To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
This is a concise presentation of the concepts underlying the design of digital communication systems, without the detail that can overwhelm students. Many examples, from the basic to the cutting-edge, show how the theory is used in the design of modern systems and the relevance of this theory will motivate students. The theory is supported by practical algorithms so that the student can perform computations and simulations. Leading edge topics in coding and wireless communication make this an ideal text for students taking just one course on the subject. Fundamentals of Digital Communications has coverage of turbo and LDPC codes in sufficient detail and clarity to enable hands-on implementation and performance evaluation, as well as 'just enough' information theory to enable computation of performance benchmarks to compare them against. Other unique features include space-time communication and geometric insights into noncoherent communication and equalization.
In this chapter, we discuss the fundamental limit – the Shannon limit – on data rate for a communications link. We motivate this limit by providing a sketch of the derivation. To construct this sketch, we discuss the idea of the ratio of hypersphere volumes and how the radius of Gaussian vectors converges to a known radius as the dimensionality goes to infinity. We provide a second approach to think about the Shannon limit, or equivalently channel capacity, of a data link by considering mutual information and entropy. By using a simple line-of-sight channel, we discuss the resulting link theoretical capacity and an approach to estimating the practical limit on data rate. Finally, we provide an overview of source coding approaches.
The past decade has seen many advances in physical layer wireless communication theory and their implementation in wireless systems. This textbook takes a unified view of the fundamentals of wireless communication and explains the web of concepts underpinning these advances at a level accessible to an audience with a basic background in probability and digital communication. Topics covered include MIMO (multi-input, multi-output) communication, space-time coding, opportunistic communication, OFDM and CDMA. The concepts are illustrated using many examples from real wireless systems such as GSM, IS-95 (CDMA), IS-856 (1 x EV-DO), Flash OFDM and UWB (ultra-wideband). Particular emphasis is placed on the interplay between concepts and their implementation in real systems. An abundant supply of exercises and figures reinforce the material in the text. This book is intended for use on graduate courses in electrical and computer engineering and will also be of great interest to practising engineers.
Digital communication systems are ubiquitous. Examples of digital communication systems include cell phones, Bluetooth, WiFi, and cable modems. This book explores in depth how these communication systems work and the fundamental limits on the performance of digital communication systems. We begin in this chapter with a high-level description of digital communication systems so as to understand the trade-offs in designing a communication system. We also explore the fundamental limits that can be achieved in terms of the data rate possible for a given bandwidth and the energy needed for a given level of noise.
In this chapter, differences between magnetic communication and electromagnetic wave-based communication are summarized and major advantages of magnetic communication are discussed, which provides a big picture of the applicable scenarios of magnetic communication. In addition, the physical circuit for magnetic communications is introduced. The fundamental performance metrics, such as path loss, bandwidth, capacity, and connectivity are discussed.
For convenience in design, the operations of radios are often broken into a number of functional layers. The standard version of this stack is referred to as the open systems interconnection (OSI) model [291], as seen in Figure 4.1. The model has two groups of layers: host and media. The host layers are the application, presentation, session, and transport layers. The media layers are the network, data-link, and physical layers. In many radio systems, some of these layers are trivial or the division between the layers may be blurred. The OSI stack is commonly interpreted in terms of wired networks such as the internet. Depending upon the details of an implementation, various tasks may occupy different layers. Nonetheless, the OSI layered architecture is useful as a common reference for discussing radios. In this text, the media layers are of principal importance.
The network layer indicates how data are routed from an information source to a sink node, as seen in Figure 4.2. In the case of a network with two nodes, this routing is trivial. In the case of an ad hoc wireless network, the routing may be both complicated and time varying. The network layer may break a data sequence at the source node into smaller blocks and then reassemble the data sequence at the sink node. It also may provide notification of errors to the transport layer.
Written in an easy-to-follow, tutorial style, this complete guide will allow students to quickly understand the key principles, techniques and applications of MIMO wireless communications. Important concepts such as MIMO channel models, power allocation and channel capacity, space-time codes, MIMO detection and antenna selection are covered in detail, providing practical insights into the world of modern telecommunication systems. The most up-to-date techniques are explained, with examples including spatial modulation, MIMO-based cooperative communications, large-scale MIMO systems, massive MIMO and space-time block coded spatial modulation. Supported by numerous solved examples, review questions, MATLAB problems and lecture slides, and including all the necessary mathematical background, this is an ideal text for students taking graduate, single-semester courses in wireless communications.
This dynamic textbook provides students with a concise and accessible introduction to the fundamentals of modern digital communications systems. Building from first principles, its comprehensive approach equips students with all of the mathematical tools, theoretical knowledge, and practical understanding they need to excel. It equips students with a strong mathematical foundation spanning signals and systems, probability, random variables, and random processes, and introduces students to key concepts in digital information sources, analog-to-digital conversion, digital modulation, power spectra, multi-carrier modulation, and channel coding. It includes over 85 illustrative examples, and more than 270 theoretical and computational end-of-chapter problems, allowing students to connect theory to practice, and is accompanied by downloadable Matlab code, and a digital solutions manual for instructors. Suitable for a single-semester course, this succinct textbook is an ideal introduction to the field of digital communications for senior undergraduate students in electrical engineering.
