Wireless broadband : conflict and convergence / / Vern Fotheringham, Chetan Sharma |
Autore | Fotheringham Vern |
Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , c2008 |
Descrizione fisica | 1 online resource (277 p.) |
Disciplina |
384.5
621.384 |
Altri autori (Persone) | SharmaChetan |
Collana | IEEE series on mobile & digital communication |
Soggetto topico |
Broadband communication systems
Wireless communication systems |
ISBN |
1-282-11268-6
9786612112683 0-470-38160-4 0-470-38159-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword -- Acknowledgments -- List of Figures -- INTRODUCTION -- 1 WHERE WE ARE--WIRELESS MEETS THE BROADBAND INTERNET -- 2 BROADBAND AND THE INFORMATION SOCIETY -- 3 GLOBAL WIRELESS MARKET ANALYSIS -- 4 THE VIRTUAL DISPLACES THE PHYSICAL -- 5 CONVERGENCE FINALLY ARRIVES -- 6 DRIVERS OF BROADBAND CONSUMPTION -- 7 THE EMERGING INFLUENCE OF THE COMPUTER INDUSTRY -- 8 ALWAYS BEST CONNECTED -- 9 BROADBAND IP CORE NETWORKS -- 10 WIDEBAND 3G TO BROADBAND 4G--COLLISION AND CONVERGENCE OF STANDARDS -- 11 RADIO TECHNOLOGY--MOVING THE GOAL POSTS -- 12 CONTENTION AND CONFLICT--REGULATORY, POLITICAL, FINANCIAL, AND STANDARDS BATTLES -- 13 CONCLUSION -- A WIRELESS BROADBAND GLOSSARY -- B A SCENARIO OF A BROADBAND WIRELESS CUSTOMER,CIRCA 2012 -- C SPECTRUM TABLES--WIRELESS BROADBAND -- About the Authors. |
Record Nr. | UNINA-9910145956103321 |
Fotheringham Vern | ||
Hoboken, New Jersey : , : Wiley, , c2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Wireless broadband : conflict and convergence / / Vern Fotheringham, Chetan Sharma |
Autore | Fotheringham Vern |
Pubbl/distr/stampa | Hoboken, New Jersey : , : Wiley, , c2008 |
Descrizione fisica | 1 online resource (277 p.) |
Disciplina |
384.5
621.384 |
Altri autori (Persone) | SharmaChetan |
Collana | IEEE series on mobile & digital communication |
Soggetto topico |
Broadband communication systems
Wireless communication systems |
ISBN |
1-282-11268-6
9786612112683 0-470-38160-4 0-470-38159-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword -- Acknowledgments -- List of Figures -- INTRODUCTION -- 1 WHERE WE ARE--WIRELESS MEETS THE BROADBAND INTERNET -- 2 BROADBAND AND THE INFORMATION SOCIETY -- 3 GLOBAL WIRELESS MARKET ANALYSIS -- 4 THE VIRTUAL DISPLACES THE PHYSICAL -- 5 CONVERGENCE FINALLY ARRIVES -- 6 DRIVERS OF BROADBAND CONSUMPTION -- 7 THE EMERGING INFLUENCE OF THE COMPUTER INDUSTRY -- 8 ALWAYS BEST CONNECTED -- 9 BROADBAND IP CORE NETWORKS -- 10 WIDEBAND 3G TO BROADBAND 4G--COLLISION AND CONVERGENCE OF STANDARDS -- 11 RADIO TECHNOLOGY--MOVING THE GOAL POSTS -- 12 CONTENTION AND CONFLICT--REGULATORY, POLITICAL, FINANCIAL, AND STANDARDS BATTLES -- 13 CONCLUSION -- A WIRELESS BROADBAND GLOSSARY -- B A SCENARIO OF A BROADBAND WIRELESS CUSTOMER,CIRCA 2012 -- C SPECTRUM TABLES--WIRELESS BROADBAND -- About the Authors. |
Record Nr. | UNINA-9910830184403321 |
Fotheringham Vern | ||
Hoboken, New Jersey : , : Wiley, , c2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Wireless broadband : conflict and convergence / / Vern Fotheringham, Chetan Sharma |
Autore | Fotheringham Vern |
Pubbl/distr/stampa | Hoboken, N.J., : Wiley |
Descrizione fisica | 1 online resource (277 p.) |
Disciplina |
384.5
621.384 |
Altri autori (Persone) | SharmaChetan |
Collana | IEEE series on mobile & digital communication |
Soggetto topico |
Broadband communication systems
Wireless communication systems |
ISBN |
1-282-11268-6
9786612112683 0-470-38160-4 0-470-38159-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Foreword -- Acknowledgments -- List of Figures -- INTRODUCTION -- 1 WHERE WE ARE--WIRELESS MEETS THE BROADBAND INTERNET -- 2 BROADBAND AND THE INFORMATION SOCIETY -- 3 GLOBAL WIRELESS MARKET ANALYSIS -- 4 THE VIRTUAL DISPLACES THE PHYSICAL -- 5 CONVERGENCE FINALLY ARRIVES -- 6 DRIVERS OF BROADBAND CONSUMPTION -- 7 THE EMERGING INFLUENCE OF THE COMPUTER INDUSTRY -- 8 ALWAYS BEST CONNECTED -- 9 BROADBAND IP CORE NETWORKS -- 10 WIDEBAND 3G TO BROADBAND 4G--COLLISION AND CONVERGENCE OF STANDARDS -- 11 RADIO TECHNOLOGY--MOVING THE GOAL POSTS -- 12 CONTENTION AND CONFLICT--REGULATORY, POLITICAL, FINANCIAL, AND STANDARDS BATTLES -- 13 CONCLUSION -- A WIRELESS BROADBAND GLOSSARY -- B A SCENARIO OF A BROADBAND WIRELESS CUSTOMER,CIRCA 2012 -- C SPECTRUM TABLES--WIRELESS BROADBAND -- About the Authors. |
Record Nr. | UNINA-9910876744703321 |
Fotheringham Vern | ||
Hoboken, N.J., : Wiley | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Wireless broadband networks / / David Tung Chong Wong ... [et al.] |
Pubbl/distr/stampa | Hoboken, New Jersey : , : John Wiley & Sons, , c2009 |
Descrizione fisica | 1 online resource (526 p.) |
