and will no longer haunt Pandora's box in cyberspace. Security and opening-up, advanced progressiveness and controllability seem to be contradictory, but there can be theoretically and technologically unified solutions to the problem.
Focusing on inductive wireless power transfer (WPT), which relies on coil resonators and power converters, this book begins by providing the background and basic theories of WPT, which are essential for newcomers to the field. Then two major challenges of WPT - power transfer distance and efficiency - are subsequently addressed, and multi-resonator WPT systems, which not only offer a way to extend power transfer distance but also provide more flexibility, are investigated. Recent findings on techniques to maximize the power transfer efficiency of WPT systems, e.g. maximum efficiency point tracking, are also introduced. Without the constraint of cables, wireless power transfer (WPT) is an elegant technique for charging or powering a range of electrical devices, e.g. electric vehicles, mobile phones, artificial hearts, etc. Given its depth of coverage, the book can serve as a technical guideline or reference guide for engineers and researchers working on WPT.
This book comprises select peer-reviewed proceedings of the international conference on Research in Intelligent and Computing in Engineering (RICE 2020) held at Thu Dau Mot University, Vietnam. The volume primarily focuses on latest research and advances in various computing models such as centralized, distributed, cluster, grid, and cloud computing. Practical examples and real-life applications of wireless sensor networks, mobile ad hoc networks, and internet of things, data mining and machine learning are also covered in the book. The contents aim to enable researchers and professionals to tackle the rapidly growing needs of network applications and the various complexities associated with them.
Focusing on soft computing techniques and application in various engineering research domains, this book presents the state-of-the-art outcomes from ongoing research works being conducted in various research laboratories and educational institutions. The included research works deal with estimated models and give resolutions to complex real-life issues. In the field of evolutionary computing and other domains of applications, such as, data mining and fuzzy logic, soft computing techniques play an incomparable role, where it successfully handles contemporary computationally intensive and complex problems that have usually appeared to be inflexible to traditional mathematical methods. Comprising the concepts and applications of soft computing with other emerging research domains, this book cherishes varieties of modern applications in the fields of natural language processing, image processing, biomedical engineering, communication, control systems, circuit design etc.
This book provides applications of wireless sensor networks (WSN) in environmental monitoring, with an emphasis on livestock disease detection and agricultural management in Africa to aid farmers. This proposed system entails current and innovative monitoring technologies intended to improve agricultural conditions in Africa, with a focus on Botswana, and addresses the Internet of Things (IoT) as a set of remote monitoring protocols using WSNs to improve and ensure proper environmental maintenance. In this book, the author introduces WSNs, and how the IoT can be applied to develop a system of "smart agriculture" in Africa, taking into account livestock health, climate change impacts on crops and wildlife, and technological innovations in response to climate change such as windmills and solar panels. The book will be interesting to students and researchers in engineering and life sciences, as well as practitioners working with sensing technologies for agricultural monitoring and improvement.
This book discusses how to plan the time-variant placements of the UAVs served as base station (BS)/relay, which is very challenging due to the complicated 3D propagation environments, as well as many other practical constraints such as power and flying speed. Spectrum sharing with existing cellular networks is also investigated in this book. The emerging unmanned aerial vehicles (UAVs) have been playing an increasing role in the military, public, and civil applications. To seamlessly integrate UAVs into future cellular networks, this book will cover two main scenarios of UAV applications as follows. The first type of applications can be referred to as UAV Assisted Cellular Communications. Second type of application is to exploit UAVs for sensing purposes, such as smart agriculture, security monitoring, and traffic surveillance. Due to the limited computation capability of UAVs, the real-time sensory data needs to be transmitted to the BS for real-time data processing. The cellular networks are necessarily committed to support the data transmission for UAVs, which the authors refer to as Cellular assisted UAV Sensing. To support real-time sensing streaming, the authors design joint sensing and communication protocols, develop novel beamforming and estimation algorithms, and study efficient distributed resource optimization methods. This book targets signal processing engineers, computer and information scientists, applied mathematicians and statisticians, as well as systems engineers to carve out the role that analytical and experimental engineering has to play in UAV research and development. Undergraduate students, industry managers, government research agency workers and general readers interested in the fields of communications and networks will also want to read this book.
This book presents reinforcement learning (RL) based solutions for user-centric online network selection optimization. The main content can be divided into three parts. The first part (chapter 2 and 3) focuses on how to learning the best network when QoE is revealed beyond QoS under the framework of multi-armed bandit (MAB). The second part (chapter 4 and 5) focuses on how to meet dynamic user demand in complex and uncertain heterogeneous wireless networks under the framework of markov decision process (MDP). The third part (chapter 6 and 7) focuses on how to meet heterogeneous user demand for multiple users inlarge-scale networks under the framework of game theory. Efficient RL algorithms with practical constraints and considerations are proposed to optimize QoE for realizing intelligent online network selection for future mobile networks. This book is intended as a reference resource for researchers and designers in resource management of 5G networks and beyond.
