![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
The Library of Congress maintains a digital preservation blog called The Signal. This book contains a series of reformatted posts from that blog on the subject of personal digital archiving. Specifically, the topics include guidance for such things as choosing file formats and adding descriptions to digital photographs; first-hand accounts of working with and preserving personal collections; descriptions of outreach activities and interviews with library professionals on the subject of personal digital archiving, and many others. Photo albums, letters, home movies and paper documents are a vital link to the past. Personal information we create today has the same value. The only difference is that much of it is now digital. Preserving digital information is a new concept that most people have little experience with. This book provides knowledge and tips to ensure that digital materials last a lifetime by taking steps to preserve them.
Following a detailed overview of cooperative communications and the physical layer security, this book proposes relay and jammer selection schemes for security in one-way cooperative networks and to improve physical layer security in two-way cooperative networks. It also proposes a Cooperative Hybrid Self-Healing scheme to enhance the confidentiality of the data collected by UWSN. It ends with a proposal called Self-Healing Cluster Controlled Mobility (SH-CCM) scheme based on hybrid cooperation between both Proactive and Reactive peers and the sick sensors at both network and cluster levels to guarantee the security in UWSN.
This book describes the current and most probable future wireless security solutions. The focus is on the technical discussion of existing systems and new trends like Internet of Things (IoT). It also discusses existing and potential security threats, presents methods for protecting systems, operators and end-users, describes security systems attack types and the new dangers in the ever-evolving Internet. The book functions as a practical guide describing the evolvement of the wireless environment, and how to ensure the fluent continuum of the new functionalities, whilst minimizing the potential risks in network security.
This is an open access book. Important tasks must be completed on time and with guaranteed quality; that is the consensus reached by system designers and users. However, for too long, important tasks have often been given unnecessary urgency, and people intuitively believe that important tasks should be executed first so that their performance can be guaranteed. Actually, in most cases, their performance can be guaranteed even if they are executed later, and the "early" resources can be utilized for other, more urgent tasks. Therefore, confusing importance with urgency hinders the proper use of system resources. In 2007, mixed criticality was proposed to indicate that a system may contain tasks of various importance levels. Since then, system designers and users have distinguished between importance and urgency. In the industrial field, due to the harsh environment they operate in, industrial wireless networks' quality of service (QoS) has always been a bottleneck restricting their applications. Therefore, this book introduces criticality to label important data, which is then allocated more transmission resources, ensuring that important data's QoS requirements can be met to the extent possible. To help readers understand how to apply mixed-criticality data to industrial wireless networks, the content is divided into three parts. First, we introduce how to integrate the model of mixed-criticality data into industrial wireless networks. Second, we explain how to analyze the schedulability of mixed-criticality data under existing scheduling algorithms. Third, we present a range of novel scheduling algorithms for mixed-criticality data. If you want to improve the QoS of industrial wireless networks, this book is for you.
This book investigates intelligent network resource management for IoV, with the objective of maximizing the communication and computing performance of vehicle users. Focusing on two representative use cases in IoV, i.e., safety message broadcast and autonomous driving, the authors propose link-layer protocol design and application-layer computing task scheduling to achieve the objective given the unique characteristics and requirements of IoV. In particular, this book illustrates the challenges of resource management for IoV due to network dynamics, such as time-varying traffic intensity and vehicle mobility, and presents intelligent resource management solutions to adapt to the network dynamics. The Internet of Vehicles (IoV) enables vehicle-to-everything connectivity and supports a variety of applications for vehicles on the road. Intelligent resource management is critical for satisfying demanding communication and computing requirements on IoV, while the highly dynamic network environments pose challenges to the design of resource management schemes. This book provides insights into the significance of adaptive resource management in improving the performance of IoV. The customized communication protocol and computing scheduling scheme are designed accordingly by taking the network dynamics information as an integral design factor. Moreover, the decentralized designs of the proposed solutions guarantee low signaling overhead and high scalability. A comprehensive literature review summarizing recent resource management schemes in IoV, followed by the customized design of communication and computing solutions for the two IoV use cases is included which can serve as a useful reference for professionals from both academia and industry in the area of IoV and resource management. Researchers working within this field and computer science and electrical engineering students will find this book useful as well.
