Electronics and communications engineering Books

3154 products


  • Optimization Techniques in Engineering

    John Wiley & Sons Inc Optimization Techniques in Engineering

    15 in stock

    Book SynopsisOPTIMIZATION TECHNIQUES IN ENGINEERING The book describes the basic components of an optimization problem along with the formulation of design problems as mathematical programming problems using an objective function that expresses the main aim of the model, and how it is to be either minimized or maximized; subsequently, the concept of optimization and its relevance towards an optimal solution in engineering applications, is explained. This book aims to present some of the recent developments in the area of optimization theory, methods, and applications in engineering. It focuses on the metaphor of the inspired system and how to configure and apply the various algorithms. The book comprises 30 chapters and is organized into two parts: Part I Soft Computing and Evolutionary-Based Optimization; and Part II Decision Science and Simulation-Based Optimization, which contains application-based chapters. Readers and users will find in the book: An overview and brief background of optimizatTable of ContentsPreface xxi Acknowledgment xxix Part 1: Soft Computing and Evolutionary-Based Optimization 1 1 Improved Grey Wolf Optimizer with Levy Flight to Solve Dynamic Economic Dispatch Problem with Electric Vehicle Profiles 3 Anjali Jain, Ashish Mani and Anwar S. Siddiqui 1.1 Introduction 4 1.2 Problem Formulation 5 1.2.1 Power Output Limits 6 1.2.2 Power Balance Limits 6 1.2.3 Ramp Rate Limits 7 1.2.4 Electric Vehicles 7 1.3 Proposed Algorithm 8 1.3.1 Overview of Grey Wolf Optimizer 8 1.3.2 Improved Grey Wolf Optimizer with Levy Flight 9 1.3.3 Modeling of Prey Position with Levy Flight Distribution 10 1.4 Simulation and Results 13 1.4.1 Performance of Improved GWOLF on Benchmark Functions 14 1.4.2 Performance of Improved GWOLF for Solving DED for the Different Charging Probability Distribution 14 1.5 Conclusion 29 References 34 xxi vii 2 Comparison of YOLO and Faster R-CNN on Garbage Detection 37 Arulmozhi M., Nandini G. Iyer, Jeny Sophia S., Sivakumar P., Amutha C. and Sivamani D. 2.1 Introduction 37 2.2 Garbage Detection 39 2.2.1 Transfer Learning-Technique 39 2.2.2 Inception-Custom Model 39 2.2.2.1 Convolutional Neural Network 40 2.2.2.2 Max Pooling 41 2.2.2.3 Stride 41 2.2.2.4 Average Pooling 41 2.2.2.5 Inception Layer 42 2.2.2.6 3*3 and 1*1 Convolution 43 2.2.2.7 You Only Look Once (YOLO) Architecture 43 2.2.2.8 Faster R-CNN Algorithm 44 2.2.2.9 Mean Average Precision (mAP) 46 2.3 Experimental Results 46 2.3.1 Results Obtained Using YOLO Algorithm 46 2.3.2 Results Obtained Using Faster R-CNN 46 2.4 Future Scope 48 2.5 Conclusion 48 References 48 3 Smart Power Factor Correction and Energy Monitoring System 51 Amutha C., Sivagami V., Arulmozhi M., Sivamani D. and Shyam D. 3.1 Introduction 51 3.2 Block Diagram 53 3.2.1 Power Factor Concept 54 3.2.2 Power Factor Calculation 54 3.3 Simulation 54 3.4 Conclusion 56 References 57 4 ANN-Based Maximum Power Point Tracking Control Configured Boost Converter for Electric Vehicle Applications 59 Sivamani D., Sangari A., Shyam D., Anto Sheeba J., Jayashree K. and Nazar Ali A. 4.1 Introduction 59 4.2 Block Diagram 60 4.3 ANN-Based MPPT for Boost Converter 64 4.4 Closed Loop Control 66 4.5 Simulation Results 67 4.6 Conclusion 70 References 70 5 Single/Multijunction Solar Cell Model Incorporating Maximum Power Point Tracking Scheme Based on Fuzzy Logic Algorithm 73 Omveer Singh, Shalini Gupta and Shabana Urooj 5.1 Introduction 74 5.2 Modeling Structure 75 5.2.1 Single-Junction Solar Cell Model 75 5.2.2 Modeling of Multijunction Solar PV Cell 77 5.3 MPPT Design Techniques 80 5.3.1 Design of MPPT Scheme Based on P&O Technique 80 5.3.2 Design of MPPT Scheme Based on FLA 82 5.4 Results and Discussions 84 5.4.1 Single-Junction Solar Cell 84 5.4.2 Multijunction Solar PV Cell 86 5.4.3 Implementation of MPPT Scheme Based on P&O Technique 90 5.4.4 Implementation of MPPT Scheme Based on FLA 91 5.5 Conclusion 93 References 93 6 Particle Swarm Optimization: An Overview, Advancements and Hybridization 95 Shafquat Rana, Md Sarwar, Anwar Shahzad Siddiqui and Prashant 6.1 Introduction 96 6.2 The Particle Swarm Optimization: An Overview 97 6.3 PSO Algorithms and Pseudo-Code 98 6.3.1 PSO Algorithm 98 6.3.2 Pseudo-Code for PSO 101 6.3.3 PSO Limitations 101 6.4 Advancements in PSO and Its Perspectives 102 6.4.1 Inertia Weight 102 6.4.1.1 Random Selection (RS) 102 6.4.1.2 Linear Time Varying (LTV) 103 6.4.1.3 Nonlinear Time Varying (NLTV) 103 6.4.1.4 Fuzzy Adaptive (FA) 103 6.4.2 Constriction Factors 104 6.4.3 Topologies 104 6.4.4 Analysis of Convergence 104 6.5 Hybridization of PSO 105 6.5.1 PSO Hybridization with Artificial Bee Colony (ABC) 105 6.5.2 PSO Hybridization with Ant Colony Optimization (aco) 106 6.5.3 PSO Hybridization with Genetic Algorithms (GA) 106 6.6 Area of Applications of PSO 107 6.7 Conclusions 109 References 109 7 Application of Genetic Algorithm in Sensor Networks and Smart Grid 115 Geeta Yadav, Dheeraj Joshi, Leena G. and M. K. Soni 7.1 Introduction 115 7.2 Communication Sector 116 7.2.1 Sensor Networks 116 7.3 Electrical Sector 117 7.3.1 Smart Microgrid 117 7.4 A Brief Outline of GAs 118 7.5 Sensor Network’s Energy Optimization 120 7.6 Sensor Network’s Coverage and Uniformity Optimization Using GA 126 7.7 Use GA for Optimization of Reliability and Availability for Smart Microgrid 131 7.8 GA Versus Traditional Methods 135 7.9 Summaries and Conclusions 136 References 137 8 AI-Based Predictive Modeling of Delamination Factor for Carbon Fiber–Reinforced Polymer (CFRP) Drilling Process 139 Rohit Volety and Geetha Mani 8.1 Introduction 140 8.2 Methodology 142 8.3 AI-Based Predictive Modeling 143 8.3.1 Linear Regression 143 8.3.2 Random Forests 144 8.3.3 XGBoost 145 8.3.4 Svm 146 8.4 Performance Indices 146 8.4.1 Root Mean Squared Error (RMSE) 146 8.4.2 Mean Squared Error (MSE) 147 8.4.3 R 2 (R-Squared) 147 8.5 Results and Discussion 147 8.5.1 Key Performance Metrics (KPIs) During the Model Training Phase 148 8.5.2 Key Performance Index Metrics (KPIs) During the Model Testing Phase 148 8.5.3 K Cross Fold Validation 149 8.6 Conclusions 151 References 152 9 Performance Comparison of Differential Evolutionary Algorithm-Based Contour Detection to Monocular Depth Estimation for Elevation Classification in 2D Drone-Based Imagery 155 Jacob Vishal, Somdeb Datta, Sudipta Mukhopadhyay, Pravar Kulbhushan, Rik Das, Saurabh Srivastava and Indrajit Kar 9.1 Introduction 156 9.2 Literature Survey 157 9.3 Research Methodology 159 9.3.1 Dataset and Metrics 161 9.4 Result and Discussion 162 9.5 Conclusion 165 References 165 10 Bioinspired MOPSO-Based Power Allocation for Energy Efficiency and Spectral Efficiency Trade-Off in Downlink NOMA 169 Jyotirmayee Subudhi and P. Indumathi 10.1 Introduction 170 10.2 System Model 172 10.3 User Clustering 175 10.4 Optimal Power Allocation for EE-SE Tradeoff 176 10.4.1 Multiobjective Optimization Problem 177 10.4.2 Multiobjective PSO 178 10.4.3 MOPSO Algorithm for EE-SE Trade-Off in Downlink NOMA 180 10.5 Numerical Results 180 10.6 Conclusion 183 References 184 11 Performances of Machine Learning Models and Featurization Techniques on Amazon Fine Food Reviews 187 Rishabh Singh, Akarshan Kumar and Mousim Ray 11.1 Introduction 188 11.1.1 Related Work 189 11.2 Materials and Methods 190 11.2.1 Data Cleaning and Pre-Processing 191 11.2.2 Feature Extraction 191 11.2.3 Classifiers 193 11.3 Results and Experiments 194 11.4 Conclusion 197 References 198 12 Optimization of Cutting Parameters for Turning by Using Genetic Algorithm 201 Mintu Pal and Sibsankar Dasmahapatra 12.1 Introduction 202 12.2 Genetic Algorithm GA: An Evolutionary Computational Technique 203 12.3 Design of Multiobjective Optimization Problem 204 12.3.1 Decision Variables 204 12.3.2 Objective Functions 204 12.3.2.1 Minimization of Main Cutting Force 205 12.3.2.2 Minimization of Feed Force 205 12.3.3 Bounds of Decision Variables 205 12.3.4 Response Variables 206 12.4 Results and Discussions 206 12.4.1 Single Objective Optimization 206 12.4.2 Results of Multiobjective Optimization 208 12.5 Conclusion 212 References 212 13 Genetic Algorithm-Based Optimization for Speech Processing Applications 215 Ramya.R, M. Preethi and R. Rajalakshmi 13.1 Introduction to GA 215 13.1.1 Enhanced GA 216 13.1.1.1 Hybrid GA 216 13.1.1.2 Interval GA 217 13.1.1.3 Adaptive GA 217 13.2 GA in Automatic Speech Recognition 218 13.2.1 GA for Optimizing Off-Line Parameters in Voice Activity Detection (VAD) 218 13.2.2 Classification of Features in ASR Using GA 219 13.2.3 GA-Based Distinctive Phonetic Features Recognition 219 13.2.4 GA in Phonetic Decoding 220 13.3 Genetic Algorithm in Speech Emotion Recognition 221 13.3.1 Speech Emotion Recognition 221 13.3.2 Genetic Algorithms in Speech Emotion Recognition 222 13.3.2.1 Feature Extraction Using GA for SER 222 13.3.2.2 Steps for Adaptive Genetic Algorithm for Feature Optimization 224 13.4 Genetic Programming in Hate Speech Using Deep Learning 225 13.4.1 Introduction to Hate Speech Detection 225 13.4.2 GA Integrated With Deep Learning Models for Hate Speech Detection 226 13.5 Conclusion 228 References 228 14 Performance of P, PI, PID, and NARMA Controllers in the Load Frequency Control of a Single-Area Thermal Power Plant 231 Ranjit Singh and L. Ramesh 14.1 Introduction 231 14.2 Single-Area Power System 232 14.3 Automatic Load Frequency Control (ALFC) 233 14.4 Controllers Used in the Simulink Model 233 14.4.1 PID Controller 233 14.4.2 PI Controller 234 14.4.3 P Controller 234 14.5 Circuit Description 235 14.6 ANN and NARMA L2 Controller 236 14.7 Simulation Results and Comparative Analysis 237 14.8 Conclusion 239 References 240 Part 2: Decision Science and Simulation-Based Optimization 243 15 Selection of Nonpowered Industrial Truck for Small Scale Manufacturing Industry Using Fuzzy VIKOR Method Under FMCDM Environment 245 Bipradas Bairagi 15.1 Introduction 246 15.2 Fuzzy Set Theory 248 15.2.1 Some Important Fuzzy Definitions 248 15.2.2 Fuzzy Operations 249 15.2.3 Linguistic Variable (LV) 250 15.3 Fvikor 251 15.4 Problem Definition 253 15.5 Results and Discussions 253 15.6 Conclusions 258 References 259 16 Slightly and Almost Neutrosophic gsα*—Continuous Function in Neutrosophic Topological Spaces 261 P. Anbarasi Rodrigo and S. Maheswari 16.1 Introduction 261 16.2 Preliminaries 262 16.3 Slightly Neutrosophic gsα* – Continuous Function 263 16.4 Almost Neutrosophic gsα* – Continuous Function 266 16.5 Conclusion 274 References 274 17 Identification and Prioritization of Risk Factors Affecting the Mental Health of Farmers 275 Hullash Chauhan, Suchismita Satapathy, A. K. Sahoo and Debesh Mishra 17.1 Introduction 275 17.2 Materials and Methods 277 17.2.1 ELECTRE Technique 278 17.3 Result and Discussion 281 17.4 Conclusion 293 References 294 18 Multiple Objective and Subjective Criteria Evaluation Technique (MOSCET): An Application to Material Handling System Selection 297 Bipradas Bairagi 18.1 Introduction 298 18.2 Multiple Objective and Subjective Criteria Evaluation Technique (MOSCET): The Proposed Algorithm 300 18.3 Illustrative Example 303 18.3.1 Problem Definition 303 18.3.2 Calculation and Discussions 305 18.4 Conclusions 309 References 310 19 Evaluation of Optimal Parameters to Enhance Worker’s Performance in an Automotive Industry 313 Rajat Yadav, Kuwar Mausam, Manish Saraswat and Vijay Kumar Sharma 19.1 Introduction 314 19.2 Methodology 315 19.3 Results and Discussion 316 19.4 Conclusions 320 References 321 20 Determining Key Influential Factors of Rural Tourism— An AHP Model 323 Puspalata Mahaptra, RamaKrishna Bandaru, Deepanjan Nanda and Sushanta Tripathy 20.1 Introduction 324 20.2 Rural Tourism 325 20.3 Literature Review 326 20.4 Objectives 328 20.5 Methodology 328 20.6 Analysis 332 20.7 Results and Discussion 332 20.8 Conclusions 340 20.9 Managerial Implications 340 References 341 21 Solution of a Pollution-Based Economic Order Quantity Model Under Triangular Dense Fuzzy Environment 345 Partha Pratim Bhattacharya, Kousik Bhattacharya, Sujit Kumar De, Prasun Kumar Nayak, Subhankar Joardar and Kushankur Das 21.1 Introduction 346 21.1.1 Overview 346 21.1.2 Motivation and Specific Study 346 21.2 Preliminaries 348 21.2.1 Pollution Function 348 21.2.2 Triangular Dense Fuzzy Set (TDFS) 349 21.3 Notations and Assumptions 350 21.3.1 Case Study 351 21.4 Formulation of the Mathematical Model 352 21.4.1 Crisp Mathematical Model 352 21.4.2 Formulation of Triangular Dense Fuzzy Mathematical Model 352 21.4.3 Defuzzification of Triangular Dense Fuzzy Model 353 21.5 Numerical Illustration 354 21.6 Sensitivity Analysis 355 21.7 Graphical Illustration 355 21.8 Merits and Demerits 358 21.9 Conclusion 358 Acknowledgement 359 Appendix 359 References 360 22 Common Yet Overlooked Aspects Accountable for Antiaging: An MCDM Approach 363 Rajnandini Saha, Satyabrata Aich, Hee-Cheol Kim and Sushanta Tripathy 22.1 Introduction 364 22.2 Literature Review 365 22.3 Analytic Hierarchy Process (AHP) 367 22.4 Result and Discussion 372 22.5 Conclusion 373 References 373 23 E-Waste Management Challenges in India: An AHP Approach 377 Amit Sutar, Apurv Singh, Deepak Singhal, Sushanta Tripathy and Bharat Chandra Routara 23.1 Introduction 378 23.2 Literature Review 379 23.3 Methodology 379 23.4 Results and Discussion 379 23.5 Conclusion 390 References 391 24 Application of k-Means Method for Finding Varying Groups of Primary Energy Household Emissions in the Indian States 393 Tanmay Belsare, Abhay Deshpande, Neha Sharma and Prithwis De 24.1 Introduction 394 24.2 Literature Review 395 24.3 Materials and Methods 397 24.3.1 Data Preparation 397 24.3.2 Methods and Approach 397 24.3.2.1 Cluster Analysis 397 24.3.2.2 Agglomerative Hierarchical Clustering 397 24.3.2.3 K-Means Clustering 398 24.4 Exploratory Data Analysis 398 24.5 Results and Discussion 401 24.6 Conclusion 405 References 406 25 Airwaves Detection and Elimination Using Fast Fourier Transform to Enhance Detection of Hydrocarbon 409 Garba Aliyu, Mathias M. Fonkam, Augustine S. Nsang, Muhammad Abdulkarim, Sandip Rashit and Yakub K. Saheed 25.1 Introduction 410 25.1.1 Airwaves 411 25.1.2 Fast Fourier Transform 412 25.2 Related Works 413 25.3 Theoretical Framework 415 25.4 Methodology 416 25.5 Results and Discussions 417 25.6 Conclusion 420 References 420 26 Design and Implementation of Control for Nonlinear Active Suspension System 423 Ravindra S. Rana and Dipak M. Adhyaru 26.1 Introduction 423 26.2 Mathematical Model of Quarter Car Suspension System 426 26.2.1 Mathematical Model 426 26.2.2 Linearization Method for Nonlinear System Model 429 26.2.3 Discussion of Result 430 26.3 Conclusion 433 References 434 27 A Study of Various Peak to Average Power Ratio (PAPR) Reduction Techniques for 5G Communication System (5G-CS) 437 Himanshu Kumar Sinha, Anand Kumar and Devasis Pradhan 27.1 Introduction 437 27.2 Literature Review 439 27.3 Overview of 5G Cellular System 440 27.4 Papr 441 27.4.1 Continuous Time PAPR 441 27.4.2 Continuous Time PAPR 442 27.5 Factors on which PAPR Reduction Depends 442 27.6 PAPR Reduction Technique 443 27.6.1 Scrambling of Signals 443 27.6.2 Signal Distortion Technique 446 27.6.3 High Power Amplifier (HPA) 447 27.7 Limitation of OFDM 447 27.8 Universal Filter Multicarrier (UMFC) Emerging Technique to Reduce PAPR in 5G 448 27.8.1 Transmitter of UMFC 448 27.8.2 Receiver of UMFC 450 27.9 Comparison Between Various Techniques 450 27.10 Conclusion 450 References 452 28 Investigation of Rebound Suppression Phenomenon in an Electromagnetic V-Bending Test 455 Aman Sharma, Pradeep Kumar Singh, Manish Saraswat and Irfan Khan 28.1 Introduction 455 28.2 Investigation 458 28.2.1 Specimen for Tests 458 28.2.2 Design of Die and Tool 458 28.2.3 Configuration and Procedure 459 28.3 Mathematical Evaluation 460 28.3.1 Simulation Methodology 460 28.4 Modeling for Material 461 28.4.1 Suppressing Rebound Phenomenon 461 28.5 Conclusion 466 References 466 29 Quadratic Spline Function Companding Technique to Minimize Peak-to-Average Power Ratio in Orthogonal Frequency Division Multiplexing System 469 Lazar Z. Velimirovic 29.1 Introduction 469 29.2 OFDM System 471 29.2.1 PAPR of OFDM Signal 472 29.3 Companding Technique 474 29.3.1 Quadratic Spline Function Companding 474 29.4 Numerical Results and Discussion 475 29.5 Conclusion 480 Acknowledgment 480 References 480 30 A Novel MCGDM Approach for Supplier Selection in a Supply Chain Management 483 Bipradas Bairagi 30.1 Introduction 484 30.2 Proposed Algorithm 486 30.3 Illustrative Example 491 30.3.1 Problem Definition 491 30.3.2 Calculation and Discussions 492 30.4 Conclusions 498 References 499 Index 501

    15 in stock

    £153.00

  • Impedance Source Matrix Converters and Control

    Wiley-Blackwell Impedance Source Matrix Converters and Control

    15 in stock

    Book Synopsis

    15 in stock

    £91.80

  • The Official ISC2 CCSP CBK Reference

    John Wiley & Sons Inc The Official ISC2 CCSP CBK Reference

    15 in stock

    Book SynopsisTable of ContentsForeword to the Fourth Edition xxi Introduction xix Chapter 1 Cloud Concepts, Architecture, and Design 1 Understand Cloud Computing Concepts 2 Cloud Computing Definitions 2 Cloud Computing Roles and Responsibilities 3 Key Cloud Computing Characteristics 7 Building Block Technologies 11 Describe Cloud Reference Architecture 14 Cloud Computing Activities 14 Cloud Service Capabilities 15 Cloud Service Categories 17 Cloud Deployment Models 18 Cloud Shared Considerations 21 Impact of Related Technologies 27 Understand Security Concepts Relevant to Cloud Computing 33 Cryptography and Key Management 33 Identity and Access Control 34 Data and Media Sanitization 36 Network Security 37 Virtualization Security 39 Common Threats 41 Security Hygiene 41 Understand Design Principles of Secure Cloud Computing 43 Cloud Secure Data Lifecycle 43 Cloud- Based Business Continuity and Disaster Recovery Plan 44 Business Impact Analysis 45 Functional Security Requirements 46 Security Considerations for Different Cloud Categories 48 Cloud Design Patterns 49 DevOps Security 51 Evaluate Cloud Service Providers 51 Verification against Criteria 52 System/Subsystem Product Certifications 54 Summary 56 Chapter 2 Cloud Data Security 57 Describe Cloud Data Concepts 58 Cloud Data Lifecycle Phases 58 Data Dispersion 61 Data Flows 62 Design and Implement Cloud Data Storage Architectures 63 Storage Types 63 Threats to Storage Types 66 Design and Apply Data Security Technologies and Strategies 67 Encryption and Key Management 67 Hashing 70 Data Obfuscation 71 Tokenization 73 Data Loss Prevention 74 Keys, Secrets, and Certificates Management 77 Implement Data Discovery 78 Structured Data 79 Unstructured Data 80 Semi- structured Data 81 Data Location 82 Implement Data Classification 82 Data Classification Policies 83 Mapping 85 Labeling 86 Design and Implement Information Rights Management 87 Objectives 88 Appropriate Tools 89 Plan and Implement Data Retention, Deletion, and Archiving Policies 89 Data Retention Policies 90 Data Deletion Procedures and Mechanisms 93 Data Archiving Procedures and Mechanisms 94 Legal Hold 95 Design and Implement Auditability, Traceability, and Accountability of Data Events 96 Definition of Event Sources and Requirement of Event Attribution 97 Logging, Storage, and Analysis of Data Events 99 Chain of Custody and Nonrepudiation 100 Summary 101 Chapter 3 Cloud Platform and Infrastructure Security 103 Comprehend Cloud Infrastructure and Platform Components 104 Physical Environment 104 Network and Communications 106 Compute 107 Virtualization 108 Storage 110 Management Plane 111 Design a Secure Data Center 113 Logical Design 114 Physical Design 116 Environmental Design 117 Analyze Risks Associated with Cloud Infrastructure and Platforms 119 Risk Assessment 119 Cloud Vulnerabilities, Threats, and Attacks 122 Risk Mitigation Strategies 123 Plan and Implementation of Security Controls 124 Physical and Environmental Protection 124 System, Storage, and Communication Protection 125 Identification, Authentication, and Authorization in Cloud Environments 127 Audit Mechanisms 128 Plan Disaster Recovery and Business Continuity 131 Business Continuity/Disaster Recovery Strategy 131 Business Requirements 132 Creation, Implementation, and Testing of Plan 134 Summary 138 Chapter 4 Cloud Application Security 139 Advocate Training and Awareness for Application Security 140 Cloud Development Basics 140 Common Pitfalls 141 Common Cloud Vulnerabilities 142 Describe the Secure Software Development Life Cycle Process 144 NIST Secure Software Development Framework 145 OWASP Software Assurance Maturity Model 145 Business Requirements 145 Phases and Methodologies 146 Apply the Secure Software Development Life Cycle 149 Cloud- Specific Risks 149 Threat Modeling 153 Avoid Common Vulnerabilities during Development 156 Secure Coding 156 Software Configuration Management and Versioning 157 Apply Cloud Software Assurance and Validation 158 Functional and Non- functional Testing 159 Security Testing Methodologies 160 Quality Assurance 164 Abuse Case Testing 164 Use Verified Secure Software 165 Securing Application Programming Interfaces 165 Supply- Chain Management 166 Third- Party Software Management 166 Validated Open- Source Software 167 Comprehend the Specifics of Cloud Application Architecture 168 Supplemental Security Components 169 Cryptography 171 Sandboxing 172 Application Virtualization and Orchestration 173 Design Appropriate Identity and Access Management Solutions 174 Federated Identity 175 Identity Providers 175 Single Sign- on 176 Multifactor Authentication 176 Cloud Access Security Broker 178 Summary 179 Chapter 5 Cloud Security Operations 181 Build and Implement Physical and Logical Infrastructure for Cloud Environment 182 Hardware- Specific Security Configuration Requirements 182 Installation and Configuration of Virtualization Management Tools 185 Virtual Hardware–Specific Security Configuration Requirements 186 Installation of Guest Operating System Virtualization Toolsets 188 Operate Physical and Logical Infrastructure for Cloud Environment 188 Configure Access Control for Local and Remote Access 188 Secure Network Configuration 190 Operating System Hardening through the Application of Baselines 195 Availability of Stand- Alone Hosts 196 Availability of Clustered Hosts 197 Availability of Guest Operating Systems 199 Manage Physical and Logical Infrastructure for Cloud Environment 200 Access Controls for Remote Access 201 Operating System Baseline Compliance Monitoring and Remediation 202 Patch Management 203 Performance and Capacity Monitoring 205 Hardware Monitoring 206 Configuration of Host and Guest Operating System Backup and Restore Functions 207 Network Security Controls 208 Management Plane 212 Implement Operational Controls and Standards 212 Change Management 213 Continuity Management 214 Information Security Management 216 Continual Service Improvement Management 217 Incident Management 218 Problem Management 221 Release Management 221 Deployment Management 222 Configuration Management 224 Service Level Management 225 Availability Management 226 Capacity Management 227 Support Digital Forensics 228 Forensic Data Collection Methodologies 228 Evidence Management 230 Collect, Acquire, and Preserve Digital Evidence 231 Manage Communication with Relevant Parties 234 Vendors 235 Customers 236 Partners 238 Regulators 238 Other Stakeholders 239 Manage Security Operations 239 Security Operations Center 240 Monitoring of Security Controls 244 Log Capture and Analysis 245 Incident Management 248 Summary 253 Chapter 6 Legal, Risk, and Compliance 255 Articulating Legal Requirements and Unique Risks within the Cloud Environment 256 Conflicting International Legislation 256 Evaluation of Legal Risks Specific to Cloud Computing 258 Legal Frameworks and Guidelines 258 eDiscovery 265 Forensics Requirements 267 Understand Privacy Issues 267 Difference between Contractual and Regulated Private Data 268 Country- Specific Legislation Related to Private Data 272 Jurisdictional Differences in Data Privacy 277 Standard Privacy Requirements 278 Privacy Impact Assessments 280 Understanding Audit Process, Methodologies, and Required Adaptations for a Cloud Environment 281 Internal and External Audit Controls 282 Impact of Audit Requirements 283 Identify Assurance Challenges of Virtualization and Cloud 284 Types of Audit Reports 285 Restrictions of Audit Scope Statements 288 Gap Analysis 289 Audit Planning 290 Internal Information Security Management System 291 Internal Information Security Controls System 292 Policies 293 Identification and Involvement of Relevant Stakeholders 296 Specialized Compliance Requirements for Highly Regulated Industries 297 Impact of Distributed Information Technology Model 298 Understand Implications of Cloud to Enterprise Risk Management 299 Assess Providers Risk Management Programs 300 Differences between Data Owner/Controller vs. Data Custodian/Processor 301 Regulatory Transparency Requirements 302 Risk Treatment 303 Risk Frameworks 304 Metrics for Risk Management 307 Assessment of Risk Environment 307 Understand Outsourcing and Cloud Contract Design 309 Business Requirements 309 Vendor Management 311 Contract Management 312 Supply Chain Management 314 Summary 316 Index 317