The contemporary political climate has activated Americans’ political identities and affective orientations, resulting in the perception of excessively large differences between the political parties and negative evaluation of identifiers of the opposing party. In short, the American public has become psychologically polarized. The classic explanations for issue polarization cannot entirely account for identity-based polarization. How did this psychological polarization developed? Americans’ use of social media, primarily Facebook, is an important contributing factor. This first chapter provides an overview of the book’s central argument. The defining characteristics of political communication on the Facebook News Feed are uniquely suited to facilitate psychological processes of polarization: identity formation and reinforcement, biased information processing, and social inference and judgment. The confluence of features and norms on Facebook affect the interactions people have with each other, creating a communication ecosystem that facilitates negative and stereotyped evaluations of the Americans with whom people disagree.
In this chapter, we have provided an overview of ambient backscatter communication systems. Firstly, we have introduced the fundamentals of modulated backscatter and its three main configurations, i.e., monostatic, bistatic, and ambient backscatter communication systems. Then, key channel-coding and modulation techniques in modulated backscatter communication systems are discussed. Two major types of backscatter communication channels and their link budgets are also introduced. Next, theoretical analyses and experimental measurements of backscatter channels are reviewed. Finally, we have discussed some research challenges of backscatter communication systems, especially ambient backscatter communication systems.
Chapter 3 discusses the fundamentals of backscatter radio communications, analyzes the RFID backscatter channel, its major limitations and mitigation approaches, and presents recent advances including novel RFID quadrature backscatter modulation techniques.
The initial Community treaties establishing the ECSC, the EEC and EURATOM did not contain any fundamental rights provisions at all. The 1953 Draft Treaty embodying the Statute of a European Political Community envisaged human rights protection as a major task and proposed to incorporate the European Convention on Human Rights (ECHR), a treaty concluded by many European states in 1950 under the auspices of the Council of Europe and enforced by the European Court of Human Rights (ECtHR) in Strasbourg. After the plans for a European Defence Community were buried by the French National Assembly in 1954, this idea also became obsolete. With the resurgence of the ‘functionalist approach’, culminating in the 1957 Rome Treaties, the view prevailed that the economic integration now pursued did not warrant the inclusion of human rights guarantees.
With the growth of Community activities, however, the likelihood of infringement of fundamental rights also increased. Clearly, the extension of Community law into many fields beyond the core aspects of the four freedoms was not a wholly unintended ‘spill-over effect’ of economic integration. This tendency was reinforced by the specific development of EC law, in particular of direct effect and supremacy in such landmark cases as Van Gend en Loos and Costa v. ENEL. Both direct effect and supremacy increase the probability that it is EC law itself and not any national implementation of Community obligations that may infringe human rights.
The fifth-generation (5G) mobile communication networks, which are anticipated to be soft, green, and super-fast, may possibly be deployed in 2020s to satisfy the challenging demands of mobile communication in various scenarios. Characterized by a mixed set of key performance indicators like data rates, latency, mobility, energy efficiency, and traffic density, 5G services demand a fundamental revolution on the end to end network architecture and key technologies design. Toward a “soft, green, and super-fast” 5G, this paper presents seven innovative 5G R&D themes of China Mobile, including: (1) rethinking Shannon to start a green journey on wireless systems; (2) rethinking Ring and Young for no more “cells”; (3) rethinking signaling and control to make network applications aware and load aware; (4) rethinking antennas to make base stations invisible via SmarTiles; (5) rethinking spectrum and air interface to enable wireless signals to “dress for the occasion”; (6) rethinking fronthaul (FH) to enable Soft RAN via next-generation FH interface; and (7) rethinking the protocol stack for flexible configurations of diversified access points and optimal baseband function split between the base band unit pool and the Remote Radio Systems.
Sunday, March 21, 1993, was a memorable day for the more than two thousand members of Highland Park Baptist Church (HPBC) in Southfield, Michigan, for it marked the end of the church's fiftieth annual missions conference. The event had gathered people from HPBC and other churches to discuss the many social, economic, and moral issues threatening the vitality of community life in metro-politan Detroit. Following several rousing hymns, including “Raise Up an Army, O God” and “The City Is Alive, O God,” HPBC senior pastor Leonard Crowley ended the historic proceedings by offering an impassioned sermon on the Judaic institution of “Jubilee,” an Old Testament mandate that called for restoration of land and property to original ownership. Crowley had much to say about this antiquated ideal and its personal application to HPBC members, but the most pointed and intriguing elements of his jeremiad concerned the con-gregational body as a whole.
No competence to review EC regulations implementing Security Council resolutions, according to the Court of First Instance – Worst of both worlds: critique from the perspectives of international law and Community law – Alternative approach on the basis of the firmly established European solange tradition.
Treaties — Conclusion and operation — European Community — Treaty-making powers — Whether European Community empowered to accede to European Convention on Human Rights, 1950 — Treaty establishing the European Community, 1957 (“EC Treaty”) — Whether containing any provision conferring a general power on Community institutions to conclude international human rights conventions — Whether Article 235 of EC Treaty could provide a legal basis for accession to the Convention — Whether accession requiring amendment of EC Treaties
Human rights — Scope of protection within the European Community — Whether respect for human rights constituting a condition for the lawfulness of Community acts — Significance of the European Convention on Human Rights within the Community legal order — Whether accession of the Community to the Convention would entail a substantial change in the Community system for the protection of human rights, requiring a treaty amendment
International tribunals — Court of Justice of the European Communities — Jurisdiction — EC Treaty, Article 228(6) — Competence of Court to give opinions on the compatibility of proposed international agreements with provisions of the EC Treaty — Scope of competence — Whether reference for opinion concerning an envisaged agreement admissible even before negotiations have formally begun — The law of the European Community