Disciplina | 621.384 |
Altri autori (Persone) | WongDavid Tung Chong |
Soggetto topico |
Wireless communication systems
Broadband communication systems |
ISBN |
1-282-13714-X
9786612137143 0-470-43494-5 0-470-43493-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Orthogonal frequency-division multiplexing and other block-based transmissions -- Multiple-input, multiple-output antenna systems -- Ultrawideband -- Medium access control -- Mobility resource management -- Routing protocols for mulihop wireless broadband networks -- Radio resource management for wireless broadband networks -- Quality of service for multimedia services -- Long-term-evolution cellular networks -- Wireless broadband networking with WiMAX -- Wireless local area networks -- Wireless personal area networks -- Convergence of networks -- Appendix : Basics of probability, random variables, random processes, and queueing systems. |
Record Nr. | UNINA-9910145962003321 |
Hoboken, New Jersey : , : John Wiley & Sons, , c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Wireless broadband networks / / David Tung Chong Wong ... [et al.] |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Hoboken, N.J., : John Wiley & Sons, 2009 |
Descrizione fisica | 1 online resource (526 p.) |
Disciplina | 621.384 |
Altri autori (Persone) | WongDavid Tung Chong |
Soggetto topico |
Wireless communication systems
Broadband communication systems |
ISBN |
1-282-13714-X
9786612137143 0-470-43494-5 0-470-43493-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Orthogonal frequency-division multiplexing and other block-based transmissions -- Multiple-input, multiple-output antenna systems -- Ultrawideband -- Medium access control -- Mobility resource management -- Routing protocols for mulihop wireless broadband networks -- Radio resource management for wireless broadband networks -- Quality of service for multimedia services -- Long-term-evolution cellular networks -- Wireless broadband networking with WiMAX -- Wireless local area networks -- Wireless personal area networks -- Convergence of networks -- Appendix : Basics of probability, random variables, random processes, and queueing systems. |
Record Nr. | UNINA-9910825508803321 |
Hoboken, N.J., : John Wiley & Sons, 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Wireless coexistence : standards, challenges, and intelligent solutions / / Daniel Chew, Andrew Adams, Jason Uher |
Autore | Chew Daniel (Electrical engineer) |
Pubbl/distr/stampa | Hoboken, New Jersey : , : The Institute of Electrical and Electronics Engineers, Inc., , [2021] |
Descrizione fisica | 1 online resource (338 pages) |
Disciplina | 621.384 |
Soggetto topico |
Transmission sans fil
Wireless communication systems |
ISBN |
1-119-58412-4
1-119-58423-X 1-119-58422-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Title Page -- Copyright Page -- Contents -- Author Biographies -- Preface -- Acknowledgments -- Chapter 1 Introduction -- 1.1 A Primer on Wireless Coexistence: The Electromagnetic Spectrum as a Shared Resource -- 1.1.1 Basic Description of Spectrum Use and Interference -- 1.1.2 Understanding What It Means to Occupy a Band -- 1.1.3 Spectral Masks -- 1.1.4 Bandwidth and Information Rate -- 1.1.5 Benefits of Different Frequencies -- 1.2 The Role of Standardization in Wireless Coexistence -- 1.3 An Overview of Wireless Coexistence Strategies -- 1.3.1 Separation Strategies -- 1.3.2 Mitigation Strategies -- 1.3.3 Monitoring Strategies -- 1.3.4 Sensing Strategies -- 1.3.5 Collaboration Strategies -- 1.3.6 Combining the Strategies -- 1.4 Standards Covered in this Book -- 1.5 1900.1 as a Baseline Taxonomy -- 1.5.1 Advanced Radio System Concepts -- 1.5.2 Radio Capabilities -- 1.5.3 Network Types -- 1.5.4 Spectrum Management -- 1.6 Organization of this Work -- References -- Chapter 2 Regulation for Wireless Coexistence -- 2.1 Traditional Frequency Assignment -- 2.1.1 How Did It Work -- 2.1.2 History of Allocations in the United States -- 2.1.3 History of Spectrum Sharing -- 2.1.4 Mobile Phone Explosion -- 2.1.5 Wireless Networking -- 2.1.6 Future Allocations for Coexistence -- 2.2 Policies and Regulations -- 2.2.1 Spectrum Rights and Digital Commons -- 2.2.2 Spectrum Coordination (Both Licensed and Unlicensed) -- 2.2.3 Case Study in Spectrum Reallocation -- 2.3 Bands for Unlicensed Use -- 2.3.1 Overview of Unlicensed Use -- 2.3.2 Voice and Other Restricted but Unlicensed Bands -- 2.3.3 Industrial, Scientific, and Medical Band -- 2.3.4 TV White space -- 2.3.5 CBRS -- References -- Chapter 3 Concepts in Communications Theory -- 3.1 Types of Channels and Related Terminology -- 3.2 Types of Interference and Related Terminology.
