top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Wireless broadband : conflict and convergence / / Vern Fotheringham, Chetan Sharma
Wireless broadband : conflict and convergence / / Vern Fotheringham, Chetan Sharma
Autore Fotheringham Vern
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , c2008
Descrizione fisica 1 online resource (277 p.)
Disciplina 384.5
621.384
Altri autori (Persone) SharmaChetan
Collana IEEE series on mobile & digital communication
Soggetto topico Broadband communication systems
Wireless communication systems
ISBN 1-282-11268-6
9786612112683
0-470-38160-4
0-470-38159-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword -- Acknowledgments -- List of Figures -- INTRODUCTION -- 1 WHERE WE ARE--WIRELESS MEETS THE BROADBAND INTERNET -- 2 BROADBAND AND THE INFORMATION SOCIETY -- 3 GLOBAL WIRELESS MARKET ANALYSIS -- 4 THE VIRTUAL DISPLACES THE PHYSICAL -- 5 CONVERGENCE FINALLY ARRIVES -- 6 DRIVERS OF BROADBAND CONSUMPTION -- 7 THE EMERGING INFLUENCE OF THE COMPUTER INDUSTRY -- 8 ALWAYS BEST CONNECTED -- 9 BROADBAND IP CORE NETWORKS -- 10 WIDEBAND 3G TO BROADBAND 4G--COLLISION AND CONVERGENCE OF STANDARDS -- 11 RADIO TECHNOLOGY--MOVING THE GOAL POSTS -- 12 CONTENTION AND CONFLICT--REGULATORY, POLITICAL, FINANCIAL, AND STANDARDS BATTLES -- 13 CONCLUSION -- A WIRELESS BROADBAND GLOSSARY -- B A SCENARIO OF A BROADBAND WIRELESS CUSTOMER,CIRCA 2012 -- C SPECTRUM TABLES--WIRELESS BROADBAND -- About the Authors.
Record Nr. UNINA-9910145956103321
Fotheringham Vern  
Hoboken, New Jersey : , : Wiley, , c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless broadband : conflict and convergence / / Vern Fotheringham, Chetan Sharma
Wireless broadband : conflict and convergence / / Vern Fotheringham, Chetan Sharma
Autore Fotheringham Vern
Pubbl/distr/stampa Hoboken, New Jersey : , : Wiley, , c2008
Descrizione fisica 1 online resource (277 p.)
Disciplina 384.5
621.384
Altri autori (Persone) SharmaChetan
Collana IEEE series on mobile & digital communication
Soggetto topico Broadband communication systems
Wireless communication systems
ISBN 1-282-11268-6
9786612112683
0-470-38160-4
0-470-38159-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword -- Acknowledgments -- List of Figures -- INTRODUCTION -- 1 WHERE WE ARE--WIRELESS MEETS THE BROADBAND INTERNET -- 2 BROADBAND AND THE INFORMATION SOCIETY -- 3 GLOBAL WIRELESS MARKET ANALYSIS -- 4 THE VIRTUAL DISPLACES THE PHYSICAL -- 5 CONVERGENCE FINALLY ARRIVES -- 6 DRIVERS OF BROADBAND CONSUMPTION -- 7 THE EMERGING INFLUENCE OF THE COMPUTER INDUSTRY -- 8 ALWAYS BEST CONNECTED -- 9 BROADBAND IP CORE NETWORKS -- 10 WIDEBAND 3G TO BROADBAND 4G--COLLISION AND CONVERGENCE OF STANDARDS -- 11 RADIO TECHNOLOGY--MOVING THE GOAL POSTS -- 12 CONTENTION AND CONFLICT--REGULATORY, POLITICAL, FINANCIAL, AND STANDARDS BATTLES -- 13 CONCLUSION -- A WIRELESS BROADBAND GLOSSARY -- B A SCENARIO OF A BROADBAND WIRELESS CUSTOMER,CIRCA 2012 -- C SPECTRUM TABLES--WIRELESS BROADBAND -- About the Authors.
Record Nr. UNINA-9910830184403321
Fotheringham Vern  
Hoboken, New Jersey : , : Wiley, , c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless broadband : conflict and convergence / / Vern Fotheringham, Chetan Sharma
Wireless broadband : conflict and convergence / / Vern Fotheringham, Chetan Sharma
Autore Fotheringham Vern
Pubbl/distr/stampa Hoboken, N.J., : Wiley
Descrizione fisica 1 online resource (277 p.)
Disciplina 384.5
621.384
Altri autori (Persone) SharmaChetan
Collana IEEE series on mobile & digital communication
Soggetto topico Broadband communication systems
Wireless communication systems
ISBN 1-282-11268-6
9786612112683
0-470-38160-4
0-470-38159-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Foreword -- Acknowledgments -- List of Figures -- INTRODUCTION -- 1 WHERE WE ARE--WIRELESS MEETS THE BROADBAND INTERNET -- 2 BROADBAND AND THE INFORMATION SOCIETY -- 3 GLOBAL WIRELESS MARKET ANALYSIS -- 4 THE VIRTUAL DISPLACES THE PHYSICAL -- 5 CONVERGENCE FINALLY ARRIVES -- 6 DRIVERS OF BROADBAND CONSUMPTION -- 7 THE EMERGING INFLUENCE OF THE COMPUTER INDUSTRY -- 8 ALWAYS BEST CONNECTED -- 9 BROADBAND IP CORE NETWORKS -- 10 WIDEBAND 3G TO BROADBAND 4G--COLLISION AND CONVERGENCE OF STANDARDS -- 11 RADIO TECHNOLOGY--MOVING THE GOAL POSTS -- 12 CONTENTION AND CONFLICT--REGULATORY, POLITICAL, FINANCIAL, AND STANDARDS BATTLES -- 13 CONCLUSION -- A WIRELESS BROADBAND GLOSSARY -- B A SCENARIO OF A BROADBAND WIRELESS CUSTOMER,CIRCA 2012 -- C SPECTRUM TABLES--WIRELESS BROADBAND -- About the Authors.
