![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
Resource allocation is an important issue in wireless communication networks. In recent decades, cognitive radio-based networks have garnered increased attention and have been well studied to overcome the problem of spectrum scarcity in future wireless communications systems. Many new challenges in resource allocation appear in cognitive radio-based networks. This book focuses on effective resource allocation solutions in several important cognitive radio-based networks, including opportunistic spectrum access networks, cooperative sensing networks, cellular networks, high-speed vehicle networks, and smart grids. Cognitive radio networks are composed of cognitive, spectrum-agile devices capable of changing their configuration on the fly based on the spectral environment. This capability makes it possible to design flexible and dynamic spectrum access strategies with the purpose of opportunistically reusing portions of the spectrum temporarily vacated by licensed primary users. Different cognitive radio-based networks focus on different network resources, such as transmission slots, sensing nodes, transmission power, white space, and sensing channels. This book introduces several innovative resource allocation schemes for different cognitive radio-based networks according to their network characteristics: Opportunistic spectrum access networks - Introduces a probabilistic slot allocation scheme to effectively allocate the transmission slots to secondary users to maximize throughput Cooperative sensing networks - Introduces a new adaptive collaboration sensing scheme in which the resources of secondary users are effectively utilized to sense the channels for efficient acquisition of spectrum opportunities Cellular networks - Introduces a framework of cognitive radio-assisted cooperation for downlink transmissions to allocate transmission modes, relay stations, and transmission power/sub-channels to secondary users to maximize throughput High-speed vehicle networks - Introduces schemes to maximize the utilized TV white space through effective allocation of white space resources to secondary users Smart grids - Introduces effective sensing channel allocation strategies for acquiring enough available spectrum channels for communications between utility and electricity consumers
The text focuses on the basics of Python programming fundamentals and introduction to present-day applications in technology and the upcoming state-of-art trends in a comprehensive manner. The text is based on Python 3.x and it covers the fundamentals of Python with object-oriented concepts having numerous worked-out examples. It provides a learning tool for the students of beginner level as well as for researchers of advanced level. Each chapter contains additional examples that explain the usage of methods/functions discussed in the chapter. It provides numerous programming examples along with their outputs. The book: Includes programming tips to highlight the important concepts and help readers avoid common programming errors Provides programming examples along with their outputs to ensure the correctness and help readers in mastering the art of writing efficient Python programs Contains MCQs with their answers; conceptual questions and programming questions; and solutions to some selected programming questions, for every chapter Discusses applications like time zone converter and password generators at the end Covers fundamental of Python up to object oriented concepts including regular expression The book offers a simple and lucid treatment of concepts supported with illustrations for easy understanding, provides numerous programming examples along with their outputs, and includes programming tips to highlight the important concepts. It will be a valuable resource for senior undergraduate, graduate students, and professionals in the fields of electrical engineering, electronics and communication engineering, and computer engineering.
Modern transceiver systems require diversified design aspects as various radio and sensor applications have emerged. Choosing the right architecture and understanding interference and linearity issues are important for multi-standard cellular transceivers and software-defined radios. A millimeter-wave complementary metal-oxide-semiconductor (CMOS) transceiver design for multi-Gb/s data transmission is another challenging area. Energy-efficient short-range radios for body area networks and sensor networks have recently received great attention. To meet different design requirements, gaining good system perspectives is important. Wireless Transceiver Circuits: System Perspectives and Design Aspects offers an in-depth look at integrated circuit (IC) design for modern transceiver circuits and wireless systems. Ranging in scope from system perspectives to practical circuit design for emerging wireless applications, this cutting-edge book: Provides system design considerations in modern transceiver design Covers both systems and circuits for the millimeter-wave transceiver design Introduces four energy-efficient short-range radios for biomedical and wireless connectivity applications Emphasizes key building blocks in modern transceivers and transmitters, including frequency synthesizers and digital-intensive phase modulators Featuring contributions from renowned international experts in industry and academia, Wireless Transceiver Circuits: System Perspectives and Design Aspects makes an ideal reference for engineers and researchers in the area of wireless systems and circuits.
