Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Fixed-Mobile Wireless Networks Convergence: Technologies, Solutions, Services
Fixed-Mobile Wireless Networks Convergence: Technologies, Solutions, Services
This practical book is for anyone who needs to understand the solutions that allow multimedia communications between mobile networks and fixed wireless communications. It presents the fundamentals of individual fixed and mobile wireless technologies in terms of architectures, standards, management capabilities and quality of service issues, is...
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification 2nd Edition
RFID Handbook: Fundamentals and Applications in Contactless Smart Cards and Identification 2nd Edition
Developments in RFID (Radio-Frequency Identification) are yielding larger memory capacities, wider reading ranges and quicker processing, making it one of fastest growing sectors of the radio technology industry.

RFID has become indispensable in a wide range of automated data capture and identification applications, from ticketing and access...

Telecosmos: The Next Great Telecom Revolution
Telecosmos: The Next Great Telecom Revolution
An insider's guide to the exciting future of telecommunications

The last great telecommunications revolution brought us fiber optics, mobile phones, videoconferencing, and a host of other innovations that improved life and business and connected individuals in ways never imagined. Now emerging technologies such as Voice over Internet Protocol...

RFID For Dummies
RFID For Dummies
Somewhere, separated from you by just a few degrees, is not Kevin Bacon,
but an 800-pound gorilla demanding that you adopt radio frequency identification,
or RFID — a technology you may have never even heard of until
just a few months ago. Chances are that gorilla wears a stylish blue smock
with a yellow smiley face on it
...
CRC Handbook of Modern Telecommunications, Second Edition
CRC Handbook of Modern Telecommunications, Second Edition

Addressing the most dynamic areas of the ever-changing telecommunications landscape, this new edition of the bestselling CRC Handbook of Modern Telecommunications once again brings together the top minds and industry pioneers in wireless communication networks, protocols, and devices.

In addition to new discussions of...

Logistics and Retail Management: Insights into Current Practice and Trends from Leading Experts
Logistics and Retail Management: Insights into Current Practice and Trends from Leading Experts

Throughout the last decade there have been steady, incremental improvements and relationship changes in retail logistics. These changes have been fundamental to business efficiency and it is now widely recognized that logistics excellence provides competitive advantage. Emphasis is now on minimizing time to market, maximizing on-shelf...

RFID Explained (Synthesis Lectures on Mobile and Pervasive Computing)
RFID Explained (Synthesis Lectures on Mobile and Pervasive Computing)
This lecture provides an introduction to Radio Frequency Identification (RFID), a technology enabling automatic identification of objects at a distance without requiring line-of-sight. Electronic tagging can be divided into technologies that have a power source (active tags), and those that are powered by the tag interrogation signal (passive...
Reasoning in Event-Based Distributed Systems (Studies in Computational Intelligence)
Reasoning in Event-Based Distributed Systems (Studies in Computational Intelligence)

Event-based distributed systems are playing an ever increasing role in areas such as enterprise management, information dissemination, finance, environmental monitoring and geo-spatial systems. Event-based processing originated with the introduction of Event-Condition-Action (ECA) rules to database systems in the 1980s. Since then,...

Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
Lattice-Based Public-Key Cryptography in Hardware (Computer Architecture and Design Methodologies)
This book describes the efficient implementation of public-key cryptography (PKC) to address the security challenges of massive amounts of information generated by the vast network of connected devices, ranging from tiny Radio Frequency Identification (RFID) tags to powerful desktop computers. It investigates implementation aspects of post...
Everyware: The Dawning Age of Ubiquitous Computing
Everyware: The Dawning Age of Ubiquitous Computing
From the RFID tags now embedded in everything from soda cans to the family pet, to smart buildings that subtly adapt to the changing flow of visitors, to gestural interfaces like the ones seen in Minority Report, computing no longer looks much like it used to. Increasingly invisible but present everywhere in our lives, it has moved off the desktop...
Encyclopedia of Mobile Computing and Commerce
Encyclopedia of Mobile Computing and Commerce
Nowadays, mobile communication, mobile devices, and mobile computing are widely available. Everywhere people are carrying mobile devices, such as mobile phones. The availability of mobile communication networks has made a huge impact to various applications, including commerce. Consequently, there is a strong relationship between mobile computing...
RF Circuit Design Techniques for MF-UHF Applications
RF Circuit Design Techniques for MF-UHF Applications

Magnetic resonance imaging, semiconductor processing, and RFID are some of the critical applications within the medium frequency (MF) to ultrahigh frequency (UHF) range that require RF designers to have a solid understanding of analytical and experimental RF techniques. Designers need to be able to design components and devices cost...

unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy