Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
This book gives a detailed overview of a universal Maximum Likelihood (ML) decoding technique, known as Guessing Random Additive Noise Decoding (GRAND), has been introduced for short-length and high-rate linear block codes. The interest in short channel codes and the corresponding ML decoding algorithms has recently been reignited in both industry and academia due to emergence of applications with strict reliability and ultra-low latency requirements . A few of these applications include Machine-to-Machine (M2M) communication, augmented and virtual Reality, Intelligent Transportation Systems (ITS), the Internet of Things (IoTs), and Ultra-Reliable and Low Latency Communications (URLLC), which is an important use case for the 5G-NR standard.GRAND features both soft-input and hard-input variants. Moreover, there are traditional GRAND variants that can be used with any communication channel, and specialized GRAND variants that are developed for a specific communication channel. This book presents a detailed overview of these GRAND variants and their hardware architectures.The book is structured into four parts. Part 1 introduces linear block codes and the GRAND algorithm. Part 2 discusses the hardware architecture for traditional GRAND variants that can be applied to any underlying communication channel. Part 3 describes the hardware architectures for specialized GRAND variants developed for specific communication channels. Lastly, Part 4 provides an overview of recently proposed GRAND variants and their unique applications.This book is ideal for researchers or engineers looking to implement high-throughput and energy-efficient hardware for GRAND, as well as seasoned academics and graduate students interested in the topic of VLSI hardware architectures. Additionally, it can serve as reading material in graduate courses covering modern error correcting codes and Maximum Likelihood decoding for short codes.
Wireless communication investigations involve the study; analysis; and experimentation of various aspects of transmitting and receiving information without physical connections. This field encompasses a wide range of technologies and applications; including radio waves; microwaves; and infrared signals; used in devices like smartphones; Wi-Fi routers; and satellite communication systems.Researchers and engineers in wireless communication delve into signal propagation; modulation techniques; coding schemes; and protocols to enhance data transfer efficiency; minimize interference; and extend communication range. This work is critical in ensuring seamless connectivity in diverse environments; such as urban areas; remote locations; and even specialized settings like aircraft interiors.In the context of aircraft; wireless communication investigations focus on developing and optimizing systems that provide reliable connectivity to passengers and crew during flights. This involves addressing challenges like signal attenuation due to the aircraft's metal structure; ensuring uninterrupted coverage throughout the cabin; and adhering to safety and interference regulations.By conducting thorough wireless communication investigations; experts can advance the capabilities of wireless technologies; leading to improved connectivity experiences for both everyday users and specialized settings like aircraft; thereby shaping the future of global communication networks.
This book reports on the latest advances from both industry and academia on ubiquitous intelligence and how it is enabled by 5G/6G communication technologies. The authors cover network protocol and architecture design, machine learning and artificial intelligence, coordinated control and digital twins technologies, and security and privacy enhancement for ubiquitous intelligence. The authors include recent studies of performance analysis and enhancement of the Internet of Things, cyber-physical systems, edge computing, and cyber twins, all of which provide importance guidance and theoretical tools for developing future ubiquitous intelligence. The content of the book will be of interest to students, educators, and researchers in academia, industry, and research laboratories.Provides comprehensive coverage of enabling communications, computing, and control technologies for ubiquitous intelligence;Presents a novel paradigm of ubiquitous intelligence powered by broadband communications, computing, and control;Includes a review of 5G/6G communication technologies, network protocol and architecture design, and ubiquitous computing.
This textbook presents the fundamental concepts and theories in electromagnetic theory in a very simple, systematic, and comprehensive way. The book is written in a lucid manner so that they are able to understand the realization behind the mathematical concepts which are the backbone of this subject. All the subject fundamentals and related derivations are discussed in an easy and comprehensive way to make the students strong about the basics of the electromagnetic theory. The philosophy of presentation and material content in the book is based on concept-based approach toward the subject. The key features also lies in the solutions of several interesting numerical problems so that the students should have the idea of the practical usages of the subject. The book benefits students who are taking introductory courses in electromagnetic wave and field theory for applications in communication engineering.
