![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > WAP (wireless) technology
Snapchat. WhatsApp. Ashley Madison. Fitbit. Tinder. Periscope. How do we make sense of how apps like these-and thousands of others-have embedded themselves into our daily routines, permeating the background of ordinary life and standing at-the-ready to be used on our smartphones and tablets? When we look at any single app, it's hard to imagine how such a small piece of software could be particularly notable. But if we look at a collection of them, we see a bigger picture that reveals how the quotidian activities apps encompass are far from banal: connecting with friends (and strangers and enemies), sharing memories (and personally identifying information), making art (and trash), navigating spaces (and reshaping places in the process). While the sheer number of apps is overwhelming, as are the range of activities they address, each one offers an opportunity for us to seek out meaning in the mundane. Appified is the first scholarly volume to examine individual apps within the wider historical and cultural context of media and cultural studies scholarship, attuned to issues of politics and power, identity and the everyday.
This book presents an alternative and simplified approaches for the robust adaptive detection and beamforming in wireless communications. It adopts several systems models including DS/CDMA, OFDM/MIMO with antenna array, and general antenna arrays beamforming model. It presents and analyzes recently developed detection and beamforming algorithms with an emphasis on robustness. In addition, simplified and efficient robust adaptive detection and beamforming techniques are presented and compared with exiting techniques. Practical examples based on the above systems models are provided to exemplify the developed detectors and beamforming algorithms. Moreover, the developed techniques are implemented using MATLAB--and the relevant MATLAB scripts are provided to help the readers to develop and analyze the presented algorithms. Simplified Robust Adaptive Detection and Beamforming for Wireless Communications starts by introducing readers to adaptive signal processing and robust adaptive detection. It then goes on to cover Wireless Systems Models. The robust adaptive detectors and beamformers are implemented using the well-known algorithms including LMS, RLS, IQRD-RLS, RSD, BSCMA, CG, and SD. The robust detection and beamforming are derived based on the existing detectors/beamformers including MOE, PLIC, LCCMA, LCMV, MVDR, BSCMA, and MBER. The adopted cost functions include MSE, BER, CM, MV, and SINR/SNR.
Learn to run your own simulation by working with model analysis, mathematical background, simulation output data, and most importantly, a network simulator for wireless technology. This book introduces the best practices of simulator use, the techniques for analyzing simulations with artificial agents and the integration with other technologies such as Power Line Communications (PLC). Network simulation is a key technique used to test the future behavior of a network. It's a vital development component for the development of 5G, IoT, wireless sensor networks, and many more. This book explains the scope and evolution of the technology that has led to the development of dynamic systems such as Internet of Things and fog computing. You'll focus on the ad hoc networks with stochastic behavior and dynamic nature, and the ns-3 simulator. These are useful open source tools for academics, researchers, students and engineers to deploy telecommunications experiments, proofs and new scenarios with a high degree of similarity with reality. You'll also benefit from a detailed explanation of the examples and the theoretical components needed to deploy wireless simulations or wired, if necessary. What You'll Learn Review best practices of simulator uses Understand techniques for analyzing simulations with artificial agents Apply simulation techniques and experiment design Program on ns-3 simulator Analyze simulation results Create new modules or protocols for wired and wireless networks Who This Book Is For Undergraduate and postgraduate students, researchers and professors interested in network simulations. This book also includes theoretical components about simulation, which are useful for those interested in discrete event simulation DES, general theory of simulation, wireless simulation and ns-3 simulator.
This book gathers selected papers presented at the 4th International Conference on Wireless Communications and Applications (ICWCA 2020), held at Hainan University, China. The first volume of the proceedings will focus on the newest methods and algorithms in smart wireless communications in the areas of multimedia communications over wireless; smart antenna and space-time signal processing; antenna, wireless propagation, and channel modeling; OFDM and multi-carrier techniques; localization and navigation techniques; software-defined networking (SDN) and network function virtualization (NFV); knowledge-defined networking (KDN) and the applications of artificial intelligence (AI) in future networks; future data-center networks; resource allocation and orchestration in future networks and many others.