    15 in stock

    £48.75

  • Essentials of Signals and Systems

    John Wiley & Sons Inc Essentials of Signals and Systems

    15 in stock

    Book SynopsisTable of ContentsPreface xi About the Author xv Acknowledgments xvii About the Companion Website xix 1 Review of Linear Algebra 1 1.1 Introduction 1 1.2 Vectors, Scalars, and Bases 2 Worked Exercise: Linear Combinations on the Left-hand Side of the Scalar Product 3 1.3 Vector Representation in Different Bases 7 1.4 Linear Operators 12 1.5 Representation of Linear Operators 14 1.6 Eigenvectors and Eigenvalues 18 1.7 General Method of Solution of a Matrix Equation 21 1.8 The Closure Relation 23 1.9 Representation of Linear Operators in Terms of Eigenvectors and Eigenvalues 24 1.10 The Dirac Notation 25 Worked Exercise: The Bra of the Action of an Operator on a Ket 28 1.11 Exercises 30 Interlude: Signals and Systems: What is it About? 35 2 Representation of Signals 37 2.1 Introduction 37 2.2 The Convolution 38 Worked Exercise: First Example of Convolution 42 Worked Exercise: Second Example of Convolution 44 2.3 The Impulse Function, or Dirac Delta 46 2.4 Convolutions with Impulse Functions 50 Worked Exercise: The Convolution with δ(t − a) 52 2.5 Impulse Functions as a Basis: The Time Domain Representation of Signals 53 2.6 The Scalar Product 60 2.7 Orthonormality of the Basis of Impulse Functions 62 Worked Exercise: Proof of Orthonormality of the Basis of Impulse Functions 64 2.8 Exponentials as a Basis: The Frequency Domain Representation of Signals 65 2.9 The Fourier Transform 72 Worked Exercise: The Fourier Transform of the Rectangular Function 74 2.10 The Algebraic Meaning of Fourier Transforms 75 Worked Exercise: Projection on the Basis of Exponentials 78 2.11 The Physical Meaning of Fourier Transforms 80 2.12 Properties of Fourier Transforms 85 2.12.1 Fourier Transform and the DC level 85 2.12.2 Property of Reality 86 2.12.3 Symmetry Between Time and Frequency 88 2.12.4 Time Shifting 88 2.12.5 Spectral Shifting 90 Worked Exercise: The Property of Spectral Shifting and AM Modulation 91 2.12.6 Differentiation 92 2.12.7 Integration 93 2.12.8 Convolution in the Time Domain 96 2.12.9 Product in the Time Domain 97 Worked Exercise: The Fourier Transform of a Physical Sinusoidal Wave 98 2.12.10 The Energy of a Signal and Parseval’s Theorem 101 2.13 The Fourier Series 102 Worked Exercise: The Fourier Series of a Square Wave 108 2.14 Exercises 109 3 Representation of Systems 113 3.1 Introduction and Properties 113 3.1.1 Linearity 114 3.1.2 Time Invariance 114 Worked Exercise: Example of a Time Invariant System 116 Worked Exercise: An Example of a Time Variant System 117 3.1.3 Causality 117 3.2 Operators Representing Linear and Time Invariant Systems 118 3.3 Linear Systems as Matrices 119 3.4 Operators in Dirac Notation 121 3.5 Statement of the Problem 123 3.6 Eigenvectors and Eigenvalues of LTI Operators 123 3.7 General Method of Solution 124 3.7.1 Step 1: Defining the Problem 124 3.7.2 Step 2: Finding the Eigenvalues 125 3.7.3 Step 3: The Representation in the Basis of Eigenvectors 126 3.7.4 Step 4: Solving the Equation and Returning to the Original Basis 129 Worked Exercise: Input is an Eigenvector 130 Worked Exercise: Input is an Explicit Linear Combination of Eigenvectors 131 Worked Exercise: An Arbitrary Input 132 3.8 The Physical Meaning of Eigenvalues: The Impulse and Frequency Responses 133 Worked Exercise: Impulse and Frequency Responses of a Harmonic Oscillator 136 Worked Exercise: How can the Frequency Response be Measured? 139 Worked Exercise: The Transient of a Harmonic Oscillator 142 Worked Exercise: Charge and Discharge in an RC Circuit 145 3.9 Frequency Conservation in LTI Systems 147 3.10 Frequency Conservation in Other Fields 148 3.10.1 Snell’s Law 149 3.10.2 Wavefunctions and Heisenberg’s Uncertainty Principle 150 3.11 Exercises 152 4 Electric Circuits as LTI Systems 157 4.1 Electric Circuits as LTI Systems 157 4.2 Phasors, Impedances, and the Frequency Response 158 Worked Exercise: An RLC Circuit as a Harmonic Oscillator 163 4.3 Exercises 164 5 Filters 165 5.1 Ideal Filters 165 5.2 Example of a Low-pass Filter 167 5.3 Example of a High-pass Filter 170 5.4 Example of a Band-pass Filter 171 5.5 Exercises 172 6 Introduction to the Laplace Transform 175 6.1 Motivation: Stability of LTI Systems 175 6.2 The Laplace Transform as a Generalization of the Fourier Transform 179 6.3 Properties of Laplace Transforms 181 6.4 Region of Convergence 182 6.5 Inverse Laplace Transform by Inspection 185 Worked Exercise: Example of Inverse Laplace Transform by Inspection 185 Worked Exercise: Impulse Response of a Harmonic Oscillator 187 6.6 Zeros and Poles 188 Worked Exercise: Finding the Zeros and Poles 189 Worked Exercise: Poles of a Harmonic Oscillator 190 6.7 The Unilateral Laplace Transform 191 6.7.1 The Differentiation Property of the Unilateral Fourier Transform 193 Worked Exercise: Differentiation Property of the Unilateral Fourier Transform Involving Higher Order Derivatives 195 Worked Exercise: Example of Differentiation Using the Unilateral Fourier Transform 196 Worked Exercise: Discharge of an RC Circuit 197 6.7.2 Generalization to the Unilateral Laplace Transform 198 6.8 Exercises 199 Interlude: Discrete Signals and Systems: Why do we Need Them? 203 7 The Sampling Theorem and the Discrete Time Fourier Transform (DTFT) 205 7.1 Discrete Signals 205 7.2 Fourier Transforms of Discrete Signals and the Sampling Theorem 207 7.3 The Discrete Time Fourier Transform (DTFT) 216 Worked Exercise: Example of a Matlab Routine to Calculate the Dtft 218 Worked Exercise: Fourier Transform from the DTFT 221 7.4 The Inverse DTFT 223 7.5 Properties of the DTFT 224 7.5.1 ‘Time’ shifting 225 7.5.2 Difference 226 7.5.3 Sum 228 7.5.4 Convolution in the ‘Time’ Domain 229 7.5.5 Product in the Time Domain 230 7.5.6 The Theorem that Should not be: Energy of Discrete Signals 231 7.6 Concluding Remarks 235 7.7 Exercises 235 8 The Discrete Fourier Transform (DFT) 239 8.1 Discretizing the Frequency Domain 239 8.2 The DFT and the Fast Fourier Transform (fft) 246 Worked Exercise: Getting the Centralized DFT Using the Command fft 250 Worked Exercise: Getting the Fourier Transform with the fft 254 Worked Exercise: Obtaining the Inverse Fourier Transform Using the ifft 256 8.3 The Circular Time Shift 258 8.4 The Circular Convolution 259 8.5 Relationship Between Circular and Linear Convolutions 264 8.6 Parseval’s Theorem for the DFT 269 8.7 Exercises 270 9 Discrete Systems 275 9.1 Introduction and Properties 275 9.1.1 Linearity 276 9.1.2 ‘Time’ invariance 276 9.1.3 Causality 276 9.1.4 Stability 276 9.2 Linear and Time Invariant Discrete Systems 277 Worked Exercise: Further Advantages of Frequency Domain 279 9.3 Digital Filters 283 9.4 Exercises 285 10 Introduction to the z-transform 287 10.1 Motivation: Stability of LTI Systems 287 10.2 The z-transform as a Generalization of the DTFT 289 Worked Exercise: Example of z-transform 290 10.3 Relationship Between the z-transform and the Laplace Transform 292 10.4 Properties of the z-transform 293 10.4.1 ‘Time’ shifting 294 10.4.2 Difference 294 10.4.3 Sum 294 10.4.4 Convolution in the Time Domain 294 10.5 The Transfer Function of Discrete LTI Systems 295 10.6 The Unilateral z-transform 295 10.7 Exercises 297 References with Comments 299 Appendix A: Laplace Transform Property of Product in the Time Domain 301 Appendix B: List of Properties of Laplace Transforms 303 Index 305