This book explains the motivation for using microphone arrays as opposed to using a single sensor for sound acquisition. The book then goes on to summarize the most useful ideas, concepts, results, and new algorithms therein. The material presented in this work includes analysis of the advantages of using microphone arrays, including dimensionality reduction to remove the redundancy while preserving the variability of the array signals using the principal component analysis (PCA). The authors also discuss benefits such as beamforming with low-rank approximations, fixed, adaptive, and robust distortionless beamforming, differential beamforming, and a new form of binaural beamforming that takes advantage of both beamforming and human binaural hearing properties to improve speech intelligibility. The book makes the microphone array signal processing theory and applications available in a complete and self-contained text. The authors attempt to explain the main ideas in a clear and rigorous way so that the reader can easily capture the potentials, opportunities, challenges, and limitations of microphone array signal processing. This book is written for those who work on the topics of microphone arrays, noise reduction, speech enhancement, speech communication, and human-machine speech interfaces.
This book presents some of the most advanced leading-edge technology for the fourth Industrial Revolution -- known as ¿Industry 4.0.¿ The book provides a comprehensive understanding of the interconnections of AI, IoT, big data and cloud computing as integral to the technologies that revolutionize the way companies produce and distribute products and the way local governments deliver their services. The book emphasizes that at every phase of the supply chain, manufactures are found to be interweaving AI, robotics, IoT, big data/machine learning, and cloud computing into their production facilities and throughout their distribution networks. Equally important, the authors show how their research can be applied to computer vision, cyber security, database and compiler theory, natural language processing, healthcare, education and agriculture.Presents the fundamentals of AI, IoT, and cloud computing and how they can be incorporatedin Industry 4.0 applicationsMotivates readers to address challenges in the areas of speech communication and signal processingProvides numerous examples, case studies, technical descriptions, and approaches of AI/ML
This book presents the proceedings of the 5th International Conference on Wireless Intelligent and Distributed Environment for Communication (WIDECOM 2022), which took place at the University of Windsor, Windsor, Canada, October 12-14, 2022. The book addresses issues related to new dependability paradigms, design, and performance of dependable network computing and mobile systems, as well as issues related to the security of these systems. The goal of the conference is to provide a forum for researchers, students, scientists and engineers working in academia and industry to share their experiences, new ideas and research results in the above-mentioned areas.
This book demonstrates that the reliable and secure communication performance of maritime communications can be significantly improved by using intelligent reflecting surface (IRS) aided communication, privacy-aware Internet of Things (IoT) communications, intelligent resource management and location privacy protection. In the IRS aided maritime communication system, the reflecting elements of IRS can be intelligently controlled to change the phase of signal, and finally enhance the received signal strength of maritime ships (or sensors) or jam maritime eavesdroppers illustrated in this book.The power and spectrum resource in maritime communications can be jointly optimized to guarantee the quality of service (i.e., security and reliability requirements), and reinforcement leaning is adopted to smartly choose the resource allocation strategy. Moreover, learning based privacy-aware offloading and location privacy protection are proposed to intelligently guarantee the privacy-preserving requirements of maritime ships or (sensors). Therefore, these communication schemes based on reinforcement learning algorithms can help maritime communication systems to improve the information security, especially in dynamic and complex maritime environments.This timely book also provides broad coverage of the maritime wireless communication issues, such as reliability, security, resource management, and privacy protection. Reinforcement learning based methods are applied to solve these issues. This book includes four rigorously refereed chapters from prominent international researchers working in this subject area. The material serves as a useful reference for researchers, graduate students. Practitioners seeking solutions to maritime wireless communication and security related issues will benefit from this book as well.
This book provides a conceptual understanding of deep learning algorithms. The book consists of the four parts: foundations, deep machine learning, deep neural networks, and textual deep learning. The first part provides traditional supervised learning, traditional unsupervised learning, and ensemble learning, as the preparation for studying deep learning algorithms. The second part deals with modification of existing machine learning algorithms into deep learning algorithms. The book¿s third part deals with deep neural networks, such as Multiple Perceptron, Recurrent Networks, Restricted Boltzmann Machine, and Convolutionary Neural Networks. The last part provides deep learning techniques that are specialized for text mining tasks. The book is relevant for researchers, academics, students, and professionals in machine learning.
This book presents the latest research, theoretical methods, and novel applications in the field of Health 5.0. The authors focus on combating COVID-19 or other pandemics through facilitating various technological services. The authors discuss new models, practical solutions, and technological advances related to detecting and analyzing COVID-19 or other pandemic based on machine intelligence models and communication technologies. The aim of the coverage is to help decision-makers, managers, professionals, and researchers design new paradigms considering the unique opportunities associated with computational intelligence and Internet of Medical Things (IoMT). This book emphasizes the need to analyze all the information through studies and research carried out in the field of computational intelligence, communication networks, and presents the best solutions to combat COVID and other pandemics.