3.3 Types of Networks and Related Terminology -- 3.4 Primer on Noise -- 3.5 Primer on Propagation -- 3.6 Primer on Orthogonal Frequency Division Multiplexing -- 3.6.1 Complex-Valued Waveforms -- 3.6.2 Symbol Mapping and Linear Modulation -- 3.6.3 Orthogonal Subcarriers -- 3.6.4 Modulating the Subcarriers -- 3.6.5 Assigning the Subcarriers -- 3.6.6 Further Reading on OFDM -- 3.7 Direct-Conversion Transceivers -- References -- Chapter 4 Mitigating Contention in Equal-Priority Access -- 4.1 Designating Spectrum Resources -- 4.2 Interference, Conflict, and Collisions -- 4.3 What Is a Primary User? -- 4.4 Tiers of Users -- 4.5 Unlicensed Users -- 4.6 Contention in Spectrum Access and Mitigation Techniques -- 4.7 Division of Responsibility among the Protocol Layers -- 4.8 Duplexing -- 4.9 Multiple Access and Multiplexing -- 4.10 Frequency and Time Division Multiple Access -- 4.11 Spectral Masks Defined in Standards -- 4.12 Spread Spectrum Techniques -- 4.12.1 Frequency Hopping -- 4.12.2 Adaptive Frequency Hopping -- 4.12.3 Direct Sequence Spread Spectrum and Code Division Multiple Access -- 4.13 Carrier Sense Multiple Access -- 4.13.1 Collision Avoidance -- 4.14 Orthogonal Frequency Division Multiple Access -- 4.15 Final Thoughts -- References -- Chapter 5 Secondary Spectrum Usage and Signal Detection -- 5.1 Spectrum Occupancy and White Space -- 5.2 Secondary Users -- 5.3 Signal Detection -- 5.3.1 Binary Hypothesis Testing -- 5.3.2 A Generic Framework for Signal Detection -- 5.3.3 Feature Selection -- 5.3.4 Maximum Likelihood Detector -- 5.3.5 Maximum A Posteriori (MAP) Detector -- 5.3.6 Probability of Error -- 5.3.7 Choosing the Threshold for a False Alarm Rate -- 5.3.8 Choosing Threshold for a Missed Detect Rate -- 5.3.9 Noise Power Estimation -- 5.4 Energy Detector -- 5.4.1 Single-Channel Operation -- 5.4.2 Multichannel Operation. 5.5 Known Pattern Detector -- 5.5.1 Calculation in the Time-Domain -- 5.5.2 Calculating the Decision Metric with no Phase Offset -- 5.5.3 Calculating the Decision Metric with a Constant Phase Offset -- 5.5.4 Calculating the Decision Metric with a Constant Frequency Offset -- 5.6 Cyclic Spectral Analysis -- 5.6.1 Motivation -- 5.6.2 Spectral Correlation Density -- 5.6.3 Bifrequency Plane -- 5.6.4 Implementation -- 5.7 Final Thoughts -- References -- Chapter 6 Intelligent Radio Concepts -- 6.1 Introduction -- 6.1.1 Motivation -- 6.1.2 Definitions -- 6.2 Intelligent Radio Use-Cases -- 6.3 The Cognitive Cycle -- 6.4 Making Radios Intelligent -- 6.5 Intelligent Radio Architectures -- 6.5.1 Cognitive Resource Manager Framework -- 6.5.2 IEEE 1900.4 -- 6.6 Learning Algorithms -- 6.6.1 Artificial Neural Networks -- 6.6.2 Markov Models -- 6.6.3 Reinforcement Learning -- 6.7 Looking Forward -- References -- Chapter 7 Coexistence Standards in IEEE 1900 -- 7.1 DySPAN Standards Committee (IEEE P1900) -- 7.1.1 History -- 7.1.2 The Working Groups´ Overview -- 7.1.3 1900.1 Working Group -- 7.1.4 1900.2 Working Group -- 7.1.5 1900.4 Working Group -- 7.1.6 1900.5 Working Group -- 7.1.7 1900.6 Working Group -- 7.1.8 1900.7 Working Group -- References -- Chapter 8 Coexistence Standards in IEEE 802 -- 8.1 The Standards to Be Addressed in this Chapter -- 8.2 Types and Spatial Scope of Wireless Networks -- 8.3 Stacks: The Structure of Wireless Protocol Standards -- 8.4 IEEE 802.22 -- 8.4.1 The Data Plane -- 8.4.2 The Control Plane -- 8.4.3 The Cognitive Plane -- 8.4.4 Distributed Sensing -- 8.4.5 Sensing Techniques -- 8.5 IEEE 802.11 -- 8.5.1 A Brief History of the IEEE 802.11 Standards -- 8.5.2 The Evolution of Wi-Fi -- 8.5.3 Wi-Fi Channelization in the 2.4GHz Band -- 8.5.4 Carrier Sensing -- 8.5.5 Wi-Fi as TV White Space Access -- 8.5.6 Comparison of 802.11af and 802.22. 