« Back | Print 
Concordia.ca   /   Library   /   About the library   /   News   /   Acquisitions

New books by subject

sort items by: 

Electrical and Computer Engineering - Concordia University Libraries Recent Acquisitions

Titles in the call number range TK1-9971 (Electrical and Computer Engineering) that were added to the Concordia University Libraries collection in the last 60 days.

  • Dreamweaver 4 for dummies / by Janine Warner and Paul Vachier
    TK 5105.8885 D74 W37 2001
    This easy-to-use guide is designed to make creating a Web site more intuitive and efficient. Filled with practical tips and easy-to-follow, step-by-step instructions, this book will your secret weapon in the race to design beautiful and functional high-end Web sites. When it comes to the most advanced HTML features, such as Dynamic HTML and Cascading Style Sheets; this book really shines by making it fun and easy to add animations, rollover effects, and multimedia to bring any site to life. Dreamweaver 4 For Dummies includes all of this and special Fireworks coverage.

  • DC distribution systems and microgrids / Tomislav Dragičević, Pat Wheeler, and Frede Blaabjerg
    TK 1006 D4 2018eb

    DC electric power distribution systems have higher efficiency, better current carrying capacity and faster response when compared to conventional AC systems. They also provide a more natural interface with many types of renewable energy sources. Furthermore, there are fewer issues with reactive power flow, power quality and frequency regulation, resulting in a notably less complex control system. All these facts lead to increased applications of DC systems in modern power systems. Still, design and operation of these systems imposes a number of specific challenges, mostly related to lack of mature protection technology and operational experience, as well as very early development stage of standards regarding DC based power infrastructure.

    This book provides an up-to-date overview of recent research activities in the control, protection and architectural design of a number of different types of DC distribution systems and microgrids. Practical requirements and implementation details of several types of DC distribution systems used in the real world industrial applications are also presented. Several types of coordinated control design concepts are shown, with concepts of stabilization being explained in detail. The book reviews the shortcomings and future developments concerning the practical DC system integration issues.

  • Energy storage at different voltage levels : technology, integration, and market aspects / edited by, Ahmed Faheem Zobaa, Paulo F. Ribeiro, Shady H. E. Abdel Aleem and Sara N. Afifi
    TK 1006 E54 2018eb

    In an era of increasing contributions from intermittent renewable resources, energy storage is becoming more important to ensure a resilient and reliable electricity supply. Energy Storage at Different Voltage Levels presents the technology, integration and market aspects of energy storage in the various generation, transmission, distribution, and customer levels of the grid.

    Starting with a comprehensive overview of energy storage technologies and their emerging codes and standards, the book discusses energy storage capacity requirements in electricity mix scenarios at different levels; energy storage in microgrids; energy storage in electricity markets; the role of storage in transmission investment deferral and management of future planning uncertainty; sizing of battery energy storage for end user application under time of use pricing; evaluation of multiple storage benefits and optimization of energy storage operations in distribution networks; use and role of flywheel energy storage systems; forecasting and optimization for multi-purpose application of energy storage systems to deliver grid services (a case study of the smarter network storage project); and optimal coordination between generation and storage under uncertainties. Also included are country-specific case studies from Romania, Italy and Turkey.

  • Bifacial Photovoltaics : technology, applications and economics / edited by, Joris Libal and Radovan Kopecek
    TK 1001 B54 2018eb

    Bifacial photovoltaic (PV) modules are able to utilize light from both sides and can therefore significantly increase the electric yield of PV power plants, thus reducing the cost and improving profitability. Bifacial PV technology has a huge potential to reach a major market share, in particular when considering utility scale PV plants. Accordingly, bifacial PV is currently attracting increasing attention from involved engineers, scientists and investors.

    There is a lack of available, structured information about this topic. A book that focuses exclusively on bifacial PV thus meets an increasing need. Bifacial Photovoltaics: Technology, applications and economics provides an overview of the history, status and future of bifacial PV technology with a focus on crystalline silicon technology, covering the areas of cells, modules, and systems. In addition, topics like energy yield simulations and bankability are addressed. It is a must-read for researchers and manufacturers involved with cutting-edge photovoltaics.

  • New trends in information and communications technology applications : third International Conference, NTICT 2018, Baghdad, Iraq, October 2-4, 2018, Proceedings / Safaa O. Al-mamory, Jwan K. Alwan, Ali D. Hussein (eds.)

  • Collaborative computing : networking, applications and worksharing : 13th International Conference, CollaborateCom 2017, Edinburgh, UK, December 11-13, 2017, Proceedings / Imed Romdhani, Lei Shu, Hara Takahiro, Zhangbing Zhou, Timothy Gordon, Deze Zeng (eds.)

  • The semantic web -- ISWC 2018 : 17th International Semantic Web Conference, Monterey, CA, USA, October 8-12, 2018, Proceedings. Denny Vrandečić, Kalina Bontcheva, Mari Carmen Suárez-Figueroa, Valentina Presutti, Irene Celino, Marta Sabou, Lucie-Aimée Kaffee, Elena Simperl (eds.)

  • The semantic web -- ISWC 2018 : 17th International Semantic Web Conference, Monterey, CA, USA, October 8-12, 2018, Proceedings. Denny Vrandečić, Kalina Bontcheva, Mari Carmen Suárez-Figueroa, Valentina Presutti, Irene Celino, Marta Sabou, Lucie-Aimée Kaffee, Elena Simperl (eds.)

  • Practical PHP 7, MySQL 8, and MariaDB website databases : a simplified approach to developing database-driven websites / Adrian W. West, Steve Prettyman

  • Ion-irradiation-induced damage in nuclear materials : case study of a-SiO₂ and MgO / Diana Bachiller Perea

  • Smarter homes : how technology will change your home life / Alexandra Deschamps-Sonsino

  • Verification and evaluation of computer and communication systems : 12th International Conference, VECoS 2018, Grenoble, France, September 26-28, 2018, Proceedings / Mohamed Faouzi Atig, Saddek Bensalem, Simon Bliudze, Bruno Monsuez (eds.)

  • Operads of wiring diagrams / Donald Yau

  • Symmetry and symmetry-breaking in semiconductors : fine structure of exciton states / Bernd Hönerlage, Ivan Pelant

  • Document image analysis : current trends and challenges in graphics recognition / K.C. Santosh

  • Reasoning web : learning, uncertainty, streaming, and scalability : 14th International Summer School 2018, Esch-sur-Alzette, Luxembourg, September 22-26, 2018, tutorial lectures / Claudia d'Amato, Martin Theobald (eds.)

  • Transactions on computational science XXXIII / Marina L. Gavrilova, C.J. Kenneth Tan (eds.)

  • Studies on speech production : 11th International Seminar, ISSP 2017, Tianjin, China, October 16-19, 2017, Revised selected papers / Qiang Fang, Jianwu Dang, Pascal Perrier, Jianguo Wei, Longbiao Wang, Nan Yan (eds.)