Understand the fundamentals of wireless and MIMO communication with this accessible and comprehensive text. Viewing the subject through an information theory lens, but also drawing on other perspectives, it provides a sound treatment of the key concepts underpinning contemporary wireless communication and MIMO, all the way to massive MIMO. Authoritative and insightful, it includes over 330 worked examples and 450 homework problems, with solutions and MATLAB code and data available online. Altogether, this is an excellent resource for instructors and graduate students, as well as an outstanding reference for researchers and practicing engineers.
Following a detailed overview of cooperative communications and the physical layer security, this book proposes relay and jammer selection schemes for security in one-way cooperative networks and to improve physical layer security in two-way cooperative networks. It also proposes a Cooperative Hybrid Self-Healing scheme to enhance the confidentiality of the data collected by UWSN. It ends with a proposal called Self-Healing Cluster Controlled Mobility (SH-CCM) scheme based on hybrid cooperation between both Proactive and Reactive peers and the sick sensors at both network and cluster levels to guarantee the security in UWSN.
Providing an ideal transition from introductory to advanced concepts, this book builds a foundation that allows electrical engineers to confidently proceed with the development of advanced EM studies, research, and applications. New topics include quasistatics, vector spherical wave functions, and wave matrices. Several application-oriented sections covering guided waves and transmission lines, particle dynamics, shielding, electromagnetic material characterization, and antennas have also been added. Mathematical appendices present helpful background information in the areas of Fourier transforms, dyadics, and boundary value problems. Key Features Provides extensive end-of-chapter problems. Includes numerous solved examples with detailed explanations and interpretations. Introduces the reader to numerical electromagnetics and integral equations. Each chapter offers an introduction to an important application of electromagnetics. Emphasizes fundamentals, while covering all of the important topics in electromagnetics.
This book discusses the theoretical limits of information transfer in random wireless networks or ad hoc networks, where nodes are distributed uniformly in space and there is no centralised control. It provides a detailed analysis of the two relevant notions of capacity for random wireless networks - transmission capacity and throughput capacity. The book starts with the transmission capacity framework that is first presented for the single-hop model and later extended to the multi-hop model with retransmissions. Reusing some of the tools developed for analysis of transmission capacity, a few key long-standing questions about the performance analysis of cellular networks are also provided for the benefit of students. The discussion goes further into the concept of hierarchical co-operation that allows throughput capacity to scale linearly with the number of nodes. The author finally discusses the concept of hierarchical co-operation that allows throughput capacity to scale linearly with the number of nodes.
Written in the intuitive yet rigorous style that readers of A Foundation in Digital Communication have come to expect, this second edition includes entirely new chapters on the radar problem (with Lyapunov's theorem) and intersymbol interference channels, new discussion of the baseband representation of passband noise, and a simpler, more geometric derivation of the optimal receiver for the additive white Gaussian noise channel. Other key topics covered include the definition of the power spectral density of nonstationary stochastic processes, the geometry of the space of energy-limited signals, the isometry properties of the Fourier transform, and complex sampling. Including over 500 homework problems and all the necessary mathematical background, this is the ideal text for one- or two-semester graduate courses on digital communications and courses on stochastic processes and detection theory. Solutions to problems and video lectures are available online.
Owing to the rapid developments and growth in the telecommunications industry, the need to develop relevant skills in this field are in high demand. Wireless technology helps to exchange the information between portable devices situated globally. In order to fulfil the demands of this developing field, a unified approach between fundamental concepts and advanced topics is required. The book bridges the gap with a focus on key concepts along with the latest developments including turbo coding, smart antennas, multiple input multiple output (MIMO) system, and software defined radio. It also underpins the design requirements of wireless systems and provides comprehensive coverage of the cellular system and its generations: 3G and 4G (Long Term Evolution). With numerous solved examples, numerical questions, open book exam questions, and illustrations, undergraduates and graduate students will find this to be a readable and highly useful text.
