http://iet.metastore.ingenta.com
1887

Welcome to IET Digital Library

The IET Digital Library holds more than 190,000 technical papers from 1994 onwards for all IET journals, magazines, books, conference publications and seminar digests. Highly cited journals such as Electronics Letters are available alongside 24 research journal titles, The Journal of Engineering, the IET's new open access journal, Micro & Nano Letters, the IET's online only journal, the IET's member magazine Engineering & Technology, plus seminar digests and conference publications. Find out more...

Latest Books

image of The Inverted Pendulum in Control Theory and Robotics: From theory to new innovations
  • The Inverted Pendulum in Control Theory and Robotics: From theory to new innovations
  • The inverted pendulum is a classic problem in dynamics and control theory and is widely used as a benchmark for testing control algorithms. It is also an area of active study, with many new innovations and applications - for example, the problem is solved in the technology of the Segway, a self-balancing transportation device. This book provides an overall picture of historical and current trends and the developments in nonlinear control theory, based on the simple structure and rich nonlinear model of the inverted pendulum. After an introduction to the system and open/current problems, the book covers the topic in four parts: applications of robust state estimation and control to pendulum-cart systems; controllers for under-actuated mechanical systems; nonlinear controllers for mobile inverted pendulum systems; and robust controllers based observers via Takagi-Sugeno or linear approaches. With contributions from international researchers in the field, The Inverted Pendulum in Control Theory and Robotics is essential reading for researchers, scientists, engineers and students in the field of control theory, robotics and nonlinear systems

image of RFID Protocol Design, Optimization, and Security for the Internet of Things
  • RFID Protocol Design, Optimization, and Security for the Internet of Things
  • Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. The tags contain electronically stored information. RFIDs have been widely used in countless applications such as object tracking, 3D positioning, indoor localization, supply chain management, automotive, inventory control, anti-theft, anti-counterfeit, and access control. The Internet of Things (IoT) promises a huge growth in RFID technology and usage. This book covers the topic of RFID protocol design, optimization, and security. RFID systems allow for a much easier and error free inventory management and tracking, but the probabilistic nature of RFID protocols makes the design and optimization complex and challenging. Most existing commercial RFID systems are not well designed. In this book, the authors aim to demystify complicated RFID protocols and explain in depth the principles, techniques, and practices in designing and optimizing them.

image of User-Centric Privacy and Security in Biometrics
  • User-Centric Privacy and Security in Biometrics
  • The interplay of privacy, security and user-determination is an important consideration in the roll-out of biometric technologies. It brings into play requirements such as privacy of biometric data in systems, communication and databases, soft biometric profiling, biometric recognition of persons across distributed systems and in nomadic scenarios, and the convergence between user convenience, usability and authentication reliability. User-Centric Privacy and Security in Biometrics explores how developments in biometrics will address security and privacy aspects. The book surveys and evaluates how biometric techniques can enhance and increase the reliability of security strategies in a variety of applications. This includes privacy-preserving state-of-the-art works and future directions in the view of biometrics as part of broader security concepts. The fundamental emphasis is on privacy within and for biometrics, particularly for the protection of biometric data, informed consent of data usage, transparency on biometric data, and big data fraud prevention.

image of Enhanced Living Environments: From models to technologies
  • Enhanced Living Environments: From models to technologies
  • Enhanced living environments employ information and communications technologies to support true ambient assisted living for adults and people with disabilities. This book provides an overview of today's architectures, techniques, protocols, components, and cloud-based solutions related to ambient assisted living and enhanced living environments. Topics covered include: an introduction to enhanced living environments; pervasive sensing for social connectedness; ethics in information and communication technologies; service scenarios in smart personal environments; technological support to stress level monitoring; big data systems to improve healthcare information searching over the Internet; sensors for wireless body area networks; linear wireless sensor networks and protocols in next generation networks; model-compilation challenges for cyber-physical systems; health monitoring using wireless body area networks; wearable health care; and intelligent systems for after-stroke home rehabilitation.

View more
image of The Impact of Cognition on Radar Technology
  • The Impact of Cognition on Radar Technology
  • Cognitive dynamic systems are inspired by the computational capability of the brain and the viewpoint that cognition is a supreme form of computation. The key idea behind this new paradigm is to mimic the human brain as well as that of other mammals with echolocation capabilities which continuously learn and react to stimulations according to four basic processes: perception-action cycle, memory, attention, and intelligence. The Impact of Cognition on Radar Technology is an essential exploration of the application of cognitive concepts in the development of modern phased array radar systems for surveillance. It starts by asking whether our current radar systems already have cognitive capabilities and then discusses topics including: mimicking the visual brain; applications to CFAR detection and receiver adaptation; cognitive radar waveform design for spectral compatibility; cognitive optimization of the transmitter-receiver pair; theory and application of cognitive control; cognition in radar target tracking; anticipative target tracking; cognition in MIMO radar, electronic warfare, and synthetic aperture radar. The book concludes with a cross-disciplinary review of cognition studies with potential lessons for radar systems.

