|
Showing 1 - 11 of
11 matches in All Departments
This book focuses on the issue of optimizing radio resource
allocation (RRA) and user admission control (AC) for multiple
multicasting sessions on a single high altitude platform (HAP) with
multiple antennas on-board. HAPs are quasi-stationary aerial
platforms that carry a wireless communications payload to provide
wireless communications and broadband services. They are meant to
be located in the stratosphere layer of the atmosphere at altitudes
in the range 17-22 km and have the ability to fly on demand to
temporarily or permanently serve regions with unavailable
telecommunications infrastructure. An important requirement that
the book focusses on is the development of an efficient and
effective method for resource allocation and user admissions for
HAPs, especially when it comes to multicasting. Power, frequency,
space (antennas selection) and time (scheduling) are the resources
considered in the problem over an orthogonal frequency division
multiple access (OFDMA) HAP system. Due to the strong dependence of
the total number of users that could join different multicast
groups, on the possible ways we may allocate resources to these
groups, it is of significant importance to consider a joint user to
session assignments and RRA across the groups. From the service
provider's point of view, it would be in its best interest to be
able to admit as many higher priority users as possible, while
satisfying their quality of service requirements. High priority
users could be users subscribed in and paying higher for a service
plan that gives them preference of admittance to receive more
multicast transmissions, compared to those paying for a lower
service plan. Also, the user who tries to join multiple multicast
groups (i.e. receive more than one multicast transmission), would
have preferences for which one he would favor to receive if
resources are not enough to satisfy the QoS requirements. Technical
topics discussed in the book include: - Overview on High Altitude
Platforms, their different types and the recent works in this area
- Radio Resource Allocation and User Admission Control in HAPs -
Multicasting in a Single HAP System: System Model and Mathematical
Formulation - Optimization schemes that are designed to enhance the
performance of a branch and bound technique by taking into account
special mathematical structure in the problem formulation
Today, more than ever, the pharmacist is a full-member of the
health team and many of the pharmacist's patients are using a host
of other devices from various specialty areas of medicine and
surgery. Medical Devices for Pharmacy and Other Healthcare
Professions presents a comprehensive review of most devices that
pharmacists and pharmacy personnel encounter during practice. The
devices covered are relevant to pharmacists working in various work
settings from hospitals, community pharmacies, and health insurance
sector, to regulatory bodies, academia, and research institutes.
Even if a pharmacist does not come across each of these devices on
a regular basis, the book is a valuable reference source for those
occasions when information is needed by a practitioner, and for
instructing interns and residents. The book discusses devices
needed for special pharmaceutical services and purposes such as
residential care homes and primary care based with GPs,
pharmacy-based smoking cessation services, pharmacy-based
anticoagulant services, pain management and terminal care,
medication adherence and automation in hospital pharmacy.
Additional features include: Provides information on devices
regarding theory, indications, and procedures concerning use,
cautions, and place, in therapy. Assists pharmacists in
understanding medical devices and instructing patients with the use
of these devices. Focuses on providing the available evidence on
effectiveness and cost-effectiveness of devices and the latest
information in the particular field. Other healthcare providers
interested in medical devices or involved in patients care where
medical devices represent part of the provided care would benefit
from the book.
Presenting encryption algorithms with diverse characteristics,
Image Encryption: A Communication Perspective examines image
encryption algorithms for the purpose of secure wireless
communication. It considers two directions for image encryption:
permutation-based approaches and substitution-based approaches.
Covering the spectrum of image encryption principles and
techniques, the book compares image encryption with permutation-
and diffusion-based approaches. It explores number theory-based
encryption algorithms such as the Data Encryption Standard, the
Advanced Encryption Standard, and the RC6 algorithms. It not only
details the strength of various encryption algorithms, but also
describes their ability to work within the limitations of wireless
communication systems. Since some ciphers were not designed for
image encryption, the book explains how to modify these ciphers to
work for image encryption. It also provides instruction on how to
search for other approaches suitable for this task. To make this
work comprehensive, the authors explore communication concepts
concentrating on the orthogonal frequency division multiplexing
(OFDM) system and present a simplified model for the OFDM
communication system with its different implementations. Complete
with simulation experiments and MATLAB (R) codes for most of the
simulation experiments, this book will help you gain the
understanding required to select the encryption method that best
fulfills your application requirements.
Presenting encryption algorithms with diverse characteristics,
Image Encryption: A Communication Perspective examines image
encryption algorithms for the purpose of secure wireless
communication. It considers two directions for image encryption:
permutation-based approaches and substitution-based approaches.
Covering the spectrum of image encryption principles and
techniques, the book compares image encryption with permutation-
and diffusion-based approaches. It explores number theory-based
encryption algorithms such as the Data Encryption Standard, the
Advanced Encryption Standard, and the RC6 algorithms. It not only
details the strength of various encryption algorithms, but also
describes their ability to work within the limitations of wireless
communication systems. Since some ciphers were not designed for
image encryption, the book explains how to modify these ciphers to
work for image encryption. It also provides instruction on how to
search for other approaches suitable for this task. To make this
work comprehensive, the authors explore communication concepts
concentrating on the orthogonal frequency division multiplexing
(OFDM) system and present a simplified model for the OFDM
communication system with its different implementations. Complete
with simulation experiments and MATLAB (R) codes for most of the
simulation experiments, this book will help you gain the
understanding required to select the encryption method that best
fulfills your application requirements.
BOOK SUMMARY Sitaad is a genre of religious panegyrics laced with
spirituality and a yearning to emulate and fuse with some respected
earlier women of Islam - most notably Fatima (the daughter of
Prophet Muhammad - Peace and blessings be upon him) and others who
lived before the coming of Islam such as Xaawa (Eve). The term
Xaawaleey which can be translated as 'the party of Eve' alludes to
that common bond and shared identify among women which transcends
time, space and belief. Other than its spiritual significance, it
is a medium where some women turn up to temper any negative
feelings giving them trouble, and eventually it assists them
reconcile with the reality of world they live in. When the
incanting, often accompanied by clapping and drumming, reaches its
climax, some even pass into ecstasy and spiritual intoxication
(jibbo), in which they later emerge strong out of the session,
relieved, full of optimism and energy to face the challenges of
their immediate future. For children, it is a festive occasion and
for wayfarers, a place where they can quench their thirst and
satiate their hunger. Moreover, in contrast to the local
contemporary women institutions working in women empowerment
programs whose actions are often looked at by most men with
suspicion, women of Sitaad never use it as a forum to conspire
against men or challenge their hegemony. Instead, they use such
occasions in consoling those among them who suffered bereavement or
experienced misfortune, help their sick and poor, and enjoin the
good and advice themselves against evil doing. An ideal character
every women of Sitaad wants to be identified with is Raalliyo (the
Good Woman) which is synonymous to the Arabic word Mar'at-u-Saliha
who has a place of esteem in Islam. A woman who is Raalliyo can be
contrasted with Arliyo - an unruly and rebellious one. This book
looks into the history of Sitaad and its place in the Somali
culture. It also looks into the transformation it has gone through
during the past two decades and the impact of contemporary
revivalist Islamic movements on its continuity. While the book
underlines the important role women of Sitaad played in
disseminating some basic facts about Islam within the circles of
womenfolk, it also laments the attitude of men that deprived them
the right to learn and practice their faith. The women were seen
only to serve assisting their husbands in fulfilling their
spiritual journey leading to the bliss. Finally, the book also
documents more than a dozen Sitaad songs discussing different
issues such as spirituality, fidelity, peace, philanthropy etc. It
is also a reflection of the concerns and yearning of Somali women
which has always been overlooked.
|
|