![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering
This book presents a comprehensive framework for IoT, including its architectures, security, privacy, network communications, and protocols. The book starts by providing an overview of the aforementioned research topics, future directions and open challenges that face the IoT development. The authors then discuss the main architectures in the field, which include Three- and Five-Layer Architectures, Cloud and Fog Based Architectures, a Social IoT Application Architecture. In the security chapter, the authors outline threats and attacks, privacy preservation, trust and authentication, IoT data security, and social awareness. The final chapter presents case studies including smart home, wearables, connected cars, industrial Internet, smart cities, IoT in agriculture, smart retail, energy engagement, IoT in healthcare, and IoT in poultry and farming. Discusses ongoing research into the connection of the physical and virtual worlds; Includes the architecture, security, privacy, communications, and protocols of IoT; Presents a variety of case studies in IoT including wearables, smart cities, and energy management.
This book explores the ways in which the broad range of technologies that make up the smart city infrastructure can be harnessed to incorporate more playfulness into the day-to-day activities that take place within smart cities, making them not only more efficient but also more enjoyable for the people who live and work within their confines. The book addresses various topics that will be of interest to playable cities stakeholders, including the human-computer interaction and game designer communities, computer scientists researching sensor and actuator technology in public spaces, urban designers, and (hopefully) urban policymakers. This is a follow-up to another book on Playable Cities edited by Anton Nijholt and published in 2017 in the same book series, Gaming Media and Social Effects.
This book presents the state-of-the art of one of the main concerns with microprocessors today, a phenomenon known as "dark silicon". Readers will learn how power constraints (both leakage and dynamic power) limit the extent to which large portions of a chip can be powered up at a given time, i.e. how much actual performance and functionality the microprocessor can provide. The authors describe their research toward the future of microprocessor development in the dark silicon era, covering a variety of important aspects of dark silicon-aware architectures including design, management, reliability, and test. Readers will benefit from specific recommendations for mitigating the dark silicon phenomenon, including energy-efficient, dedicated solutions and technologies to maximize the utilization and reliability of microprocessors.
Since its inception in 1966, the series of numbered volumes known
as "Semiconductors and Semimetals" has distinguished itself through
the careful selection of well-known authors, editors, and
contributors. The "Willardson and Beer" Series, as it is widely
known, has succeeded in publishing numerous landmark volumes and
chapters. Not only did many of these volumes make an impact at the
time of their publication, but they continue to be well-cited years
after their original release. Recently, Professor Eicke R. Weber of
the University of California at Berkeley joined as a co-editor of
the series. Professor Weber, a well-known expert in the field of
semiconductor materials, will further contribute to continuing the
series' tradition of publishing timely, highly relevant, and
long-impacting volumes. Some of the recent volumes, such as
"Hydrogen in Semiconductors, Imperfections in III/V Materials,
Epitaxial Microstructures, High-Speed Heterostructure Devices,
Oxygen in Silicon, " and others promise that this tradition will be
maintained and even expanded. Reflecting the truly
interdisciplinary nature of the field that the series covers, the
volumes in "Semiconductors and Semimetals" have been and will
continue to be of great interest to physicists, chemists, materials
scientists, and device engineers in modern industry.
This book introduces new methods to analyze vertex-varying graph signals. In many real-world scenarios, the data sensing domain is not a regular grid, but a more complex network that consists of sensing points (vertices) and edges (relating the sensing points). Furthermore, sensing geometry or signal properties define the relation among sensed signal points. Even for the data sensed in the well-defined time or space domain, the introduction of new relationships among the sensing points may produce new insights in the analysis and result in more advanced data processing techniques. The data domain, in these cases and discussed in this book, is defined by a graph. Graphs exploit the fundamental relations among the data points. Processing of signals whose sensing domains are defined by graphs resulted in graph data processing as an emerging field in signal processing. Although signal processing techniques for the analysis of time-varying signals are well established, the corresponding graph signal processing equivalent approaches are still in their infancy. This book presents novel approaches to analyze vertex-varying graph signals. The vertex-frequency analysis methods use the Laplacian or adjacency matrix to establish connections between vertex and spectral (frequency) domain in order to analyze local signal behavior where edge connections are used for graph signal localization. The book applies combined concepts from time-frequency and wavelet analyses of classical signal processing to the analysis of graph signals. Covering analytical tools for vertex-varying applications, this book is of interest to researchers and practitioners in engineering, science, neuroscience, genome processing, just to name a few. It is also a valuable resource for postgraduate students and researchers looking to expand their knowledge of the vertex-frequency analysis theory and its applications. The book consists of 15 chapters contributed by 41 leading researches in the field.
A concise, updated guide to the 3GPP LTE Security Standardization specifications A welcome Revised Edition of the successful "LTE Security" addressing the security architecture for SAE/LTE, which is based on elements of the security architectures for GSM and 3G, but which needed a major redesign due to the significantly increased complexity, and different architectural and business requirements of fourth generation systems. The authors explain in detail the security mechanisms employed to meet these requirements. The specifications generated by standardization bodies only inform about how to implement the system (and this only to the extent required for interoperability), but almost never inform readers about why things are done the way they are. Furthermore, specifications tend to be readable only for a small group of experts and lack the context of the broader picture. The book fills this gap by providing first hand information from insiders who participated in decisively shaping SAE/LTE security in the relevant standardization body, 3GPP, and can therefore explain the rationale for design decisions in this area.A concise, fully updated guide to the 3GPP LTE Security Standardization specificationsDescribes the essential elements of LTE and SAE Security, written by leading experts who participated in decisively shaping SAE/LTE security in the relevant standardization body, 3GPPExplains the rationale behind the standards specifications giving readers a broader understanding of the context to these specificationsIncludes new chapters covering 3GPP work on system enhancements for MTC, plus application layer security in ETSI TC M2M and embedded smart card in ETSI SCP; Security for Machine-type Communication, Relay Node Security, and Future Challenges, including Voice over LTE, MTC, Home base stations, LIPA/SIPTO, and New Cryptographic Algorithms Essential reading for System engineers, developers and people in technical sales working in the area of LTE and LTE security, communication engineers and software developers in mobile communication field.
This book reports on the formulation of a multi-stage optimization framework for the Danish power system, taking into account the real operational cost, the voltage constraints and the uncertainty associated to the forecasting errors of the wind power. It describes in detail the implementation of this framework into a simulation platform and its validation in real-world applications. The book especially focuses on automatic voltage control systems and on methods to handle uncertainty in them. All in all, it provides readers with a comprehensive overview of power system optimization and future trends in power system operation.
These proceedings present selected research papers from CSNC2017, held during 23th-25th May in Shanghai, China. The theme of CSNC2017 is Positioning, Connecting All. These papers discuss the technologies and applications of the Global Navigation Satellite System (GNSS), and the latest progress made in the China BeiDou System (BDS) especially. They are divided into 12 topics to match the corresponding sessions in CSNC2017, which broadly covered key topics in GNSS. Readers can learn about the BDS and keep abreast of the latest advances in GNSS techniques and applications.
Atlantic Communications examines the historical development of communications technology and its impact on German-American relations from the 17th to the 20th century. Chronologically organized, the book is divided into five parts, each scrutinizing one or two central themes connected to the specific time period and technology involved. The book starts with speech as a dominant medium of the 17th and 18th centuries, when cultural brokers played a significant role in producing and spreading knowledge about America. During the 19th century, the technological competition between the old and the new world became a driving force for the history of transatlantic relations. This competition developed new dimensions with the invention of the telegraph and the emergence of news agencies. Information became commercialized. technologically possible. Print media, daily journals and especially weekly magazines became the medium of a critical style of journalism. The Muckrakers, representatives of a political and intellectual elite, criticized the social and cultural consequences of technological progress, thereby highlighting the negative effects of modernization. During the 1920s and 1930s, radio developed as a new mass medium, the first one to be used widely for political purposes. Not only did Josef Goebbels recognize the political possibilities of reaching the people directly via radio, Franklin Roosevelt used the radio as well to transmit his political messages in the form of fireside chats. to communicate the past, especially the historical experience of the Holocaust. Specific cultures of memory developed in both America and Germany. The demand to tackle the psychological and social problems stemming from the experiences during the Third Reich, advocated especially by the student movement, was most successfully taken up by the media. The television miniseries Holocaust had a far more profound impact on the public than efforts taken by school teachers, history professors or the institutions for political education who were officially in charge of Vergangenheitsbewaltigung.
This book provides information about wireless systems and WIMAX modeling. The authors provide various techniques for the WiMAX systems such as antenna diversity and Alamouti coding. The performance of these systems is tested using various types of data and the results of systems are presented and discussed. Additional topics include WiMAX simulation using diversity techniques and real time WiMAX system modeling. The book pertains to researchers, academics, students, and professionals. Provides information about wireless system modeling and WiMAX systems; Presents WiMAX system modeling using antenna diversity techniques and the Alamouti coding scheme; Includes real time WiMAX system modeling for speech signal and digital images.