image of Fuzzy Logic Control in Energy Systems with design applications in MATLAB®/Simulink®
  • Fuzzy Logic Control in Energy Systems with design applications in MATLAB®/Simulink®
  • Modern electrical power systems are facing complex challenges, arising from distributed generation and intermittent renewable energy. Fuzzy logic is one approach to meeting this challenge and providing reliability and power quality. The book is about fuzzy logic control and its applications in managing, controlling and operating electrical energy systems. It provides a comprehensive overview of fuzzy logic concepts and techniques required for designing fuzzy logic controllers, and then discusses several applications to control and management in energy systems. The book incorporates a novel fuzzy logic controller design approach in both Matlab® and in Matlab Simulink& so that the user can study every step of the fuzzy logic processor, with the ability to modify the code. Fuzzy Logic Control in Energy Systems is an important read for researchers and practicing engineers in energy engineering and control, as well as advanced students involved with power system research and operation.

image of Transceiver and System Design for Digital Communications, 5th Edition
  • Transceiver and System Design for Digital Communications, 5th Edition
  • This applied engineering reference covers a wide range of wireless communication design techniques; including link budgets, error detection and correction, adaptive and cognitive techniques, and system analysis of receivers and transmitters. Digital modulation and demodulation techniques using phase-shift keyed and frequency hopped spread spectrum systems are addressed. The book includes sections on broadband communications and home networking, satellite communications, global positioning systems (GPS), search, acquisition and track, and radar communications. Various techniques and designs are evaluated for modulating and sending digital signals, and the book offers an intuitive approach to probability plus jammer reduction methods using various adaptive processes. This title assists readers in gaining a firm understanding of the processes needed to effectively design wireless digital communication and cognitive systems with a basic understanding of radar. Transceiver and System Design for Digital Communications has been fully revised and updated in this new fifth edition, with the addition of two new chapters addressing radar communications and volume search and track. Derived from numerous training workshops taught to engineers through private courses by the authors, this book will appeal to digital wireless communications system designers in both the commercial and military sectors, in particular new engineers requiring practical design techniques and fundamental understanding of modern systems that employ digital transceivers.

image of Trusted Communications with Physical Layer Security for 5G and Beyond
  • Trusted Communications with Physical Layer Security for 5G and Beyond
  • Physical layer security is emerging as a promising means of ensuring secrecy in wireless communications. The key idea is to exploit the characteristics of wireless channels such as fading or noise to transmit a message from the source to the intended receiver while keeping this message confidential from eavesdroppers. Topics covered in Trusted Communications with Physical Layer Security for 5G and Beyond include secrecy metrics for physical layer security over fading channels; trusted wireless communications with spatial multiplexing; directional modulation enabled physical layer wireless security; secure waveform for 5G systems; confidential and energy efficient communications using physical layer security; secure data networks with channel uncertainty; antenna selection strategies for wiretap channels; physical layer security for massive MIMO systems, millimeter wave cellular networks, non-orthogonal multiple access, multiuser relay networks, cognitive radio networks, MIMOME-OFDM systems; wirelessly powered communication systems and D2D-enabled cellular networks; and security solutions and applications at the physical layer, including case studies of secret key generation and secrecy coding in communication nodes and terminals.

Latest news

  • Healthcare Technology Letters now publishing as Gold Open Access. All article processing charges will be waived for papers submitted in 2017.
    Find out more 
  • IET Author URLs - Share your work for FREE. Find out more. 
  • Help the IET to improve its support for researchers by completing a short survey ‘Understanding researchers needs’.Find out more
  • IET Biometrics receives its inaugural Impact Factor of 0.857. Find out more
  • Professor Chris Toumazou, co-Editor-in-Chief of IETs prestigious Electronics Letters, has been featured in "Electronics Weekly"
    Find out more
  • Editage partners with the Institution of Engineering and Technology (IET) to offer pre-submission editing and language services
    Find out more
  • Author Interview with Hubert Trzaska
    Find out more
  • Access 6500+ engineering and technology videos on the new IET.tv platform.
    Find out more
  • IET and CIE sign co-publishing agreement
    Find out more
  • IET and key publishers address need to improve conference content quality. Find out more and read the full press release here
  • The new IET 2015 Publishing Catalogues are now available
    Find out more
View more

Most viewed content

Content
8
4
Loading

Popular topics

This is a required field
Please enter a valid email address