This book introduces a unique perspective on the use of data from popular emerging technologies and the effect on user quality of experience (QoE). The term data is first refined into specific types of data such as financial data, personal data, public data, context data, generated data, and the popular big data. The book focuses the responsible use of data, with consideration to ethics and wellbeing, in each setting. The specific nuances of different technologies bring forth interesting case studies, which the book breaks down into mathematical models so they can be analyzed and used as powerful tools. Overall, this perspective on the use of data from popular emerging technologies and the resulting QoE analysis will greatly benefit researchers, educators and students in fields related to ICT studies, especially where there is additional interest in ethics and wellbeing, user experience, data management, and their link to emerging technologies.
The book focuses on utilizing sparse signal processing techniques in designing massive MIMO communication systems. As the number of antennas has been increasing rapidly for years, extremely high-dimensional channel matrix and massive user access urge for algorithms with much higher efficiency. This book provides in-depth discussions on compressive sensing techniques and simulates the performance on wireless systems. The easy-to-understand instructions with detailed simulations and open-sourced codes provide convenience for readers such as researchers, engineers, and graduate students in the fields of wireless communications.
This book is a collection of selected high-quality research papers presented at International Conference on Paradigms of Communication, Computing and Data Analytics (PCCDA 2023), held at South Asian University, New Delhi, India, during 22¿23 April 2023. It discusses cutting-edge research in the areas of advanced computing, communications and data science techniques. The book is a collection of latest research articles in computation algorithm, communication and data sciences, intertwined with each other for efficiency.
This book systematically summarizes the development process of China Internet in 2020, reveals the strong impact of Internet on China's economic development and social progress, and displays the course of the Chinese people's changes from beneficiary and participant to builder, contributor, and joint maintainer of cyberspace development and security during the Internet development; objectively reflects the development achievements, development status, and development trend of China Internet in 2020, systematically summarizes the main experience in the development of China Internet, and deeply analyzes China's strategic planning, policy actions, development results, practical level and future trend in information infrastructure, network information technology, digital economy, E-government, construction and management of network contents, network security, legal construction of cyberspace, international cyberspace governance, and other aspects; further improves the index system for the development of China Internet and makes an overall assessment of network security and informatization work in 31 provinces (autonomous regions and municipalities directly under the central government, excluding Hong Kong, Macao, and Taiwan) throughout China from 6 aspects, in the hope of reflecting the Internet development level throughout China and individual places comprehensively and accurately.With the important thoughts of General Secretary Xi Jinping on the national cyber development strategy as the main line running through the book, this book collects the latest research results in the domestic Internet field and utilizes the latest cases and authoritative data; featuring rich contents and highlights, this book helps the public readers to better comprehend the rich implications, spiritual essence, and practice requirements of the Internet governance concepts, thoughts, and opinions of General Secretary Xi Jinping and provides an important reference value for the employees in the Internet fields, such as government departments, Internet enterprises, scientific research institutions, colleges, and universities to fully understand and master the development of the China Internet.
Das Buch vermittelt neuartige Analyse- und Syntheseverfahren für quasi- und nichtlineare Kirchhoff-Netzwerke. Hierzu verwendet der Autor als Unternetzwerke gewöhnliche Widerstände, Kondensatoren, Spulen, Übertrager, Transistoren oder Dioden sowie die sogenannten pathologischen Unternetzwerke Nullator und Norator. Zur Analyse oder Synthese erfolgt eine Zerlegung der Gleichungen zur Beschreibung des Klemmenverhaltens in die u-i-Relationen realisierbarer Unternetzwerke sowie in Strukturgleichungen nach Kirchhoff. Dazu kreiert Reiner Thiele neue nichtlineare Transistor- bzw. Dioden-Modelle. Außerdem zeigt er, wie durch die Applikation von Klemmen-Äquivalenzen praxisrelevante elektrische oder elektronische Schaltungen entstehen.Der InhaltFixatoren und u-i-GeneratorenFixator-Modelle von TransistorenDimensionierung gesteuerter QuellenNichtlineare Transistor- und Dioden-ModelleKlemmenverhalten gesteuerter QuellenSynthese gesteuerter QuellenResistive und dynamische Dioden-Netzwerke Die Zielgruppen Studierende und Dozierende der Fachgebiete Elektrotechnik/Elektronik und Informationstechnik/Technische Informatik sowie Technische Mathematik und PhysikIngenieurinnen und Ingenieure, die sich mit Netzberechnung und Netzwerkentwurf befassenDer AutorProf. Dr.-Ing. Reiner Thiele lehrte an der Hochschule Zittau/Görlitz und an der Staatlichen Studienakademie Bautzen.