8.6 TVWS Geolocation Databases in the United States -- 8.7 IEEE 802.19.1 -- 8.8 IEEE 802.15.2 -- References -- Chapter 9 LTE Carrier Aggregation and Unlicensed Access -- 9.1 Introduction -- 9.2 3G to LTE -- 9.3 LTE Coexistence Strategies -- 9.4 LAA Motivation -- 9.5 LTE Overview -- 9.5.1 Evolved Packet System -- 9.5.2 Evolved Packet Core -- 9.5.3 Radio Access Network -- 9.5.4 Air Interface -- 9.6 Carrier Aggregation -- 9.7 License-Assisted Access -- 9.7.1 Basic Concepts -- 9.7.2 Deployment Scenarios -- 9.7.3 LAA Coexistence Mechanisms -- 9.8 Deployment Status -- 9.9 Conclusions -- References -- Chapter 10 Conclusion and Future Trends -- 10.1 Summary of the Preceding Chapters -- 10.2 Nonorthogonal Multiple Access and Underlaying -- 10.2.1 Nonorthogonal Multiple Access -- 10.2.2 Underlaying for Secondary Users -- 10.2.3 Implementation Issues -- 10.2.4 The Future of NOMA and Underlaying -- 10.3 Intelligent Collaborative Radio Networks -- 10.4 Validation and Verification of Intelligent Radios -- 10.4.1 Case Study: The DARPA Colosseum -- 10.5 Spectrum Sharing Utopia -- 10.5.1 Major Hurdles for Spectrum Utopia -- 10.5.2 Pathways to an Optimally Utilized Future -- 10.6 Conclusion -- References -- Index -- EULA. |
Record Nr. | UNINA-9910554875303321 |
Chew Daniel (Electrical engineer) | ||
Hoboken, New Jersey : , : The Institute of Electrical and Electronics Engineers, Inc., , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Wireless coexistence : standards, challenges, and intelligent solutions / / Daniel Chew, Andrew Adams, Jason Uher |
Autore | Chew Daniel (Electrical engineer) |
Pubbl/distr/stampa | Hoboken, New Jersey : , : The Institute of Electrical and Electronics Engineers, Inc., , [2021] |
Descrizione fisica | 1 online resource (338 pages) |
Disciplina | 621.384 |
Soggetto topico |
Transmission sans fil
Wireless communication systems |
ISBN |
1-119-58412-4
1-119-58423-X 1-119-58422-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Title Page -- Copyright Page -- Contents -- Author Biographies -- Preface -- Acknowledgments -- Chapter 1 Introduction -- 1.1 A Primer on Wireless Coexistence: The Electromagnetic Spectrum as a Shared Resource -- 1.1.1 Basic Description of Spectrum Use and Interference -- 1.1.2 Understanding What It Means to Occupy a Band -- 1.1.3 Spectral Masks -- 1.1.4 Bandwidth and Information Rate -- 1.1.5 Benefits of Different Frequencies -- 1.2 The Role of Standardization in Wireless Coexistence -- 1.3 An Overview of Wireless Coexistence Strategies -- 1.3.1 Separation Strategies -- 1.3.2 Mitigation Strategies -- 1.3.3 Monitoring Strategies -- 1.3.4 Sensing Strategies -- 1.3.5 Collaboration Strategies -- 1.3.6 Combining the Strategies -- 1.4 Standards Covered in this Book -- 1.5 1900.1 as a Baseline Taxonomy -- 1.5.1 Advanced Radio System Concepts -- 1.5.2 Radio Capabilities -- 1.5.3 Network Types -- 1.5.4 Spectrum Management -- 1.6 Organization of this Work -- References -- Chapter 2 Regulation for Wireless Coexistence -- 2.1 Traditional Frequency Assignment -- 2.1.1 How Did It Work -- 2.1.2 History of Allocations in the United States -- 2.1.3 History of Spectrum Sharing -- 2.1.4 Mobile Phone Explosion -- 2.1.5 Wireless Networking -- 2.1.6 Future Allocations for Coexistence -- 2.2 Policies and Regulations -- 2.2.1 Spectrum Rights and Digital Commons -- 2.2.2 Spectrum Coordination (Both Licensed and Unlicensed) -- 2.2.3 Case Study in Spectrum Reallocation -- 2.3 Bands for Unlicensed Use -- 2.3.1 Overview of Unlicensed Use -- 2.3.2 Voice and Other Restricted but Unlicensed Bands -- 2.3.3 Industrial, Scientific, and Medical Band -- 2.3.4 TV White space -- 2.3.5 CBRS -- References -- Chapter 3 Concepts in Communications Theory -- 3.1 Types of Channels and Related Terminology -- 3.2 Types of Interference and Related Terminology.