Record Nr. UNINA-9910876744703321
Fotheringham Vern  
Hoboken, N.J., : Wiley
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless broadband networks / / David Tung Chong Wong ... [et al.]
Wireless broadband networks / / David Tung Chong Wong ... [et al.]
Pubbl/distr/stampa Hoboken, New Jersey : , : John Wiley & Sons, , c2009
Descrizione fisica 1 online resource (526 p.)
Disciplina 621.384
Altri autori (Persone) WongDavid Tung Chong
Soggetto topico Wireless communication systems
Broadband communication systems
ISBN 1-282-13714-X
9786612137143
0-470-43494-5
0-470-43493-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Orthogonal frequency-division multiplexing and other block-based transmissions -- Multiple-input, multiple-output antenna systems -- Ultrawideband -- Medium access control -- Mobility resource management -- Routing protocols for mulihop wireless broadband networks -- Radio resource management for wireless broadband networks -- Quality of service for multimedia services -- Long-term-evolution cellular networks -- Wireless broadband networking with WiMAX -- Wireless local area networks -- Wireless personal area networks -- Convergence of networks -- Appendix : Basics of probability, random variables, random processes, and queueing systems.
Record Nr. UNINA-9910145962003321
Hoboken, New Jersey : , : John Wiley & Sons, , c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless broadband networks / / David Tung Chong Wong ... [et al.]
Wireless broadband networks / / David Tung Chong Wong ... [et al.]
Edizione [1st ed.]
Pubbl/distr/stampa Hoboken, N.J., : John Wiley & Sons, 2009
Descrizione fisica 1 online resource (526 p.)
Disciplina 621.384
Altri autori (Persone) WongDavid Tung Chong
Soggetto topico Wireless communication systems
Broadband communication systems
ISBN 1-282-13714-X
9786612137143
0-470-43494-5
0-470-43493-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Orthogonal frequency-division multiplexing and other block-based transmissions -- Multiple-input, multiple-output antenna systems -- Ultrawideband -- Medium access control -- Mobility resource management -- Routing protocols for mulihop wireless broadband networks -- Radio resource management for wireless broadband networks -- Quality of service for multimedia services -- Long-term-evolution cellular networks -- Wireless broadband networking with WiMAX -- Wireless local area networks -- Wireless personal area networks -- Convergence of networks -- Appendix : Basics of probability, random variables, random processes, and queueing systems.
Record Nr. UNINA-9910825508803321
Hoboken, N.J., : John Wiley & Sons, 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless coexistence : standards, challenges, and intelligent solutions / / Daniel Chew, Andrew Adams, Jason Uher
Wireless coexistence : standards, challenges, and intelligent solutions / / Daniel Chew, Andrew Adams, Jason Uher
Autore Chew Daniel (Electrical engineer)
Pubbl/distr/stampa Hoboken, New Jersey : , : The Institute of Electrical and Electronics Engineers, Inc., , [2021]
Descrizione fisica 1 online resource (338 pages)
Disciplina 621.384
Soggetto topico Transmission sans fil
Wireless communication systems
ISBN 1-119-58412-4
1-119-58423-X
1-119-58422-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Copyright Page -- Contents -- Author Biographies -- Preface -- Acknowledgments -- Chapter 1 Introduction -- 1.1 A Primer on Wireless Coexistence: The Electromagnetic Spectrum as a Shared Resource -- 1.1.1 Basic Description of Spectrum Use and Interference -- 1.1.2 Understanding What It Means to Occupy a Band -- 1.1.3 Spectral Masks -- 1.1.4 Bandwidth and Information Rate -- 1.1.5 Benefits of Different Frequencies -- 1.2 The Role of Standardization in Wireless Coexistence -- 1.3 An Overview of Wireless Coexistence Strategies -- 1.3.1 Separation Strategies -- 1.3.2 Mitigation Strategies -- 1.3.3 Monitoring Strategies -- 1.3.4 Sensing Strategies -- 1.3.5 Collaboration Strategies -- 1.3.6 Combining the Strategies -- 1.4 Standards Covered in this Book -- 1.5 1900.1 as a Baseline Taxonomy -- 1.5.1 Advanced Radio System Concepts -- 1.5.2 Radio Capabilities -- 1.5.3 Network Types -- 1.5.4 Spectrum Management -- 1.6 Organization of this Work -- References -- Chapter 2 Regulation for Wireless Coexistence -- 2.1 Traditional Frequency Assignment -- 2.1.1 How Did It Work -- 2.1.2 History of Allocations in the United States -- 2.1.3 History of Spectrum Sharing -- 2.1.4 Mobile Phone Explosion -- 2.1.5 Wireless Networking -- 2.1.6 Future Allocations for Coexistence -- 2.2 Policies and Regulations -- 2.2.1 Spectrum Rights and Digital Commons -- 2.2.2 Spectrum Coordination (Both Licensed and Unlicensed) -- 2.2.3 Case Study in Spectrum Reallocation -- 2.3 Bands for Unlicensed Use -- 2.3.1 Overview of Unlicensed Use -- 2.3.2 Voice and Other Restricted but Unlicensed Bands -- 2.3.3 Industrial, Scientific, and Medical Band -- 2.3.4 TV White space -- 2.3.5 CBRS -- References -- Chapter 3 Concepts in Communications Theory -- 3.1 Types of Channels and Related Terminology -- 3.2 Types of Interference and Related Terminology.