  • Computer information systems and industrial management : 17th International Conference, CISIM 2018, Olomouc, Czech Republic, September 27-29, 2018, Proceedings / Khalid Saeed, Władysław Homenda (eds.)

  • Formation of KNbO3 Thin Films for Self-Powered ReRAM Devices and Artificial Synapses / Tae-Ho Lee

  • Guide to vulnerability analysis for computer networks and systems : an artificial intelligence approach / Simon Parkinson, Andrew Crampton, Richard Hill, editors

  • Principles and structures of FPGAs / Hideharu Amano, editor
    TK7895.G36 P75 2018eb

  • LED-based visible light communications / Nan Chi
    TK5103.59 .C456 2018eb

  • Ad-hoc, mobile, and wireless networks : 17th International Conference on Ad Hoc Networks and Wireless, ADHOC-NOW 2018, Saint-Malo, France, September 5-7, 2018. Proceedings / Nicolas Montavont, Georgios Z. Papadopoulos (eds.)

  • Artificial neural networks in pattern recognition : 8th IAPR TC3 Workshop, ANNPR 2018, Siena, Italy, September 19-21, 2018, Proceedings / Luca Pancioni, Friedhelm Schwenker, Edmondo Trentin (eds.)
    TK7882.P3 A56 2018eb

  • Secure networked inference with unreliable data sources / Aditya Vempaty, Bhavya Kailkhura, Pramod K. Varshney

  • Narrowband single photons for light-matter interfaces / Markus Rambach

  • e-Infrastructure and e-Services for Developing Countries : 9th International Conference, AFRICOMM 2017, Lagos, Nigeria, December 11-12, 2017, Proceedings / Victor Odumuyiwa, Ojo Adegboyega, Charles Uwadia (eds.)

  • Wireless mobile communication and healthcare : 7th International Conference, MobiHealth 2017, Vienna, Austria, November 14-15, 2017, Proceedings / Paolo Perego, Amir M. Rahmani, Nima TaheriNejad (eds.)

  • Smart micro-grid systems security and privacy / Anne V.D.M. Kayem, STephen D. Wolthusen, Christoph Meinel, editors

  • The Semantic Web: ESWC 2018 Satellite Events : ESWC 2018 Satellite Events, Heraklion, Crete, Greece, June 3-7, 2018, Revised Selected Papers / Aldo Gangemi, Anna Lisa Gentile, Andrea Giovanni Nuzzolese, Sebastian Rudolph, Maria Maleshkova, Heiko Paulheim, Jeff Z. Pan, Mehwish Alam (eds.)
    TK5105.88815 .E98 2018eb

  • Advances in lead-free piezoelectric materials / Jiagang Wu

  • Wireless indoor localization : a crowdsourcing approach / Chenshu Wu, Zheng Yang, Yunhao Liu

  • HTML5 and JavaScript projects / Jeanine Meyer

  • Doped-ceria electrolytes : synthesis, sintering and characterization / Luca Spiridigliozzi

  • Terahertz wave detection and imaging with a hot Rydberg vapour / Christopher G. Wade

  • Lithium-ion batteries : basics and applications / Reiner Korthauer, editor ; translator Michael Wuest, alphabet & more
    The handbook focuses on a complete outline of lithium-ion batteries. Just before starting with an exposition of the fundamentals of this system, the book gives a short explanation of the newest cell generation. The most important elements are described as negative / positive electrode materials, electrolytes, seals and separators. The battery disconnect unit and the battery management system are important parts of modern lithium-ion batteries. An economical, faultless and efficient battery production is a must today and is represented with one chapter in the handbook. Cross-cutting issues like electrical, chemical, functional safety are further topics. Last but not least standards and transportation themes are the final chapters of the handbook. The different topics of the handbook provide a good knowledge base not only for those working daily on electrochemical energy storage, but also to scientists, engineers and students concerned in modern battery systems.

  • Off-grid electrical systems in Developing Countries Henry Louie

  • Internet and distributed computing systems : 10th International Conference, IDCS 2017, Mana Island, Fiji, December 11-13, 2017, Proceedings / Giancarlo Fortino, A.B.M. Shawkat Ali, Mukaddim Pathan, Antonio Guerrieri, Giuseppe Di Fatta (eds.)

  • Web and big data : second International Joint Conference, APWeb-WAIM 2018, Macau, China, July 23-25, 2018, Proceedings. Yi Cai, Yoshiharu Ishikawa, Jianliang Xu (eds.)

  • Service research and innovation : 5th and 6th Australasian Symposium, ASSRI 2015 and ASSRI 2017, Sydney, NSW, Australia, November 2-3, 2015, and October 19-20, 2017 : revised selected papers / Amin Beheshti, Mustafa Hashmi, Hai Dong, Wei Emma Zhang (Eds.)
    TK5105.5828 .A97 2017eb

  • Mobile sensors and context-aware computing / Manish J. Gajjar

    Mobile Sensors and Context-Aware Computing is a useful guide that explains how hardware, software, sensors, and operating systems converge to create a new generation of context-aware mobile applications. This cohesive guide to the mobile computing landscape demonstrates innovative mobile and sensor solutions for platforms that deliver enhanced, personalized user experiences, with examples including the fast-growing domains of mobile health and vehicular networking.

    Users will learn how the convergence of mobile and sensors facilitates cyber-physical systems and the Internet of Things, and how applications which directly interact with the physical world are becoming more and more compatible. The authors cover both the platform components and key issues of security, privacy, power management, and wireless interaction with other systems.

    Shows how sensor validation, calibration, and integration impact application design and power management Explains specific implementations for pervasive and context-aware computing, such as navigation and timing Demonstrates how mobile applications can satisfy usability concerns, such as know me, free me, link me, and express me Covers a broad range of application areas, including ad-hoc networking, gaming, and photography

  • Managing the web of things : linking the real world to the web / edited by Quan Z. Sheng [and others]

    Managing the Web of Things: Linking the Real World to the Web presents a consolidated and holistic coverage of engineering, management, and analytics of the Internet of Things. The web has gone through many transformations, from traditional linking and sharing of computers and documents (i.e., Web of Data), to the current connection of people (i.e., Web of People), and to the emerging connection of billions of physical objects (i.e., Web of Things).

    With increasing numbers of electronic devices and systems providing different services to people, Web of Things applications present numerous challenges to research institutions, companies, governments, international organizations, and others. This book compiles the newest developments and advances in the area of the Web of Things, ranging from modeling, searching, and data analytics, to software building, applications, and social impact.

    Its coverage will enable effective exploration, understanding, assessment, comparison, and the selection of WoT models, languages, techniques, platforms, and tools. Readers will gain an up-to-date understanding of the Web of Things systems that accelerates their research.

    Offers a comprehensive and systematic presentation of the methodologies, technologies, and applications that enable efficient and effective management of the Internet of Things Provides an in-depth analysis on the state-of-the-art Web of Things modeling and searching technologies, including how to collect, clean, and analyze data generated by the Web of Things Covers system design and software building principles, with discussions and explorations of social impact for the Web of Things through real-world applications Acts as an ideal reference or recommended text for graduate courses in cloud computing, service computing, and more

  • Securing the internet of things / Shancang Li, Li Da Xu ; Imed Romdhani, contributor

    Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound.