A wireless sensor network (WSN) consists of spatially distributed autonomous sensors to co-operatively monitor physical or environmental conditions, such as temperature, sound, vibration, pressure, motion or pollutants. The development of wireless sensor networks was motivated by military applications such as battlefield surveillance. They are now used in many industrial and civilian application areas, including industrial process monitoring and control, machine health monitoring, environment and habitat monitoring, healthcare applications, home automation, and traffic control. This book gathers and presents topical research data from around the globe in the field of wireless sensor networks.
This book gathers selected papers presented at the 4th International Conference on Wireless Communications and Applications (ICWCA 2020), held at Hainan University, China. The first volume of the proceedings will focus on the newest methods and algorithms in smart wireless communications in the areas of multimedia communications over wireless; smart antenna and space-time signal processing; antenna, wireless propagation, and channel modeling; OFDM and multi-carrier techniques; localization and navigation techniques; software-defined networking (SDN) and network function virtualization (NFV); knowledge-defined networking (KDN) and the applications of artificial intelligence (AI) in future networks; future data-center networks; resource allocation and orchestration in future networks and many others.
This book presents the design requirements of antenna integration for modern commercial devices such as smartphones, dongles, and access points. Practical use-case scenarios of smartphone and the design process of the antenna system for the same are highlighted. The feasibility of scaling up sub-6GHz to mmWave antennas is also discussed in detail followed by a plethora of design examples which could be panel mounted to modern-day commercial smartphones. The unique requirement of gain switchability is introduced with feasible practical antenna designs. High efficiency antennas for 5G base stations is introduced along with a design example on planar all-metallic antenna. Beam switchability requirement for base station is illustrated with a couple of compact antenna system examples. Variety of feeding techniques for mmWave antennas is elaborated in this book. Finally, low-cost antenna designs for future wireless devices are illustrated.
Elucidating fundamental design principles by means of accurate trade-off analysis of relevant design options using suitable mathematical tools, this is the first book to provide a coherent treatment of transmission technologies essential to current and future wireless systems. Develop in-depth knowledge of the capabilities and limitations of wireless transmission technologies in supporting high-quality wireless transmission services, and foster a thorough understanding of various design trade-offs, to help identify an ideal choice for your own application requirements. Key technologies such as advanced diversity combining, multi-user scheduling, multi-user multi-antenna transmission, relay transmission, and cognitive radio are examined, making this an essential resource for senior graduate students, researchers, and engineers working in wireless communications.
The book systematically introduces the design theory and method of multi-band RF filtering circuits for the modern wireless communication systems or radar systems, which are required to operate at multi-bands. These multi-band filtering RF circuits have drawn more and more attention from the engineers and scientists in the field of RF circuits design. The book proposes the detailed theoretical analysis and abundant experimental data of multi-mode resonators, multi-band bandpass filter with high selectivity, reflectionless multi-band bandpass filter, balanced filter with high suppression, slotline based multi-band balun filter, switchable filtering diplexer based on reused L-shape resonator and miniaturized 55-/95-GHz on-chip dual-band bandpass Filter. The book is intended for undergraduate and graduate students who are interested in filtering circuits design, researchers who are investigating RF & microwave systems, as well as design engineers who are working in the RF & microwave circuits field. Readers can get an in-depth understanding about the multi-band RF filtering circuits design theory and method.
