Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Navigation Signal Processing for GNSS Software Receivers (Gnss Technology and Applications)
Navigation Signal Processing for GNSS Software Receivers (Gnss Technology and Applications)

The continuous developments of software-defined radio technology resulted in the appearance of the first real-time GPS software radios at the beginning of this century. For the first time, it was possible to realize a complete GNSS receiver without going into the depths of cumbersome hardware development that requires development or...

3G CDMA2000 Wireless System Engineering
3G CDMA2000 Wireless System Engineering
Breaking down complex technology into easy-to-understand concepts, this hands-on, system-level resource offers expert guidance in designing, optimizing, and managing a CDMA2000 wireless network. The book focuses on the development of practical knowledge that can be readily applied in the field, and also provides the theoretical background needed to...
RFID-Enabled Sensor Design and Applications (Integrated Microsystems)
RFID-Enabled Sensor Design and Applications (Integrated Microsystems)

Radio frequency identification (RFID) is gaining in popularity, especially as we find ourselves in this communications age and headed towards a ubiquitous computing world. Automatic identification systems become an important aspect not just in today’s technology but also as part of our daily life. We need RFID in our cars,...

Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking

This book provides an overview of steganography and digital watermarking, two areas of research which are generally referred to as "information hiding." Steganography studies ways to make communication invisible by hiding secrets in innocuous messages, whereas watermarking originated from the need for copyright protection of...

The Great Telecom Meltdown
The Great Telecom Meltdown
The economic boom of the late 1990s included huge investments in the telecommunications
industry and related sectors. It was followed by a downturn of
unusual severity, which reduced total paper wealth by trillions of dollars, cost
many thousands of jobs, and saw some of the biggest bankruptcies in history.
While there certainly
...
A Practitioner's Guide to Software Test Design
A Practitioner's Guide to Software Test Design

Here’s a comprehensive, up-to-date and practical introduction to software test design. This invaluable book presents all the important test design techniques in a single place and in a consistent, and easy-to-digest format. An immediately useful handbook for test engineers, developers, quality assurance professionals, and requirements and...

LANs to WANs: The Complete Management Guide
LANs to WANs: The Complete Management Guide
This text addresses key network management challenges, showing professionals how to tie together incompatible LANs, meld legacy systems and LANs, extend the reach of LANs with wireless links, and protect information assets from various disaster scenarios.

Empowered by today’s high-performance computers interconnected over LANs and...

QoS in Integrated 3G Networks
QoS in Integrated 3G Networks
This book is intended to provide a self-contained general understanding of the factors that determine quality of service (QoS) in a third-generation (3G) mobile network that interacts with other fixed networks. Since QoS is an end-end quantity, and the mobile networks interact both with each other and with fixed networks, the discussion includes...
Engineering Wireless-Based Software Systems And Applications
Engineering Wireless-Based Software Systems And Applications
This comprehensive resource offers professionals detailed guidance on the engineering aspects of building software for wireless communications. From design and architecture to security and testing, the book shows how to overcome every engineering challenge encountered in successfully developing wireless software. Filled with open-source code...
Identity Management: Concepts, Technologies, and Systems
Identity Management: Concepts, Technologies, and Systems

Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and...

An Introduction to Microelectromechanical Systems Engineering, Second Edition
An Introduction to Microelectromechanical Systems Engineering, Second Edition

The past few years have witnessed an increasing maturity of the MEMS industry and a rapid introduction of new products addressing applications ranging from biochemical analysis to fiber-optic telecommunications. The market size for MEMS products has doubled in the past 5 years and is projected to grow at this fast rate for the foreseeable...

Innovations in Internetworking (Artech House Telecommunication Library)
Innovations in Internetworking (Artech House Telecommunication Library)
Choosing the proper boundaries between functions is perhaps the primary activity of the computer system designer. Design principles that provide guidance in this choice of function placement are among the most important tools of a system designer. This paper discusses one class of function placement argument that has been used for...
unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy