![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Electronics & communications engineering > Communications engineering / telecommunications > General
Instructs advanced and important analysis methods which are frequently used for researchers, engineers and students who work on applications of electromagnetic waves to microwave devices and antennas. The book also includes various numerical techniques.
The objective of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012) is to facilitate an exchange of information on best practices for the latest research advances in the area of communications, networks and intelligence applications. These mainly involve computer science and engineering, informatics, communications and control, electrical engineering, information computing, and business intelligence and management. "Proceedings of the 2nd International Conference on Green Communications and Networks 2012 (GCN 2012)" will focus on green information technology and applications, which will provide in-depth insights for engineers and scientists in academia, industry, and government. The book addresses the most innovative research developments including technical challenges, social and economic issues, and presents and discusses the authors' ideas, experiences, findings, and current projects on all aspects of advanced green information technology and applications. Yuhang Yang is a professor at the Department of Electronic Engineering, Shanghai Jiao Tong University. Maode Ma is an associate professor at the School of Electrical & Electronic Engineering, Nanyang Technological University.
IT securiteers - The human and technical dimension working for the organisation. Current corporate governance regulations and international standards lead many organisations, big and small, to the creation of an information technology (IT) security function in their organisational chart or to the acquisition of services from the IT security industry. More often than desired, these teams are only useful for companies' executives to tick the corresponding box in a certification process, be it ISO, ITIL, PCI, etc. Many IT security teams do not provide business value to their company. They fail to really protect the organisation from the increasing number of threats targeting its information systems. IT Security Management provides an insight into how to create and grow a team of passionate IT security professionals. We will call them "securiteers." They will add value to the business, improving the information security stance of organisations.
This book presents the most important fault-tolerant distributed programming abstractions and their associated distributed algorithms, in particular in terms of reliable communication and agreement, which lie at the heart of nearly all distributed applications. These programming abstractions, distributed objects or services, allow software designers and programmers to cope with asynchrony and the most important types of failures such as process crashes, message losses, and malicious behaviors of computing entities, widely known under the term "Byzantine fault-tolerance". The author introduces these notions in an incremental manner, starting from a clear specification, followed by algorithms which are first described intuitively and then proved correct. The book also presents impossibility results in classic distributed computing models, along with strategies, mainly failure detectors and randomization, that allow us to enrich these models. In this sense, the book constitutes an introduction to the science of distributed computing, with applications in all domains of distributed systems, such as cloud computing and blockchains. Each chapter comes with exercises and bibliographic notes to help the reader approach, understand, and master the fascinating field of fault-tolerant distributed computing.
This book covers control theory signal processing and relevant applications in a unified manner. It introduces the area, takes stock of advances, and describes open problems and challenges in order to advance the field. The editors and contributors to this book are pioneers in the area of active sensing and sensor management, and represent the diverse communities that are targeted.
Focusing on the nuts and bolts of wireless network access for computers on board vehicles, this volume shows how in-car computerization now does much more than merely act as a glorified map-reader. Wireless communication is transforming road travel in ways previously undreamt of, allowing vehicles to "talk" to a wider network and monitor road conditions, potential delays and traffic congestion, all automatically. Toll payments can be made without opening the driver's window on a cold day, while vehicles might themselves take active steps to avoid collisions. It is the connection between on-board computers and wireless access points, ubiquitous in most cities now, that is a key area of research. Moving vehicles transfer their communications to new points as they progress, and this causes delays, known as "handover latency." In this book, new stochastic models are developed to map the disruption when connecting to 802.11 WLAN points. It details the application of stochastic tools to analyzing communication networks, as well as previous literature on handover latency and relevant mathematical modeling. Finally, it presents a scheme for monitoring traffic congestion using WLAN connectivity. This volume will be a useful addition to the libraries both of wireless communication students and those studying probability theory."