3.3 Types of Networks and Related Terminology -- 3.4 Primer on Noise -- 3.5 Primer on Propagation -- 3.6 Primer on Orthogonal Frequency Division Multiplexing -- 3.6.1 Complex-Valued Waveforms -- 3.6.2 Symbol Mapping and Linear Modulation -- 3.6.3 Orthogonal Subcarriers -- 3.6.4 Modulating the Subcarriers -- 3.6.5 Assigning the Subcarriers -- 3.6.6 Further Reading on OFDM -- 3.7 Direct-Conversion Transceivers -- References -- Chapter 4 Mitigating Contention in Equal-Priority Access -- 4.1 Designating Spectrum Resources -- 4.2 Interference, Conflict, and Collisions -- 4.3 What Is a Primary User? -- 4.4 Tiers of Users -- 4.5 Unlicensed Users -- 4.6 Contention in Spectrum Access and Mitigation Techniques -- 4.7 Division of Responsibility among the Protocol Layers -- 4.8 Duplexing -- 4.9 Multiple Access and Multiplexing -- 4.10 Frequency and Time Division Multiple Access -- 4.11 Spectral Masks Defined in Standards -- 4.12 Spread Spectrum Techniques -- 4.12.1 Frequency Hopping -- 4.12.2 Adaptive Frequency Hopping -- 4.12.3 Direct Sequence Spread Spectrum and Code Division Multiple Access -- 4.13 Carrier Sense Multiple Access -- 4.13.1 Collision Avoidance -- 4.14 Orthogonal Frequency Division Multiple Access -- 4.15 Final Thoughts -- References -- Chapter 5 Secondary Spectrum Usage and Signal Detection -- 5.1 Spectrum Occupancy and White Space -- 5.2 Secondary Users -- 5.3 Signal Detection -- 5.3.1 Binary Hypothesis Testing -- 5.3.2 A Generic Framework for Signal Detection -- 5.3.3 Feature Selection -- 5.3.4 Maximum Likelihood Detector -- 5.3.5 Maximum A Posteriori (MAP) Detector -- 5.3.6 Probability of Error -- 5.3.7 Choosing the Threshold for a False Alarm Rate -- 5.3.8 Choosing Threshold for a Missed Detect Rate -- 5.3.9 Noise Power Estimation -- 5.4 Energy Detector -- 5.4.1 Single-Channel Operation -- 5.4.2 Multichannel Operation. 5.5 Known Pattern Detector -- 5.5.1 Calculation in the Time-Domain -- 5.5.2 Calculating the Decision Metric with no Phase Offset -- 5.5.3 Calculating the Decision Metric with a Constant Phase Offset -- 5.5.4 Calculating the Decision Metric with a Constant Frequency Offset -- 5.6 Cyclic Spectral Analysis -- 5.6.1 Motivation -- 5.6.2 Spectral Correlation Density -- 5.6.3 Bifrequency Plane -- 5.6.4 Implementation -- 5.7 Final Thoughts -- References -- Chapter 6 Intelligent Radio Concepts -- 6.1 Introduction -- 6.1.1 Motivation -- 6.1.2 Definitions -- 6.2 Intelligent Radio Use-Cases -- 6.3 The Cognitive Cycle -- 6.4 Making Radios Intelligent -- 6.5 Intelligent Radio Architectures -- 6.5.1 Cognitive Resource Manager Framework -- 6.5.2 IEEE 1900.4 -- 6.6 Learning Algorithms -- 6.6.1 Artificial Neural Networks -- 6.6.2 Markov Models -- 6.6.3 Reinforcement Learning -- 6.7 Looking Forward -- References -- Chapter 7 Coexistence Standards in IEEE 1900 -- 7.1 DySPAN Standards Committee (IEEE P1900) -- 7.1.1 History -- 7.1.2 The Working Groups´ Overview -- 7.1.3 1900.1 Working Group -- 7.1.4 1900.2 Working Group -- 7.1.5 1900.4 Working Group -- 7.1.6 1900.5 Working Group -- 7.1.7 1900.6 Working Group -- 7.1.8 1900.7 Working Group -- References -- Chapter 8 Coexistence Standards in IEEE 802 -- 8.1 The Standards to Be Addressed in this Chapter -- 8.2 Types and Spatial Scope of Wireless Networks -- 8.3 Stacks: The Structure of Wireless Protocol Standards -- 8.4 IEEE 802.22 -- 8.4.1 The Data Plane -- 8.4.2 The Control Plane -- 8.4.3 The Cognitive Plane -- 8.4.4 Distributed Sensing -- 8.4.5 Sensing Techniques -- 8.5 IEEE 802.11 -- 8.5.1 A Brief History of the IEEE 802.11 Standards -- 8.5.2 The Evolution of Wi-Fi -- 8.5.3 Wi-Fi Channelization in the 2.4GHz Band -- 8.5.4 Carrier Sensing -- 8.5.5 Wi-Fi as TV White Space Access -- 8.5.6 Comparison of 802.11af and 802.22. 8.6 TVWS Geolocation Databases in the United States -- 8.7 IEEE 802.19.1 -- 8.8 IEEE 802.15.2 -- References -- Chapter 9 LTE Carrier Aggregation and Unlicensed Access -- 9.1 Introduction -- 9.2 3G to LTE -- 9.3 LTE Coexistence Strategies -- 9.4 LAA Motivation -- 9.5 LTE Overview -- 9.5.1 Evolved Packet System -- 9.5.2 Evolved Packet Core -- 9.5.3 Radio Access Network -- 9.5.4 Air Interface -- 9.6 Carrier Aggregation -- 9.7 License-Assisted Access -- 9.7.1 Basic Concepts -- 9.7.2 Deployment Scenarios -- 9.7.3 LAA Coexistence Mechanisms -- 9.8 Deployment Status -- 9.9 Conclusions -- References -- Chapter 10 Conclusion and Future Trends -- 10.1 Summary of the Preceding Chapters -- 10.2 Nonorthogonal Multiple Access and Underlaying -- 10.2.1 Nonorthogonal Multiple Access -- 10.2.2 Underlaying for Secondary Users -- 10.2.3 Implementation Issues -- 10.2.4 The Future of NOMA and Underlaying -- 10.3 Intelligent Collaborative Radio Networks -- 10.4 Validation and Verification of Intelligent Radios -- 10.4.1 Case Study: The DARPA Colosseum -- 10.5 Spectrum Sharing Utopia -- 10.5.1 Major Hurdles for Spectrum Utopia -- 10.5.2 Pathways to an Optimally Utilized Future -- 10.6 Conclusion -- References -- Index -- EULA. |