This book precisely formulates and simplifies the presentation of Instruction Level Parallelism (ILP) compilation techniques. It uniquely offers consistent and uniform descriptions of the code transformations involved. Due to the ubiquitous nature of ILP in virtually every processor built today, from general purpose CPUs to application-specific and embedded processors, this book is useful to the student, the practitioner and also the researcher of advanced compilation techniques. With an emphasis on fine-grain instruction level parallelism, this book will also prove interesting to researchers and students of parallelism at large, in as much as the techniques described yield insights that go beyond superscalar and VLIW (Very Long Instruction Word) machines compilation and are more widely applicable to optimizing compilers in general. ILP techniques have found wide and crucial application in Design Automation, where they have been used extensively in the optimization of performance as well as area and power minimization of computer designs.
This book thoroughly examines and explains the basic processing steps used in MEMS fabrication (both integrated circuit and specialized micro machining processing steps. The book places an emphasis on the process variations in the device dimensions resulting from these commonly used processing steps. This will be followed by coverage of commonly used metrology methods, process integration and variations in material properties, device parameter variations, quality assurance and control methods, and design methods for handling process variations. A detailed analysis of future methods for improved microsystems manufacturing is also included. This book is a valuable resource for practitioners, researchers and engineers working in the field as well as students at either the undergraduate or graduate level.
This book describes the integrated circuit supply chain flow and discusses security issues across the flow, which can undermine the trustworthiness of final design. The author discusses and analyzes the complexity of the flow, along with vulnerabilities of digital circuits to malicious modifications (i.e. hardware Trojans) at the register-transfer level, gate level and layout level. Various metrics are discussed to quantify circuit vulnerabilities to hardware Trojans at different levels. Readers are introduced to design techniques for preventing hardware Trojan insertion and to facilitate hardware Trojan detection. Trusted testing is also discussed, enabling design trustworthiness at different steps of the integrated circuit design flow. Coverage also includes hardware Trojans in mixed-signal circuits.
This book offers a new perspective and deeper understanding of complex socioeconomic systems, and explores the laws and mechanisms of erring by revealing the system structure, i.e., the context in which errors are imbedded. It proposes a number of new concepts for the field of systems science concerning the forces affecting e.g. system structure, subsystem structures, and system elements. Given its scope, it offers an excellent reference book for researchers and other readers in the fields of systems science, management science, mathematics, fuzzy logic and sets, symbolic logic, philosophy, etc. The book can also benefit researchers and practitioners in artificial intelligence and machine learning, as various erring patterns can be identified by training intelligent machines with big data (i.e., error cases and their logic), helping to prevent or eliminate errors in a cost-effective manner.
This clearly written thesis discusses the development of a highly innovative single-photon source that uses active optical switching, known as multiplexing, to increase the probability of delivering photons into a single mode. Improving single-photon sources is critical in advancing the state of the art in photonic quantum technologies for information processing and communications.
This volume builds on the author's previous work, "RF Power Amplifiers for Wireless Communications", offering experienced engineers a more in-depth understanding of the theory and design of RF power amplifiers. A useful reference tool for RF-, digital- and system-level designers, the book includes discussions on the most critical topics for professionals in the field, including envelope power management schemes and linearization. This book should be of interest to RF- and microwave-design engineers in wireless communications, as well as digital- and system-level engineers in satellite communications.
Many laser applications depend on the ability of a particular laser
to be frequency tunable. Among the many different types of
frequency tunable lasers are: dye lasers, excimer lasers, and
semiconductor lasers. Thisbook gives active researchers and
engineers the practical information they need to choose an
appropriate tunable laser for their particular applications.
This book introduces a new approach to model and predict substrate parasitic failures in integrated circuits with standard circuit design tools. The injection of majority and minority carriers in the substrate is a recurring problem in smart power ICs containing high voltage, high current switching devices besides sensitive control, protection and signal processing circuits. The injection of parasitic charges leads to the activation of substrate bipolar transistors. This book explores how these events can be evaluated for a wide range of circuit topologies. To this purpose, new generalized devices implemented in Verilog-A are used to model the substrate with standard circuit simulators. This approach was able to predict for the first time the activation of a latch-up in real circuits through post-layout SPICE simulation analysis. Discusses substrate modeling and circuit-level simulation of parasitic bipolar device coupling effects in integrated circuits; Includes circuit back-annotation of the parasitic lateral n-p-n and vertical p-n-p bipolar transistors in the substrate; Uses Spice for simulation and characterization of parasitic bipolar transistors, latch-up of the parasitic p-n-p-n structure, and electrostatic discharge (ESD) protection devices; Offers design guidelines to reduce couplings by adding specific protections.