Thewritingofthisbookhasbeeninspiredbytheexperienceofteachinga courseonDetectionandSignalProcessingtograduatestudentsoveraperiod ofmanyyears. Itwasstrikingthatstudentswerenotonlyfascinatedbythe variousdetectionprinciplesandtechnicalperformancesofpracticalsystems, butalsobytheprofessionalismoftheinvolved typical physicalengine- ing. Usuallystudentsarethoroughlytaughtindi?erentcoursesofphysics, whicharemostlystudiedasisolated?elds. Thecourseondetectionands- nalprocessingisbasedontypicalresultsthatwereestablishedindi?erent disciplines like optics, solid state physics, thermodynamics, mathematical statistics,Fouriertransforms,andelectroniccircuitry. Theirsimultaneousand interdependentapplicationbroadenstheinsightofmutualrelationsinthev- ious?elds. Forinstancethe?uctuationsofthermalbackgroundradiationcan bederivedeitherwiththeblackbodytheoryorindependentlywithther- dynamicstoarriveatthesameresult. AlsotheappliedFourierrelationsin thefrequencyandtimedomainsarenolongerabstractmathematicalman- ulationsbutpracticaltoolsandprobablyeasiertounderstandintheapplied technique. Estimatesoftheorderofmagnitudeswithcomparisonofrelevant physicale?ectsnecessarybydesigningadeviceareveryinstructive. Ingeneral theachievementsofvariousdisciplinesarebroughttogethertodesignandto evaluatequantitativelythetechnicalperformancesofdetectiontechniques. Thustheinterestfordetectionandsignalprocessingisbothtolearnthe knowledgefordesigningpracticaldetectionsystemsandtogetacquainted withthethinkingofphysicalengineering. The?rstpartofthebookisdevotedtonoisephenomenaandradiation detectors. Fundamentaldescriptionswithquantitativeanalysesoftheund- lyingphysicalprocessesofbothdetectorsandaccompanyingnoiseleadto understandthepotentialswithrespecttosensitivityandoperatingfrequency domain. Thesecondpartdealswithampli?cationproblemsandtherecovery ofrepetitivesignalsburiedinnoise. Thelastpartisdevotedtosolvingthe problemsconnectedwithreachingtheultimatedetectionlimitorquantum limit. Thisisdoneforheterodynedetectionandphotoncounting. Although VIII Preface heterodynedetectionyieldstheultimatesensitivity,itsspatialmodesel- tivityand,ingeneral,thelowspectralpowerdensityofthesignalrequire sophisticatedprovisions. Thisisdiscussedindetail. Theinherentproblemsare analyzedandappropriatetechnicalsolutionsaredescribedtoreachtheul- matesensitivityfordetectingincoherentradiationandcommunicationsignals thatarerandomlyDopplershifted. Theresultsareillustratedwithexamples ofspacecommunication. Hengelo(O),January2006 W. J. Witteman Contents 1 RandomFluctuations...1 1. 1 Introduction...1 1. 2 ThermalNoiseofResistance...2 1. 3 ShotNoise...5 1. 3. 1 SpectralDistribution ...6 1. 3. 2 Photons...10 1. 4 FlickerNoise...10 1. 5 Generation-RecombinationNoise...10 1. 6 ThermalRadiationandItsFluctuations...13 1. 7 TemperatureFluctuationsofSmallBodies...18 1. 7. 1 AbsorptionandEmissionFluctuations...20 2 Signal-NoiseRelations...21 2. 1 SignalLimitation...22 2. 2 BackgroundLimitation...22 2. 2. 1 IdealDetection...24 2. 3 JohnsonNoise...27 2. 4 DarkCurrentNoise...27 2. 5 NoiseandSensitivity...28 2. 6 Ampli?erNoiseandMismatching...28 3 ThermalDetectors...31 3. 1 ThermocoupleandThermopile...31 3. 2 Bolometer...36 3. 2. 1 MetallicBolometer...39 3. 2. 2 Thermistor...40 3. 3 PyroelectricDetector...44 4 VacuumPhotodetectors...51 4. 1 VacuumPhotodiode...52 4. 2 Photomultiplier...56 X Contents 5 SemiconductorPhotodetectors...61 5. 1 Photoconductors...6 1 5. 1. 1 AnalysisoftheDetectionProcess...64 5. 1. 2 FrequencyResponse ...69 5. 2 Photodiodes...69 5. 2. 1 P-NJunction...70 5. 2. 2 Current-VoltageCharacteristic...72 5. 2. 3 PhotonExcitation...75 5. 2. 4 OperationalModes...79 5. 2. 5 OpenCircuit ...80 5. 2. 6 CurrentCircuit...82 5. 2. 7 Reverse-BiasedCircuit...83 5. 3 AvalanchePhotodiodes...