3.3 Types of Networks and Related Terminology -- 3.4 Primer on Noise -- 3.5 Primer on Propagation -- 3.6 Primer on Orthogonal Frequency Division Multiplexing -- 3.6.1 Complex-Valued Waveforms -- 3.6.2 Symbol Mapping and Linear Modulation -- 3.6.3 Orthogonal Subcarriers -- 3.6.4 Modulating the Subcarriers -- 3.6.5 Assigning the Subcarriers -- 3.6.6 Further Reading on OFDM -- 3.7 Direct-Conversion Transceivers -- References -- Chapter 4 Mitigating Contention in Equal-Priority Access -- 4.1 Designating Spectrum Resources -- 4.2 Interference, Conflict, and Collisions -- 4.3 What Is a Primary User? -- 4.4 Tiers of Users -- 4.5 Unlicensed Users -- 4.6 Contention in Spectrum Access and Mitigation Techniques -- 4.7 Division of Responsibility among the Protocol Layers -- 4.8 Duplexing -- 4.9 Multiple Access and Multiplexing -- 4.10 Frequency and Time Division Multiple Access -- 4.11 Spectral Masks Defined in Standards -- 4.12 Spread Spectrum Techniques -- 4.12.1 Frequency Hopping -- 4.12.2 Adaptive Frequency Hopping -- 4.12.3 Direct Sequence Spread Spectrum and Code Division Multiple Access -- 4.13 Carrier Sense Multiple Access -- 4.13.1 Collision Avoidance -- 4.14 Orthogonal Frequency Division Multiple Access -- 4.15 Final Thoughts -- References -- Chapter 5 Secondary Spectrum Usage and Signal Detection -- 5.1 Spectrum Occupancy and White Space -- 5.2 Secondary Users -- 5.3 Signal Detection -- 5.3.1 Binary Hypothesis Testing -- 5.3.2 A Generic Framework for Signal Detection -- 5.3.3 Feature Selection -- 5.3.4 Maximum Likelihood Detector -- 5.3.5 Maximum A Posteriori (MAP) Detector -- 5.3.6 Probability of Error -- 5.3.7 Choosing the Threshold for a False Alarm Rate -- 5.3.8 Choosing Threshold for a Missed Detect Rate -- 5.3.9 Noise Power Estimation -- 5.4 Energy Detector -- 5.4.1 Single-Channel Operation -- 5.4.2 Multichannel Operation.
5.5 Known Pattern Detector -- 5.5.1 Calculation in the Time-Domain -- 5.5.2 Calculating the Decision Metric with no Phase Offset -- 5.5.3 Calculating the Decision Metric with a Constant Phase Offset -- 5.5.4 Calculating the Decision Metric with a Constant Frequency Offset -- 5.6 Cyclic Spectral Analysis -- 5.6.1 Motivation -- 5.6.2 Spectral Correlation Density -- 5.6.3 Bifrequency Plane -- 5.6.4 Implementation -- 5.7 Final Thoughts -- References -- Chapter 6 Intelligent Radio Concepts -- 6.1 Introduction -- 6.1.1 Motivation -- 6.1.2 Definitions -- 6.2 Intelligent Radio Use-Cases -- 6.3 The Cognitive Cycle -- 6.4 Making Radios Intelligent -- 6.5 Intelligent Radio Architectures -- 6.5.1 Cognitive Resource Manager Framework -- 6.5.2 IEEE 1900.4 -- 6.6 Learning Algorithms -- 6.6.1 Artificial Neural Networks -- 6.6.2 Markov Models -- 6.6.3 Reinforcement Learning -- 6.7 Looking Forward -- References -- Chapter 7 Coexistence Standards in IEEE 1900 -- 7.1 DySPAN Standards Committee (IEEE P1900) -- 7.1.1 History -- 7.1.2 The Working Groups´ Overview -- 7.1.3 1900.1 Working Group -- 7.1.4 1900.2 Working Group -- 7.1.5 1900.4 Working Group -- 7.1.6 1900.5 Working Group -- 7.1.7 1900.6 Working Group -- 7.1.8 1900.7 Working Group -- References -- Chapter 8 Coexistence Standards in IEEE 802 -- 8.1 The Standards to Be Addressed in this Chapter -- 8.2 Types and Spatial Scope of Wireless Networks -- 8.3 Stacks: The Structure of Wireless Protocol Standards -- 8.4 IEEE 802.22 -- 8.4.1 The Data Plane -- 8.4.2 The Control Plane -- 8.4.3 The Cognitive Plane -- 8.4.4 Distributed Sensing -- 8.4.5 Sensing Techniques -- 8.5 IEEE 802.11 -- 8.5.1 A Brief History of the IEEE 802.11 Standards -- 8.5.2 The Evolution of Wi-Fi -- 8.5.3 Wi-Fi Channelization in the 2.4GHz Band -- 8.5.4 Carrier Sensing -- 8.5.5 Wi-Fi as TV White Space Access -- 8.5.6 Comparison of 802.11af and 802.22.