Receive comprehensive instruction on the fundamentals of wireless security from three leading international voices in the field Security in Wireless Communication Networksdelivers a thorough grounding in wireless communication security. The distinguished authors pay particular attention to wireless specific issues, like authentication protocols for various wireless communication networks, encryption algorithms and integrity schemes on radio channels, lessons learned from designing secure wireless systems and standardization for security in wireless systems. The book addresses how engineers, administrators, and others involved in the design and maintenance of wireless networks can achieve security while retaining the broadcast nature of the system, with all of its inherent harshness and interference. Readers will learn: A comprehensive introduction to the background of wireless communication network security, including a broad overview of wireless communication networks, security services, the mathematics crucial to the subject, and cryptographic techniques An exploration of wireless local area network security, including Bluetooth security, Wi-Fi security, and body area network security An examination of wide area wireless network security, including treatments of 2G, 3G, and 4G Discussions of future development in wireless security, including 5G, and vehicular ad-hoc network security Perfect for undergraduate and graduate students in programs related to wireless communication, Security in Wireless Communication Networks will also earn a place in the libraries of professors, researchers, scientists, engineers, industry managers, consultants, and members of government security agencies who seek to improve their understanding of wireless security protocols and practices.
This book comprises select proceedings of the 4th International Conference on Optical and Wireless Technologies (OWT 2020). The contents of this volume focus on research carried out in the areas of Optical Communication, Optoelectronics, Optics, Wireless Communication, Wireless Networks, Sensors, Mobile Communications and Antenna and Wave Propagation. The volume also explores the combined use of various optical and wireless technologies in next generation applications, and their latest developments in applications like photonics, high speed communication systems and networks, visible light communication, nanophotonics, wireless and MIMO systems. This book will serve as a useful reference to scientists, academicians, engineers and policy-makers interested in the field of optical and wireless technologies.
Wireless telecommunication systems generate a huge amount of interest. In the last two decades, these systems have experienced at least three major technological leaps, and it has become impossible to imagine how society was organized without them. In this book, we propose a macroscopic approach on wireless systems, and aim at answering key questions about power, data rates, multiple access, cellular engineering and access networks architectures. We present a series of solved problems, whose objective is to establish the main elements of a global link budget in several radiocommunications systems. Contents 1. Radio Propagation. 2. F/TDMA and GSM. 3. CDMA and UMTS. 4. OFDM and LTE. 5. MIMO and Beamforming. 6. UWB. 7. Synchronization. 8. Digital Communications Fundamentals. 9. Erlang B Tables. About the Authors Michel Terre received his engineering degree from Telecom SudParis, his phD in electronics and telecommunications from Conservatoire National des Arts et Metiers (CNAM), and his habilitation to conduct researches from Paris XIII University. He is a full professor at Conservatoire National des Arts et Metiers. He his responsabile of CNAM s Master of Science in radiocommunicationssystems. Mylene Pischella received her engineering degree and her phD in electronics and telecommunications from Telecom ParisTech. She is an associate professor at Conservatoire National des Arts et Metiers (CNAM). Emmanuelle Vivier received her engineering degree from Institut Superieur d Electronique de Paris (ISEP) and her PhD in radiocommunications from Conservatoire National des Arts et Metiers (CNAM). She is an associate professor at ISEP, where she is responsible of networks and telecommunications teaching majors.
The book systematically introduces the design theory and method of multi-band RF filtering circuits for the modern wireless communication systems or radar systems, which are required to operate at multi-bands. These multi-band filtering RF circuits have drawn more and more attention from the engineers and scientists in the field of RF circuits design. The book proposes the detailed theoretical analysis and abundant experimental data of multi-mode resonators, multi-band bandpass filter with high selectivity, reflectionless multi-band bandpass filter, balanced filter with high suppression, slotline based multi-band balun filter, switchable filtering diplexer based on reused L-shape resonator and miniaturized 55-/95-GHz on-chip dual-band bandpass Filter. The book is intended for undergraduate and graduate students who are interested in filtering circuits design, researchers who are investigating RF & microwave systems, as well as design engineers who are working in the RF & microwave circuits field. Readers can get an in-depth understanding about the multi-band RF filtering circuits design theory and method.
This book discusses synthesis of Gm-C filter for modern radio frequency systems. Analogue filters are an inevitable part of the chain of signal processing in modern radio and telecommunication systems. Among the technologies implemented for these purposes are the so-called Gm-C filters which are built of operational transconductance amplifiers and capacitors. This technology allows for integration of the filter into a CMOS system-on-chip so making it very attractive for application in low-power (battery operated) devices. The objective of this book is to achieve three goals: (1) to fully describe the circuit synthesis procedures for parallel, cascade, and a realization based on LC prototypes; (2) to make a thorough evaluation of the advantages and disadvantages of these methods and to recommend the "preferable" one; and (3) to create an extensive table of element values of cascaded Gm-C filters realizing the best-known low-pass filter functions. The book will influence the design community to embrace this technology even for non-communication applications.