    This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.

    Helps researchers and practitioners understand the security architecture in IoT and the state-of-the-art in IoT security countermeasures Explores how the threats in IoT are different from traditional ad hoc or infrastructural networks Provides a comprehensive discussion on the security challenges and solutions in RFID, WSNs, and IoT Contributed material by Dr. Imed Romdhani

  • Rugged embedded systems : computing in harsh environments / Augusto Vega, Pradip Bose, Alper Buyuktosunoglu

    Rugged Embedded Systems: Computing in Harsh Environments describes how to design reliable embedded systems for harsh environments, including architectural approaches, cross-stack hardware/software techniques, and emerging challenges and opportunities.

    A "harsh environment" presents inherent characteristics, such as extreme temperature and radiation levels, very low power and energy budgets, strict fault tolerance and security constraints, etc. that challenge the computer system in its design and operation. To guarantee proper execution (correct, safe, and low-power) in such scenarios, this contributed work discusses multiple layers that involve firmware, operating systems, and applications, as well as power management units and communication interfaces. This book also incorporates use cases in the domains of unmanned vehicles (advanced cars and micro aerial robots) and space exploration as examples of computing designs for harsh environments.

    Provides a deep understanding of embedded systems for harsh environments by experts involved in state-of-the-art autonomous vehicle-related projects Covers the most important challenges (fault tolerance, power efficiency, and cost effectiveness) faced when developing rugged embedded systems Includes case studies exploring embedded computing for autonomous vehicle systems (advanced cars and micro aerial robots) and space exploration

  • Power supplies for LED driving / Steve Winder

    Power Supplies for LED Driving, Second Edition explores the wide use of light-emitting diodes due to their efficient use of power. The applications for power LEDs include traffic lights, street lamps, automotive lighting, architectural lights, theatre lighting, household light replacements, signage lighting (replacing neon strip lights and fluorescent tubes), LCD display backlighting, and many more.

    Powering (driving) these LED's is not always simple. Linear driving is inefficient and generates far too much heat. With a switching supply, the main issues are EMI, efficiency, and of course cost. This book covers the design trade-offs involved in LED driving applications, from low-power, to UB-LEDs and beyond.

    Provides a practical, hands-on approach to power supply design for LED drivers Contains detailed examples of what works throughout the design process Presents commentary on how the calculated component value compares with the actual value used, including a description of why the choice was made

  • Radio-frequency digital-to-analog converters : implementation in nanoscale CMOS / Morteza S. Alavi, Jaimin Mehta, Robert Bogdan Staszewski

    With the proliferation of wireless networks, there is a need for more compact, low-cost, power efficient transmitters that are capable of supporting the various communication standards, including Bluetooth, WLAN, GSM/EDGE, WCDMA and 4G of 3GPP cellular. This book describes a novel idea of RF digital-to-analog converters (RFDAC) and demonstrates how they can realize all-digital, fully-integrated RF transmitters that support all the current multi-mode and multi-band communication standards.

    With this book the reader will:

    Understand the challenges of realizing a universal CMOS RF transmitter Recognize the design issues and the advantages and disadvantages related to analog and digital transmitter architectures Master designing an RF transmitter from system level modeling techniques down to circuit designs and their related layout know-hows Grasp digital polar and I/Q calibration techniques as well as the digital predistortion approaches Learn how to generate appropriate digital I/Q baseband signals in order to apply them to the test chip and measure the RF-DAC performance. Highlights the benefits and implementation challenges of software-defined transmitters using CMOS technology Includes various types of analog and digital RF transmitter architectures for wireless applications Presents an all-digital polar RFDAC transmitter architecture and describes in detail its implementation Presents a new all-digital I/Q RFDAC transmitter architecture and its implementation Provides comprehensive design techniques from system level to circuit level Introduces several digital predistortion techniques which can be used in RF transmitters Describes the entire flow of system modeling, circuit simulation, layout techniques and the measurement process

  • FTTx networks : technology implementation and operation / James Farmer, Brian Lane, Kevin Bourg, Weyl Wang

    FTTX Networks: Technology Implementation and Operation provides an in-depth treatment of the technology and implementation of FTTX networks, discusses the environment that gave rise to FTTX, provides a survey of the available FTTX technologies, and gives users the state-of-the-art knowledge needed for successful deployment of FTTX.

    The book includes hands-on project planning engineering design and operations checklists, as well as recommended best practices for configuring FTTH systems and the data networks preceding them for IPTV, voice, and data, with case studies of actual FTTH systems and a methodology for predicting the performance of real systems. This book is a must-read for all network engineers, technical businesspeople, and technical specialists engaged in building FTTX networks, from technology selection, to fielding the network in production, to implementation.

    Compares, contrasts, and explains FTTX technologies Provides hands-on project planning, engineering design, and operations checklists, allowing for a quick climb up the network design, deployment, and implementation learning curves Discusses recommended best practices for configuring FTTH systems and the data networks preceding them, for IPTV, voice, and data Includes case studies of actual FTTH systems and their configurations Covers a methodology for predicting the performance of real systems, particularly in the optical domain

  • Software defined networks : a comprehensive approach / Paul Göransson, Chuck Black, Timothy Culver

    Software Defined Networks: A Comprehensive Approach, Second Edition provides in-depth coverage of the technologies collectively known as Software Defined Networking (SDN). The book shows how to explain to business decision-makers the benefits and risks in shifting parts of a network to the SDN model, when to integrate SDN technologies in a network, and how to develop or acquire SDN applications.

    In addition, the book emphasizes the parts of the technology that encourage opening up the network, providing treatment for alternative approaches to SDN that expand the definition of SDN as networking vendors adopt traits of SDN to their existing solutions. 

    Since the first edition was published, the SDN market has matured, and is being gradually integrated and morphed into something more compatible with mainstream networking vendors. This book reflects these changes, with coverage of the OpenDaylight controller and its support for multiple southbound protocols, the Inclusion of NETCONF in discussions on controllers and devices, expanded coverage of NFV, and updated coverage of the latest approved version (1.5.1) of the OpenFlow specification.

    Contains expanded coverage of controllers Includes a new chapter on NETCONF and SDN Presents expanded coverage of SDN in optical networks Provides support materials for use in computer networking courses

  • Advanced persistent security : a cyberwarfare approach to implementing adaptive enterprise protection, detection, and reaction strategies / Ira Winkler, Araceli Treu Gomes ; Dave Shackleford, technical editor

    Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how to prioritize the right countermeasures.

    The book discusses concepts such as malignant versus malicious threats, adversary mentality, motivation, the economics of cybercrime, the criminal infrastructure, dark webs, and the criminals organizations currently face.