The purpose of this book is to provide tools for a better understanding of the fundamental tradeo's and interdependencies in wireless networks, with the goal of designing resource allocation strategies that exploit these int- dependencies to achieve signi?cant performance gains. Two facts prompted us to write it: First, future wireless applications will require a fundamental understanding of the design principles and control mechanisms in wireless networks. Second, the complexity of the network problems simply precludes the use of engineering common sense alone to identify good solutions, and so mathematics becomes the key avenue to cope with central technical problems in the design of wireless networks. In this book, two ?elds of mathematics play a central role: Perron-Frobenius theory for non-negative matrices and optimization theory. This book is a revised and expanded version of the research monograph "Resource Allocation in Wireless Networks" that was published as Lecture Notes in Computer Sciences (LNCS 4000) in 2006. Although the general structure has remained unchanged to a large extent, the book contains - merous additional results and more detailed discussion. For instance, there is a more extensive treatment of general nonnegative matrices and interf- ence functions that are described by an axiomatic model. Additional material on max-min fairness, proportional fairness, utility-based power control with QoS (quality of service) support and stochastic power control has been added.
The book reports on the latest advances in and applications of fractional order control and synchronization of chaotic systems, explaining the concepts involved in a clear, matter-of-fact style. It consists of 30 original contributions written by eminent scientists and active researchers in the field that address theories, methods and applications in a number of research areas related to fractional order control and synchronization of chaotic systems, such as: fractional chaotic systems, hyperchaotic systems, complex systems, fractional order discrete chaotic systems, chaos control, chaos synchronization, jerk circuits, fractional chaotic systems with hidden attractors, neural network, fuzzy logic controllers, behavioral modeling, robust and adaptive control, sliding mode control, different types of synchronization, circuit realization of chaotic systems, etc. In addition to providing readers extensive information on chaos fundamentals, fractional calculus, fractional differential equations, fractional control and stability, the book also discusses key applications of fractional order chaotic systems, as well as multidisciplinary solutions developed via control modeling. As such, it offers the perfect reference guide for graduate students, researchers and practitioners in the areas of fractional order control systems and fractional order chaotic systems.
Designed for information systems professionals, including IS, DP, MIS, LAN, and systems managers, this text provides a source of introductory information for those involved with decision-making processes related to information systems. Suitable as a University course text in MIS programs, the book also covers the subject in sufficient detail for the more technically orientated. This text describes how to reap the benefits of improved efficiency and productivity through the use of document imaging systems that reduce access time and enhance document integrity.
This book provides a comprehensive analysis of Brooks-Iyengar Distributed Sensing Algorithm, which brings together the power of Byzantine Agreement and sensor fusion in building a fault-tolerant distributed sensor network. The authors analyze its long-term impacts, advances, and future prospects. The book starts by discussing the Brooks-Iyengar algorithm, which has made significant impact since its initial publication in 1996. The authors show how the technique has been applied in many domains such as software reliability, distributed systems and OS development, etc. The book exemplifies how the algorithm has enhanced new real-time features by adding fault-tolerant capabilities for many applications. The authors posit that the Brooks-Iyengar Algorithm will to continue to be used where fault-tolerant solutions are needed in redundancy system scenarios. This book celebrates S.S. Iyengar's accomplishments that led to his 2019 Institute of Electrical and Electronics Engineers' (IEEE) Cybermatics Congress "Test of Time Award" for his work on creating Brooks-Iyengar Algorithm and its impact in advancing modern computing.
