The book discusses modern channel coding techniques for wireless communications such as turbo codes, low parity check codes (LDPC), space-time coding, Reed Solomon (RS) codes and convolutional codes. Many illustrative examples are included in each chapter for easy understanding of the coding techniques. The text is integrated with MATLAB-based programs to enhance the understanding of the subjec…
Understanding how culture affects the ways we communicate -- how we tell jokes, greet, ask questions, hedge, apologize, compliment, and so much more. We can learn to speak other languages, but do we truly understand what we are saying? How much detail should we offer when someone asks how we are? How close should we stand to our conversational partners? Is an invitation genuine or just pro form…
An examination of the uses of data within a changing knowledge infrastructure, offering analysis and case studies from the sciences, social sciences, and humanities."'Big Data' is on the covers of Science, Nature, the Economist, and Wired magazines, on the front pages of the Wall Street Journal and the New York Times. But despite the media hyperbole, as Christine Borgman points out in this exam…
The experience of digital art and how it is relevant to information technology.In Windows and Mirrors: Interaction Design, Digital Art, and the Myth of Transparency, Jay David Bolter and Diane Gromala argue that, contrary to Donald Norman's famous dictum, we do not always want our computers to be invisible "information appliances." They say that a computer does not feel like a toaster or a vacu…
An examination of how technological failures defined nature and national identity in Cold War Canada.OCLC-licensed vendor bibliographic record.
This book presents two practical physical attacks. It shows how attackers can reveal the secret key of symmetric as well as asymmetric cryptographic algorithms based on these attacks, and presents countermeasures on the software and the hardware level that can help to prevent them in the future. Though their theory has been known for several years now, since neither attack has yet been successf…
This monograph presents a collection of major developments leading toward the implementation of white space technology - an emerging wireless standard for using wireless spectrum in locations where it is unused by licensed users. Some of the key research areas in the field are covered. These include emerging standards, technical insights from early pilots and simulations, software defined radio…
This book showcases new and innovative approaches to biometric data capture and analysis, focusing especially on those that are characterized by non-intrusiveness, reliable prediction algorithms, and high user acceptance. It comprises the peer-reviewed papers from the international workshop on the subject that was held in Ancona, Italy, in October 2014 and featured sessions on ICT for health ca…
This book presents a state-of-the-art overview of the available and emerging mobile technologies and explores how these technologies can serve as support tools in enhancing user participation in health care and promoting well-being in the daily lives of individuals, thereby reducing the burden of chronic disease on the health care system. The analysis is supported by presentation of a variety o…
This book introduces inclusive-cost-effective (ICE) approaches that have the potential to transform all aspects of daily lives of people at the base of the pyramid in the economic scale, who represent more than 75% of the world population. ICE means that the approaches must meet the affordability level at the base of the pyramid. This includes mobile banking and financial service technologies, …