Record Nr. | UNINA-9910829892703321 |
Chew Daniel (Electrical engineer) | ||
Hoboken, New Jersey : , : The Institute of Electrical and Electronics Engineers, Inc., , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Wireless communication electronics : introduction to RF circuits and design techniques / / Robert Sobot |
Autore | Sobot Robert |
Edizione | [2nd ed. 2021.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (XX, 522 p. 364 illus., 287 illus. in color.) |
Disciplina | 621.384 |
Soggetto topico |
Wireless communication systems
Radio frequency integrated circuits Radio frequency integrated circuits - Design and construction |
ISBN | 3-030-48630-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Part I.Basic concepts and definitions -- Chapter 1. Introduction -- Chapter 2.Basic behavioral and device models -- Chapter 3. Multistage Interface -- Chapter 4. Basic Semiconductor Devices -- Chapter 5. Transistor Biasing -- Chapter 6. Review of Basic Amplifiers -- Chapter 7. Introduction to frequency analysis of amplifiers -- Chapter 8. Electrical Noise -- Part II. Radio receiver circuit -- Chapter 9. Radio receiver architecture -- Chapter 10. Electrical Resonance -- Chapter 11. Matching Networks -- Chapter 12. RF and IF Amplifiers -- Chapter 13. Sinusoidal Oscillators -- Chapter 14. Frequency Shifting -- Chapter 15. Modulation -- Chapter 16. AM and FM Signal Demodulation -- Chapter 17. RF Receivers. |
Record Nr. | UNINA-9910483614003321 |
Sobot Robert | ||
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Wireless Communication in Cyber Security |
Autore | Sountharrajan S |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Newark : , : John Wiley & Sons, Incorporated, , 2023 |
Descrizione fisica | 1 online resource (284 pages) |
Disciplina | 005.8 |
Altri autori (Persone) |
MaheswarR
RatheeGeetanjali AkilaM |
Collana | Advances in antenna, microwave, and communication engineering |
Soggetto topico |
Computer security
Wireless communication systems |
ISBN |
1-119-91061-7
1-119-91060-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 BBUCAF: A Biometric-Based User Clustering Authentication Framework in Wireless Sensor Network -- 1.1 Introduction to Wireless Sensor Network -- 1.2 Background Study -- 1.3 A Biometric-Based User Clustering Authentication Framework -- 1.3.1 Biometric-Based Model -- 1.3.2 Clustering -- 1.4 Experimental Analysis -- 1.5 Conclusion -- References -- Chapter 2 DeepNet: Dynamic Detection of Malwares Using Deep Learning Techniques -- 2.1 Introduction -- 2.2 Literature Survey -- 2.2.1 ML or Metaheuristic Methods for Malware Detection -- 2.2.2 Deep Learning Algorithms for Malware Detection -- 2.3 Malware Datasets -- 2.3.1 Android Malware Dataset -- 2.3.2 SOREL-20M Dataset -- 2.4 Deep Learning Architecture -- 2.4.1 Deep Neural Networks (DNN) -- 2.4.2 Convolutional Neural Networks (CNN) -- 2.4.3 Recurrent Neural Networks (RNN) -- 2.4.4 Deep Belief Networks (DBN) -- 2.4.5 Stacked Autoencoders (SAE) -- 2.5 Proposed System -- 2.5.1 Datasets Used -- 2.5.2 System Architecture -- 2.5.3 Data Preprocessing -- 2.5.4 Proposed Methodology -- 2.5.5 DeepNet -- 2.5.6 DBN -- 2.5.7 SAE -- 2.5.8 Categorisation -- 2.6 Result and Analysis -- 2.7 Conclusion & -- Future Work -- References -- Chapter 3 State of Art of Security and Risk in Wireless Environment Along with Healthcare Case Study -- 3.1 Introduction -- 3.2 Literature Survey -- 3.3 Applications of Wireless Networks -- 3.4 Types of Attacks -- 3.4.1 Passive Attacks -- 3.4.2 Release of Message Contents -- 3.4.3 Traffic Analysis -- 3.4.4 Eavesdropping -- 3.5 Active Attacks -- 3.5.1 Malware -- 3.5.2 Password Theft -- 3.5.3 Bandwidth Stealing -- 3.5.4 Phishing Attacks -- 3.5.5 DDoS -- 3.5.6 Cross-Site Attack -- 3.5.7 Ransomware -- 3.5.8 Message Modification -- 3.5.9 Message Replay -- 3.5.10 Masquerade -- 3.6 Layered Attacks in WSN.
