You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Quantum Communications in New Telecommunications Systems Computers are quickly making the transition from silicon towards miniaturization, which now risks reaching its limits as dictated by the laws of physics. Quantum communications are the answer to post-silicon computers. The main applications for quantum communications in the domain of telecommunications are beginning to appear, with some commercial applications already on the market. This book explores the technological advances in quantum communications with a special focus on telecommunications systems. The authors provide a comprehensive state of the art on quantum communications and quantum signal processing. The reader will learn about the advantages, current applications and future prospects of quantum technology.
This book addresses the move towards quantum communications, in light of the recent technological developments on photonic crystals and their potential applications in systems. The authors present the state of the art on extensive quantum communications, the first part of the book being dedicated to the relevant theory; quantum gates such as Deutsch gates, Toffoli gates and Dedekind gates are reviewed with regards to their feasibility as electronic circuits and their implementation in systems, and a comparison is performed in parallel with conventional circuits such as FPGAs and DSPs. The specifics of quantum communication are also revealed through the entanglement and Bell states, and mathematical and physical aspects of quantum optical fibers and photonic crystals are considered in order to optimize the quantum transmissions. These concepts are linked with relevant, practical examples in the second part of the book, which presents six integrated applications for quantum communications.
This book concerns a new paradigm in the field of UHF RFID systems: the positive exploitation of nonlinear signals generated by the chips integrated into the RFID tags. After having recalled the main principles in RFID technology and its current challenges notably with the emergence of Internet of Things or the smart connected environments, the purpose is to focus on the presence of nonlinearities produced by the nonlinear circuits of RFID chips: effects, nuisances and solutions but also and especially use of the phenomena. The presentation covers all aspects from the characterization of the nonlinear behavior of RFID tags and the associated platforms (distinguishing conducted and radiated measurement) to the design of new types of tags where nonlinearities are exploited in order to offer new capabilities or enhanced performance.
This book studies the simulation of wireless networking in the domain of Intelligent Transportation Systems (ITS) involving aircraft, railway and vehicular communication. On this subject, particular focus is placed on effective communication channels, mobility modeling, multi-technology simulation and global ITS simulation frameworks. Networking Simulation for Intelligent Transportation Systems addresses the mixing of IEEE802.11p and LTE into a dedicated simulation environment as well as the links between ITS and IoT; aeronautical mobility and VHD Data Link (VDL) simulation; virtual co-simulation for railway communication and control-command; realistic channel simulation, mobility modeling and autonomic simulation for VANET and quality metrics for VANET. The authors intend for this book to be as useful as possible to the reader as they provide examples of methods and tools for running realistic and reliable simulations in the domain of communications for ITS.
Cyber threats are ever increasing. Adversaries are getting more sophisticated and cyber criminals are infiltrating companies in a variety of sectors. In today’s landscape, organizations need to acquire and develop effective security tools and mechanisms – not only to keep up with cyber criminals, but also to stay one step ahead. Cyber-Vigilance and Digital Trust develops cyber security disciplines that serve this double objective, dealing with cyber security threats in a unique way. Specifically, the book reviews recent advances in cyber threat intelligence, trust management and risk analysis, and gives a formal and technical approach based on a data tainting mechanism to avoid data leakage in Android systems
Vehicular networks were first developed to ensure safe driving and to extend the Internet to the road. However, we can now see that the ability of vehicles to engage in cyber-activity may result in tracking and privacy violations through the interception of messages, which are frequently exchanged on road. This book serves as a guide for students, developers and researchers who are interested in vehicular networks and the associated security and privacy issues. It facilitates the understanding of the technologies used and their various types, highlighting the importance of privacy and security issues and the direct impact they have on the safety of their users. It also explains various solutions and proposals to protect location and identity privacy, including two anonymous authentication methods that preserve identity privacy and a total of five schemes that preserve location privacy in the vehicular ad hoc networks and the cloud-enabled internet of vehicles, respectively.
This book provides a novel method based on advantages of mobility model of Low Earth Orbit Mobile Satellite System LEO MSS which allows the evaluation of instant of subsequent handover of a MS even if its location is unknown. This method is then utilized to propose two prioritized handover schemes, Pseudo Last Useful Instant PLUI strategy and Dynamic Channel Reservation DCR-like scheme based respectively on LUI and DCR schemes, previously proposed in literature. The authors also approach a different aspect of handover problem: calls with short durations dropped due to a handover failure. We propose a decision system based on fuzzy logic Rescuing System that allows the rescue of calls with short durations facing a premature at the expense of those lasting for long durations.
From queues to telecoms. Queues are, of course, omnipresent in our world, at the bank, the supermarket, the shops, on the road… and yes, they also exist in the domain of telecoms. Queues Applied to Telecoms studies the theoretical aspect of these queues, from Poisson processes, Markov chains and queueing systems to queueing networks. The study of the use of their resources is addressed by the theory of teletraffic. This book also outlines the basic ideas in the theory of teletraffic, presenting the teletraffic of loss systems and waiting systems. However, some applications and explanations are more oriented towards the field of telecommunications, and this book contains lectures and more than sixty corrected exercises to cover these topics. On your marks…
The adoption of smartphones has had as a corollary the use of services that require streaming, such as video streaming, which is a constraint for the 4G mobile network. The integration of the network of Wi-Fi hotspots deployed by the operators adds capacity to the 4G mobile network. The use of Wi-Fi technology in carrier networks is the result of developments coordinated by the IEEE, WFA and WBA standardization bodies. For its part, the 3GPP standardization body has been working to integrate Wi-Fi technology into the 4G mobile network. The first part of this book presents the characteristics of the Wi-Fi radio interface. The different IEEE 802.11b / g / n / ac physical layers characterize th...
Random SALOHA and CSMA protocols that are used to access MAC in ad hoc networks are very small compared to the multiple and spontaneous use of the transmission channel. So they have low immunity to the problems of packet collisions. Indeed, the transmission time is the critical factor in the operation of such networks. The simulations demonstrate the positive impact of erasure codes on the throughput of the transmission in ad hoc networks. However, the network still suffers from the intermittency and volatility of its efficiency throughout its operation, and it switches quickly to the saturation zone. In this context, game theory has demonstrated his ability to lead the network to a more efficient equilibrium. This, we were led to propose our model code set that formalizes the behavior of nodes during transmission within SALOHA networks and CSMA respectively.