This book demonstrates the optimal adversarial attacks against several important signal processing algorithms. Through presenting the optimal attacks in wireless sensor networks, array signal processing, principal component analysis, etc, the authors reveal the robustness of the signal processing algorithms against adversarial attacks. Since data quality is crucial in signal processing, the adversary that can poison the data will be a significant threat to signal processing. Therefore, it is necessary and urgent to investigate the behavior of machine learning algorithms in signal processing under adversarial attacks. The authors in this book mainly examine the adversarial robustness of three commonly used machine learning algorithms in signal processing respectively: linear regression, LASSO-based feature selection, and principal component analysis (PCA). As to linear regression, the authors derive the optimal poisoning data sample and the optimal feature modifications, and also demonstrate the effectiveness of the attack against a wireless distributed learning system. The authors further extend the linear regression to LASSO-based feature selection and study the best strategy to mislead the learning system to select the wrong features. The authors find the optimal attack strategy by solving a bi-level optimization problem and also illustrate how this attack influences array signal processing and weather data analysis. In the end, the authors consider the adversarial robustness of the subspace learning problem. The authors examine the optimal modification strategy under the energy constraints to delude the PCA-based subspace learning algorithm. This book targets researchers working in machine learning, electronic information, and information theory as well as advanced-level students studying these subjects. R&D engineers who are working in machine learning, adversarial machine learning, robust machine learning, and technical consultants working on the security and robustness of machine learning are likely to purchase this book as a reference guide.
Near field communication (NFC) can appear to be a simple intuitive technology for exchanging data between close devices. In reality, these contactless structures that combine components and antennas must respect important and specific working constraints. Illustrated by a number of detailed technological examples, this book discusses the multiple normative (ISO, CEN, NFC Forum, EMVCo, etc.) and regulatory (ERC, FCC, ETSI, radiofrequency, private and ecological pollution, etc.) constraints, as well as the applied, typological, functional, structural, environmental or interoperability constraints that a NFC device might face. Design Constraints for NFC Devices also presents techniques that enable us to free ourselves from the technological constraints of current NFC operations encountered in banking, public transport, administration, automotive, industrial, communicating object and Internet of Things applications.
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Master the Signal Processing Concepts and Techniques Needed to Design and Operate Any Wireless Communications Network Signal Processing for Wireless Communications offers communications engineers an application-focused guide to the essential concepts and techniques of wireless signal processing. This comprehensive reference examines the role that key algorithms and standard migration paths play in the design and day-to-day operations of today's state-of-the-art wireless networks. Written by Dr. Joseph Boccuzzi, a leading signal processing expert with years of product development, research, and teaching experience, this on-target engineering tool takes readers step by step through major wireless topics...modulation theory...wireless multipath channel...modulation detection methods...performance improvement techniques...receiver digital signal processing...3G wideband CDMA...computer simulation estimation techniques...and 3G and beyond. Designed to bring engineers up to speed on the latest breakthroughs in signal processing technology, Signal Processing for Wireless Communications features: Expert coverage of 3G wideband CDMA Discussion of the role OFDM will play in future technologies Complete information on the role of vital signal processing algorithms within the context of wireless applications Discussions of advanced signal processing challenges in the mobile environment Over 500 detailed illustrations Inside This Hands-On Signal Processing Guide * Wireless Topics * Modulation Theory * Wireless Multipath Channel * Modulation Detection Techniques * Performance Improvement Techniques * Receiver Digital Signal Processing * 3G Wideband CDMA * Computer Simulation Estimation Techniques * 3G and Beyond
Wireless sensor networks are an emerging technology with a wide range of applications in military and civilian domains. The book begins by detailing the basic principles and concepts of wireless sensor networks, including information gathering, energy management and the structure of sensory nodes. It proceeds to examine advanced topics, covering localisation, topology, security and evaluation of wireless sensor networks, highlighting international research being carried out in this area. Finally, it features numerous examples of applications of this technology to a range of domains, such as wireless, multimedia, underwater and underground wireless sensor networks. The concise but clear presentation of the important principles, techniques and applications of wireless sensor networks makes this guide an excellent introduction for anyone new to the subject, as well as an ideal reference for practitioners and researchers.