This book describes the fundamentals of THz communications, spanning the whole range of applications, propagation and channel models, RF transceiver technology, antennas, baseband techniques, and networking interfaces. The requested data rate in wireless communications will soon reach from 100 Gbit/s up to 1 Tbps necessitating systems with ultra-high bandwidths of several 10s of GHz which are available only above 200 GHz. In the last decade, research at these frequency bands has made significant progress, enabling mature experimental demonstrations of so-called THz communications, which are thus expected to play a vital role in future wireless networks. In addition to chapters by leading experts on the theory, modeling, and implementation of THz communication technology, the book also features the latest experimental results and addresses standardization and regulatory aspects. This book will be of interest to both academic researchers and engineers in the telecommunications industry.
This book provides a timely and comprehensive study of developing efficient network slicing frameworks in both 5G wireless and core networks. It also presents protocol stack layer perspectives, which includes virtual network topology design, end-to-end delay modeling, dynamic resource slicing, and link-layer and transport-layer protocol customization. This book provides basic principles, concepts and technologies for communication, computing and networking. Optimization and queueing analysis techniques are applied to solving different problems for network slicing illustrated in this book as well. Researchers working in the area of network slicing in 5G networks and beyond, and advanced-level students majoring in electrical engineering, computer engineering and computer science will find this book useful as a reference or secondary textbook. Professionals in industry seeking solutions to resource management for 5G networks and beyond will also want to purchase this book.
This book defines what IoT Systems manageability looks like and what the associated resources and costs are of that manageability. It identifies IoT Systems performance expectations and addresses the difficult challenges of determining actual costs of IoT Systems implementation, operation, and management across multiple institutional organizations. It details the unique challenges that cities and institutions have in implementing and operating IoT Systems.
This book gathers selected papers presented at the 4th International Conference on Wireless Communications and Applications (ICWCA 2020), held at Hainan University, China. The second volume will involve research works aimed at the contemporary applications: emerging wireless/mobile applications, context and location-aware wireless services; wireless telemedicine and e-health services; intelligent transportation systems; RFID technology and application; cognitive radio and sensor-based applications; content distribution in wireless home environment and many others.
This book covers connectivity and edge computing solutions for representative Internet of Things (IoT) use cases, including industrial IoT, rural IoT, Internet of Vehicles (IoV), and mobile virtual reality (VR). Based on their unique characteristics and requirements, customized solutions are designed with targets such as supporting massive connections or seamless mobility and achieving low latency or high energy efficiency. Meanwhile, the book highlights the role of artificial intelligence (AI) in future IoT networks and showcases AI-based connectivity and edge computing solutions. The solutions presented in this book serve the overall purpose of facilitating an increasingly connected and intelligent world. The potential benefits of the solutions include increased productivity in factories, improved connectivity in rural areas, enhanced safety for vehicles, and enriched entertainment experiences for mobile users. Featuring state-of-the-art research in the IoT field, this book can help answer the question of how to connect billions of diverse devices and enable seamless data collection and processing in future IoT. The content also provides insights regarding the significance of customizing use case-specific solutions as well as approaches of using various AI methods to empower IoT. This book targets researchers and graduate students working in the areas of electrical engineering, computing engineering, and computer science as a secondary textbook or reference. Professionals in industry who work in the field of IoT will also find this book useful.
This book introduces the Internet access for vehicles as well as novel communication and computing paradigms based on the Internet of vehicles. To enable efficient and reliable Internet connection for mobile vehicle users, this book first introduces analytical modelling methods for the practical vehicle-to-roadside (V2R) Internet access procedure, and employ the interworking of V2R and vehicle-to-vehicle (V2V) to improve the network performance for a variety of automotive applications. In addition, the wireless link performance between a vehicle and an Internet access station is investigated, and a machine learning based algorithm is proposed to improve the link throughout by selecting an efficient modulation and coding scheme. This book also investigates the distributed machine learning algorithms over the Internet access of vehicles. A novel broadcasting scheme is designed to intelligently adjust the training users that are involved in the iteration rounds for an asynchronous federated learning scheme, which is shown to greatly improve the training efficiency. This book conducts the fully asynchronous machine learning evaluations among vehicle users that can utilize the opportunistic V2R communication to train machine learning models. Researchers and advanced-level students who focus on vehicular networks, industrial entities for internet of vehicles providers, government agencies target on transportation system and road management will find this book useful as reference. Network device manufacturers and network operators will also want to purchase this book.