8.6 TVWS Geolocation Databases in the United States -- 8.7 IEEE 802.19.1 -- 8.8 IEEE 802.15.2 -- References -- Chapter 9 LTE Carrier Aggregation and Unlicensed Access -- 9.1 Introduction -- 9.2 3G to LTE -- 9.3 LTE Coexistence Strategies -- 9.4 LAA Motivation -- 9.5 LTE Overview -- 9.5.1 Evolved Packet System -- 9.5.2 Evolved Packet Core -- 9.5.3 Radio Access Network -- 9.5.4 Air Interface -- 9.6 Carrier Aggregation -- 9.7 License-Assisted Access -- 9.7.1 Basic Concepts -- 9.7.2 Deployment Scenarios -- 9.7.3 LAA Coexistence Mechanisms -- 9.8 Deployment Status -- 9.9 Conclusions -- References -- Chapter 10 Conclusion and Future Trends -- 10.1 Summary of the Preceding Chapters -- 10.2 Nonorthogonal Multiple Access and Underlaying -- 10.2.1 Nonorthogonal Multiple Access -- 10.2.2 Underlaying for Secondary Users -- 10.2.3 Implementation Issues -- 10.2.4 The Future of NOMA and Underlaying -- 10.3 Intelligent Collaborative Radio Networks -- 10.4 Validation and Verification of Intelligent Radios -- 10.4.1 Case Study: The DARPA Colosseum -- 10.5 Spectrum Sharing Utopia -- 10.5.1 Major Hurdles for Spectrum Utopia -- 10.5.2 Pathways to an Optimally Utilized Future -- 10.6 Conclusion -- References -- Index -- EULA.
Record Nr. UNINA-9910554875303321
Chew Daniel (Electrical engineer)  
Hoboken, New Jersey : , : The Institute of Electrical and Electronics Engineers, Inc., , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless coexistence : standards, challenges, and intelligent solutions / / Daniel Chew, Andrew Adams, Jason Uher
Wireless coexistence : standards, challenges, and intelligent solutions / / Daniel Chew, Andrew Adams, Jason Uher
Autore Chew Daniel (Electrical engineer)
Pubbl/distr/stampa Hoboken, New Jersey : , : The Institute of Electrical and Electronics Engineers, Inc., , [2021]
Descrizione fisica 1 online resource (338 pages)
Disciplina 621.384
Soggetto topico Transmission sans fil
Wireless communication systems
ISBN 1-119-58412-4
1-119-58423-X
1-119-58422-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Copyright Page -- Contents -- Author Biographies -- Preface -- Acknowledgments -- Chapter 1 Introduction -- 1.1 A Primer on Wireless Coexistence: The Electromagnetic Spectrum as a Shared Resource -- 1.1.1 Basic Description of Spectrum Use and Interference -- 1.1.2 Understanding What It Means to Occupy a Band -- 1.1.3 Spectral Masks -- 1.1.4 Bandwidth and Information Rate -- 1.1.5 Benefits of Different Frequencies -- 1.2 The Role of Standardization in Wireless Coexistence -- 1.3 An Overview of Wireless Coexistence Strategies -- 1.3.1 Separation Strategies -- 1.3.2 Mitigation Strategies -- 1.3.3 Monitoring Strategies -- 1.3.4 Sensing Strategies -- 1.3.5 Collaboration Strategies -- 1.3.6 Combining the Strategies -- 1.4 Standards Covered in this Book -- 1.5 1900.1 as a Baseline Taxonomy -- 1.5.1 Advanced Radio System Concepts -- 1.5.2 Radio Capabilities -- 1.5.3 Network Types -- 1.5.4 Spectrum Management -- 1.6 Organization of this Work -- References -- Chapter 2 Regulation for Wireless Coexistence -- 2.1 Traditional Frequency Assignment -- 2.1.1 How Did It Work -- 2.1.2 History of Allocations in the United States -- 2.1.3 History of Spectrum Sharing -- 2.1.4 Mobile Phone Explosion -- 2.1.5 Wireless Networking -- 2.1.6 Future Allocations for Coexistence -- 2.2 Policies and Regulations -- 2.2.1 Spectrum Rights and Digital Commons -- 2.2.2 Spectrum Coordination (Both Licensed and Unlicensed) -- 2.2.3 Case Study in Spectrum Reallocation -- 2.3 Bands for Unlicensed Use -- 2.3.1 Overview of Unlicensed Use -- 2.3.2 Voice and Other Restricted but Unlicensed Bands -- 2.3.3 Industrial, Scientific, and Medical Band -- 2.3.4 TV White space -- 2.3.5 CBRS -- References -- Chapter 3 Concepts in Communications Theory -- 3.1 Types of Channels and Related Terminology -- 3.2 Types of Interference and Related Terminology.
3.3 Types of Networks and Related Terminology -- 3.4 Primer on Noise -- 3.5 Primer on Propagation -- 3.6 Primer on Orthogonal Frequency Division Multiplexing -- 3.6.1 Complex-Valued Waveforms -- 3.6.2 Symbol Mapping and Linear Modulation -- 3.6.3 Orthogonal Subcarriers -- 3.6.4 Modulating the Subcarriers -- 3.6.5 Assigning the Subcarriers -- 3.6.6 Further Reading on OFDM -- 3.7 Direct-Conversion Transceivers -- References -- Chapter 4 Mitigating Contention in Equal-Priority Access -- 4.1 Designating Spectrum Resources -- 4.2 Interference, Conflict, and Collisions -- 4.3 What Is a Primary User? -- 4.4 Tiers of Users -- 4.5 Unlicensed Users -- 4.6 Contention in Spectrum Access and Mitigation Techniques -- 4.7 Division of Responsibility among the Protocol Layers -- 4.8 Duplexing -- 4.9 Multiple Access and Multiplexing -- 4.10 Frequency and Time Division Multiple Access -- 4.11 Spectral Masks Defined in Standards -- 4.12 Spread Spectrum Techniques -- 4.12.1 Frequency Hopping -- 4.12.2 Adaptive Frequency Hopping -- 4.12.3 Direct Sequence Spread Spectrum and Code Division Multiple Access -- 4.13 Carrier Sense Multiple Access -- 4.13.1 Collision Avoidance -- 4.14 Orthogonal Frequency Division Multiple Access -- 4.15 Final Thoughts -- References -- Chapter 5 Secondary Spectrum Usage and Signal Detection -- 5.1 Spectrum Occupancy and White Space -- 5.2 Secondary Users -- 5.3 Signal Detection -- 5.3.1 Binary Hypothesis Testing -- 5.3.2 A Generic Framework for Signal Detection -- 5.3.3 Feature Selection -- 5.3.4 Maximum Likelihood Detector -- 5.3.5 Maximum A Posteriori (MAP) Detector -- 5.3.6 Probability of Error -- 5.3.7 Choosing the Threshold for a False Alarm Rate -- 5.3.8 Choosing Threshold for a Missed Detect Rate -- 5.3.9 Noise Power Estimation -- 5.4 Energy Detector -- 5.4.1 Single-Channel Operation -- 5.4.2 Multichannel Operation.