    15 in stock

    £54.00

  • ISC2 CCSP Certified Cloud Security Professional

    John Wiley & Sons Inc ISC2 CCSP Certified Cloud Security Professional

    15 in stock

    Book SynopsisTable of Contents Introduction xxiii Assessment Test xxxii Chapter 1 Architectural Concepts 1 Cloud Characteristics 3 Business Requirements 5 Understanding the Existing State 6 Cost/Benefit Analysis 7 Intended Impact 10 Cloud Computing Service Categories 11 Software as a Service 11 Infrastructure as a Service 12 Platform as a Service 12 Cloud Deployment Models 13 Private Cloud 13 Public Cloud 13 Hybrid Cloud 13 Multi- Cloud 13 Community Cloud 13 Multitenancy 14 Cloud Computing Roles and Responsibilities 15 Cloud Computing Reference Architecture 16 Virtualization 18 Hypervisors 18 Virtualization Security 19 Cloud Shared Considerations 20 Security and Privacy Considerations 20 Operational Considerations 21 Emerging Technologies 22 Machine Learning and Artificial Intelligence 22 Blockchain 23 Internet of Things 24 Containers 24 Quantum Computing 25 Edge and Fog Computing 26 Confidential Computing 26 DevOps and DevSecOps 27 Summary 28 Exam Essentials 28 Review Questions 30 Chapter 2 Data Classification 35 Data Inventory and Discovery 37 Data Ownership 37 Data Flows 42 Data Discovery Methods 43 Information Rights Management 46 Certificates and IRM 47 IRM in the Cloud 47 IRM Tool Traits 47 Data Control 49 Data Retention 50 Data Audit and Audit Mechanisms 53 Data Destruction/Disposal 55 Summary 57 Exam Essentials 57 Review Questions 59 Chapter 3 Cloud Data Security 63 Cloud Data Lifecycle 65 Create 66 Store 66 Use 67 Share 67 Archive 69 Destroy 70 Cloud Storage Architectures 71 Storage Types 71 Volume Storage: File- Based Storage and Block Storage 72 Object- Based Storage 72 Databases 73 Threats to Cloud Storage 73 Designing and Applying Security Strategies for Storage 74 Encryption 74 Certificate Management 77 Hashing 77 Masking, Obfuscation, Anonymization, and Tokenization 78 Data Loss Prevention 81 Log Capture and Analysis 82 Summary 85 Exam Essentials 85 Review Questions 86 Chapter 4 Security in the Cloud 91 Chapter 5 Shared Cloud Platform Risks and Responsibilities 92 Cloud Computing Risks by Deployment Model 94 Private Cloud 95 Community Cloud 95 Public Cloud 97 Hybrid Cloud 101 Cloud Computing Risks by Service Model 102 Infrastructure as a Service (IaaS) 102 Platform as a Service (PaaS) 102 Software as a Service (SaaS) 103 Virtualization 103 Threats 105 Risk Mitigation Strategies 107 Disaster Recovery (DR) and Business Continuity (BC) 110 Cloud- Specific BIA Concerns 110 Customer/Provider Shared BC/DR Responsibilities 111 Cloud Design Patterns 114 Summary 115 Exam Essentials 115 Review Questions 116 Cloud Platform, Infrastructure, and Operational Security 121 Foundations of Managed Services 123 Cloud Provider Responsibilities 124 Shared Responsibilities by Service Type 125 IaaS 125 PaaS 126 SaaS 126 Securing Communications and Infrastructure 126 Firewalls 127 Intrusion Detection/Intrusion Prevention Systems 128 Honeypots 128 Vulnerability Assessment Tools 128 Bastion Hosts 129 Identity Assurance in Cloud and Virtual Environments 130 Securing Hardware and Compute 130 Securing Software 132 Third- Party Software Management 133 Validating Open- Source Software 134 OS Hardening, Monitoring, and Remediation 134 Managing Virtual Systems 135 Assessing Vulnerabilities 137 Securing the Management Plane 138 Auditing Your Environment and Provider 141 Adapting Processes for the Cloud 142 Planning for Cloud Audits 143 Summary 144 Exam Essentials 145 Review Questions 147 Chapter 6 Cloud Application Security 151 Developing Software for the Cloud 154 Common Cloud Application Deployment Pitfalls 155 Cloud Application Architecture 157 Cryptography 157 Sandboxing 158 Application Virtualization and Orchestration 158 Application Programming Interfaces 159 Multitenancy 162 Supplemental Security Components 162 Cloud- Secure Software Development Lifecycle (SDLC) 164 Software Development Phases 165 Software Development Models 166 Cloud Application Assurance and Validation 172 Threat Modeling 172 Common Threats to Applications 174 Quality Assurance and Testing Techniques 175 Supply Chain Management and Licensing 177 Identity and Access Management 177 Cloud Identity and Access Control 178 Single Sign- On 179 Identity Providers 180 Federated Identity Management 180 Multifactor Authentication 181 Secrets Management 182 Common Threats to Identity and Access Management in the Cloud 183 Zero Trust 183 Summary 183 Exam Essentials 184 Review Questions 186 Chapter 7 Operations Elements 191 Designing a Secure Data Center 193 Build vs. Buy 193 Location 194 Facilities and Redundancy 196 Data Center Tiers 200 Logical Design 201 Virtualization Operations 202 Storage Operations 205 Managing Security Operations 207 Security Operations Center (SOC) 208 Continuous Monitoring 208 Incident Management 209 Summary 209 Exam Essentials 210 Review Questions 211 Chapter 8 Operations Management 215 Monitoring, Capacity, and Maintenance 217 Monitoring 217 Physical and Environmental Protection 218 Maintenance 219 Change and Configuration Management 224 Baselines 224 Roles and Process 226 Release and Deployment Management 228 Problem and Incident Management 229 IT Service Management and Continual Service Improvement 229 Business Continuity and Disaster Recovery 231 Prioritizing Safety 231 Continuity of Operations 232 BC/DR Planning 232 The BC/DR Toolkit 234 Relocation 235 Power 237 Testing 238 Summary 239 Exam Essentials 239 Review Questions 241 Chapter 9 Legal and Compliance Issues 245 Legal Requirements and Unique Risks in the Cloud Environment 247 Constitutional Law 247 Legislation 249 Administrative Law 249 Case Law 250 Common Law 250 Contract Law 250 Analyzing a Law 251 Determining Jurisdiction 251 Scope and Application 252 Legal Liability 253 Torts and Negligence 254 U.S. Privacy and Security Laws 255 Health Insurance Portability and Accountability Act 255 The Health Information Technology for Economic and Clinical Health Act 258 Gramm–Leach–Bliley Act 259 Sarbanes–Oxley Act 261 State Data Breach Notification Laws 261 International Laws 263 European Union General Data Protection Regulation 263 Adequacy Decisions 267 U.S.- EU Safe Harbor and Privacy Shield 267 Laws, Regulations, and Standards 269 Payment Card Industry Data Security Standard 270 Critical Infrastructure Protection Program 270 Conflicting International Legislation 270 Information Security Management Systems 272 Iso/iec 27017:2015 272 Privacy in the Cloud 273 Generally Accepted Privacy Principles 273 Iso 27018 279 Direct and Indirect Identifiers 279 Privacy Impact Assessments 280 Cloud Forensics 281 Forensic Requirements 281 Cloud Forensic Challenges 281 Collection and Acquisition 282 Evidence Preservation and Management 283 e-discovery 283 Audit Processes, Methodologies, and Cloud Adaptations 284 Virtualization 284 Scope 284 Gap Analysis 285 Restrictions of Audit Scope Statements 285 Policies 286 Audit Reports 286 Summary 288 Exam Essentials 288 Review Questions 290 Chapter 10 Cloud Vendor Management 295 The Impact of Diverse Geographical Locations and Legal Jurisdictions 297 Security Policy Framework 298 Policies 298 Standards 300 Procedures 302 Guidelines 303 Exceptions and Compensating Controls 304 Developing Policies 305 Enterprise Risk Management 306 Risk Identification 308 Risk Calculation 308 Risk Assessment 309 Risk Treatment and Response 313 Risk Mitigation 313 Risk Avoidance 314 Risk Transference 314 Risk Acceptance 315 Risk Analysis 316 Risk Reporting 316 Enterprise Risk Management 318 Assessing Provider Risk Management Practices 318 Risk Management Frameworks 319 Cloud Contract Design 320 Business Requirements 321 Vendor Management 321 Data Protection 323 Negotiating Contracts 324 Common Contract Provisions 324 Contracting Documents 326 Government Cloud Standards 327 Common Criteria 327 FedRAMP 327 Fips 140- 2 327 Manage Communication with Relevant Parties 328 Summary 328 Exam Essentials 329 Review Questions 330 Appendix Answers to the Review Questions 335 Chapter 1: Architectural Concepts 336 Chapter 2: Data Classification 337 Chapter 3: Cloud Data Security 339 Chapter 4: Security in the Cloud 341 Chapter 5: Cloud Platform, Infrastructure, and Operational Security 343 Chapter 6: Cloud Application Security 345 Chapter 7: Operations Elements 347 Chapter 8: Operations Management 349 Chapter 9: Legal and Compliance Issues 350 Chapter 10: Cloud Vendor Management 352 Index 355