The three-volume set constitutes the proceedings of the 17th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2022, which was held during November 24th-26th, 2022. The conference took place in Dalian, China.The 95 full and 62 short papers presented in these proceedings were carefully reviewed and selected from 265 submissions. The contributions in cyber-physical systems including intelligent transportation systems and smart healthcare systems; security and privacy; topology control and coverage; energy-efficient algorithms, systems and protocol design
The three-volume set constitutes the proceedings of the 17th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2022, which was held during October 28-30, 2022. The conference took place in Dalian, China.The 95 full and 62 short papers presented in these proceedings were carefully reviewed and selected from 265 submissions. The contributions in theoretical frameworks and analysis of fundamental cross-layer protocol and network design and performance issues; distributed and localized algorithm design and analysis; information and coding theory for wireless networks; localization; mobility models and mobile social networking; underwater and underground networks; vehicular networks; algorithms, systems, and applications of edge computing
The three-volume set constitutes the proceedings of the 17th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2022, which was held during October 28-30, 2022. The conference took place in Dalian, China.The 95 full and 62 short papers presented in these proceedings were carefully reviewed and selected from 265 submissions. The contributions in algorithms, systems; and applications of internet of things;information processing and data management;radar and sonar networks
This book provides a timely and comprehensive study of dynamic resource management for network slicing in service-oriented fifth-generation (5G) and beyond core networks. This includes the perspective of developing efficient computation resource provisioning and scheduling solutions to guarantee consistent service performance in terms of end-to-end (E2E) data delivery delay. Network slicing is enabled by the software defined networking (SDN) and network function virtualization (NFV) paradigms. For a network slice with a target traffic load, the E2E service delivery is enabled by virtual network function (VNF) placement and traffic routing with static resource allocations. When data traffic enters the network, the traffic load is dynamic and can deviate from the target value, potentially leading to QoS performance degradation and network congestion. Data traffic has dynamics in different time granularities. For example, the traffic statistics (e.g., mean and variance) can be non-stationary and experience significant changes in a coarse time granularity, which are usually predictable. Within a long time duration with stationary traffic statistics, there are traffic dynamics in small timescales, which are usually highly bursty and unpredictable. To provide continuous QoS performance guarantee and ensure efficient and fair operation of the network slices over time, it is essential to develop dynamic resource management schemes for the embedded services in the presence of traffic dynamics during virtual network operation. Queueing theory is used in system modeling, and different techniques including optimization and machine learning are applied to solving the dynamic resource management problems. Based on a simplified M/M/1 queueing model with Poisson traffic arrivals, an optimization model for flow migration is presented to accommodate the large-timescale changes in the average traffic rates with average E2E delay guarantee, while addressing a trade-off between load balancing and flow migration overhead. To overcome the limitations of Poisson traffic model, the authors present a machine learning approach for dynamic VNF resource scaling and migration. The new solution captures the inherent traffic patterns in a real-world traffic trace with non-stationary traffic statistics in large timescale, predicts resource demands for VNF resource scaling, and triggers adaptive VNF migration decision making, to achieve load balancing, migration cost reduction, and resource overloading penalty suppression in the long run. Both supervised and unsupervised machine learning tools are investigated for dynamic resource management. To accommodate the traffic dynamics in small time granularities, the authors present a dynamic VNF scheduling scheme to coordinate the scheduling among VNFs of multiple services, which achieves network utility maximization with delay guarantee for each service. Researchers and graduate students working in the areas of electrical engineering, computing engineering and computer science will find this book useful as a reference or secondary text. Professionals in industry seeking solutions to dynamic resource management for 5G and beyond networks will also want to purchase this book.