This book describes the fundamentals of THz communications, spanning the whole range of applications, propagation and channel models, RF transceiver technology, antennas, baseband techniques, and networking interfaces. The requested data rate in wireless communications will soon reach from 100 Gbit/s up to 1 Tbps necessitating systems with ultra-high bandwidths of several 10s of GHz which are available only above 200 GHz. In the last decade, research at these frequency bands has made significant progress, enabling mature experimental demonstrations of so-called THz communications, which are thus expected to play a vital role in future wireless networks. In addition to chapters by leading experts on the theory, modeling, and implementation of THz communication technology, the book also features the latest experimental results and addresses standardization and regulatory aspects. This book will be of interest to both academic researchers and engineers in the telecommunications industry.
This book provides a timely and comprehensive study of developing efficient network slicing frameworks in both 5G wireless and core networks. It also presents protocol stack layer perspectives, which includes virtual network topology design, end-to-end delay modeling, dynamic resource slicing, and link-layer and transport-layer protocol customization. This book provides basic principles, concepts and technologies for communication, computing and networking. Optimization and queueing analysis techniques are applied to solving different problems for network slicing illustrated in this book as well. Researchers working in the area of network slicing in 5G networks and beyond, and advanced-level students majoring in electrical engineering, computer engineering and computer science will find this book useful as a reference or secondary textbook. Professionals in industry seeking solutions to resource management for 5G networks and beyond will also want to purchase this book.
This book discusses synthesis of Gm-C filter for modern radio frequency systems. Analogue filters are an inevitable part of the chain of signal processing in modern radio and telecommunication systems. Among the technologies implemented for these purposes are the so-called Gm-C filters which are built of operational transconductance amplifiers and capacitors. This technology allows for integration of the filter into a CMOS system-on-chip so making it very attractive for application in low-power (battery operated) devices. The objective of this book is to achieve three goals: (1) to fully describe the circuit synthesis procedures for parallel, cascade, and a realization based on LC prototypes; (2) to make a thorough evaluation of the advantages and disadvantages of these methods and to recommend the "preferable" one; and (3) to create an extensive table of element values of cascaded Gm-C filters realizing the best-known low-pass filter functions. The book will influence the design community to embrace this technology even for non-communication applications.
This book covers connectivity and edge computing solutions for representative Internet of Things (IoT) use cases, including industrial IoT, rural IoT, Internet of Vehicles (IoV), and mobile virtual reality (VR). Based on their unique characteristics and requirements, customized solutions are designed with targets such as supporting massive connections or seamless mobility and achieving low latency or high energy efficiency. Meanwhile, the book highlights the role of artificial intelligence (AI) in future IoT networks and showcases AI-based connectivity and edge computing solutions. The solutions presented in this book serve the overall purpose of facilitating an increasingly connected and intelligent world. The potential benefits of the solutions include increased productivity in factories, improved connectivity in rural areas, enhanced safety for vehicles, and enriched entertainment experiences for mobile users. Featuring state-of-the-art research in the IoT field, this book can help answer the question of how to connect billions of diverse devices and enable seamless data collection and processing in future IoT. The content also provides insights regarding the significance of customizing use case-specific solutions as well as approaches of using various AI methods to empower IoT. This book targets researchers and graduate students working in the areas of electrical engineering, computing engineering, and computer science as a secondary textbook or reference. Professionals in industry who work in the field of IoT will also find this book useful.
This book gathers selected papers presented at the 4th International Conference on Wireless Communications and Applications (ICWCA 2020), held at Hainan University, China. The second volume will involve research works aimed at the contemporary applications: emerging wireless/mobile applications, context and location-aware wireless services; wireless telemedicine and e-health services; intelligent transportation systems; RFID technology and application; cognitive radio and sensor-based applications; content distribution in wireless home environment and many others.