Aims to teach the reader of the underlying principles and practical applications of digital A/V, and to show where technology is heading in the 21st century. The book shows how to screen and select A/V system components, and how to choose the best design approaches for a particular system. Broadcast and computer system-design engineers should find this a useful text for an understanding of analogue-digital conversion, video cameras, digital transmission and processing, compression, recording and storage, post-production, and more.
This book offers the first comprehensive and practice-oriented guide to condition monitoring algorithms in MATLAB (R). After a concise introduction to vibration theory and signal processing techniques, the attention is moved to the algorithms. Each signal processing algorithm is presented in depth, from the theory to the application, and including extensive explanations on how to use the corresponding toolbox in MATLAB (R). In turn, the book introduces various techniques for synthetic signals generation, as well as vibration-based analysis techniques for large data sets. A practical guide on how to directly access data from industrial condition monitoring systems (CMS) using MATLAB (R) .NET Libraries is also included. Bridging between research and practice, this book offers an extensive guide on condition monitoring algorithms to both scholars and professionals. "Condition Monitoring Algorithms in MATLAB (R) is a great resource for anyone in the field of condition monitoring. It is a unique as it presents the theory, and a number of examples in Matlab (R), which greatly improve the learning experience. It offers numerous examples of coding styles in Matlab, thus supporting graduate students and professionals writing their own codes." Dr. Eric Bechhoefer Founder and CEO of GPMS Developer of the Foresight MX Health and Usage Monitoring System
Globalization of the integrated circuit (IC) supply chains led to many potential vulnerabilities. Several attack scenarios can exploit these vulnerabilities to reverse engineer IC designs or to insert malicious trojan circuits. Split manufacturing refers to the process of splitting an IC design into multiple parts and fabricating these parts at two or more foundries such that the design is secure even when some or all of those foundries are potentially untrusted. Realizing its security benefits, researchers have proposed split fabrication methods for 2D, 2.5D, and the emerging 3D ICs. Both attack methods against split designs and defense techniques to thwart those attacks while minimizing overheads have steadily progressed over the past decade. This book presents a comprehensive review of the state-of-the-art and emerging directions in design splitting for secure split fabrication, design recognition and recovery attacks against split designs, and design techniques to defend against those attacks. Readers will learn methodologies for secure and trusted IC design and fabrication using split design methods to protect against supply chain vulnerabilities.
This book features selected papers presented at Third International Conference on Nanoelectronics, Circuits and Communication Systems (NCCS 2017). Covering topics such as MEMS and nanoelectronics, wireless communications, optical communication, instrumentation, signal processing, Internet of Things, image processing, bioengineering, green energy, hybrid vehicles, environmental science, weather forecasting, cloud computing, renewable energy, RFID, CMOS sensors, actuators, transducers, telemetry systems, embedded systems, and sensor network applications in mines, it is a valuable resource for young scholars, researchers, and academics.
This book showcases new and innovative approaches to biometric data capture and analysis, focusing especially on those that are characterized by non-intrusiveness, reliable prediction algorithms, and high user acceptance. It comprises the peer-reviewed papers from the international workshop on the subject that was held in Ancona, Italy, in October 2014 and featured sessions on ICT for health care, biometric data in automotive and home applications, embedded systems for biometric data analysis, biometric data analysis: EMG and ECG, and ICT for gait analysis. The background to the book is the challenge posed by the prevention and treatment of common, widespread chronic diseases in modern, aging societies. Capture of biometric data is a cornerstone for any analysis and treatment strategy. The latest advances in sensor technology allow accurate data measurement in a non-intrusive way, and in many cases it is necessary to provide online monitoring and real-time data capturing to support a patient's prevention plans or to allow medical professionals to access the patient's current status. This book will be of value to all with an interest in this expanding field. |
![]() ![]() You may like...
Research Anthology on Physical and…
Information R Management Association
Hardcover
R11,473
Discovery Miles 114 730
|