    Contains practical and cost-effective recommendations for proactive and reactive protective measures Teaches users how to establish a viable threat intelligence program Focuses on how social networks present a double-edged sword against security programs

  • Peering Carrier Ethernet networks / Sachidananda Kangovi

    Peering Carrier Ethernet Networks begins by providing background information on the evolution of important concepts and building blocks that have led to the current state of high bandwidth and high performance Ethernet technology in order to support current and emerging customer applications. The background information covered includes an overview of Public Switched Telephone Networks (PSTN) to describe circuit switching, multiplexing, and voice digitization that lead to the development of T1/T3 and SONET/SDH for transport. It interweaves these developments with changes in the regulatory regime.

    Additional coverage includes Carrier Ethernet networks' technical standards, which describe how service providers can offer services to off-net customers using peered Carrier Ethernet networks and a description of the taxonomy of customers and their current and emerging applications at Layer 2 and Layer 3 on peered Carrier Ethernet networks.

    The book concludes by describing next steps in Ethernet technology to meet growing demands and emerging trends.

    Presents detailed coverage of end-to-end services across wide area data networks Consolidates, in one ready reference, the latest applied research in this rapidly evolving field Provides the context, advantages, and industry standards for peering Carrier Ethernet networks

  • Fast and effective embedded systems design : applying the ARM mbed / Rob Toulson, Tim Wilmshurst

    Fast and Effective Embedded Systems Design is a fast-moving introduction to embedded systems design, applying the innovative ARM mbed and its web-based development environment. Each chapter introduces a major topic in embedded systems, and proceeds as a series of practical experiments, adopting a "learning through doing" strategy. Minimal background knowledge is needed to start. C/C++ programming is applied, with a step-by-step approach which allows you to get coding quickly. Once the basics are covered, the book progresses to some "hot" embedded issues - intelligent instrumentation, wireless and networked systems, digital audio and digital signal processing. In this new edition all examples and peripheral devices are updated to use the most recent libraries and peripheral devices, with increased technical depth, and introduction of the "mbed enabled" concept.

    Written by two experts in the field, this book reflects on the experimental results, develops and matches theory to practice, evaluates the strengths and weaknesses of the technology and techniques introduced, and considers applications in a wider context.

    New Chapters on:

    Bluetooth and ZigBee communication Internet communication and control, setting the scene for the 'Internet of Things' Digital Audio, with high-fidelity applications and use of the I2S bus Power supply, and very low power applications The development process of moving from prototyping to small-scale or mass manufacture, with a commercial case study. Updates all examples and peripheral devices to use the most recent libraries and peripheral products Includes examples with touch screen displays and includes high definition audio input/output with the I2S interface Covers the development process of moving from prototyping to small-scale or mass manufacture with commercial case studies Covers hot embedded issues such as intelligent instrumentation, networked systems, closed loop control, and digital signal processing

  • Nuclear facilities : a designer's guide / Bill Collum

    Designing new nuclear facilities is an extraordinarily complex exercise, often requiring teams of specialists several hundred strong. Nuclear Facilities: A Designer's Guide provides an insight into each of the main contributors and shows how the whole design process is drawn together.

    Essential reading for all nuclear professionals: those already involved in the industry will gain knowledge that enables them to interact more effectively with colleagues in other disciplines. Its wealth of information will assist students and graduates in progressing more rapidly into fully rounded contributors to the nuclear facility design process. Whilst those joining nuclear from other industries will find a structured introduction to the nuclear world and discover what differentiates it from other spheres of engineering.

    A single, comprehensive text on nuclear facility design which covers all major aspects of the process Packed full of essential information, its complex subject matter is explained in a logical and comprehensible style Valuable to those involved in both new build and decommissioning projects Written by a highly respected expert in the nuclear industry

  • Network function virtualization / Ken Gray, Thomas G. Nadeau

    Network Function Virtualization provides an architectural, vendor-neutral level overview of the issues surrounding the large levels of data storage and transmission requirements needed for today's companies, also enumerating the benefits of NFV for the enterprise.

    Drawing upon years of practical experience, and using numerous examples and an easy-to-understand framework, authors Tom Nadeau and Ken Gary discuss the relevancy of NFV and how it can be effectively used to create and deploy new services. Readers will learn how to determine if network function virtualization is right for their enterprise network, be able to use hands-on, step-by-step guides to design, deploy, and manage NFV in an enterprise, and learn how to evaluate all relevant NFV standards, including ETSI, IETF, Openstack, and Open Daylight.

    Provides a comprehensive overview of Network Function Virtualization (NFV) Discusses how to determine if network function virtualization is right for an enterprise network Presents an ideal reference for those interested in NFV Network Service Chaining, NSC network address translation (NAT), firewalling, intrusion detection, domain name service (DNS), caching, and software defined networks Includes hands-on, step-by-step guides for designing, deploying, and managing NFV in the enterprise Explains, and contrasts, all relevant NFV standards, including ETSI, IETF, Openstack, and Open Daylight

  • Data breach preparation and response : breaches are certain, impact is not / Kevvie Fowler ; Curtis Rose, technical editor
    TK 5105.59 F68 2016eb

    Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents that can disrupt business operations and carry severe reputational and financial impact, making them one of the largest risks facing organizations today. The effects of a breach can be felt across multiple departments within an organization, who will each play a role in effectively managing the breach. Kevvie Fowler has assembled a team of leading forensics, security, privacy, legal, public relations and cyber insurance experts to create the definitive breach management reference for the whole organization.

    Discusses the cyber criminals behind data breaches and the underground dark web forums they use to trade and sell stolen data Features never-before published techniques to qualify and discount a suspected breach or to verify and precisely scope a confirmed breach Helps identify your sensitive data, and the commonly overlooked data sets that, if stolen, can result in a material breach Defines breach response plan requirements and describes how to develop a plan tailored for effectiveness within your organization Explains strategies for proactively self-detecting a breach and simplifying a response Covers critical first-responder steps and breach management practices, including containing a breach and getting the scope right, the first time Shows how to leverage threat intelligence to improve breach response and management effectiveness Offers guidance on how to manage internal and external breach communications, restore trust, and resume business operations after a breach, including the critical steps after the breach to reduce breach-related litigation and regulatory fines Illustrates how to define your cyber-defensible position to improve data protection and demonstrate proper due diligence practices

  • Smart cities and homes : key enabling technologies / edited by Mohammad S. Obaidat, Petros Nicopolitidis

    Smart Cities and Homes: Key Enabling Technologies explores the fundamental principles and concepts of the key enabling technologies for smart cities and homes, disseminating the latest research and development efforts in the field through the use of numerous case studies and examples.

    Smart cities use digital technologies embedded across all their functions to enhance the wellbeing of citizens. Cities that utilize these technologies report enhancements in power efficiency, water use, traffic congestion, environmental protection, pollution reduction, senior citizens care, public safety and security, literacy rates, and more.

    This book brings together the most important breakthroughs and advances in a coherent fashion, highlighting the interconnections between the works in different areas of computing, exploring both new and emerging computer networking systems and other computing technologies, such as wireless sensor networks, vehicle ad hoc networks, smart girds, cloud computing, and data analytics and their roles in creating environmentally friendly, secure, and prosperous cities and homes.