    15 in stock

    £37.50

  • Wireless Communication in Cyber Security

    John Wiley & Sons Inc Wireless Communication in Cyber Security

    15 in stock

    Book SynopsisWIRELESS COMMUNICATION in CYBERSECURITY Presenting the concepts and advances of wireless communication in cybersecurity, this volume, written and edited by a global team of experts, also goes into the practical applications for the engineer, student, and other industry professionals. Rapid advancement in wireless communications and related technologies has led to the use of newer technologies like 6G, Internet of Things (IoT), Radar, and others. Not only are the technologies expanding, but the impact of wireless communication is also changing, becoming an inevitable part of daily life. With increased use comes great responsibilities and challenges for any newer technology. The growing risks in the direction of security, authentication, and encryption are some major areas of concern, together with user privacy and security. We have seen significant development in blockchain technology along with development in a wireless network that has proved extremely useful in solving various securiTable of ContentsPreface xiii 1 BBUCAF: A Biometric-Based User Clustering Authentication Framework in Wireless Sensor Network 1Rinesh, S., Thamaraiselvi, K., Mahdi Ismael Omar and Abdulfetah Abdulahi Ahmed 1.1 Introduction to Wireless Sensor Network 2 1.2 Background Study 3 1.3 A Biometric-Based User Clustering Authentication Framework 5 1.4 Experimental Analysis 12 1.5 Conclusion 16 2 DeepNet: Dynamic Detection of Malwares Using Deep Learning Techniques 21Nivaashini, M., Soundariya, R. S., Vishnupriya, B. and Tharsanee, R. M. 2.1 Introduction 22 2.2 Literature Survey 24 2.3 Malware Datasets 28 2.4 Deep Learning Architecture 29 2.5 Proposed System 32 2.6 Result and Analysis 40 2.7 Conclusion & Future Work 51 3 State of Art of Security and Risk in Wireless Environment Along with Healthcare Case Study 55Deepa Arora and Oshin Sharma 3.1 Introduction 56 3.2 Literature Survey 58 3.3 Applications of Wireless Networks 60 3.4 Types of Attacks 62 3.5 Active Attacks 63 3.6 Layered Attacks in WSN 66 3.7 Security Models 69 3.8 Case Study: Healthcare 71 3.9 Minimize the Risks in a Wireless Environment 74 3.10 Conclusion 76 4 Machine Learning-Based Malicious Threat Detection and Security Analysis on Software-Defined Networking for Industry 4.0 79J. Ramprasath, N. Praveen Sundra Kumar, N. Krishnaraj and M. Gomathi 4.1 Introduction 80 4.2 Related Works 86 4.3 Proposed Work for Threat Detection and Security Analysis 89 4.4 Implementation and Results 96 4.5 Conclusion 100 5 Privacy Enhancement for Wireless Sensor Networks and the Internet of Things Based on Cryptological Techniques 105Karthiga, M., Indirani, A., Sankarananth, S., S. S. Sountharrajan and E. Suganya 5.1 Introduction 106 5.2 System Architecture 107 5.3 Literature Review 108 5.4 Proposed Methodology 112 5.5 Results and Discussion 118 5.6 Analysis of Various Security and Assaults 122 5.7 Conclusion 124 6 Security and Confidentiality Concerns in Blockchain Technology: A Review 129G. Prabu Kanna, Abinash M.J., Yogesh Kumar, Jagadeesh Kumar and E. Suganya 6.1 Introduction 130 6.2 Blockchain Technology 131 6.3 Blockchain Revolution Drivers 133 6.4 Blockchain Classification 135 6.5 Blockchain Components and Operation 138 6.6 Blockchain Technology Applications 142 6.7 Difficulties 145 6.8 Conclusion 145 7 Explainable Artificial Intelligence for Cybersecurity 149P. Sharon Femi, K. Ashwini, A. Kala and V. Rajalakshmi 7.1 Introduction 150 7.2 Cyberattacks 152 7.3 XAI and Its Categorization 157 7.4 XAI Framework 160 7.5 Applications of XAI in Cybersecurity 165 7.6 Challenges of XAI Applications in Cybersecurity 169 7.7 Future Research Directions 171 7.8 Conclusion 171 8 AI-Enabled Threat Detection and Security Analysis 175A. Saran Kumar, S. Priyanka, V. Praveen and G. Sivapriya 8.1 Introduction 176 8.2 Literature Survey 181 8.3 Proposed Work 184 8.4 System Evaluation 190 8.5 Conclusion 195 9 Security Risks and Its Preservation Mechanism Using Dynamic Trusted Scheme 199Geetanjali Rathee, Akshay Kumar, S. Karthikeyan and N. Yuvaraj 9.1 Introduction 200 9.2 Related Work 202 9.3 Proposed Framework 205 9.4 Performance Analysis 209 9.5 Results Discussion 210 9.6 Empirical Analysis 212 9.7 Conclusion 213 10 6G Systems in Secure Data Transmission 217A.V.R. Mayuri, Jyoti Chauhan, Abhinav Gadgil, Om Rajani and Soumya Rajadhyaksha 10.1 Introduction 218 10.2 Evolution of 6G 219 10.3 Functionality 222 10.4 6G Security Architectural Requirements 230 10.5 Future Enhancements 234 10.6 Summary 237 11 A Trust-Based Information Forwarding Mechanism for IoT Systems 239Geetanjali Rathee, Hemraj Saini, R. Maheswar and M. Akila 11.1 Introduction 240 11.2 Related Works 243 11.3 Estimated Trusted Model 247 11.4 Blockchain Network 248 11.5 Performance Analysis 250 11.6 Results Discussion 252 11.7 Empirical Analysis 253 11.8 Conclusion 255 References 255 About the Editors 259 Index 261

