From the Publisher: Wireless Location in CDMA Cellular Radio Systems investigates methods for wireless location in CDMA networks and analyzes their performances. Techniques for measuring location parameters (AoAs, ToA...
ISBN:
(纸本)9780792377030;0792377036
From the Publisher: Wireless Location in CDMA Cellular Radio Systems investigates methods for wireless location in CDMA networks and analyzes their performances. Techniques for measuring location parameters (AoAs, ToAs, etc.) are presented along with algorithms for calculating position from those parameters. Several impairments to accurate location are covered and analyzed including multipath propagation, non-line-of-sight propagation, and multiple-access interference. Many of the topics in this book are also applicable to FDMA- and TDMA-based communication networks.
At present, the expansion of tetherless communications is a technological trend surpassed perhaps only by the explosive growth of the Internet. Wireless systems are being deployed today mainly for telephony, satisfyin...
ISBN:
(数字)9780306473272
ISBN:
(纸本)9780792386803
At present, the expansion of tetherless communications is a technological trend surpassed perhaps only by the explosive growth of the Internet. Wireless systems are being deployed today mainly for telephony, satisfying the ind- trialized nations' appetite for talk-on-the-go, and providing much-needed communications infrastructure in developing countries. The desire for wi- less access to the Internet is starting to add fuel to the growth of tetherless communications. Indeed, the synergy of wireless and Internet technologies will lead to a host of exciting new applications, some of which are not yet envisioned. Future-generation wireless systems will achieve capacities much higher than the systems of today by incorporating myriad improvements. These in- vations include transmission in higher-frequency bands, "smart antennas", multi-user detection, new forward error-correction techniques, and advanced network resource-allocation techniques. The term "smart antenna" usually refers to the deployment of multiple antennas at the base-station site, coupled with special processing of the m- tiple received signals. Smart antennas can adaptively reject co-channel int- ference and mitigate multipath fading, and have been identified by many as a promising means to extend base-station coverage, increase system capacity and enhance quality of service.
From the Publisher: Verilog™ Quickstart , Second Edition, has been revised and updated in accordance with the new IEEE 1364-1999 standard, much of which applies to synthesizable Verilog. New examples have been inclu...
ISBN:
(纸本)9780306470486;9780792385158;0792385152
From the Publisher: Verilog™ Quickstart , Second Edition, has been revised and updated in accordance with the new IEEE 1364-1999 standard, much of which applies to synthesizable Verilog. New examples have been included as well as additional material added throughout. Verilog™ Quickstart , Second Edition, focuses on the most commonly used elements of the Verilog Hardware Description Language used by designers for simulation and synthesis of ASICS and FPGAs. This book makes learning Verilog easy by following a well proven approach used in the author's classes for many years. Verilog™ Quickstart , Second Edition, is a basic, practical, introductory textbook for professionals and students alike. This book explains how a designer can be more effective through the use of the Verilog Hardware Description Language to simulate and document a design. Verilog™ Quickstart , Second Edition, presents some of the formal Verilog syntax and definitions and then shows practical uses. This book does not oversimplify the Verilog language nor does it emphasize theory. Verilog™ Quickstart , Second Edition, has over 100 examples that are used to illustrate aspects of the language. The later chapters focus on working with modeling style and explaining why and when one would use different elements of the language. Another feature of the book is the chapter on state machine modeling. There is a chapter on test benches and testing strategy as well as a chapter on debugging. Verilog™ Quickstart , Second Edition, is designed to teach the Verilog language, to show the designer how to model in Verilog and to explain the basics of using Verilog simulators. Theaccompanying disk contains over 100 runable Verilog examples from the book.
From the Publisher: Architecture and CAD for Deep-Submicron FPGAs addresses several key issues in the design of high-performance FPGA architectures and CAD tools, with particular emphasis on issues that are important ...
ISBN:
(纸本)0792384601;9780792384601
From the Publisher: Architecture and CAD for Deep-Submicron FPGAs addresses several key issues in the design of high-performance FPGA architectures and CAD tools, with particular emphasis on issues that are important for FPGAs implemented in deep-submicron processes. Three factors combine to determine the performance of an FPGA: the quality of the CAD tools used to map circuits into the FPGA, the quality of the FPGA architecture, and the electrical (i.e. transistor-level) design of the FPGA. Architecture and CAD for Deep-Submicron FPGAs examines all three of these issues in concert.
From the Publisher: The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connec...
ISBN:
(纸本)0792386752;9780792386759
From the Publisher: The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable to these threats. In addition, new issues have surfaced that did not exist previously, e.g. adding a signature to an electronic document. Cryptology addresses the above issues -- it is at the foundation of all information security. The techniques employed to this end have become increasingly mathematical in nature. Basic Concepts in Cryptology serves as an introduction to modern cryptographic methods. After a brief survey of classical cryptosystems, it concentrates on three main areas. First, stream ciphers and block ciphers are discussed. These systems have extremely fast implementations, but sender and receiver must share a secret key. Second, the book presents public key cryptosystems, which make it possible to protect data without a prearranged key. Their security is based on intractable mathematical problems, such as the factorization of large numbers. The remaining chapters cover a variety of topics, including zero-knowledge proofs, secret sharing schemes and authentication codes. Two appendices explain all mathematical prerequisites in detail: one presents elementary number theory (Euclid's Algorithm, the Chinese Remainder Theorem, quadratic residues, inversion formulas, and continued fractions) and the other introduces finite fields and their algebraic structure. Basic Concepts in Cryptology is an updated and improved version of An Introduction to Cryptology , originally published in 1988. Apartfrom a revision of the existing material, there are many new sections, and two new chapters on elliptic curves and authentication codes, respectively. In addition, the book is accompanied by a full text electronic version on CD-ROM as an interactive Mathematica manuscript. Basic Concepts
暂无评论