    Intended for researchers and practitioners, the book discusses the pervasive and cooperative computing technologies that will perform a central role for handling the challenges of urbanization and demographic change.

    Includes case studies and contributions from prominent researchers and practitioners from around the globe Explores the latest methodologies, theories, tools, applications, trends, challenges, and strategies needed to build smart cities and homes from the bottom up Provides a pedagogy that includes PowerPoint slides, key terms, and a comprehensive bibliography

  • Deploying wireless sensor networks : theory and practice / Mustapha Reda Senouci, Abdelhamid Mellouk

    Wireless Sensor Networks: Theory and Practice for Deployment addresses WSNs deployment, a mandatory and critical step in the process of developing WSNs solutions for real-life applications. The authors address simple approaches to deploy static WSNs, then exploring more sophisticated approaches to deploy mobile WSNs. Featuring detailed investigations of deployment-related issues such as deployment cost, coverage, connectivity, sensors reliability, and harsh deployment environments, this book will equip you with the basics and an advanced view of both the theoretical and practical aspects, along with knowledge of the guidelines for WSNs deployment.

    Provides both the theoretical basis and practical applications Features an in-depth discussion of deployment-related issues Covers basic concepts and terminologies as well as highlighting open problems in the research areas to help you solve your deployment-related issues

  • Network performance and security : testing and analyzing using open source and low-cost tools / Chris Chapman

    Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how to use the tools and how to interpret them. Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools begins with an overview of best practices for testing security and performance across devices and the network. It then shows how to document assets--such as servers, switches, hypervisor hosts, routers, and firewalls--using publicly available tools for network inventory.

    The book explores security zoning the network, with an emphasis on isolated entry points for various classes of access. It shows how to use open source tools to test network configurations for malware attacks, DDoS, botnet, rootkit and worm attacks, and concludes with tactics on how to prepare and execute a mediation schedule of the who, what, where, when, and how, when an attack hits.

    Network security is a requirement for any modern IT infrastructure. Using Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools makes the network stronger by using a layered approach of practical advice and good testing practices.

    Offers coherent, consistent guidance for those tasked with securing the network within an organization and ensuring that it is appropriately tested Focuses on practical, real world implementation and testing Employs a vetted "security testing by example" style to demonstrate best practices and minimize false positive testing Gives practical advice for securing BYOD devices on the network, how to test and defend against internal threats, and how to continuously validate a firewall device, software, and configuration Provides analysis in addition to step by step methodologies

  • Time frequency signal analysis and processing : a comprehensive reference / edited by Boualem Boashash
    TK 5102.9 T55 2016eb

    Time-Frequency Signal Analysis and Processing (TFSAP) is a collection of theory, techniques and algorithms used for the analysis and processing of non-stationary signals, as found in a wide range of applications including telecommunications, radar, and biomedical engineering. This book gives the university researcher and R&D engineer insights into how to use TFSAP methods to develop and implement the engineering application systems they require.

    New to this edition:

    New sections on Efficient and Fast Algorithms; a "Getting Started" chapter enabling readers to start using the algorithms on simulated and real examples with the TFSAP toolbox, compare the results with the ones presented in the book and then insert the algorithms in their own applications and adapt them as needed. Two new chapters and twenty three new sections, including updated references. New topics including: efficient algorithms for optimal TFDs (with source code), the enhanced spectrogram, time-frequency modelling, more mathematical foundations, the relationships between QTFDs and Wavelet Transforms, new advanced applications such as cognitive radio, watermarking, noise reduction in the time-frequency domain, algorithms for Time-Frequency Image Processing, and Time-Frequency applications in neuroscience (new chapter). A comprehensive tutorial introduction to Time-Frequency Signal Analysis and Processing (TFSAP), accessible to anyone who has taken a first course in signals Key advances in theory, methodology and algorithms, are concisely presented by some of the leading authorities on the respective topics Applications written by leading researchers showing how to use TFSAP methods

  • Network routing : algorithms, protocols, and architectures / Deep Medhi, Karthik Ramasamy
    TK 5105.5 M425 2018eb

    Network Routing: Algorithms, Protocols, and Architectures, Second Edition , explores network routing and how it can be broadly categorized into Internet routing, circuit-switched routing, and telecommunication transport network routing.

    The book systematically considers these routing paradigms, as well as their interoperability, discussing how algorithms, protocols, analysis, and operational deployment impact these approaches and addressing both macro-state and micro-state in routing.

    Readers will learn about the evolution of network routing, the role of IP and E.164 addressing and traffic engineering in routing, the impact on router and switching architectures and their design, deployment of network routing protocols, and lessons learned from implementation and operational experience. Numerous real-world examples bring the material alive.

    Extensive coverage of routing in the Internet, from protocols (such as OSPF, BGP), to traffic engineering, to security issues A detailed coverage of various router and switch architectures, IP lookup and packet classification methods A comprehensive treatment of circuit-switched routing and optical network routing New topics such as software-defined networks, data center networks, multicast routing Bridges the gap between theory and practice in routing, including the fine points of implementation and operational experience Accessible to a wide audience due to its vendor-neutral approach

  • Op amps for everyone / Bruce Carter, Ron Mancini
    TK 7871.58 O6

    Op Amps for Everyone, Fifth Edition, will help you design circuits that are reliable, have low power consumption, and can be implemented in as small a size as possible at the lowest possible cost. It bridges the gap between the theoretical and practical by giving pragmatic solutions using components that are available in the real world from distributors. The book does not just give a design with a transfer function; instead, it provides design tools based on transfer function, getting you to a working circuit so you can make the right decision on which op amp is best for the job at hand.

    With this book you will learn: single op amp designs that get the most out of every amplifier; which specifications are of most importance to your design, enabling you to narrow down the list of amplifiers to those few that are most suitable; strategies for making simple tweaks to the design--changes that are often apparent once a prototype has been constructed; how to design for hostile environments--extreme temperatures, high levels of shock, vibration, and radiation--by knowing which circuit parameters are likely to degrade and how to counteract that degradation.

    Features real world op amp selection guides Teaches which op amp is best for the job Includes design circuits with real world component values Contains guidelines for developing the entire signal chain, from specification for the transducer to power supply and data converter Includes new coverage of negative regulation techniques and op amp stability, negative regulation techniques, extended electronics theory and troubleshooting

  • Electronics explained : fundamentals for engineers, technicians, and makers / Louis E. Frenzel, Jr
    TK 7819

    Electronics Explained, Second Edition, takes a systems based approach to the fundamentals of electronics, covering the different types of electronic circuits, how they work, and how they fit together to create modern electronic equipment, enabling you to apply, use, select, operate and discuss common electronic products and systems.