This book dives into radio resource allocation optimizations, a research area for wireless communications, in a pragmatic way and not only includes wireless channel conditions but also incorporates the channel in a simple and practical fashion via well-understood equations. Most importantly, the book presents a practical perspective by modeling channel conditions using terrain-aware propagation which narrows the gap between purely theoretical work and that of industry methods. The provided propagation modeling reflects industry grade scenarios for radio environment map and hence makes the channel based resource allocation presented in the book a field-grade view. Also, the book provides large scale simulations that account for realistic locations with terrain conditions that can produce realistic scenarios applicable in the field. Most portions of the book are accompanied with MATLAB code and occasionally MATLAB/Python/C code. The book is intended for graduate students, academics, researchers of resource allocation in mathematics, computer science, and electrical engineering departments as well as working professionals/engineers in wireless industry.
This book introduces the Internet access for vehicles as well as novel communication and computing paradigms based on the Internet of vehicles. To enable efficient and reliable Internet connection for mobile vehicle users, this book first introduces analytical modelling methods for the practical vehicle-to-roadside (V2R) Internet access procedure, and employ the interworking of V2R and vehicle-to-vehicle (V2V) to improve the network performance for a variety of automotive applications. In addition, the wireless link performance between a vehicle and an Internet access station is investigated, and a machine learning based algorithm is proposed to improve the link throughout by selecting an efficient modulation and coding scheme. This book also investigates the distributed machine learning algorithms over the Internet access of vehicles. A novel broadcasting scheme is designed to intelligently adjust the training users that are involved in the iteration rounds for an asynchronous federated learning scheme, which is shown to greatly improve the training efficiency. This book conducts the fully asynchronous machine learning evaluations among vehicle users that can utilize the opportunistic V2R communication to train machine learning models. Researchers and advanced-level students who focus on vehicular networks, industrial entities for internet of vehicles providers, government agencies target on transportation system and road management will find this book useful as reference. Network device manufacturers and network operators will also want to purchase this book.
The three-volume set constitutes the proceedings of the 17th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2022, which was held during November 24th-26th, 2022. The conference took place in Dalian, China.The 95 full and 62 short papers presented in these proceedings were carefully reviewed and selected from 265 submissions. The contributions in cyber-physical systems including intelligent transportation systems and smart healthcare systems; security and privacy; topology control and coverage; energy-efficient algorithms, systems and protocol design
The three-volume set constitutes the proceedings of the 17th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2022, which was held during October 28-30, 2022. The conference took place in Dalian, China.The 95 full and 62 short papers presented in these proceedings were carefully reviewed and selected from 265 submissions. The contributions in theoretical frameworks and analysis of fundamental cross-layer protocol and network design and performance issues; distributed and localized algorithm design and analysis; information and coding theory for wireless networks; localization; mobility models and mobile social networking; underwater and underground networks; vehicular networks; algorithms, systems, and applications of edge computing
The three-volume set constitutes the proceedings of the 17th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2022, which was held during October 28-30, 2022. The conference took place in Dalian, China.The 95 full and 62 short papers presented in these proceedings were carefully reviewed and selected from 265 submissions. The contributions in algorithms, systems; and applications of internet of things;information processing and data management;radar and sonar networks
Objectives: This book examined the decision making process and health seeking patterns of low-income young women with unplanned pregnancies who opted for abortion, putting baby up for adoption, or keeping the baby. Methods: Research methodology in this book focused on formative research utilising qualitative data. The study was conducted covering all five shelters and low-income communities in Bangkok, Thailand. The data collection was through Focus Group Discussions, and in-depth interview. Forty-five cases were purposively recruited into the study. The data were analysed using content analysis. Results: From the qualitative research, the results indicated that the majority of the young women tended to select abortion as their first choice, while a few cases continued their pregnancies to term without any attempt to terminate the pregnancy. These women tended to delay seeking assistance once they found out their pregnancy situation. Majority of the low-income young women were more likely to resort self-medication as their first alternative, which was sometimes hazardous to their health. Decision on self-medication or abortions with unskilled personnel sometimes resulted in serious and life-threatening complications. Many pregnancy-termination situations resulted from self-medication. While most of these women made the important decision themselves, they still sought advice, guidance, and support from their partners, peers and parents. When the first attempt failed, they would seek a second or third attempt until they felt it was not possible to achieve what they had planned. Most women with unplanned pregnancies knew that they had options regarding termination of their pregnancies but their main concern was confidentiality. Consequently, the women who wanted to terminate their pregnancies adopted three patterns of action, i.e., 1) visiting drugstores / grocery stores, 2) visiting private clinics or hospitals, and 3) using physical pressure or vigorous actions. Most of the women realised that private clinics provided effective methods for terminating pregnancy, but due to its high cost, they would first resort self-medication or self-management. If they were not successful, they would then visit a private clinic and asked others to support the cost. Understanding the women's decisions making process and their health seeking patterns utilisation allows us to understand their decision and course of actions. The program managers, implementers, providers, partners, parents/relatives, and friends should do as much as possible to support the decision of the women in order to provide better information and services to reduce the impact, both physical and mental, of their selected choice.