Whether you are a developer, engineer, researcher or student, this practical guide gives you everything you need to know about NFC technology and its applications. You will learn what differentiates NFC from other short-range technologies such as contactless cards, RFID and Bluetooth, as well as discovering the opportunities it provides, from a fast and instinctive user interface with no infrastructure requirements to the world of Secure Elements, Trusted Service Managers, mobile wallets and the Internet of Things. With critical applications in areas including advertising, retail and transportation, this book demonstrates how you can use NFC technology practically to make transactions easier and quicker. All of this is supplemented with an array of in-depth case studies and real-life examples to reinforce your understanding, along with detailed coverage of the problems associated with the wider commercial introduction of NFC and strategies that can be used to aid its future development.
This accessible, self-contained guide contains everything you need to get up to speed on the theory and implementation of MIMO techniques. In-depth coverage of topics such as RF propagation, space-time coding, spatial multiplexing, OFDM in MIMO for broadband applications, the theoretical MIMO capacity formula and channel estimation will give you a deep understanding of how the results are obtained, while detailed descriptions of how MIMO is implemented in commercial WiFi and LTE networks will help you apply the theory to practical wireless systems. Key concepts in matrix mathematics and information theory are introduced and developed as you need them, and key results are derived step-by-step, with no details omitted. Including numerous worked examples, and end-of-chapter exercises to reinforce and solidify your understanding, this is the perfect introduction to MIMO for anyone new to the field.
Over recent years, the amount of mobile equipment that needs to be connected to corporate networks remotely (smartphones, laptops, etc.) has increased rapidly. Innovative development perspectives and new tendencies such as BYOD (bring your own device) are exposing business information systems more than ever to various compromising threats. The safety control of remote access has become a strategic issue for all companies. This book reviews all the threats weighing on these remote access points, as well as the existing standards and specific countermeasures to protect companies, from both the technical and organizational points of view. It also reminds us that the organization of safety is a key element in the implementation of an efficient system of countermeasures as well. The authors also discuss the novelty of BYOD, its dangers and how to face them. Contents 1. An Ordinary Day in the Life of Mr. Rowley, or the Dangers of Virtualization and Mobility.2.Threats and Attacks.3. Technological Countermeasures.4. Technological Countermeasures for Remote Access.5. What Should Have Been Done to Make Sure Mr Rowley's Day Really Was Ordinary. About the Authors Dominique Assing is a senior security consultant and a specialist in the management and security of information systems in the banking and stock markets sectors. As a security architect and risk manager, he has made information security his field of expertise.Stephane Cale is security manager (CISSP) for a major automobile manufacturer and has more than 15 years of experience of putting in place telecommunications and security infrastructures in an international context.
This handbook offers an unparalleled view of wireless personal area networking technologies and their associated protocols. It lifts the lid on their growing adoption within the consumer electronics, home automation, sports, health and well-being markets. Bluetooth low energy, ZigBee, EnOcean and ANT+ are comprehensively covered, along with other WPAN technologies including NFC, Wi-Fi, Bluetooth classic and high speed, and WHDI. It also features 802.11ac, the Internet of Things, Wireless USB, WiGig and WirelessHD. The handbook shows how white space radio, cellular and Femtocells have inadvertently blurred the boundaries between personal and wide area communications, creating disruptive topologies through technology convergence. It explores how pervasive WAN technologies have spawned a new generation of consumers through the Lawnmower Man Effect and explains how our personal space has become integral to social media streams, including Twitter, Facebook and Pinterest. An essential read for students, software engineers and developers, product planners, technical marketers and analysts.
