You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This volume contains the refereed proceedings of the 3rd International Conf- ence on Sequences and Their Applications (SETA 2004), held in Seoul, Korea during October 24–28, 2004. The previous two conferences, SETA 1998 and SETA 2001, were held in Singapore and Bergen, Norway, respectively. These conferences are motivated by the many widespread applications of sequences in modern communication systems. These applications include pseudorandom sequences in spread spectrum systems, code-division multiple-access, stream ciphers in cryptography and several connections to coding theory. The Technical Program Committee of SETA 2004 received 59 submitted - pers, many more than the submissions to p...
None
Code Division Multiple Access (CDMA) has become one of the main candidates for the next generation of mobile land and satellite communication systems. CDMA is based on spread spectrum techniques, which have been used in military applications for over half a century. Only recently, however, has it been recognised that spread spectrum techniques, combined with some additional steps, can provide higher capacity and better flexibility for the mobile cellular radio communications. Code Division Multiple Access Communications comprises a set of contributions from the most distinguished world scientists in the field. These papers review the basic theory and some of the most important problems relat...
This book contains survey papers and research papers by leading experts on sequences and their applications. It discusses both the theory of sequences and their applications in cryptography, coding theory, communications systems, numerical computation and computer simulation. Sequences have important applications in ranging systems, spread spectrum communication systems, multi-terminal system identification, code division multiply access communications systems, global positioning systems, software testing, circuit testing, computer simulation, and stream ciphers. The papers contained in this volume bring together experts from discrete mathematics, computer science and communications engineering, and help to bridge advances in these different areas.
In Time Division Multiple Access (TDMA), within a given time frame a particular user is allowed to transmit within a given time slot. This technique is used in most of the second-generation digital mobile communication systems. In Europe the system is known as GSM, in USA as DAMPS and in Japan as MPT. In Code Division Multiple Access (CDMA) every user is using a distinct code so that it can occupy the same frequency bandwidth at the same time with other users and still can be separated on the basis of low correlation between the codes. These systems like IS-95 in the USA are also developed and standardized within the second generation of the mobile communication systems. CDMA systems within ...
This is a concise presentation of the concepts underlying the design of digital communication systems, without the detail that can overwhelm students. Many examples, from the basic to the cutting-edge, show how the theory is used in the design of modern systems and the relevance of this theory will motivate students. The theory is supported by practical algorithms so that the student can perform computations and simulations. Leading edge topics in coding and wireless communication make this an ideal text for students taking just one course on the subject. Fundamentals of Digital Communications has coverage of turbo and LDPC codes in sufficient detail and clarity to enable hands-on implementation and performance evaluation, as well as 'just enough' information theory to enable computation of performance benchmarks to compare them against. Other unique features include space-time communication and geometric insights into noncoherent communication and equalization.
Pseudorandom sequences have widespread applications, for instance, in spread spectrum, code division multiple access, optical and ultrawide band communication systems, as well as in ranging systems global positioning systems, circuit testing and stream ciphers. Such sequences also have strong ties to error-correcting codes. This volume contains survey and research papers on sequences and their applications. It brings together leading experts from discrete mathematics, computer science and communications engineering, and helps to bridge advances in these different areas. Papers in this volume discuss the theory of sequences and their applications in cryptography, coding theory, communications systems, numerical computation and computer simulation.
The need to transmit and store massive amounts of data reliably and without error is a vital part of modern communications systems. Error-correcting codes play a fundamental role in minimising data corruption caused by defects such as noise, interference, crosstalk and packet loss. This book provides an accessible introduction to the basic elements of algebraic codes, and discusses their use in a variety of applications. The author describes a range of important coding techniques, including Reed-Solomon codes, BCH codes, trellis codes, and turbocodes. Throughout the book, mathematical theory is illustrated by reference to many practical examples. The book was first published in 2003 and is aimed at graduate students of electrical and computer engineering, and at practising engineers whose work involves communications or signal processing.
Politics cannot grow in isolation; at the same time society learns from the changing ethos of polity. A relatively young subject, Political Sociology tries to seek research excellence, in its process of evolution. This book on Political Sociology deals with different variables of society which influence various facets of political dynamics. It also analyzes attitude and behavioural pattern of the public who act as political actors. As a branch of political science, the book draws attention to the very nature of this inter-disciplinary study. All the chapters are conceptualized to strengthen the bond between the polity and the society and vice-versa. This book is an attempt to widen the frontier of political science with an empirical approach. Intended for the undergraduate and postgraduate students of Political Science and Sociology, the book will enrich the students indulged in research works and those who are preparing for the Civil Services examinations as well.
This book provides information on theoretically secure multiparty computation (MPC) and secret sharing, and the fascinating relationship between the two concepts.