This book provides a timely and comprehensive study of dynamic resource management for network slicing in service-oriented fifth-generation (5G) and beyond core networks. This includes the perspective of developing efficient computation resource provisioning and scheduling solutions to guarantee consistent service performance in terms of end-to-end (E2E) data delivery delay. Network slicing is enabled by the software defined networking (SDN) and network function virtualization (NFV) paradigms. For a network slice with a target traffic load, the E2E service delivery is enabled by virtual network function (VNF) placement and traffic routing with static resource allocations. When data traffic enters the network, the traffic load is dynamic and can deviate from the target value, potentially leading to QoS performance degradation and network congestion. Data traffic has dynamics in different time granularities. For example, the traffic statistics (e.g., mean and variance) can be non-stationary and experience significant changes in a coarse time granularity, which are usually predictable. Within a long time duration with stationary traffic statistics, there are traffic dynamics in small timescales, which are usually highly bursty and unpredictable. To provide continuous QoS performance guarantee and ensure efficient and fair operation of the network slices over time, it is essential to develop dynamic resource management schemes for the embedded services in the presence of traffic dynamics during virtual network operation. Queueing theory is used in system modeling, and different techniques including optimization and machine learning are applied to solving the dynamic resource management problems. Based on a simplified M/M/1 queueing model with Poisson traffic arrivals, an optimization model for flow migration is presented to accommodate the large-timescale changes in the average traffic rates with average E2E delay guarantee, while addressing a trade-off between load balancing and flow migration overhead. To overcome the limitations of Poisson traffic model, the authors present a machine learning approach for dynamic VNF resource scaling and migration. The new solution captures the inherent traffic patterns in a real-world traffic trace with non-stationary traffic statistics in large timescale, predicts resource demands for VNF resource scaling, and triggers adaptive VNF migration decision making, to achieve load balancing, migration cost reduction, and resource overloading penalty suppression in the long run. Both supervised and unsupervised machine learning tools are investigated for dynamic resource management. To accommodate the traffic dynamics in small time granularities, the authors present a dynamic VNF scheduling scheme to coordinate the scheduling among VNFs of multiple services, which achieves network utility maximization with delay guarantee for each service. Researchers and graduate students working in the areas of electrical engineering, computing engineering and computer science will find this book useful as a reference or secondary text. Professionals in industry seeking solutions to dynamic resource management for 5G and beyond networks will also want to purchase this book.