    15 in stock

    £140.40

  • Positioning and Locationbased Analytics in 5G and

    John Wiley & Sons Inc Positioning and Locationbased Analytics in 5G and

    15 in stock

    Book SynopsisPOSITIONING AND LOCATION-BASED ANALYTICS IN 5G AND BEYOND Understand the future of cellular positioning with this introduction The fifth generation (5G) of mobile network technology are revolutionizing numerous aspects of cellular communication. Location information promises to make possible a range of new location-dependent services for end users and providers alike. With the new possibilities of this location technology comes a new demand for location-based analytics, a new paradigm for generating and analyzing dynamic location data for a wide variety of purposes. Positioning and Location-based Analytics in 5G and Beyond introduces the foundational concepts related to network localization, user positioning, and location-based analytics in the context of cutting-edge mobile networks. It includes information on current location-based technologies and their application, and guidance on the future development of location systems beyond 5G. The result is an accessible but rigorous guide to a bold new frontier in cellular technology. Positioning and Location-based Analytics in 5G and Beyond readers will also find: Contributions from leading researchers and industry professionalsHigh-level insights into 5G and its future evolutionIn-depth coverage of subjects such as positioning enablers, location-aware network management, reference standard architectures, and more Positioning and Location-based Analytics in 5G and Beyond is ideal for researchers and industry professionals with an understanding of network communications and a desire to understand the future of the field.Table of ContentsAbout the Editors xii List of Contributors xiii Preface xiv Acknowledgments xx List of Abbreviations xxi 1 Introduction and Fundamentals 1Stefania Bartoletti, Eduardo Baena, Raquel Barco, Giacomo Bernini, Nicola Blefari Melazzi, Hui Chen, Sergio Fortes, Domenico Giustiniano, Mythri Hunukumbure, Fan Jiang, Emil J. Khatib, Oluwatayo Kolawole, Aristotelis Margaris, Sara Modarres Razavi, Athina Ropodi, Gürkan Solmaz, Kostas Tsagkaris, and Henk Wymeersch 1.1 Introduction and Motivation 1 1.2 Use Cases, Verticals, and Applications 2 1.2.1 Emergency Calls 2 1.2.2 Public Safety and Natural Disasters 3 1.2.3 ITS and Autonomous Vehicles 4 1.2.4 IIoT, Construction Sites, and Mines 4 1.2.5 Commercial and Transport Hubs 5 1.2.6 Internet-of-Things 5 1.2.7 Education and Gaming 6 1.3 Fundamentals of Positioning and Navigation 7 1.3.1 Position-Dependent Measurements 7 1.3.2 Positioning Methods 8 1.3.3 AI/ML for Positioning 9 1.4 Fundamentals of Location-Based Analytics 10 1.5 Introduction to Architectural Principles 12 1.5.1 5G Architecture and Positioning 13 1.5.2 Location-Based Analytics Platform 13 1.6 Book Outline 16 Part I Positioning Enablers 19 2 Positioning Methods 21Stefania Bartoletti, Carlos S. Álvarez-Merino, Raquel Barco, Hui Chen, Andrea Conti, Yannis Filippas, Domenico Giustiniano, Carlos A. Gómez Vega, Mythri Hunukumbure, Fan Jiang, Emil J. Khatib, Oluwatayo Y. Kolawole, Flavio Morselli, Sara Modarres Razavi, Athina Ropodi, Joerg Widmer, Moe Z. Win, and Henk Wymeersch 2.1 Positioning as Parameter Estimation 22 2.1.1 The Snapshot Positioning Problem 22 2.1.2 Fisher Information and Bounds 24 2.1.3 Tracking and Location-Data Fusion 25 2.1.3.1 Practical Aspects 27 2.2 Device-Based Radio Positioning 28 2.2.1 Theoretical Foundations 28 2.2.1.1 Signal Model 28 2.2.1.2 Equivalent Fisher Information Matrix 29 2.2.1.3 Interpretation 30 2.2.2 Signal Processing Techniques 30 2.2.3 Example Results of 5G-Based Positioning in IIoT Scenarios 31 2.3 Device-Free Radio Localization 33 2.3.1 Theoretical Foundations 34 2.3.1.1 Signal Model 34 2.3.1.2 EFIM for DFL 35 2.3.1.3 Interpretation 36 2.3.2 Signal Processing Techniques 37 2.3.3 Experimental Results on 5G-Based DFL 38 2.4 AI/ML for Positioning 40 2.4.1 Fingerprinting Approach 41 2.4.2 Soft Information-Based Approach 44 2.4.3 AI/ML to Mitigate Practical Impairments 46 3 Standardization in 5G and 5G Advanced Positioning 51Sara Modarres Razavi, Mythri Hunukumbure, and Domenico Giustiniano 3.1 Positioning Standardization Support Prior to 5G 51 3.1.1 GNSS and Real-Time Kinematics (RTK) GNSS Positioning 52 3.1.2 WiFi/Bluetooth-Based Positioning 55 3.1.3 Terrestrial Beacon System 56 3.1.4 Sensor Positioning 56 3.1.5 RAT-Dependent Positioning Prior to 5G 56 3.1.5.1 Enhanced CID (eCID) 57 3.1.5.2 Observed Time-Difference-of-Arrival (OTDoA) 58 3.1.5.3 Uplink Time-Difference-of-Arrival (UTDoA) 58 3.1.6 Internet of Things (IoT) Positioning 58 3.1.7 Other Non-3GPP Technologies 58 3.1.7.1 UWB 58 3.1.7.2 Fingerprinting 59 3.2 5G Positioning 59 3.2.1 5G Localization Architecture 60 3.2.2 Positioning Protocols 62 3.2.3 RAT-Dependent NR Positioning Technologies 64 3.2.3.1 Downlink-Based Solutions 64 3.2.3.2 Uplink-Based Solutions 64 3.2.3.3 Downlink- and Uplink-Based Solutions 64 3.2.4 Specific Positioning Signals 65 3.2.4.1 Downlink Positioning Reference Signal 66 3.2.4.2 Uplink Signal for Positioning 67 3.2.5 Positioning Measurements 68 3.3 Hybrid Positioning Technologies 69 3.3.1 Outdoor Fusion 69 3.3.2 Indoor Fusion 70 3.4 5G Advanced Positioning 71 