This book covers the basic theory of mean field game (MFG) and its applications in wireless networks. It starts with an overview of the current and future state-of-the-art in 5G and 6G wireless networks. Then, a tutorial is presented for MFG, mean-field-type game (MFTG), and prerequisite fields of study such as optimal control theory and differential games. This book also includes a literature survey of MFG-based research in wireless network technologies such as ultra-dense networks (UDNs), device-to-device (D2D) communications, internet-of-things (IoT), unmanned aerial vehicles (UAVs), and mobile edge networks (MENs). Several applications of MFG and MFTG in UDNs, social networks, and multi-access edge computing networks (MECNs) are introduced as well. Applications of MFG covered in this book are divided in three parts. The first part covers three single-population MFG research works or case studies in UDNs including ultra-dense D2D networks, ultra-dense UAV networks, and dense-user MECNs. The second part centers on a multiple-population MFG (MPMFG) modeling of belief and opinion evolution in social networks. It focuses on a recently developed MPMFG framework and its application in analyzing the behavior of users in a multiple-population social network. Finally, the last part concentrates on an MFTG approach to computation offloading in MECN. The computation offloading algorithms are designed for energy- and time-efficient offloading of computation-intensive tasks in an MECN. This book targets advanced-level students, professors, researchers, scientists, and engineers in the fields of communications and networks. Industry managers and government employees working in these same fields will also find this book useful.
This book provides a comprehensive review and in-depth study on efficient beamforming design and rigorous performance analysis in mmWave networks, covering beam alignment, beamforming training and beamforming-aided caching. Due to significant beam alignment latency between the transmitter and the receiver in existing mmWave systems, this book proposes a machine learning based beam alignment algorithm for mmWave networks to determine the optimal beam pair with a low latency. Then, to analyze and enhance the performance of beamforming training (BFT) protocol in 802.11ad mmWave networks, an analytical model is presented to evaluate the performance of BFT protocol and an enhancement scheme is proposed to improve its performance in high user density scenarios. Furthermore, it investigates the beamforming-aided caching problem in mmWave networks, and proposes a device-to-device assisted cooperative edge caching to alleviate backhaul congestion and reduce content retrieval delay. This book concludes with future research directions in the related fields of study. The presented beamforming designs and the corresponding research results covered in this book, provides valuable insights for practical mmWave network deployment and motivate new ideas for future mmWave networking. This book targets researchers working in the fields of mmWave networks, beamforming design, and resource management as well as graduate students studying the areas of electrical engineering, computing engineering and computer science. Professionals in industry who work in this field will find this book useful as a reference.
The essential guide to state-of-the art mobile positioning and tracking techniques fully updated for new and emerging trends in the field Mobile Positioning and Tracking, Second Edition explores state-of-the-art mobile positioning solutions applied on top of current wireless communication networks. Application areas covered include positioning, data fusion and filtering, tracking, error mitigation, both conventional and cooperative positioning technologies and systems, and more. The authors fill the gap between positioning and communication systems, showing how features of wireless communications systems can be used for positioning purposes and how the retrieved location information can be used to enhance the performance of wireless networks. Unlike other books on the subject, Mobile Positioning and Tracking: From Conventional to Cooperative Techniques, 2nd Edition covers the entire positioning and tracking value chain, starting from the measurement of positioning signals, and offering valuable insights into the theoretical fundamentals behind these methods and how they relate to application areas such as location-based services, as well as related disciplines and professional concerns, including global business considerations and the changing laws and standards governing wireless communication networks. Fully updated and revised for the latest developments in the field, this Second Edition: * Features new chapters on UWB positioning and tracking, indoor positioning in WLAN, and multi-tag positioning in RFID * Explores an array of positioning and tracking systems based on satellite and terrestrial systems technologies and methods * Introduces advanced and novel topics such as localisation in heterogeneous and cooperative scenarios * Provides a bridge between research and industry with potential implementations of the solutions presented Mobile positioning and tracking is subject to continuous innovations and improvements. This important working resource helps busy industry professionals and practitioners including software and service developers stay on top of emerging trends in the field. It is also a valuable reference for advanced students in related disciplines studying positioning and mobile technologies.
The updated book presents Matlab illustrations on various digital signal processing (DSP) techniques such as random process, time varying wireless system model, and detection and estimation theory used in wireless communication. The book also covers recent wireless techniques like OFDM, massive MIMO techniques, non-orthogonal multiple access, millimeter wave MIMO, full duplex, cognitive radio, co-operating communication, unmanned aerial vehicles etc. This book is suitable for those who are doing basic and applied research in digital signal processing for wireless communication.