5.5 Known Pattern Detector -- 5.5.1 Calculation in the Time-Domain -- 5.5.2 Calculating the Decision Metric with no Phase Offset -- 5.5.3 Calculating the Decision Metric with a Constant Phase Offset -- 5.5.4 Calculating the Decision Metric with a Constant Frequency Offset -- 5.6 Cyclic Spectral Analysis -- 5.6.1 Motivation -- 5.6.2 Spectral Correlation Density -- 5.6.3 Bifrequency Plane -- 5.6.4 Implementation -- 5.7 Final Thoughts -- References -- Chapter 6 Intelligent Radio Concepts -- 6.1 Introduction -- 6.1.1 Motivation -- 6.1.2 Definitions -- 6.2 Intelligent Radio Use-Cases -- 6.3 The Cognitive Cycle -- 6.4 Making Radios Intelligent -- 6.5 Intelligent Radio Architectures -- 6.5.1 Cognitive Resource Manager Framework -- 6.5.2 IEEE 1900.4 -- 6.6 Learning Algorithms -- 6.6.1 Artificial Neural Networks -- 6.6.2 Markov Models -- 6.6.3 Reinforcement Learning -- 6.7 Looking Forward -- References -- Chapter 7 Coexistence Standards in IEEE 1900 -- 7.1 DySPAN Standards Committee (IEEE P1900) -- 7.1.1 History -- 7.1.2 The Working Groups´ Overview -- 7.1.3 1900.1 Working Group -- 7.1.4 1900.2 Working Group -- 7.1.5 1900.4 Working Group -- 7.1.6 1900.5 Working Group -- 7.1.7 1900.6 Working Group -- 7.1.8 1900.7 Working Group -- References -- Chapter 8 Coexistence Standards in IEEE 802 -- 8.1 The Standards to Be Addressed in this Chapter -- 8.2 Types and Spatial Scope of Wireless Networks -- 8.3 Stacks: The Structure of Wireless Protocol Standards -- 8.4 IEEE 802.22 -- 8.4.1 The Data Plane -- 8.4.2 The Control Plane -- 8.4.3 The Cognitive Plane -- 8.4.4 Distributed Sensing -- 8.4.5 Sensing Techniques -- 8.5 IEEE 802.11 -- 8.5.1 A Brief History of the IEEE 802.11 Standards -- 8.5.2 The Evolution of Wi-Fi -- 8.5.3 Wi-Fi Channelization in the 2.4GHz Band -- 8.5.4 Carrier Sensing -- 8.5.5 Wi-Fi as TV White Space Access -- 8.5.6 Comparison of 802.11af and 802.22.
8.6 TVWS Geolocation Databases in the United States -- 8.7 IEEE 802.19.1 -- 8.8 IEEE 802.15.2 -- References -- Chapter 9 LTE Carrier Aggregation and Unlicensed Access -- 9.1 Introduction -- 9.2 3G to LTE -- 9.3 LTE Coexistence Strategies -- 9.4 LAA Motivation -- 9.5 LTE Overview -- 9.5.1 Evolved Packet System -- 9.5.2 Evolved Packet Core -- 9.5.3 Radio Access Network -- 9.5.4 Air Interface -- 9.6 Carrier Aggregation -- 9.7 License-Assisted Access -- 9.7.1 Basic Concepts -- 9.7.2 Deployment Scenarios -- 9.7.3 LAA Coexistence Mechanisms -- 9.8 Deployment Status -- 9.9 Conclusions -- References -- Chapter 10 Conclusion and Future Trends -- 10.1 Summary of the Preceding Chapters -- 10.2 Nonorthogonal Multiple Access and Underlaying -- 10.2.1 Nonorthogonal Multiple Access -- 10.2.2 Underlaying for Secondary Users -- 10.2.3 Implementation Issues -- 10.2.4 The Future of NOMA and Underlaying -- 10.3 Intelligent Collaborative Radio Networks -- 10.4 Validation and Verification of Intelligent Radios -- 10.4.1 Case Study: The DARPA Colosseum -- 10.5 Spectrum Sharing Utopia -- 10.5.1 Major Hurdles for Spectrum Utopia -- 10.5.2 Pathways to an Optimally Utilized Future -- 10.6 Conclusion -- References -- Index -- EULA.