    This new edition has been updated to show the latest technological trends with added coverage of:

    Internet of Things (IoT) Machine-to-Machine (M2M) technology Ethernet to 100 Gb/s Wi-Fi, Bluetooth and other wireless technologies 5G New Radio cellular standards Microcontrollers and programming with the Arduino, BASIC Stamp and others Learn about the basic components of electronics such as resistors, capacitors, inductors, transformers, diodes, transistors, and integrated circuits Discover different types of circuits, using the functional block diagram approach which makes it easy to understand their purpose and application Get involved with Hands-On projects in each chapter, using components and ICs with the breadboarding socket

  • Embedded computing for high performance : efficient mapping of computations using customization, code transformations and compilation / João M.P. Cardoso, José Gabriel F. Coutinho, Pedro C. Diniz
    TK 7895 E42

    Embedded Computing for High Performance: Design Exploration and Customization Using High-level Compilation and Synthesis Tools provides a set of real-life example implementations that migrate traditional desktop systems to embedded systems. Working with popular hardware, including Xilinx and ARM, the book offers a comprehensive description of techniques for mapping computations expressed in programming languages such as C or MATLAB to high-performance embedded architectures consisting of multiple CPUs, GPUs, and reconfigurable hardware (FPGAs).

    The authors demonstrate a domain-specific language (LARA) that facilitates retargeting to multiple computing systems using the same source code. In this way, users can decouple original application code from transformed code and enhance productivity and program portability.

    After reading this book, engineers will understand the processes, methodologies, and best practices needed for the development of applications for high-performance embedded computing systems.

    Focuses on maximizing performance while managing energy consumption in embedded systems Explains how to retarget code for heterogeneous systems with GPUs and FPGAs Demonstrates a domain-specific language that facilitates migrating and retargeting existing applications to modern systems Includes downloadable slides, tools, and tutorials

  • The illustrated network : how TCP/IP works in a modern network / Walter Goralski
    TK 5105.585

    The Illustrated Network: How TCP/IP Works in a Modern Network, Second Edition presents an illustrated explanation on how TCP/IP works, using consistent examples from a working network configuration that includes servers, routers and workstations. Diagnostic traces allow the reader to follow the discussion with unprecedented clarity and precision. True to its title, there are 330+ diagrams and screenshots, as well as topology diagrams and a unique repeating chapter opening diagram. Illustrations are also used as end-of-chapter questions. Based on examples of a complete and modern network, all the material comes from real objects connected and running on the network.

    The book emphasizes the similarities across all networks, since all share similar components, from the smallest LAN to the global internet. Layered protocols are the rule, and all hosts attached to the Internet run certain core protocols to enable their applications to function properly.

    This second edition includes updates throughout, along with four completely new chapters that introduce developments that have occurred since the publication of the first edition, including optical networking, cloud concepts and VXLAN.

  • Inspection and monitoring technologies of transmission lines with remote sensing / Yi Hu, Kai Liu
    TK 3221

    Inspection and Monitoring Technologies of Transmission Lines with Remote Sensing helps readers build a thorough understanding of new technologies and world-class practices developed by the State Grid Corporation of China--the organization responsible for the world's largest power distribution network. Monitoring the operational status of high-voltage transmission lines is critical in supply assurance and continuity. Given the physical size, geographical, and climate variances that transmission lines are subject to, remote sensing and inspection is a critical technology for power distribution organizations. This reference covers current and developing technologies, equipment, and methods for the safe and secure operation and maintenance of transmission lines, including satellite remote sensing technology, infrared and ultraviolet detection technology, helicopter inspection technology, and condition monitoring technology.

    Covers operational and technical principles, and equipment used in transmission line inspection and monitoring, with a focus on remote sensing technologies and solutions Covers power line fundamentals, remote sensing technologies, inspection technologies, fault detection technologies, and on-line monitoring Focuses on practical equipment and systems parameters to ensure readers are able to meet operational needs Covers control technologies that ensure safe and consistent transmission operation

  • CMOS past, present and future / Henry H. Radamson [and others]

    CMOS Past, Present and Future provides insight from the basics, to the state-of-the-art of CMOS processing and electrical characterization, including the integration of Group IV semiconductors-based photonics. The book goes into the pitfalls and opportunities associated with the use of hetero-epitaxy on silicon with strain engineering and the integration of photonics and high-mobility channels on a silicon platform. It begins with the basic definitions and equations, but extends to present technologies and challenges, creating a roadmap on the origins of the technology and its evolution to the present, along with a vision for future trends.

    The book examines the challenges and opportunities that materials beyond silicon provide, including a close look at high-k materials and metal gate, strain engineering, channel material and mobility, and contacts. The book's key approach is on characterizations, device processing and electrical measurements.

    Addresses challenges and opportunities for the use of CMOS Covers the latest methods of strain engineering, materials integration to increase mobility, nano-scaled transistor processing, and integration of CMOS with photonic components Provides a look at the evolution of CMOS technology, including the origins of the technology, current status and future possibilities

  • Doherty power amplifiers : from fundamentals to advanced design methods / Bumman Kim

    Doherty Power Amplifiers: From Fundamentals to Advanced Design Methods is a great resource for both RF and microwave engineers and graduate students who want to understand and implement the technology into future base station and mobile handset systems. The book introduces the very basic operational principles of the Doherty Amplifier and its non-ideal behaviors. The different transconductance requirements for carrier and peaking amplifiers, reactive element effect, and knee voltage effect are described. In addition, several methods to correct imperfections are introduced, such as uneven input drive, gate bias adaptation, dual input drive and the offset line technique.

    Advanced design methods of Doherty Amplifiers are also explained, including multistage/multiway Doherty power amplifiers which can enhance the efficiency of the amplification of a highly-modulated signal. Other covered topics include signal tracking operation which increases the dynamic range, highly efficient saturated amplifiers, and broadband amplifiers, amongst other comprehensive, related topics.

    Specifically written on the Doherty Power Amplifier by the world's leading expert, providing an in-depth presentation of principles and design techniques Includes detailed analysis on correcting non-ideal behaviors of Doherty Power Amplifiers Presents advanced Doherty Power Amplifier architectures

  • Academic Press library in signal processing. edited by Rama Chellappa, Sergios Theodoridis

    Academic Press Library in Signal Processing, Volume 7: Array, Radar and Communications Engineering is aimed at university researchers, post graduate students and R&D engineers in the industry, providing a tutorial-based, comprehensive review of key topics and technologies of research in Array and Radar Processing, Communications Engineering and Machine Learning. Users will find the book to be an invaluable starting point to their research and initiatives.

    With this reference, readers will quickly grasp an unfamiliar area of research, understand the underlying principles of a topic, learn how a topic relates to other areas, and learn of research issues yet to be resolved.

    Presents a quick tutorial of reviews of important and emerging topics of research Explores core principles, technologies, algorithms and applications Edited and contributed by international leading figures in the field Includes comprehensive references to journal articles and other literature upon which to build further, more detailed knowledge

  • TV White Space Communications and Networks
    TK6643 T8 2018

    TV White Space Communications and Networks summarizes the current state-of-the-art in this important aspect of wireless communication. Part One covers related technologies, while Part Two looks at policy, regulation and standardization issues. Part Three discusses the commercialization and potential applications of white space networks, rounding out a comprehensive book that provides a standard reference for those researching and commercializing white space networks.