This book offers the latest research results in recent development on the principles, techniques and applications in mobile crowdsourcing. It presents state-of-the-art content and provides an in-depth overview of the basic background in this related field. Crowdsourcing involves a large crowd of participants working together to contribute or produce goods and services for the society. The early 21st century applications of crowdsourcing can be called crowdsourcing 1.0, which includes businesses using crowdsourcing to accomplish various tasks, such as the ability to offload peak demand, access cheap labor, generate better results in a timely matter, and reach a wider array of talent outside the organization. Mobile crowdsensing can be described as an extension of crowdsourcing to the mobile network to combine the idea of crowdsourcing with the sensing capacity of mobile devices. As a promising paradigm for completing complex sensing and computationtasks, mobile crowdsensing serves the vital purpose of exploiting the ubiquitous smart devices carried by mobile users to make conscious or unconscious collaboration through mobile networks. Considering that we are in the era of mobile internet, mobile crowdsensing is developing rapidly and has great advantages in deployment and maintenance, sensing range and granularity, reusability, and other aspects. Due to the benefits of using mobile crowdsensing, many emergent applications are now available for individuals, business enterprises, and governments. In addition, many new techniques have been developed and are being adopted. This book will be of value to researchers and students targeting this topic as a reference book. Practitioners, government officials, business organizations and even customers -- working, participating or those interested in fields related to crowdsourcing will also want to purchase this book.
Dieses Buch gibt einen Einblick in die Herausforderungen der Datenauthentifizierung über drahtlose Kommunikationskanäle. Die Autoren gehen davon aus, dass die etablierten Standard-Authentifizierungsmechanismen nicht ausreichen, um Daten wie Sprache, Bilder und Videos über drahtlose Kanäle zu authentifizieren, da die drahtlose Kommunikation durch zahlreiche Störungen gekennzeichnet ist. Die Autoren schlagen neue Mechanismen vor, die auf so genannten Soft-Authentifizierungsalgorithmen basieren, die einige Änderungen an den zu schützenden Daten tolerieren. Die Autoren erklären, dass das Ziel dieser Algorithmen darin besteht, tolerant gegenüber inhaltlichen Änderungen auf Grund von Übertragungsfehler zu sein, aber dennoch in der Lage zu sein, Fälschungen zu erkennen. Ein weiterer Vorteil der Soft-Authentifizierungsalgorithmen besteht darin, dass sie in der Lage sind, die veränderten Stellen zu identifizieren und sie nach Möglichkeit zu korrigieren. Die Autoren zeigen, wie man dies erreicht, indem man die Datenmerkmale mit Hilfe von fehlerkorrigierenden Codes schützt. · Erörtert Methoden zur Authentifizierung von Daten (insbesondere von Bildern) bei Übertragungsstörungen, die bei der drahtlosen Kommunikation auftreten;· Stellt eine neue Klasse von Soft-Authentifizierungsmethoden vor, die anstelle der üblichen Hard-Authentifizierungsmethoden verwendet werden, um geringfügige Änderungen der Bilddaten zu tolerieren;· Verfügt über Authentifizierungsmethoden, die auf der Verwendung von Authentifizierungscodes und digitalen Wasserzeichen basieren
Das Buch vermittelt ausgehend von den Grundlagen der Netzwerk-Theorie neuartige Analyse- und Syntheseverfahren für lineare zeitinvariante Kirchhoff-Netzwerke. Hierzu verwendet der Autor als Elementarnetzwerke gewöhnliche Widerstände, Kondensatoren und Spulen sowie die sogenannten pathologischen Unternetzwerke Nullator, Norator und Nullor. Der Nullor besteht dabei aus einem Nullator und einem Norator, wird hinsichtlich seines Klemmenverhaltens durch die Belevitch-Darstellung beschrieben und näherungsweise durch einen Operationsverstärker realisiert. Zur Analyse oder Synthese erfolgt die Zerlegung in realisierbare Unternetzwerke mit dem Verfahren der Singulärwert-Zerlegung von Matrizen. Außerdem zeigt Reiner Thiele, wie durch die Applikation von Klemmen-Äquivalenzen praxisrelevante elektrische oder elektronische Schaltungen entstehen.Der InhaltSpannungs-Strom-RelationenKirchhoff-GesetzeNetzwerk-EigenschaftenUnternetzwerkeAnalyse resistiver und dynamischer NetzwerkeBelevitch-DarstellungSynthese resistiver und dynamischer NetzwerkeDie ZielgruppenStudierende und Dozierende der Fachgebiete Elektrotechnik/Elektronik und Informationstechnik/Technische Informatik sowie Technische Mathematik und PhysikIngenieurinnen und Ingenieure, die sich mit Netzberechnung und Netzwerkentwurf befassenDer AutorProf. Dr.-Ing. Reiner Thiele lehrte an der Hochschule Zittau/Görlitz und an der Staatlichen Studienakademie Bautzen.