Record Nr. UNINA-9910829892703321
Chew Daniel (Electrical engineer)  
Hoboken, New Jersey : , : The Institute of Electrical and Electronics Engineers, Inc., , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless communication electronics : introduction to RF circuits and design techniques / / Robert Sobot
Wireless communication electronics : introduction to RF circuits and design techniques / / Robert Sobot
Autore Sobot Robert
Edizione [2nd ed. 2021.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (XX, 522 p. 364 illus., 287 illus. in color.)
Disciplina 621.384
Soggetto topico Wireless communication systems
Radio frequency integrated circuits
Radio frequency integrated circuits - Design and construction
ISBN 3-030-48630-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Part I.Basic concepts and definitions -- Chapter 1. Introduction -- Chapter 2.Basic behavioral and device models -- Chapter 3. Multistage Interface -- Chapter 4. Basic Semiconductor Devices -- Chapter 5. Transistor Biasing -- Chapter 6. Review of Basic Amplifiers -- Chapter 7. Introduction to frequency analysis of amplifiers -- Chapter 8. Electrical Noise -- Part II. Radio receiver circuit -- Chapter 9. Radio receiver architecture -- Chapter 10. Electrical Resonance -- Chapter 11. Matching Networks -- Chapter 12. RF and IF Amplifiers -- Chapter 13. Sinusoidal Oscillators -- Chapter 14. Frequency Shifting -- Chapter 15. Modulation -- Chapter 16. AM and FM Signal Demodulation -- Chapter 17. RF Receivers.
Record Nr. UNINA-9910483614003321
Sobot Robert  
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless Communication in Cyber Security
Wireless Communication in Cyber Security
Autore Sountharrajan S
Edizione [1st ed.]
Pubbl/distr/stampa Newark : , : John Wiley & Sons, Incorporated, , 2023
Descrizione fisica 1 online resource (284 pages)
Disciplina 005.8
Altri autori (Persone) MaheswarR
RatheeGeetanjali
AkilaM
Collana Advances in antenna, microwave, and communication engineering
Soggetto topico Computer security
Wireless communication systems
ISBN 1-119-91061-7
1-119-91060-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover -- Title Page -- Copyright Page -- Contents -- Preface -- Chapter 1 BBUCAF: A Biometric-Based User Clustering Authentication Framework in Wireless Sensor Network -- 1.1 Introduction to Wireless Sensor Network -- 1.2 Background Study -- 1.3 A Biometric-Based User Clustering Authentication Framework -- 1.3.1 Biometric-Based Model -- 1.3.2 Clustering -- 1.4 Experimental Analysis -- 1.5 Conclusion -- References -- Chapter 2 DeepNet: Dynamic Detection of Malwares Using Deep Learning Techniques -- 2.1 Introduction -- 2.2 Literature Survey -- 2.2.1 ML or Metaheuristic Methods for Malware Detection -- 2.2.2 Deep Learning Algorithms for Malware Detection -- 2.3 Malware Datasets -- 2.3.1 Android Malware Dataset -- 2.3.2 SOREL-20M Dataset -- 2.4 Deep Learning Architecture -- 2.4.1 Deep Neural Networks (DNN) -- 2.4.2 Convolutional Neural Networks (CNN) -- 2.4.3 Recurrent Neural Networks (RNN) -- 2.4.4 Deep Belief Networks (DBN) -- 2.4.5 Stacked Autoencoders (SAE) -- 2.5 Proposed System -- 2.5.1 Datasets Used -- 2.5.2 System Architecture -- 2.5.3 Data Preprocessing -- 2.5.4 Proposed Methodology -- 2.5.5 DeepNet -- 2.5.6 DBN -- 2.5.7 SAE -- 2.5.8 Categorisation -- 2.6 Result and Analysis -- 2.7 Conclusion & -- Future Work -- References -- Chapter 3 State of Art of Security and Risk in Wireless Environment Along with Healthcare Case Study -- 3.1 Introduction -- 3.2 Literature Survey -- 3.3 Applications of Wireless Networks -- 3.4 Types of Attacks -- 3.4.1 Passive Attacks -- 3.4.2 Release of Message Contents -- 3.4.3 Traffic Analysis -- 3.4.4 Eavesdropping -- 3.5 Active Attacks -- 3.5.1 Malware -- 3.5.2 Password Theft -- 3.5.3 Bandwidth Stealing -- 3.5.4 Phishing Attacks -- 3.5.5 DDoS -- 3.5.6 Cross-Site Attack -- 3.5.7 Ransomware -- 3.5.8 Message Modification -- 3.5.9 Message Replay -- 3.5.10 Masquerade -- 3.6 Layered Attacks in WSN.