If you've been searching for a way to get up to speed on IEEE 802.11n and 802.11ac WLAN standards without having to wade through the entire specification, then look no further. This comprehensive overview describes the underlying principles, implementation details and key enhancing features of 802.11n and 802.11ac. For many of these features the authors outline the motivation and history behind their adoption into the standard. A detailed discussion of key throughput, robustness, and reliability enhancing features (such as MIMO, multi-user MIMO, 40/80/160 MHz channels, transmit beamforming and packet aggregation) is given, plus clear summaries of issues surrounding legacy interoperability and coexistence. Now updated and significantly revised, this 2nd edition contains new material on 802.11ac throughput, including revised chapters on MAC and interoperability, plus new chapters on 802.11ac PHY and multi-user MIMO. An ideal reference for designers of WLAN equipment, network managers, and researchers in the field of wireless communications.
Wireless communication has become a ubiquitous part of modern life, from global cellular telephone systems to local and even personal-area networks. This 2004 book provides a tutorial introduction to digital mobile wireless networks, illustrating theoretical underpinnings with a wide range of real-world examples. The book begins with a review of propagation phenomena, and goes on to examine channel allocation, modulation techniques, multiple access schemes, and coding techniques. GSM and IS-95 systems are reviewed and 2.5G and 3G packet-switched systems are discussed in detail. Performance analysis and accessing and scheduling techniques are covered, and the book closes with a chapter on wireless LANs and personal-area networks. Many worked examples and homework exercises are provided and a solutions manual is available for instructors. The book is an ideal text for electrical engineering and computer science students taking courses in wireless communications. It will also be an invaluable reference for practising engineers.
This is an open access book. Important tasks must be completed on time and with guaranteed quality; that is the consensus reached by system designers and users. However, for too long, important tasks have often been given unnecessary urgency, and people intuitively believe that important tasks should be executed first so that their performance can be guaranteed. Actually, in most cases, their performance can be guaranteed even if they are executed later, and the "early" resources can be utilized for other, more urgent tasks. Therefore, confusing importance with urgency hinders the proper use of system resources. In 2007, mixed criticality was proposed to indicate that a system may contain tasks of various importance levels. Since then, system designers and users have distinguished between importance and urgency. In the industrial field, due to the harsh environment they operate in, industrial wireless networks' quality of service (QoS) has always been a bottleneck restricting their applications. Therefore, this book introduces criticality to label important data, which is then allocated more transmission resources, ensuring that important data's QoS requirements can be met to the extent possible. To help readers understand how to apply mixed-criticality data to industrial wireless networks, the content is divided into three parts. First, we introduce how to integrate the model of mixed-criticality data into industrial wireless networks. Second, we explain how to analyze the schedulability of mixed-criticality data under existing scheduling algorithms. Third, we present a range of novel scheduling algorithms for mixed-criticality data. If you want to improve the QoS of industrial wireless networks, this book is for you.
This book investigates intelligent network resource management for IoV, with the objective of maximizing the communication and computing performance of vehicle users. Focusing on two representative use cases in IoV, i.e., safety message broadcast and autonomous driving, the authors propose link-layer protocol design and application-layer computing task scheduling to achieve the objective given the unique characteristics and requirements of IoV. In particular, this book illustrates the challenges of resource management for IoV due to network dynamics, such as time-varying traffic intensity and vehicle mobility, and presents intelligent resource management solutions to adapt to the network dynamics. The Internet of Vehicles (IoV) enables vehicle-to-everything connectivity and supports a variety of applications for vehicles on the road. Intelligent resource management is critical for satisfying demanding communication and computing requirements on IoV, while the highly dynamic network environments pose challenges to the design of resource management schemes. This book provides insights into the significance of adaptive resource management in improving the performance of IoV. The customized communication protocol and computing scheduling scheme are designed accordingly by taking the network dynamics information as an integral design factor. Moreover, the decentralized designs of the proposed solutions guarantee low signaling overhead and high scalability. A comprehensive literature review summarizing recent resource management schemes in IoV, followed by the customized design of communication and computing solutions for the two IoV use cases is included which can serve as a useful reference for professionals from both academia and industry in the area of IoV and resource management. Researchers working within this field and computer science and electrical engineering students will find this book useful as well.