This book gathers high-quality peer-reviewed research papers presented at the International Conference on Intelligent Computing and Networking (IC-ICN 2020), organized by the Computer Department, Thakur College of Engineering and Technology, in Mumbai, Maharashtra, India, on February 28-29, 2020. The book includes innovative and novel papers in the areas of intelligent computing, artificial intelligence, machine learning, deep learning, fuzzy logic, natural language processing, human-machine interaction, big data mining, data science and mining, applications of intelligent systems in healthcare, finance, agriculture and manufacturing, high-performance computing, computer networking, sensor and wireless networks, Internet of Things (IoT), software-defined networks, cryptography, mobile computing, digital forensics and blockchain technology.
This book comprises selected peer-reviewed papers from the International Conference on VLSI, Signal Processing, Power Systems, Illumination and Lighting Control, Communication and Embedded Systems (VSPICE-2019). The contents are divided into five broad topics - VLSI and embedded systems, signal processing, power systems, illumination and control, and communication and networking. The book focuses on the latest innovations, trends, and challenges encountered in the different areas of electronics and communication, and electrical engineering. It also offers potential solutions and provides an insight into various emerging areas such as image fusion, bio-sensors, and underwater sensor networks. This book can prove to be useful for academics and professionals interested in the various sub-fields of electronics and communication engineering.
This book presents a detailed pedagogical description of the 5G commercial wireless communication system design, from an end to end perspective. It compares and contrasts NR with LTE, and gives a concise and highly accessible description of the key technologies in the 5G physical layer, radio access network layer protocols and procedures. This book also illustrates how the 5G core and EPC is integrated into the radio access network, how virtualization and edge computer fundamentally change the way users interact with the network, as well as 5G spectrum issues. This book is structured into six chapters. The first chapter reviews the use cases, requirements, and standardization organization and activities for 5G. These are 5G requirements and not NR specifically, as technology that meets the requirements, may be submitted to the ITU as 5G technology. This includes a set of Radio Access Technologies (RATs), consisting of NR and LTE; with each RAT meeting different aspects of the requirements. The second chapter describes the air interface of NR and LTE side by side. The basic aspects of LTE that NR builds upon are first described, followed by sections on the NR specific technologies, such as carrier/channel, spectrum/duplexing (including SUL), LTE/NR co-existence and new physical layer technologies (including waveform, Polar/LDPC codes, MIMO, and URLLC/mMTC). In all cases the enhancements made relative to LTE are made apparent. The third chapter contains descriptions of NR procedures (IAM/Beam Management/Power control/HARQ), protocols (CP/UP/mobility, including grant-free), and RAN architecture. The fourth chapter includes a detailed discussion related to end-to-end system architecture, and the 5G Core (5GC), network slicing, service continuity, relation to EPC, network virtualization, and edge computing. The fifth and major chapter describes the ITU submission and how NR and LTE meet the 5G requirements in significant detail, from the rapporteur responsible for leading the preparation and evaluation, as well as some field trial results. Engineers, computer scientists and professionals with a passing knowledge of 4G LTE and a comprehensive understanding of the end to end 5G commercial wireless system will find this book to be a valuable asset. Advanced-level students and researchers studying and working in communication engineering, who want to gain an understanding of the 5G system (as well as methodologies to evaluate features and technologies intended to supplement 5G) will also find this book to be a valuable resource.
This open access book, authored by a world-leading researcher in this field, describes fundamentals of dynamic spectrum management, provides a systematic overview on the enabling technologies covering cognitive radio, blockchain, and artificial intelligence, and offers valuable guidance for designing advanced wireless communications systems. This book is intended for a broad range of readers, including students and professionals in this field, as well as radio spectrum policy makers.
This book presents select peer-reviewed proceedings of the International Conference on Frontiers in Smart Systems Technologies (ICFSST 2019). It focuses on latest research and cutting-edge technologies in smart systems and intelligent autonomous systems with advanced functionality. Comprising topics related to diverse aspects of smart technologies such as high security, reliability, miniaturization, energy consumption, and intelligent data processing, the book contains contributions from academics as well as industry. Given the range of the topics covered, this book will prove useful for students, researchers, and professionals alike.
This book presents the peer-reviewed proceedings of the 5th International Conference on Intelligent Computing and Applications (ICICA 2019), held in Ghaziabad, India, on December 6-8, 2019. The contributions reflect the latest research on advanced computational methodologies such as neural networks, fuzzy systems, evolutionary algorithms, hybrid intelligent systems, uncertain reasoning techniques, and other machine learning methods and their applications to decision-making and problem-solving in mobile and wireless communication networks.