This book systematically reviews the development process of the world Internet and comprehensively reveals the great contributions of the Internet to economic development and social progress. The world today is marked by changes unseen in a century, and Internet development is facing new opportunities and challenges. In 2020, the COVID-19 epidemic broke out and spread at the global scale, which enormously impacted the global economy and society. Internet played an increasingly important role.Meanwhile, based on the development status of the global Internet, this book fully reflects the development process, status and trend of the world Internet in 2020, systematically summarizes the development status and highlights of the Internet in the major countries around the world, and makes an in-depth analysis of the new conditions, new dynamics and new trends of the development in the key Internet fields; the contents cover the information infrastructure, information technology, digital economy, digital government, internet media, network security, and international cyberspace governance, and other aspects. Moreover, this book further adjusts and enriches the development index systems of the world Internet, in the hope of better showing the development strength and development advantages of the Internet in various countries, and reflecting the overall development trend of the world Internet more comprehensively, accurately and objectively.From an objective perspective, this book collects the latest research results in the global internet field, featuring comprehensive contents and highlights; from a historical perspective, this book reviews the significant development process of the global internet, summarizes the experience and faces the future; from a global perspective, this book tries to construct the cyberspace community with a common future based on the new concepts, new ideas and new achievements of various countries in participating in cyberspace development and construction. This book provides an important reference value for employees in Internet fields, such as government departments, Internet enterprises, scientific research institutions, colleges and universities, to fully understand and master the development of the world internet.
Le réseau informatique de l'entreprise est le premier maillon rencontré par l'utilisateur lorsqu'il souhaite accéder aux services qui lui sont proposés en ligne, localement comme à distance; c'est le protocole Radius qui permet d'en centraliser le contrôle d'accès, pour tous les supports, filaires aussi bien que Wi-Fi.Contrôler l'accès au réseau de l'entreprise avec RadiusPour mettre en place un contrôle d'accès au réseau de l'entreprise, le responsable du réseau doit résoudre une sorte de quadrature du cercle: simplicité pour l'utilisateur, fiabilité des mécanismes, interopérabilité, niveau de sécurité élevé. Il dispose pour cela d'une palette de protocoles d'authentification, au coeur de laquelle se trouve le protocole Radius, complété par d'autres qui visent à graduer le niveau de sécurité en fonction de l'environnement. Mais comment les imbriquer et les faire interagir ? Comment maîtriser la complexité interne des solutions d'authentification réseau ?À qui s'adresse cet ouvrage ?À tous les administrateurs réseau qui doivent mettre en place un contrôle d'accès centralisé aux réseaux de l'entreprise (filaires et sans fil).
This book provides an overview of the latest R&D advancements in the field of ICT technologies inherent to a New Space vision. The book presents a system-level and technology-level description of future space networking and communications. The authors also expand the vision to interplanetary networks. The book spans hardware and software technologies for future space communication networks, also considering very modern paradigms like quantum technologies and Softwarization. In the book, the word ¿space¿ is intended in a wider sense than the usual ¿satellite communications¿, including new and partially unexplored fields like quantum space communications, interplanetary communications, and extra-terrestrial Radio Access Networks (RANs). The book includes applications including Internet of Space Things, Tactile Internet/Digital twins for Space and discusses future challenges like those involved by the concept of ¿sustainable Space¿.Provides an overview of the latest R&D advancements in the field of ICT technologies inherent to a New Space vision;Considers visions and perspectives of space technology, including a through overview of satellite communications;Presents a system-level overview of future space networking and communications.
This book is a complete guide for television and podcast researchers and associate producers.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.