3.6.1 Attacks in Physical Layer -- 3.6.2 Attacks in Data Link Layer -- 3.6.3 Attacks in Network Layer -- 3.6.4 Attacks in Transport Layer -- 3.6.5 Attacks in Application Layer -- 3.7 Security Models -- 3.7.1 Bio-Inspired Trust and Reputation Model -- 3.7.2 Peer Trust System -- 3.8 Case Study: Healthcare -- 3.8.1 Security Risks in Healthcare -- 3.8.2 Prevention from Security Attacks in Healthcare -- 3.9 Minimize the Risks in a Wireless Environment -- 3.9.1 Generate Strong Passwords -- 3.9.2 Change Default Wi-Fi Username and Password -- 3.9.3 Use Updated Antivirus -- 3.9.4 Send Confidential Files with Passwords -- 3.9.5 Detect the Intruders -- 3.9.6 Encrypt Network -- 3.9.7 Avoid Sharing Files Through Public Wi-Fi -- 3.9.8 Provide Access to Authorized Users -- 3.9.9 Used a Wireless Controller -- 3.10 Conclusion -- References -- Chapter 4 Machine Learning-Based Malicious Threat Detection and Security Analysis on Software-Defined Networking for Industry 4.0 -- 4.1 Introduction -- 4.1.1 Software-Defined Network -- 4.1.2 Types of Attacks -- 4.1.2.1 Denial of Services -- 4.1.2.2 Distributed Denial of Service -- 4.2 Related Works -- 4.3 Proposed Work for Threat Detection and Security Analysis -- 4.3.1 Traffic Collection -- 4.3.1.1 Data Flow Monitoring and Data Collection -- 4.3.1.2 Purpose of Data Flow Monitoring and Data Collection -- 4.3.1.3 Types of Collection -- 4.3.2 Feature Selection Using Entropy -- 4.3.3 Malicious Traffic Detection -- 4.3.3.1 Framing of the Expected Traffic Status -- 4.3.3.2 Traffic Filtering Using Regression -- 4.3.4 Traffic Mitigation -- 4.4 Implementation and Results -- 4.5 Conclusion -- References -- Chapter 5 Privacy Enhancement for Wireless Sensor Networks and the Internet of Things Based on Cryptological Techniques -- 5.1 Introduction -- 5.2 System Architecture -- 5.3 Literature Review -- 5.4 Proposed Methodology. 5.5 Results and Discussion -- 5.6 Analysis of Various Security and Assaults -- 5.7 Conclusion -- References -- Chapter 6 Security and Confidentiality Concerns in Blockchain Technology: A Review -- 6.1 Introduction -- 6.2 Blockchain Technology -- 6.3 Blockchain Revolution Drivers -- 6.3.1 Transparent, Decentralised Consensus -- 6.3.2 Model of Agreement(s) -- 6.3.3 Immutability and Security -- 6.3.4 Anonymity and Automation -- 6.3.5 Impact on Business, Regulation, and Services -- 6.3.6 Access and Identity -- 6.4 Blockchain Classification -- 6.4.1 Public Blockchain -- 6.4.2 Private Blockchain -- 6.4.3 Blockchain Consortium -- 6.5 Blockchain Components and Operation -- 6.5.1 Data -- 6.5.2 Hash -- 6.5.3 MD5 -- 6.5.4 SHA 256 -- 6.5.5 MD5 vs. SHA-256 -- 6.6 Blockchain Technology Applications -- 6.6.1 Blockchain Technology in the Healthcare Industry -- 6.6.2 Stock Market Uses of Blockchain Technology -- 6.6.3 Financial Exchanges in Blockchain Technology -- 6.6.4 Blockchain in Real Estate -- 6.6.5 Blockchain in Government -- 6.6.6 Other Opportunities in the Industry -- 6.7 Difficulties -- 6.8 Conclusion -- References -- Chapter 7 Explainable Artificial Intelligence for Cybersecurity -- 7.1 Introduction -- 7.1.1 Use of AI in Cybersecurity -- 7.1.2 Limitations of AI -- 7.1.3 Motivation to Integrate XAI to Cybersecurity -- 7.1.4 Contributions -- 7.2 Cyberattacks -- 7.2.1 Phishing Attack -- 7.2.1.1 Spear Phishing -- 7.2.1.2 Whaling -- 7.2.1.3 Smishing -- 7.2.1.4 Pharming -- 7.2.2 Man-in-the-Middle (MITM) Attack -- 7.2.2.1 ARP Spoofing -- 7.2.2.2 DNS Spoofing -- 7.2.2.3 HTTPS Spoofing -- 7.2.2.4 Wi-Fi Eavesdropping -- 7.2.2.5 Session Hijacking -- 7.2.3 Malware Attack -- 7.2.3.1 Ransomware -- 7.2.3.2 Spyware -- 7.2.3.3 Botnet -- 7.2.3.4 Fileless Malware -- 7.2.4 Denial-of-Service Attack -- 7.2.5 Zero-Day Exploit -- 7.2.6 SQL Injection. 7.3 XAI and Its Categorization -- 7.3.1 Intrinsic or Post-Hoc -- 7.3.2 Model-Specific or Model-Agnostic -- 7.3.3 Local or Global -- 7.3.4 Explanation Output -- 7.4 XAI Framework -- 7.4.1 SHAP (SHAPley Additive Explanations) and SHAPley Values -- 7.4.1.1 Computing SHAPley Values -- 7.4.2 LIME - Local Interpretable Model Agnostic Explanations -- 7.4.2.1 Working of LIME -- 7.4.3 ELI5 -- 7.4.4 Skater -- 7.4.5 DALEX -- 7.5 Applications of XAI in Cybersecurity -- 7.5.1 Smart Healthcare -- 7.5.2 Smart Banking -- 7.5.3 Smart Cities -- 7.5.4 Smart Agriculture -- 7.5.5 Transportation -- 7.5.6 Governance -- 7.5.7 Industry 4.0 -- 7.5.8 5G and Beyond Technologies -- 7.6 Challenges of XAI Applications in Cybersecurity -- 7.6.1 Datasets -- 7.6.2 Evaluation -- 7.6.3 Cyber Threats Faced by XAI Models -- 7.6.4 Privacy and Ethical Issues -- 7.7 Future Research Directions -- 7.8 Conclusion -- References -- Chapter 8 AI-Enabled Threat Detection and Security Analysis -- 8.1 Introduction -- 8.1.1 Phishing -- 8.1.2 Features -- 8.1.3 Optimizer Types -- 8.1.4 Gradient Descent -- 8.1.5 Types of Phishing Attack Detection -- 8.2 Literature Survey -- 8.3 Proposed Work -- 8.3.1 Data Collection and Pre-Processing -- 8.3.2 Dataset Description -- 8.3.3 