Listing 1 - 10 of 12 | << page >> |
Sort by
|
Choose an application
Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to the strongly increased security demands for mobile systems. In this book, the authors show how TETRA can be strongly improved and these improvements will most probably be part of future TETRA standards. The areas examined include channel assignment and multiple access techniques, video transmission, wireless LAN integration, and the establishment of multiple wireless mesh networks. Since the requirements for these networks is security, the authors show that innovative techniques such as those based on chaotic signals can be used in order to maximize security. The book is a vital reference point for researchers with ambition to find the general solution for modern problems of public safety.
Trunked radio. --- Mobile communication systems. --- TETRA (Standard) --- Trunk radio --- Trunking radio --- Mobile communication systems --- Terrestrial Trunked Radio standard --- Trans European Trunked Radio standard --- Digital communications --- Trunked radio --- Vehicles --- Vehicular communication systems --- Radio --- Wireless communication systems --- Standards --- Communication systems --- Telecommunication. --- Microwaves. --- Data encryption (Computer science). --- Communications Engineering, Networks. --- Microwaves, RF and Optical Engineering. --- Cryptology. --- Data encoding (Computer science) --- Encryption of data (Computer science) --- Computer security --- Cryptography --- Hertzian waves --- Electric waves --- Electromagnetic waves --- Geomagnetic micropulsations --- Radio waves --- Shortwave radio --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting --- Electrical engineering. --- Optical engineering. --- Mechanical engineering --- Electric engineering --- Engineering
Choose an application
The book covers the field of Biological Effects of Electromagnetic Fields in its entirety. Both high and low frequency areas are presented. In particular, the underlying mechanisms of interaction between EMF and biological systems, and the absorption patterns verification of theoretical models via real world measurement assessment are studied. Topics such as mathematical modeling of EMF absorption, Ion Cyclotron Resonance in Biological Systems, thermal and dissipation effects of mobile system radiation, effects on transmission lines and railway radiation, effects on the reproductive capacity of specific insects, on the immune systems, embryos, fetuses, blood parameters and behavior of rats are thoroughly covered as well as health risk assessment and therapeutic effects of EMF. Each topic is presented from the theoretical point of view, and experimental verification is shown in all cases possible. The book provides well-founded material for an overview of the major aspects of this important field in a tutorial format, which can pave the way in introducing courses in many universities.
537.8 --- Electromagnetism. Electromagnetic field. Electrodynamics. Maxwell theory --- 537.8 Electromagnetism. Electromagnetic field. Electrodynamics. Maxwell theory --- Electromagnetism --- Electromagnetic fields --- Electromagnetic waves --- Physiological effect --- Medicine. --- Medical physics. --- Radiation. --- Biophysics. --- Biological physics. --- Microwaves. --- Optical engineering. --- Cancer research. --- Power electronics. --- Biomedicine, general. --- Medical and Radiation Physics. --- Biological and Medical Physics, Biophysics. --- Microwaves, RF and Optical Engineering. --- Cancer Research. --- Power Electronics, Electrical Machines and Networks. --- Electronics, Power --- Electric power --- Electronics --- Cancer research --- Mechanical engineering --- Hertzian waves --- Electric waves --- Geomagnetic micropulsations --- Radio waves --- Shortwave radio --- Biological physics --- Biology --- Medical sciences --- Physics --- Radiology --- Health physics --- Health radiation physics --- Medical radiation physics --- Radiotherapy physics --- Radiation therapy physics --- Biophysics --- Health Workforce
Choose an application
"Interference Analysis and Reduction for Wireless Systems offers a New methodology for analyzing and studying the behavior of wireless communication systems in an interference environment. It provides modern tools and techniques for use in real-world applications that help engineers guarantee optimum system performance. The book treats both additive and multiplicative interfering signals, including in-depth descriptions of how these signals behave, regardless of the source. Hands-on details are provided to help practitioners."--Jacket.