This book investigates compressive sensing techniques to provide a robust and general framework for network data analytics. The goal is to introduce a compressive sensing framework for missing data interpolation, anomaly detection, data segmentation and activity recognition, and to demonstrate its benefits. Chapter 1 introduces compressive sensing, including its definition, limitation, and how it supports different network analysis applications. Chapter 2 demonstrates the feasibility of compressive sensing in network analytics, the authors we apply it to detect anomalies in the customer care call dataset from a Tier 1 ISP in the United States. A regression-based model is applied to find the relationship between calls and events. The authors illustrate that compressive sensing is effective in identifying important factors and can leverage the low-rank structure and temporal stability to improve the detection accuracy. Chapter 3 discusses that there are several challenges in applying compressive sensing to real-world data. Understanding the reasons behind the challenges is important for designing methods and mitigating their impact. The authors analyze a wide range of real-world traces. The analysis demonstrates that there are different factors that contribute to the violation of the low-rank property in real data. In particular, the authors find that (1) noise, errors, and anomalies, and (2) asynchrony in the time and frequency domains lead to network-induced ambiguity and can easily cause low-rank matrices to become higher-ranked. To address the problem of noise, errors and anomalies in Chap. 4, the authors propose a robust compressive sensing technique. It explicitly accounts for anomalies by decomposing real-world data represented in matrix form into a low-rank matrix, a sparse anomaly matrix, an error term and a small noise matrix. Chapter 5 addresses the problem of lack of synchronization, and the authors propose a data-driven synchronization algorithm. It can eliminate misalignment while taking into account the heterogeneity of real-world data in both time and frequency domains. The data-driven synchronization can be applied to any compressive sensing technique and is general to any real-world data. The authors illustrates that the combination of the two techniques can reduce the ranks of real-world data, improve the effectiveness of compressive sensing and have a wide range of applications. The networks are constantly generating a wealth of rich and diverse information. This information creates exciting opportunities for network analysis and provides insight into the complex interactions between network entities. However, network analysis often faces the problems of (1) under-constrained, where there is too little data due to feasibility and cost issues in collecting data, or (2) over-constrained, where there is too much data, so the analysis becomes unscalable. Compressive sensing is an effective technique to solve both problems. It utilizes the underlying data structure for analysis. Specifically, to solve the under-constrained problem, compressive sensing technologies can be applied to reconstruct the missing elements or predict the future data. Also, to solve the over-constraint problem, compressive sensing technologies can be applied to identify significant elements To support compressive sensing in network data analysis, a robust and general framework is needed to support diverse applications. Yet this can be challenging for real-world data where noise, anomalies and lack of synchronization are common. First, the number of unknowns for network analysis can be much larger than the number of measurements. For example, traffic engineering requires knowing the complete traffic matrix between all source and destination pairs, in order to properly configure traffic and avoid congestion. However, measuring the flow between all source and destination pairs is very expensive or even infeasible. Reconstructing data from a small number of measurements is an underconstrained problem. In addition, real-world data is complex and heterogeneous, and often violate the low-level assumptions required by existing compressive sensing techniques. These violations significantly reduce the applicability and effectiveness of existing compressive sensing methods. Third, synchronization of network data reduces the data ranks and increases spatial locality. However, periodic time series exhibit not only misalignment but also different frequencies, which makes it difficult to synchronize data in the time and frequency domains. The primary audience for this book is data engineers, analysts and researchers, who need to deal with big data with missing anomalous and synchronization problems. Advanced level students focused on compressive sensing techniques will also benefit from this book as a reference.
This book investigates in detail some new spoof surface plasmon polaritons (SSPPs) structures and their applications to antenna. It introduces the working principle and radiation characteristics of directional antenna, omnidirectional antenna, reconfigurable antenna and phase-mode antenna based on SSPPs structure. Especially, the irregular SSPPs structure, such as T-shaped and m-shaped SSPPs structures, is introduced to low-profile end-fire antenna with vertical polarization; the rotated SSPPs structure is applied to CP end-fire antenna and omnidirectional antenna; PIN circuit combining with SSPPs structure is used to pattern reconfigurable antenna; the novel phase-mode SSPPs antennas with multi-modes are performed too. This book proposes a continuous method to develop the potentialities of the SSPPs antenna. And the readers can study the method or ideas of the SSPPs antenna, even graft the methods to other SSPPs antenna. The book is intended for undergraduate and graduate students who are interested in SSPPs antenna technology, researchers investigating high-performance antenna, and antenna design engineers working on multi-function antenna applications. |
You may like...
Ubiquitous Computing Systems - Third…
Hee Yong Youn, Minkoo Kim, …
Paperback
R1,642
Discovery Miles 16 420
|