Performance Metrics -- 8.4 System Evaluation -- 8.5 Conclusion -- References -- Chapter 9 Security Risks and Its Preservation Mechanism Using Dynamic Trusted Scheme -- 9.1 Introduction -- 9.1.1 Need of Trust -- 9.1.2 Need of Trust-Based Mechanism in IoT Devices -- 9.1.3 Contribution -- 9.2 Related Work -- 9.3 Proposed Framework -- 9.3.1 Dynamic Trust Updation Model -- 9.3.2 Blockchain Network -- 9.4 Performance Analysis -- 9.4.1 Dataset Description and Simulation Settings -- 9.4.2 Traditional Method and Evaluation Metrics -- 9.5 Results Discussion -- 9.6 Empirical Analysis -- 9.7 Conclusion -- References. Chapter 10 6G Systems in Secure Data Transmission -- 10.1 Introduction -- 10.2 Evolution of 6G -- 10.3 Functionality -- 10.3.1 Security and Privacy Issues -- 10.3.1.1 Artificial Intelligence (AI) -- 10.3.1.2 Molecular Communication -- 10.3.1.3 Quantum Communication -- 10.3.2 Blockchain -- 10.3.3 TeraHertz Technology -- 10.3.4 Visible Light Communication (VLC) -- 10.4 6G Security Architectural Requirements -- 10.5 Future Enhancements -- 10.6 Summary -- References -- Chapter 11 A Trust-Based Information Forwarding Mechanism for IoT Systems -- 11.1 Introduction -- 11.1.1 Need of Security -- 11.1.2 Role of Trust-Based Mechanism in IoT Systems -- 11.1.3 Contribution -- 11.2 Related Works -- 11.3 Estimated Trusted Model -- 11.4 Blockchain Network -- 11.5 Performance Analysis -- 11.5.1 Dataset Description and Simulation Settings -- 11.5.2 Comparison Methods and Evaluation Metrics -- 11.6 Results Discussion -- 11.7 Empirical Analysis -- 11.8 Conclusion -- References -- About the Editors -- Index -- EULA. |
Record Nr. | UNINA-9910877441103321 |
Sountharrajan S | ||
Newark : , : John Wiley & Sons, Incorporated, , 2023 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Wireless Communication Networks and Internet of Things : Select Proceedings of ICNETS2, Volume VI / / edited by Adamu Murtala Zungeru, S Subashini, P Vetrivelan |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XIV, 258 p. 158 illus., 113 illus. in color.) |
Disciplina | 621.384 |
Collana | Lecture Notes in Electrical Engineering |
Soggetto topico |
Wireless communication systems
Mobile communication systems Electronic circuits Electrical engineering Lasers Photonics Wireless and Mobile Communication Circuits and Systems Communications Engineering, Networks Optics, Lasers, Photonics, Optical Devices |
ISBN | 981-10-8663-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | From Terrestrial to Underground Wireless Sensor Networks: Design Factors and Transmission Cost -- Optimal Energy Saving Through Joint Deployment of Relay Station and Sleep Mode Activation in 4g Lte-A Network -- Efficient Relaying for Enhanced Network Longevity for E-Health Iot Services in Medical Body Area Networks -- Gradient-Based Localization and Relay Nodes Selection in Delay tolerant Mobile Opportunistic Networks for Emergency -- Modelling and Performance Analysis of Wifi offloading -- Integrity Verification for Shared Data in Group With User Revocation -- Shortest Path Solution to Wireless Sensor Networks Using Edge Based Three Point Steiner Tree Concept -- Energy Efficient Elliptic Curve Cryptography Based Dtls Key Establishment Protocol for Iot Communication -- Monitoring Sensor Nodes With Cooja Simulator -- Analysis on Lte/Wi-Fi Data offloading in Hetnets -- Contention-Based Csi Feedback Mechanisms in Mu-Mimo Wlans: A Survey -- Synchronization Analysis of Quadratic Chaos Based Dsss-ofdma System With An Interceptional Attack -- Mean Availability Parameter-Based Ddos Detection Mechanism for Cloud Computing Environments -- An Effective Dynamic Slot Allocation Scheme for Wireless Body Area Network -- Enhancement of Security and Confidentiality for D2d Communication in Lte-Advanced Network Using Optimized Protocol -- Efficient Data Collection Using Dynamic Mobile Sink in Wireless Sensor Network -- Dependency Analysis of Control Parameter Configuration on Isd and Random Mobility of Ue in Lte-A Network -- Throughput Analysis of Macroue for Varied Transmit Power of Small Cell in Heterogeneous Network -- Mobile Foolproof Billing At Supermarkets -- Energy Efficient-Based Optimizing Cluster Head Selection By Geometric Based Mechanism and Implementation Using Soft Computing Techniques -- Enhancement of Qos Parameters in Cluster Based Wireless Sensor Network Using Co-Operative Mimo -- Ber Performance Analysis of Short Reference Differential Chaos Shift Keying Scheme Using Various Maps Over Different Channel Conditions -- Nr-Dcsk Based Mimo Chaotic Communication System -- Wearable Sensor Based Human Fall Detection Wireless System -- Mathematical Analysis of Adaptive Queue Length Based Traffic Signal Control -- Wireless Data Acquisition and Communication System for Automated Guided Vehicle -- Energy Efficient Clusterong Protocol for Wireless Sensor Networks. |
Record Nr. | UNINA-9910337598903321 |
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|