Radio --- Cell phone systems --- Cellular radio --- Cellular radiotelephone systems --- Cellular systems (Telecommunication) --- Cellular telephone systems --- Mobile telephony --- Wireless telephone systems (Cell phone) --- Mobile communication systems --- Telephone systems --- Jamming (Radio) --- Radio frequency interference --- Radio interference --- Electromagnetic interference --- Radio noise --- Interference. --- Protection. --- Jamming --- Static --- Celular telephone systems --- Interference --- Protection --- Brouillage
Choose an application
Choose an application
Spectrometric and optical chemical analysis --- Mass communications --- Computer science --- DES (data encryption standard) --- communicatietechnologie --- fysicochemie --- spectrometrie
Choose an application
Choose an application
At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called “Y2K” issue. The Y2K scare was the fear that computer networks and the systems that are controlled or operated by software would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work - operatively to exchange expertise and information, and to coordinate in case major problems should arise in the modern IT environment. The terrorist attacks of 11 September 2001 raised security concerns to a new level. The international community responded on at least two fronts; one front being the transfer of reliable information via secure networks and the other being the collection of information about - tential terrorists. As a sign of this new emphasis on security, since 2001, all major academic publishers have started technical journals focused on security, and every major communications conference (for example, Globecom and ICC) has organized workshops and sessions on security issues. In addition, the IEEE has created a technical committee on Communication and Information Security. The first editor was intimately involved with security for the Athens Olympic Games of 2004.
Data protection. --- Data structures (Computer scienc. --- Engineering. --- Telecommunication. --- Computer security --- Data encryption (Computer science) --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Computer Science --- Electrical Engineering --- Computer security. --- Data governance --- Data regulation --- Personal data protection --- Protection, Data --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Security of computer systems --- Security measures --- Protection of computer systems --- Protection --- Data structures (Computer science). --- Electrical engineering. --- Communications Engineering, Networks. --- Data Structures, Cryptology and Information Theory. --- Systems and Data Security. --- Data protection --- Security systems --- Hacking --- Electric engineering --- Engineering --- Information structures (Computer science) --- Structures, Data (Computer science) --- Structures, Information (Computer science) --- Electronic data processing --- File organization (Computer science) --- Abstract data types (Computer science) --- Construction --- Industrial arts --- Technology --- Data Structures and Information Theory. --- Electric communication --- Mass communication --- Telecom --- Telecommunication industry --- Telecommunications --- Communication --- Information theory --- Telecommuting
Choose an application
At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called “Y2K” issue. Te Y2K scare was the fear that c- puter networks and the systems that are controlled or operated by sofware would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work - operatively to exchange expertise and information, and to coordinate in case major problems should arise in the modern IT environment. Te terrorist attacks of 11 September 2001 raised security concerns to a new level. Te - ternational community responded on at least two fronts; one front being the transfer of reliable information via secure networks and the other being the collection of information about - tential terrorists. As a sign of this new emphasis on security, since 2001, all major academic publishers have started technical journals focused on security, and every major communi- tions conference (for example, Globecom and ICC) has organized workshops and sessions on security issues. In addition, the IEEE has created a technical committee on Communication and Information Security. Te ?rst editor was intimately involved with security for the Athens Olympic Games of 2004.
Choose an application
Terrestrial Trunked Radio (TETRA) has become the tool to design any type of public security systems, in particular due to the strongly increased security demands for mobile systems. In this book, the authors show how TETRA can be strongly improved and these improvements will most probably be part of future TETRA standards. The areas examined include channel assignment and multiple access techniques, video transmission, wireless LAN integration, and the establishment of multiple wireless mesh networks. Since the requirements for these networks is security, the authors show that innovative techniques such as those based on chaotic signals can be used in order to maximize security. The book is a vital reference point for researchers with ambition to find the general solution for modern problems of public safety.
Spectrometric and optical chemical analysis --- Mass communications --- Computer science --- DES (data encryption standard) --- communicatietechnologie --- fysicochemie --- spectrometrie
Choose an application
At its core, information security deals with the secure and accurate transfer of information. While information security has long been important, it was, perhaps, brought more clearly into mainstream focus with the so-called Y2K issue. Te Y2K scare was the fear that c- puter networks and the systems that are controlled or operated by sofware would fail with the turn of the millennium, since their clocks could lose synchronization by not recognizing a number (instruction) with three zeros. A positive outcome of this scare was the creation of several Computer Emergency Response Teams (CERTs) around the world that now work - operatively to exchange expertise and information, and to coordinate in case major problems should arise in the modern IT environment. Te terrorist attacks of 11 September 2001 raised security concerns to a new level. Te - ternational community responded on at least two fronts; one front being the transfer of reliable information via secure networks and the other being the collection of information about - tential terrorists. As a sign of this new emphasis on security, since 2001, all major academic publishers have started technical journals focused on security, and every major communi- tions conference (for example, Globecom and ICC) has organized workshops and sessions on security issues. In addition, the IEEE has created a technical committee on Communication and Information Security. Te ?rst editor was intimately involved with security for the Athens Olympic Games of 2004.
Listing 1 - 10 of 12 | << page >> |
Sort by
|