3.6.1 Attacks in Physical Layer -- 3.6.2 Attacks in Data Link Layer -- 3.6.3 Attacks in Network Layer -- 3.6.4 Attacks in Transport Layer -- 3.6.5 Attacks in Application Layer -- 3.7 Security Models -- 3.7.1 Bio-Inspired Trust and Reputation Model -- 3.7.2 Peer Trust System -- 3.8 Case Study: Healthcare -- 3.8.1 Security Risks in Healthcare -- 3.8.2 Prevention from Security Attacks in Healthcare -- 3.9 Minimize the Risks in a Wireless Environment -- 3.9.1 Generate Strong Passwords -- 3.9.2 Change Default Wi-Fi Username and Password -- 3.9.3 Use Updated Antivirus -- 3.9.4 Send Confidential Files with Passwords -- 3.9.5 Detect the Intruders -- 3.9.6 Encrypt Network -- 3.9.7 Avoid Sharing Files Through Public Wi-Fi -- 3.9.8 Provide Access to Authorized Users -- 3.9.9 Used a Wireless Controller -- 3.10 Conclusion -- References -- Chapter 4 Machine Learning-Based Malicious Threat Detection and Security Analysis on Software-Defined Networking for Industry 4.0 -- 4.1 Introduction -- 4.1.1 Software-Defined Network -- 4.1.2 Types of Attacks -- 4.1.2.1 Denial of Services -- 4.1.2.2 Distributed Denial of Service -- 4.2 Related Works -- 4.3 Proposed Work for Threat Detection and Security Analysis -- 4.3.1 Traffic Collection -- 4.3.1.1 Data Flow Monitoring and Data Collection -- 4.3.1.2 Purpose of Data Flow Monitoring and Data Collection -- 4.3.1.3 Types of Collection -- 4.3.2 Feature Selection Using Entropy -- 4.3.3 Malicious Traffic Detection -- 4.3.3.1 Framing of the Expected Traffic Status -- 4.3.3.2 Traffic Filtering Using Regression -- 4.3.4 Traffic Mitigation -- 4.4 Implementation and Results -- 4.5 Conclusion -- References -- Chapter 5 Privacy Enhancement for Wireless Sensor Networks and the Internet of Things Based on Cryptological Techniques -- 5.1 Introduction -- 5.2 System Architecture -- 5.3 Literature Review -- 5.4 Proposed Methodology.
5.5 Results and Discussion -- 5.6 Analysis of Various Security and Assaults -- 5.7 Conclusion -- References -- Chapter 6 Security and Confidentiality Concerns in Blockchain Technology: A Review -- 6.1 Introduction -- 6.2 Blockchain Technology -- 6.3 Blockchain Revolution Drivers -- 6.3.1 Transparent, Decentralised Consensus -- 6.3.2 Model of Agreement(s) -- 6.3.3 Immutability and Security -- 6.3.4 Anonymity and Automation -- 6.3.5 Impact on Business, Regulation, and Services -- 6.3.6 Access and Identity -- 6.4 Blockchain Classification -- 6.4.1 Public Blockchain -- 6.4.2 Private Blockchain -- 6.4.3 Blockchain Consortium -- 6.5 Blockchain Components and Operation -- 6.5.1 Data -- 6.5.2 Hash -- 6.5.3 MD5 -- 6.5.4 SHA 256 -- 6.5.5 MD5 vs. SHA-256 -- 6.6 Blockchain Technology Applications -- 6.6.1 Blockchain Technology in the Healthcare Industry -- 6.6.2 Stock Market Uses of Blockchain Technology -- 6.6.3 Financial Exchanges in Blockchain Technology -- 6.6.4 Blockchain in Real Estate -- 6.6.5 Blockchain in Government -- 6.6.6 Other Opportunities in the Industry -- 6.7 Difficulties -- 6.8 Conclusion -- References -- Chapter 7 Explainable Artificial Intelligence for Cybersecurity -- 7.1 Introduction -- 7.1.1 Use of AI in Cybersecurity -- 7.1.2 Limitations of AI -- 7.1.3 Motivation to Integrate XAI to Cybersecurity -- 7.1.4 Contributions -- 7.2 Cyberattacks -- 7.2.1 Phishing Attack -- 7.2.1.1 Spear Phishing -- 7.2.1.2 Whaling -- 7.2.1.3 Smishing -- 7.2.1.4 Pharming -- 7.2.2 Man-in-the-Middle (MITM) Attack -- 7.2.2.1 ARP Spoofing -- 7.2.2.2 DNS Spoofing -- 7.2.2.3 HTTPS Spoofing -- 7.2.2.4 Wi-Fi Eavesdropping -- 7.2.2.5 Session Hijacking -- 7.2.3 Malware Attack -- 7.2.3.1 Ransomware -- 7.2.3.2 Spyware -- 7.2.3.3 Botnet -- 7.2.3.4 Fileless Malware -- 7.2.4 Denial-of-Service Attack -- 7.2.5 Zero-Day Exploit -- 7.2.6 SQL Injection.
7.3 XAI and Its Categorization -- 7.3.1 Intrinsic or Post-Hoc -- 7.3.2 Model-Specific or Model-Agnostic -- 7.3.3 Local or Global -- 7.3.4 Explanation Output -- 7.4 XAI Framework -- 7.4.1 SHAP (SHAPley Additive Explanations) and SHAPley Values -- 7.4.1.1 Computing SHAPley Values -- 7.4.2 LIME - Local Interpretable Model Agnostic Explanations -- 7.4.2.1 Working of LIME -- 7.4.3 ELI5 -- 7.4.4 Skater -- 7.4.5 DALEX -- 7.5 Applications of XAI in Cybersecurity -- 7.5.1 Smart Healthcare -- 7.5.2 Smart Banking -- 7.5.3 Smart Cities -- 7.5.4 Smart Agriculture -- 7.5.5 Transportation -- 7.5.6 Governance -- 7.5.7 Industry 4.0 -- 7.5.8 5G and Beyond Technologies -- 7.6 Challenges of XAI Applications in Cybersecurity -- 7.6.1 Datasets -- 7.6.2 Evaluation -- 7.6.3 Cyber Threats Faced by XAI Models -- 7.6.4 Privacy and Ethical Issues -- 7.7 Future Research Directions -- 7.8 Conclusion -- References -- Chapter 8 AI-Enabled Threat Detection and Security Analysis -- 8.1 Introduction -- 8.1.1 Phishing -- 8.1.2 Features -- 8.1.3 Optimizer Types -- 8.1.4 Gradient Descent -- 8.1.5 Types of Phishing Attack Detection -- 8.2 Literature Survey -- 8.3 Proposed Work -- 8.3.1 Data Collection and Pre-Processing -- 8.3.2 Dataset Description -- 8.3.3 Performance Metrics -- 8.4 System Evaluation -- 8.5 Conclusion -- References -- Chapter 9 Security Risks and Its Preservation Mechanism Using Dynamic Trusted Scheme -- 9.1 Introduction -- 9.1.1 Need of Trust -- 9.1.2 Need of Trust-Based Mechanism in IoT Devices -- 9.1.3 Contribution -- 9.2 Related Work -- 9.3 Proposed Framework -- 9.3.1 Dynamic Trust Updation Model -- 9.3.2 Blockchain Network -- 9.4 Performance Analysis -- 9.4.1 Dataset Description and Simulation Settings -- 9.4.2 Traditional Method and Evaluation Metrics -- 9.5 Results Discussion -- 9.6 Empirical Analysis -- 9.7 Conclusion -- References.