    Presents broad-ranging coverage of all the key issues in white space networks, including regulation, standards, technologies and commercial applications Brings together an international group of experts to summarize the state-of-the-art Builds on the results of the first trials of white space networks

  • Resource efficient LDPC decoders : from algorithms to hardware architectures / Vikram Arkalgud Chandrasetty, Syed Mahfuzul Aziz

    This book takes a practical hands-on approach to developing low complexity algorithms and transforming them into working hardware. It follows a complete design approach - from algorithms to hardware architectures - and addresses some of the challenges associated with their design, providing insight into implementing innovative architectures based on low complexity algorithms. The reader will learn:

    Modern techniques to design, model and analyze low complexity LDPC algorithms as well as their hardware implementation How to reduce computational complexity and power consumption using computer aided design techniques All aspects of the design spectrum from algorithms to hardware implementation and performance trade-offs Provides extensive treatment of LDPC decoding algorithms and hardware implementations Gives a systematic guidance, giving a basic understanding of LDPC codes and decoding algorithms and providing practical skills in implementing efficient LDPC decoders in hardware Companion website containing C-Programs and MATLAB models for simulating the algorithms, and Verilog HDL codes for hardware modeling and synthesis

  • Analog design and simulation using OrCAD® Capture and PSpice® / Dennis Fitzpatrick

    New to this edition: Updated to using OrCAD Release 17.2 and its new features; Coverage of PSPICE extra features: PSpice Designer, PSpice Designer Plus, Modelling Application, PSpice Part Search Symbol Viewer, PSpice Report, Associate PSpice model, New delay functions for Behavioural Simulation Models, New Models, Support for negative values in hysteresis voltage and threshold voltage; A new chapter on PSpice Advanced Analysis

    Analog Design and Simulation Using OrCAD Capture and PSpice, Second Edition provides step-by-step instructions on how to use the Cadence/OrCAD family of Electronic Design Automation software for analog design and simulation. The book explains how to enter schematics in Capture, set up project types, project libraries and prepare circuits for PSpice simulation. There are chapters on the different analysis types for DC Bias point, DC sweep, AC frequency sweep, Parametric analysis, Temperature analysis, Performance Analysis, Noise analysis, Sensitivity and Monte Carlo simulation. Subsequent chapters explain how the Stimulus Editor is used to define custom analog and digital signals, how the Model Editor is used to view and create new PSpice models and Capture parts and how the Magnetic Parts Editor is used to design transformers and inductors. Other chapters include Analog Behaviorial models, Test Benches as well as how to create hierarchical designs.

    The book includes the latest features in the OrCAD 17.2 release and there are exercises with step by step instructions at the end of each chapter that enables the reader to progress based upon their experience and knowledge gained from previous chapters.

    In addition, there are new chapters on the PSpice Advanced Analysis suite of tools: Sensitivity Analysis, Optimizer, Monte Carlo, and Smoke Analysis.The chapters show how circuit performance can effectively be maximised and optimised for variations in component tolerances, temperature effects, manufacturing yields and component stress.

    Provides both a comprehensive user guide and a detailed overview of simulation using OrCAD Capture and PSpice Includes worked and ready to try sample designs and a wide range of to-do exercises Covers Capture and PSpice together

  • Security in network functions virtualization / Zonghua Zhang, Ahmed Meddahi

    The software and networking industry is experiencing a rapid development and deployment of Network Functions Visualization (NFV) technology, in both enterprise and cloud data center networks. One of the primary reasons for this technological trend is that NFV has the capability to reduce CAPEX and OPEX, whilst increasing networking service efficiency, performance, agility, scalability, and resource utilization. Despite such well-recognized benefits, security remains a major concern of network service providers and seriously impedes the further expansion of NFV.

    This book is therefore dedicated to investigating and exploring the potential security issues of NFV. It contains three major elements: a thorough overview of the NFV framework and architecture, a comprehensive threat analysis aiming to establish a layer-specific threat taxonomy for NFV enabled networking services, and a series of comparative studies of security best practices in traditional networking scenarios and in NFV, ultimately leading to a set of recommendations on security countermeasures in NFV.

    This book is primarily intended for engineers, engineering students and researchers and those with an interest in the field of networks and telecommunications (architectures, protocols, services) in general, and particularly software-defined network (SDN) and network functions virtualization (NFV)-based security services.

    Extensively studies security issues in NFV Presents a basis or guideline for both academia researchers and industry practitioners to work together to achieve secure and dependable lifecycle management of NFV based network services

  • Compressed sensing in li-fi and wi-fi networks / Malek Benslama, Hatem Mokhtari

    Compressed Sensing in Li-Fi and Wi-Fi Networks features coverage of the first applications in optical telecommunications and wireless. After extensive development of basic theory, many techniques are presented, such as non-asymptotic analysis of random matrices, adaptive detection, greedy algorithms, and the use of graphical models. The book can be used as a comprehensive manual for teaching and research in courses covering advanced signal processing, efficient data processing algorithms, and telecommunications. After a thorough review of the basic theory of compressed sensing, many mathematical techniques are presented, including advanced signal modeling, Nyquist sub-sampling of analog signals, the non-asymptotic analysis of random matrices, adaptive detection, greedy algorithms, and the use of graphical models.

    Offers extensive development of basic theory behind telecommunications and wireless networks Contains broad coverage of treat compressed sensing, including electromagnetism signals Provides insights into the two key areas of telecommunications, WIFI and LIFI Includes information on advanced signal modeling, Nyquist sub-sampling of analog signals, the non-asymptotic analysis of random matrices, adaptive detection, greedy algorithms, and more

  • Satellite signal propagation, impairments and mitigation / Rajat Acharya
    TK5102.5 A24 2017

    Satellite Signal Propagation, Impairments and Mitigation covers issues related to satellite link design. The book develops every concept from elementary physics, covering the basics of signal propagation from Maxwell's equations and then gradually developing the physical reasons for impairments.

    It emphasizes the unique concepts for each involved process, based on their physics, and explains how they form the determining factors for the related suitable engineering technique for mitigation. Every basic principle is followed by mathematical substantiation with an explanation of the physics behind the equations.

    Covers the basics of signal propagation, starting from Maxwell's equations and then gradually developing the physical reasons for the impairments Includes different important propagation experiments conducted and detailed in the Appendix Employs the power of MATLAB® as both a visualization and problem-solving tool Provides MATLAB scripts for simulation exercises

  • Building wireless sensor networks : application to routing and data diffusion / edited by Smain Femmam

    Building Wireless Sensor Networks: Application to Routing and Data Diffusion discusses challenges involved in securing routing in wireless sensor networks with new hybrid topologies. An analysis of the security of real time data diffusion--a protocol for routing in wireless sensor networks--is provided, along with various possible attacks and possible countermeasures. Different applications are introduced, and new topologies are developed. Topics include audio video bridging (AVB) switched Ethernet, which uses the representation of a network of wireless sensors by a grayscale image to construct routing protocols, thereby minimizing energy consumption and data sharing in vehicular ad-hoc networks.