This book provides an overview of technologies to maximize the quality of user experience for mobile, data-centric applications. Chapters cover techniques mobile network operators can use to maximize the effectiveness of congested networks, techniques that mobile application developers can use to minimize the impact of congested networks on user experience, and techniques that websites and data center operators can use to support a growing number of mobile users. With no technical jargon and a practical approach, this book offers a useful resource for a wide range of mobile network developers and managers.
This book gathers selected papers presented at the 4th International Conference on Wireless Communications and Applications (ICWCA 2020), held at Hainan University, China. The first volume of the proceedings will focus on the newest methods and algorithms in smart wireless communications in the areas of multimedia communications over wireless; smart antenna and space-time signal processing; antenna, wireless propagation, and channel modeling; OFDM and multi-carrier techniques; localization and navigation techniques; software-defined networking (SDN) and network function virtualization (NFV); knowledge-defined networking (KDN) and the applications of artificial intelligence (AI) in future networks; future data-center networks; resource allocation and orchestration in future networks and many others.
This book comprises select proceedings of the 4th International Conference on Optical and Wireless Technologies (OWT 2020). The contents of this volume focus on research carried out in the areas of Optical Communication, Optoelectronics, Optics, Wireless Communication, Wireless Networks, Sensors, Mobile Communications and Antenna and Wave Propagation. The volume also explores the combined use of various optical and wireless technologies in next generation applications, and their latest developments in applications like photonics, high speed communication systems and networks, visible light communication, nanophotonics, wireless and MIMO systems. This book will serve as a useful reference to scientists, academicians, engineers and policy-makers interested in the field of optical and wireless technologies.
Learn to run your own simulation by working with model analysis, mathematical background, simulation output data, and most importantly, a network simulator for wireless technology. This book introduces the best practices of simulator use, the techniques for analyzing simulations with artificial agents and the integration with other technologies such as Power Line Communications (PLC). Network simulation is a key technique used to test the future behavior of a network. It's a vital development component for the development of 5G, IoT, wireless sensor networks, and many more. This book explains the scope and evolution of the technology that has led to the development of dynamic systems such as Internet of Things and fog computing. You'll focus on the ad hoc networks with stochastic behavior and dynamic nature, and the ns-3 simulator. These are useful open source tools for academics, researchers, students and engineers to deploy telecommunications experiments, proofs and new scenarios with a high degree of similarity with reality. You'll also benefit from a detailed explanation of the examples and the theoretical components needed to deploy wireless simulations or wired, if necessary. What You'll Learn Review best practices of simulator uses Understand techniques for analyzing simulations with artificial agents Apply simulation techniques and experiment design Program on ns-3 simulator Analyze simulation results Create new modules or protocols for wired and wireless networks Who This Book Is For Undergraduate and postgraduate students, researchers and professors interested in network simulations. This book also includes theoretical components about simulation, which are useful for those interested in discrete event simulation DES, general theory of simulation, wireless simulation and ns-3 simulator. |
You may like...
Understanding Elephants - Guidelines for…
Elephant Specialist Advisory Group
Paperback
Power Recovery from Low Grade Heat by…
Ian Smith, Nikola Stosic, …
Hardcover
R3,515
Discovery Miles 35 150
Equine Behaviour - Principles and…
Daniel Mills, Kathryn Nankervis
Paperback
R1,596
Discovery Miles 15 960
Advances in Heat Transfer, Volume 50
Ephraim M. Sparrow, John Patrick Abraham, …
Hardcover
R4,671
Discovery Miles 46 710
|