This book presents bond graph model-based fault detection with a focus on hybrid system models. The book addresses model design, simulation, control and model-based fault diagnosis of multidisciplinary engineering systems. The text beings with a brief survey of the state-of-the-art, then focuses on hybrid systems. The author then uses different bond graph approaches throughout the text and provides case studies.
This book features a collection of high-quality research papers presented at the International Conference on Advanced Computing Technology (ICACT 2020), held at the SRM Institute of Science and Technology, Chennai, India, on 23-24 January 2020. It covers the areas of computational intelligence, artificial intelligence, machine learning, deep learning, big data, and applications of artificial intelligence in networking, IoT and bioinformatics
This is a research and reference guide to the telecommunications industry in the United States, providing an account of legislative and policy changes up until the publication of the work. Contributions by scholars in telecommunications law and policy survey the post-1996 legislative field, giving overviews of the 1996 Act itself, the impact of the legislation on national and international competition, regulation of the industry and the MCI/FCC cases in California, mergers and acquisitions, taxation and FCC reform.
This book presents an overview of the field of multimodal location estimation. The authors' aim is to describe the research results in this field in a unified way. The book describes fundamental methods of acoustic, visual, textual, social graph, and metadata processing as well as multimodal integration methods used for location estimation. In addition, the book covers benchmark metrics and explores the limits of the technology based on a human baseline. The book also outlines privacy implications and discusses directions for future research in the area.
In the last two decades, the field of time-frequency analysis has evolved into a widely recognized and applied discipline of signal processing. Besides linear time-frequency representations such as the short-time Fourier transform, the Gabor transform, and the wavelet transform, an important contribution to this development has undoubtedly been the Wigner distribution (WD) which holds an exceptional position within the field of bilinear/quadratic time-frequency representations. The WD was first defined in quantum mechanics as early as 1932 by the later Nobel laureate E. Wigner. In 1948, J. Ville introduced this concept in signal analysis. Based on investigations of its mathematical structure and properties by N.G. de Bruijn in 1967, the WD was brought to the attention of a larger signal processing community in 1980. The WD was soon recognized to be important for two reasons: firstly, it provides a powerful theoretical basis for quadratic time-frequency analysis; secondly, its discrete-time form (supplemented by suitable windowing and smoothing) is an eminently practical signal analysis tool. The seven chapters of this book cover a wide range of different aspects of the WD and other linear time-frequency distributions: properties such as positivity, spread, and interference term geometry; signal synthesis methods and their application to signal design, time-frequency filtering, and signal separation; WD based analysis of nonstationary random processes; singular value decompositions and their application to WD based detection and classification; and optical applications of the WD. The size of the chapters has been chosen such that an in-depth treatment of the various topics isachieved.
This book focuses on partitional clustering algorithms, which are commonly used in engineering and computer scientific applications. The goal of this volume is to summarize the state-of-the-art in partitional clustering. The book includes such topics as center-based clustering, competitive learning clustering and density-based clustering. Each chapter is contributed by a leading expert in the field.
This book presents cutting-edge results on stability analysis and control scheme designs for networked teleoperation systems. It highlights new research on commonly encountered nonlinear teleoperation systems, including the stability analysis of teleoperation systems with asymmetric time-varying delays, stability analysis of teleoperation systems with interval time delays, and so on. Moreover, the book presents several high-performance control scheme designs for teleoperation systems when the velocity is available and unavailable, and for systems with nonlinear input. The results presented here mark a substantial contribution to nonlinear teleoperation system theory, robotic control theory and networked control system theory. As such, the book will be of interest to university researchers, R&D engineers and graduate students in control theory and control engineering who wish to learn about the core principles, methods, algorithms, and applications of networked teleoperation systems, robotic systems and nonlinear control systems.