This book describes a full range of contemporary techniques for the design of transmitters and receivers for communications systems operating in the range from 1 through to 300 GHz. In this frequency range there is a wide range of technologies that need to be employed, with silicon ICs at the core but, compared with other electronics systems, a much greater use of more specialist devices and components for high performance - for example, high Q-factor/low loss and good power efficiency. Many text books do, of course, cover these topics but what makes this book timely is the rapid adoption of millimetre-waves (frequencies from 30 to 300 GHz) for a wide range of consumer applications such as wireless high definition TV, '5G' Gigabit mobile internet systems and automotive radars. It has taken many years to develop low-cost technologies for suitable transmitters and receivers, so previously these frequencies have been employed only in expensive military and space applications. The book will cover these modern technologies, with the follow topics covered; transmitters and receivers, lumped element filters, tranmission lines and S-parameters, RF MEMS, RFICs and MMICs, and many others. In addition, the book includes extensive line diagrams to illustrate circuit diagrams and block diagrams of systems, including diagrams and photographs showing how circuits are implemented practically. Furthermore, case studies are also included to explain the salient features of a range of important wireless communications systems. The book is accompanied with suitable design examples and exercises based on the Advanced Design System - the industry leading CAD tool for wireless design. More importantly, the authors have been working with Keysight Technologies on a learning & teaching initiative which is designed to promote access to industry-standard EDA tools such as ADS. Through its University Educational Support Program, Keysight offers students the opportunity to request a student license, backed up with extensive classroom materials and support resources. This culminates with students having the chance to demonstrate their RF/MW design and measurement expertise through the Keysight RF & Microwave Industry-Ready Student Certification Program. www.keysight.com/find/eesof-university www.keysight.com/find/eesof-student-certification
This book introduces the sources and historic collection campaigns of resource allocation in wireless communication systems. The unique characteristics of MIMO-OFDMA systems are thoroughly studied and summarized. Remarks on resource allocation and spectrum sharing are also presented, which demonstrate the great value of resource allocation techniques, but also introduce distinct challenges of resource allocation in MIMO-OFDMA systems. Novel resource allocation techniques for OFDMA Systems are surveyed from various applications (e.g., for unicast, or multicast with Guaranteed BER and Rate, subcarrier and power allocation with various detectors, low-complexity energyefficient resource allocation, etc.) in this book. Due to the high mobility and low latency requirements of 5G wireless communications, this book discusses how to deal with the imperfect CSI. It also discusses how to deal with e.g., throughput maximization, outage probabilities maximization and guarantee, energy efficiency, physical-layer security issues with feedback channel capacity constraints, in order to characterize and understand the applications of practical scenes. This book will target professionals & researchers working in the fields of Wireless Communications and Networking, Resource Allocation and Transmissions. Advanced-level students in electrical engineering and computer science will also find this book useful as a secondary textbook.
This book presents the selected peer-reviewed papers from the International Conference on Communication Systems and Networks (ComNet) 2019. Highlighting the latest findings, ideas, developments and applications in all areas of advanced communication systems and networking, it covers a variety of topics, including next-generation wireless technologies such as 5G, new hardware platforms, antenna design, applications of artificial intelligence (AI), signal processing and optimization techniques. Given its scope, this book can be useful for beginners, researchers and professionals working in wireless communication and networks, and other allied fields.
This book features various, ultra low energy, variability resilient SRAM circuit design techniques for wireless sensor network applications. Conventional SRAM design targets area efficiency and high performance at the increased cost of energy consumption, making it unsuitable for computation-intensive sensor node applications. This book, therefore, guides the reader through different techniques at the circuit level for reducing energy consumption and increasing the variability resilience. It includes a detailed review of the most efficient circuit design techniques and trade-offs, introduces new memory architecture techniques, sense amplifier circuits and voltage optimization methods for reducing the impact of variability for the advanced technology nodes. "
Combining information on the most important and related technologies in the mobile communications field, this two book package gives the engineer a concise, complete and authoritative introduction to LTE and SAE and The Evolved Packet Core. Written by experts who played a leading role in the development of the standards, this package gives insight into the 'how' and 'why', enabling the professional engineer to implement the technologies that are central to the mobile broadband revolution. Includes details of the standards and technologies with 160 new pages: LTE radio interface architecture, LTE physical layer and LTE access procedures Contains three brand new chapters on LTE: Transmission Procedures, Flexible Bandwidth and LTE Evolution, plus expanded details on the physical layer (total LTE content is 270 pages) Examines the latest developments in the evolution of LTE into IMT-Advanced, the next stage of 3G Evolution Gives clear explanations of the role of OFDM and MIMO technologies in HSPA and LTE Outlines the System Architecture Evolution (SAE) supporting LTE and HSPA evolution Up-to-date coverage of SAE including the latest standards development Easily accessible overview of the architecture and concepts defined by SAE Thorough description of the Evolved Packet Core for LTE, fixed and other wireless accesses Comprehensive explanation of SAE key concepts, security and Quality-of-Service Covers potential service and operator scenarios including interworking with existing 3GPP and 3GPP2 systems Detailed walkthrough of network entities, protocols and procedures Written by established experts in the SAE standardization process, all of whom have extensive experience and understanding of its goals, history and vision |
![]() ![]() You may like...
Geometric Algebra Applications Vol. II…
Eduardo Bayro Corrochano
Hardcover
R5,214
Discovery Miles 52 140
Microbiorobotics - Biologically Inspired…
Minjun Kim, Agung Julius, …
Hardcover
R3,415
Discovery Miles 34 150
|