Chapter 10 6G Systems in Secure Data Transmission -- 10.1 Introduction -- 10.2 Evolution of 6G -- 10.3 Functionality -- 10.3.1 Security and Privacy Issues -- 10.3.1.1 Artificial Intelligence (AI) -- 10.3.1.2 Molecular Communication -- 10.3.1.3 Quantum Communication -- 10.3.2 Blockchain -- 10.3.3 TeraHertz Technology -- 10.3.4 Visible Light Communication (VLC) -- 10.4 6G Security Architectural Requirements -- 10.5 Future Enhancements -- 10.6 Summary -- References -- Chapter 11 A Trust-Based Information Forwarding Mechanism for IoT Systems -- 11.1 Introduction -- 11.1.1 Need of Security -- 11.1.2 Role of Trust-Based Mechanism in IoT Systems -- 11.1.3 Contribution -- 11.2 Related Works -- 11.3 Estimated Trusted Model -- 11.4 Blockchain Network -- 11.5 Performance Analysis -- 11.5.1 Dataset Description and Simulation Settings -- 11.5.2 Comparison Methods and Evaluation Metrics -- 11.6 Results Discussion -- 11.7 Empirical Analysis -- 11.8 Conclusion -- References -- About the Editors -- Index -- EULA.
Record Nr. UNINA-9910877441103321
Sountharrajan S  
Newark : , : John Wiley & Sons, Incorporated, , 2023
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Wireless Communication Networks and Internet of Things : Select Proceedings of ICNETS2, Volume VI / / edited by Adamu Murtala Zungeru, S Subashini, P Vetrivelan
Wireless Communication Networks and Internet of Things : Select Proceedings of ICNETS2, Volume VI / / edited by Adamu Murtala Zungeru, S Subashini, P Vetrivelan
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIV, 258 p. 158 illus., 113 illus. in color.)
Disciplina 621.384
Collana Lecture Notes in Electrical Engineering
Soggetto topico Wireless communication systems
Mobile communication systems
Electronic circuits
Electrical engineering
Lasers
Photonics
Wireless and Mobile Communication
Circuits and Systems
Communications Engineering, Networks
Optics, Lasers, Photonics, Optical Devices
ISBN 981-10-8663-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto From Terrestrial to Underground Wireless Sensor Networks: Design Factors and Transmission Cost -- Optimal Energy Saving Through Joint Deployment of Relay Station and Sleep Mode Activation in 4g Lte-A Network -- Efficient Relaying for Enhanced Network Longevity for E-Health Iot Services in Medical Body Area Networks -- Gradient-Based Localization and Relay Nodes Selection in Delay tolerant Mobile Opportunistic Networks for Emergency -- Modelling and Performance Analysis of Wifi offloading -- Integrity Verification for Shared Data in Group With User Revocation -- Shortest Path Solution to Wireless Sensor Networks Using Edge Based Three Point Steiner Tree Concept -- Energy Efficient Elliptic Curve Cryptography Based Dtls Key Establishment Protocol for Iot Communication -- Monitoring Sensor Nodes With Cooja Simulator -- Analysis on Lte/Wi-Fi Data offloading in Hetnets -- Contention-Based Csi Feedback Mechanisms in Mu-Mimo Wlans: A Survey -- Synchronization Analysis of Quadratic Chaos Based Dsss-ofdma System With An Interceptional Attack -- Mean Availability Parameter-Based Ddos Detection Mechanism for Cloud Computing Environments -- An Effective Dynamic Slot Allocation Scheme for Wireless Body Area Network -- Enhancement of Security and Confidentiality for D2d Communication in Lte-Advanced Network Using Optimized Protocol -- Efficient Data Collection Using Dynamic Mobile Sink in Wireless Sensor Network -- Dependency Analysis of Control Parameter Configuration on Isd and Random Mobility of Ue in Lte-A Network -- Throughput Analysis of Macroue for Varied Transmit Power of Small Cell in Heterogeneous Network -- Mobile Foolproof Billing At Supermarkets -- Energy Efficient-Based Optimizing Cluster Head Selection By Geometric Based Mechanism and Implementation Using Soft Computing Techniques -- Enhancement of Qos Parameters in Cluster Based Wireless Sensor Network Using Co-Operative Mimo -- Ber Performance Analysis of Short Reference Differential Chaos Shift Keying Scheme Using Various Maps Over Different Channel Conditions -- Nr-Dcsk Based Mimo Chaotic Communication System -- Wearable Sensor Based Human Fall Detection Wireless System -- Mathematical Analysis of Adaptive Queue Length Based Traffic Signal Control -- Wireless Data Acquisition and Communication System for Automated Guided Vehicle -- Energy Efficient Clusterong Protocol for Wireless Sensor Networks.
Record Nr. UNINA-9910337598903321
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...