This book covers the basic theory of mean field game (MFG) and its applications in wireless networks. It starts with an overview of the current and future state-of-the-art in 5G and 6G wireless networks. Then, a tutorial is presented for MFG, mean-field-type game (MFTG), and prerequisite fields of study such as optimal control theory and differential games. This book also includes a literature survey of MFG-based research in wireless network technologies such as ultra-dense networks (UDNs), device-to-device (D2D) communications, internet-of-things (IoT), unmanned aerial vehicles (UAVs), and mobile edge networks (MENs). Several applications of MFG and MFTG in UDNs, social networks, and multi-access edge computing networks (MECNs) are introduced as well. Applications of MFG covered in this book are divided in three parts. The first part covers three single-population MFG research works or case studies in UDNs including ultra-dense D2D networks, ultra-dense UAV networks, and dense-user MECNs. The second part centers on a multiple-population MFG (MPMFG) modeling of belief and opinion evolution in social networks. It focuses on a recently developed MPMFG framework and its application in analyzing the behavior of users in a multiple-population social network. Finally, the last part concentrates on an MFTG approach to computation offloading in MECN. The computation offloading algorithms are designed for energy- and time-efficient offloading of computation-intensive tasks in an MECN. This book targets advanced-level students, professors, researchers, scientists, and engineers in the fields of communications and networks. Industry managers and government employees working in these same fields will also find this book useful.
This book provides a comprehensive review and in-depth study on efficient beamforming design and rigorous performance analysis in mmWave networks, covering beam alignment, beamforming training and beamforming-aided caching. Due to significant beam alignment latency between the transmitter and the receiver in existing mmWave systems, this book proposes a machine learning based beam alignment algorithm for mmWave networks to determine the optimal beam pair with a low latency. Then, to analyze and enhance the performance of beamforming training (BFT) protocol in 802.11ad mmWave networks, an analytical model is presented to evaluate the performance of BFT protocol and an enhancement scheme is proposed to improve its performance in high user density scenarios. Furthermore, it investigates the beamforming-aided caching problem in mmWave networks, and proposes a device-to-device assisted cooperative edge caching to alleviate backhaul congestion and reduce content retrieval delay. This book concludes with future research directions in the related fields of study. The presented beamforming designs and the corresponding research results covered in this book, provides valuable insights for practical mmWave network deployment and motivate new ideas for future mmWave networking. This book targets researchers working in the fields of mmWave networks, beamforming design, and resource management as well as graduate students studying the areas of electrical engineering, computing engineering and computer science. Professionals in industry who work in this field will find this book useful as a reference.
The aim of the book "Innovative Mobile and Internet Services in Ubiquitous Computing" is to provide latest research findings, methods and development techniques, challenges and solutions from both theoretical and practical perspectives related to UPC with an emphasis on innovative, mobile and internet services. With the proliferation of wireless technologies and electronic devices, there is a fast-growing interest in Ubiquitous and Pervasive Computing (UPC). The UPC enables to create a human-oriented computing environment where computer chips are embedded in everyday objects and interact with physical world. Through UPC, people can get online even while moving around, thus having almost permanent access to their preferred services. With a great potential to revolutionize our lives, UPC also poses new research challenges. |
![]() ![]() You may like...
Computing in Communication Networks…
Frank H. P. Fitzek, Fabrizio Granelli, …
Paperback
R2,757
Discovery Miles 27 570
Handbook of Research on Emerging Designs…
Jamal Zbitou, Mostafa Hefnawi, …
Hardcover
R8,879
Discovery Miles 88 790
Antenna Architectures for Future…
Shiban Kishen Koul, Karthikeya G S
Hardcover
R3,803
Discovery Miles 38 030
Solutions for High-Touch Communications…
Michael A. Brown Sr.
Hardcover
R5,088
Discovery Miles 50 880
Advances in Body-Centric Wireless…
Qammer H. Abbasi, Masood Ur Rehman, …
Hardcover
Cross-Layer Resource Allocation in…
Ana I. Perez-Neira, Marc Realp Campalans
Hardcover
R1,989
Discovery Miles 19 890
The COVID-19 Pandemic and the…
Floribert Patrick Calvain Endong
Hardcover
R6,446
Discovery Miles 64 460
Wireless Sensor and Actuator Networks…
Roberto Verdone, Davide Dardari, …
Hardcover
R2,309
Discovery Miles 23 090
|