    Existing wireless networks aim to provide communication services between vehicles by enabling the vehicular networks to support wide range applications. New topologies are proposed first, based on the graphiton models, then the wireless sensor networks (WSN) based on the IEEE 802.15.4 standard (ZigBee sensors, and finally the Pancake graphs as an alternative to the Hypercube for interconnecting processors in parallel computer networks.

    Presents an analysis and protocol for routing in wireless sensor networks Presents ways to prevent attacks against this protocol Introduces different applications Develops new topologies

  • Cellular Internet of things : technologies, standards, and performance / Olof Liberg, Ericsson Business Unit Networks, Mårten Sundberg, Ericsson Business Unit Networks, Y.-P. Eric Wang, Ericsson Research, Johan Bergman, Ericsson Business Unit Networks, Joachim Sachs, Ericsson Research

    Cellular Internet of Things: Technologies, Standards and Performance gives insight into the recent work performed by the 3rd Generation Partnership Project (3GPP) to develop systems for the Cellular Internet of Things. It presents both the design of the new Narrowband Internet of Things (NB-IoT) technology and how GSM and LTE have evolved to provide Cellular Internet of Things services. The criteria used for the design and objectives of the standardization work are explained, and the technical details and performance of each technology is presented. This book discusses the overall competitive landscape for providing wireless connectivity, also introducing the most promising technologies in the market.

    Users will learn how cellular systems work and how they can be designed to cater to challenging new requirements that are emerging in the telecom industry, what the physical layers and procedures in idle and connected mode look like in EC-GSM-IoT, LTE-M, and NB-IoT, and what the expected performance of these new systems is in terms of expected coverage, battery lifetime, data throughput, access delay time and device cost.


    How cellular systems work, and how they can be designed to cater for challenging new requirements emerging in the telecom industry. How the physical layers and the procedures in idle and connected mode look like in EC-GSM-IoT, LTE-M, and NB-IoT. What the expected performance of these new systems is in terms of expected coverage, battery lifetime, data throughput, access delay time, and device cost. How the Low-Power-Wide-Area IoT market segment looks like and how different available solutions compare in terms of performance and compatibility with already existing radio networks. What system capacity and network level performance can be achieved when deploying these new systems, and in addition what deployment options are possible. Provides a detailed introduction to the EC-GSM-IoT, LTE-M and NB-IoT technologies Presents network performance of the 3GPP cellular technologies, along with an analysis of the performance of non-cellular alternatives operating in unlicensed spectrum Includes prediction of true performance levels using state-of-the-art simulation models developed in the 3GPP standardization process

  • OQAM/FBMC for future wireless communications : principles, technologies and applications / Tao Jiang, Da Chen, Chunxing Ni, Daiming Qu

    OQAM/FBMC for Future Wireless Communications: Principles, Technologies and Applications introduces the concepts and key technologies of OQAM/FBMC, which has been regarded as the potential physical layer technique in future wireless communication systems. It comprises 10 chapters that provide an overview of wireless communications, introduce wireless channels, single carrier and multicarrier modulations, and three types of FBMC systems, also comparing OQAM/FBMC with OFDM. Other chapters introduce the OQAM/FBMC communication system model, the FFT implementation, CP insertion, PSD analysis, prototype filter optimization, joint PAPR reduction and sidelobe suppression, overhead reduction with virtual symbols, time and frequency domain channel estimations, block-wise SFBC for MIMO OQAM/FBMC, and much more.

    Provides a comprehensive guide to most major OQAM/FBMC techniques Includes a detailed comparison between OFDM and OQAM/FBMC Provides readers with a complete introduction to OQAM/FBMC, from the transmitter to the receiver Gives readers an up-to-date view of future mobile communications and how QAM/FBMC supports them

  • The Circuit Designer's Companion
    TK7867 W557 2017eb

    The fourth edition of this classic work on circuit design gives you the understanding and practical know-how to produce optimized, reliable, cost-effective electronic circuits. It bridges the gap between the theoretical learning that most university courses provide and the practical knowledge and application that comes from years of experience. Topics covered include analog and digital circuits, component types, power supplies and printed circuit board design, plus new coverage of the latest advances in electronics since the previous edition published.

    The Circuit Designer's Companion is ideal for Professional electronics design engineers, advanced amateur electronics designers, electronic engineering students and professors looking for a book with a real-world design outlook.

    Updated with new material on:

    Extreme Environment Design Design for Reliability Wide Band Gap Devices for Power Electronics Provides an invaluable companion for circuit designers and practicing electronics engineers that includes best practices Includes practical, real-world considerations for components, PCBs, manufacturability, reliability and cost Contains new material on design tools, high-speed circuits, variability and tolerances, noise, simulation methods and testing

  • RCS synthesis for chipless RFID : theory and design / Olivier Rance, Etienne Perret, Romain Siragusa and Pierre Lemaître-Auger
    TK6570.I34R36 2017eb

    The considerable growth of RFID is currently accompanied by the development of numerous identification technologies that complement those already available while seeking to answer new problems. Chipless RFID is one example. The goal is to both significantly reduce the price of the tag and increase the amount of information it contains, in order to compete with the barcode while retaining the benefits of a flexible reading approach based on radio communication. To solve the problem of the number of bits, this book describes the possibility of coding the information at the level of the overall shape of the RCS of the tag, which would facilitate reaching very large quantities. The design of the tags then returns to the resolution of the inverse problem of the electromagnetic signature. The proposed design methodology regularizes the problem by decomposing the signature on a basis of elementary patterns whose signature is chosen in advance.

    Includes a theoretical presentation of scattering phenomenon in electromagnetism, regrouping elements from classical RFID, pulse radar, and antenna theory Features a new coding technique based on magnitude level that is presented and characterized for different kinds of tags Proposes, for the first time, RCS synthesis based on a physical approach for wide-frequency bands

  • Orthogonal waveforms and filter banks for future communication systems / edited by Markku Renfors [and others]

    Orthogonal Waveforms and Filter Banks for Future Communication Systems provides an up-to-date account of orthogonal filter bank-based multicarrier (FBMC) systems and their applications in modern and future communications, highlighting the crucial role that advanced multicarrier waveforms play. It is an up-to-date overview of the theory, algorithms, design and applications of FBMC systems at both the link- and system levels that demonstrates the various gains offered by FBMC over existing transmission schemes via both simulation and test bed experiments. Readers will learn the requirements and challenges of advanced waveform design for future communication systems, existing FBMC approaches, application areas, and their implementation.

    In addition, the state-of-the-art in PHY- and MAC-layer solutions based on FBMC techniques, including theoretical, algorithmic and implementation aspects are explored.

    Presents a unique and up-to-date source for signal processing/communications researchers and practitioners Presents a homogeneous, comprehensive presentation of the subject Covers offset-QAM based FBMC (FBMC/OQAM) and its variants, including its history, signal processing interest and potential for maximum spectral efficiency, among other features
page last updated on: Monday 12 November 2018
Back to top Back to top