This book is the result of the first International Conference ICT Innovations 2009. The ICT Innovations conference is the primary scientific action of the Macedonian Society on Information and Communication Technologies (ICT-ACT). It promotes the publication of scientific results of the international community related to innovative fundamental and applied research in ICT. Today, ICT has enlarged its horizons and it is practiced under multidisciplinary contexts that introduce new challenges to theore- cal and technical approaches. The ICT Innovations 2009 conference gathered academics, professionals and pr- titioners reporting their valuable experiences in developing solutions and systems in the industrial and business arena especially innovative commercial implementations, novel applications of technology, and experience in applying recent research advances to practical situations, in any ICT areas. The conference focuses on issues concerning a variety of ICT fields like: * Multimedia Information Systems * Artificial Intelligence * Pervasive and Ubiquitous Computing * Eco and Bio Informatics * Internet and Web Applications and Services * Wireless and Mobile Communications and Services * Computer Networks, Security and Cryptography * Distributed Systems, GRID and Cloud Computing ICT Innovations 2009 Conference was held in Ohrid, Macedonia, in September 28-30, 2009. Local arrangements provided by the members of the Macedonian Society on Information and Communication Technologies - ICT-ACT, mainly consisting of teaching and research staff of Computer Science Department at Faculty of Electrical Engineering and Information Technologies and Institute of Informatics at Faculty of Natural Sciences, both at Ss. Cyril and Methodius University in Skopje, Macedonia.
As an important future network architecture, virtual network architecture has received extensive attention. Virtual network embedding (VNE) is one of the core services of network virtualization (NV). It provides solutions for various network applications from the perspective of virtual network resource allocation. The Internet aims to provide global users with comprehensive coverage. The network function requests of hundreds of millions of end users have brought great pressure to the underlying network architecture. VNE algorithm can provide effective support for the reasonable and efficient allocation of network resources, so as to alleviate the pressure off the Internet. At present, a distinctive feature of the Internet environment is that the quality of service (QoS) requirements of users are differentiated. Different regions, different times, and different users have different network function requirements. Therefore, network resources need to be reasonably allocated according to users' QoS requirements to avoid the waste of network resources. In this book, based on the analysis of the principle of VNE algorithm, we provide a VNE scheme for users with differentiated QoS requirements. We summarize the common user requirements into four categories: security awareness, service awareness, energy awareness, and load balance, and then introduce the specific implementation methods of various differentiated QoS algorithms. This book provides a variety of VNE solutions, including VNE algorithms for single physical domain, VNE algorithms for across multiple physical domains, VNE algorithms based on heuristic method, and VNE algorithms based on machine learning method.
This comprehensive book makes the important technologies and mathematical concepts behind today's optical communications systems accessible and understandable to practicing and future electrical and communication engineers. Featuring nearly 400 figures and over 900 equations, the book provides the practical engineering details and mathematical tools necessary to analyze and design optical fiber systems.
The most recent design and system applications of OF amplifiers are comprehensively described in this detailed book. With specific focus on the latest telecommunication engineering issues, it reviews all significant properties of optical fiber amplifiers and presents highly accurate models for erbium-, neodymium-, and praseodymium- doped fiver amplifiers. |
![]() ![]() You may like...
Academic Press Library in Signal…
Sergios Theodoridis, Rama Chellappa
Hardcover
R4,319
Discovery Miles 43 190
Enabling Technologies for Social…
Diep N. Nguyen, Dinh Thai Hoang, …
Hardcover
Practical Industrial Data Networks…
Steve Mackay, Edwin Wright, …
Paperback
R1,540
Discovery Miles 15 400
|