4 Enablers Toward 6G Positioning and Sensing 75Joerg Widmer, Henk Wymeersch, Stefania Bartoletti, Hui Chen, Andrea Conti, Nicolò Decarli, Fan Jiang, Barbara M. Masini, Flavio Morselli, Gianluca Torsoli, and Moe Z. Win 4.1 Integrated Sensing and Communication 76 4.1.1 ISAC Application: Joint Radar and Communication with Sidelink V2X 77 4.1.1.1 V2X and Its Sensing Potential 79 4.1.1.2 V2X Target Parameter Estimation and Signal Numerology 80 4.1.1.3 V2X Resource Allocation 81 4.1.2 ISAC Application: Human Activity Recognition and Person Identification 82 4.1.2.1 Beyond Positioning 82 4.1.2.2 System Aspects 83 4.1.2.3 Processing Chain 83 4.2 Reconfigurable Intelligent Surfaces for Positioning and Sensing 85 4.2.1 RIS Enabling and Enhancing Positioning 86 4.2.1.1 RIS Enabling Positioning 87 4.2.1.2 RIS Enhancing Positioning 87 4.2.1.3 Use Cases 88 4.2.2 RIS for Sensing 88 4.3 Advanced Methods 90 4.3.1 Model-Based Methods 90 4.3.2 AI-Based Methods 92 4.3.2.1 Use Case 93 5 Security, Integrity, and Privacy Aspects 99Stefania Bartoletti, Giuseppe Bianchi, Nicola Blefari Melazzi, Domenico Garlisi, Danilo Orlando, Ivan Palamá, and Sara Modarres Razavi 5.1 Location Privacy 100 5.1.1 Overview on the Privacy Implication 100 5.1.2 Identification and Authentication in Cellular Networks 102 5.1.3 IMSI Catching Attack 103 5.1.4 Enhanced Privacy Protection in 5G Networks 104 5.1.5 Location Privacy Algorithms 106 5.1.6 Location Privacy Considered Model 108 5.1.7 Location Privacy Tested Approach 108 5.2 Location Security 110 5.2.1 Location Security in 4G/5G Networks 112 5.2.2 Threat Models and Bounds 113 5.2.2.1 Formal Model 114 5.2.2.2 Error Model for the Spoofing Attack 115 5.2.2.3 Threat Model Example Case Study: Range-Based Localization Using RSSI 116 5.2.2.4 Error Bound Under Spoofing Attack 116 5.2.2.5 Case Study 117 5.3 3GPP Integrity Support 119 References 121 Part II Location-based Analytics and New Services 125 6 Location and Analytics for Verticals 127Gürkan Solmaz, Raquel Barco, Stefania Bartoletti, Andrea Conti, Nicolò Decarli, Yannis Filippas, Andrea Giani, Emil J. Khatib, Oluwatayo Y. Kolawole, Tomasz Mach, Barbara M. Masini, and Athina Ropodi 6.1 People-Centric Analytics 127 6.1.1 Crowd Mobility Analytics 127 6.1.1.1 Introduction and RelatedWork 127 6.1.1.2 Example Experimental Results from Crowd Mobility Analytics: Group Inference 133 6.1.2 Flow Monitoring 135 6.1.2.1 Introduction and RelatedWork 135 6.1.2.2 Selected DL Approaches and Results for Trajectory Prediction 136 6.1.3 COVID--19 Contact Tracing 139 6.1.3.1 Introduction and RelatedWork 139 6.1.3.2 Selected Approach and Example Results from Contact Tracing 141 6.2 Localization in Road Safety Applications 142 6.2.1 Safety-Critical Use Cases and 5G Position-Related Requirements 143 6.2.1.1 Introduction and RelatedWork 143 6.2.1.2 Example Results for Safety-Critical Use Cases 144 6.2.2 Upper Layers Architecture in ETSI ITS Standard 145 6.2.2.1 Introduction and RelatedWork 145 6.2.2.2 Example Results for ITS 148 6.2.3 5G Automotive Association (5GAA) Activities 151 7 Location-Aware Network Management 157Sergio Fortes, Eduardo Baena, Raquel Barco, Isabel de la Bandera, Zwi Altman, Luca Chiaraviglio, Wassim B. Chikha, Sana B. Jemaa, Yannis Filippas, Imed Hadj-Kacem, Aristotelis Margaris, Marie Masson, and Kostas Tsagkaris 7.1 Introduction 157 7.2 Location-Aware Cellular Network Planning 161 7.2.1 What Is the Cellular Network Planning? 161 7.2.2 Why Is Localization Important in the Planning Phase? 162 7.2.3 Location-Aware Cellular Network Planning 164 7.2.4 Future Directions 164 7.3 Location-Aware Network Optimization 165 7.3.1 What Is the Cellular Network Optimization? 165 7.3.2 Why Is Location Information Important in Optimization? 166 7.3.3 Hybrid Clustering-Based Optimization of 5G Mobile Networks 167 7.3.3.1 Clustering Methods and Algorithmic Approach 167 7.3.3.2 Results and Conclusions 168 7.3.4 Location-Aware Capacity and Coverage Optimization 170 7.3.4.1 Dual-Connectivity Optimization 170 7.3.4.2 Results and Conclusions 171 7.3.5 SINR Prediction in Presence of Correlated Shadowing in Cellular Networks 172 7.3.5.1 SINR Prediction with Kriging 173 7.3.5.2 Results and Conclusions 175 7.3.5.3 Multi-user (MU) Scheduling Enhancement with Geolocation Information and Radio Environment Maps (REMs) 177 7.3.5.4 Results and Conclusions 178 7.3.6 Social-Aware Load Balancing System for Crowds in Cellular Networks 179 7.3.6.1 Social-Aware Fuzzy Logic Controller (FLC) Power Traffic Sharing (PTS) Control 179 7.3.6.2 Results and Conclusions 180 7.3.7 Future Directions 182 7.4 Location-Aware Network Failure Management 182 7.4.1 What Is the Cellular Network Failure Management? 182 7.4.2 Why Is Localization Important in Failure Management? 183 7.4.3 Contextualized Indicators 184 7.4.3.1 Contextualized Indicators 184 7.4.3.2 Results and Conclusions 186 7.4.4 Location-Based Deep Learning Techniques for Network Analysis 189 7.4.4.1 Synthetic mages and Deep-Learning Classification 189 7.4.4.2 Results and Conclusions 190 Part III Architectural Aspects for Localization and Analytics 197 8 Location-Based Analytics as a Service 199Athina Ropodi, Giacomo Bernini, Aristotelis Margaris, and Kostas Tsagkaris 8.1 Motivation for a Dedicated Platform 199 8.2 Principles 201 8.2.1 Microservice Architectural Approach 201 8.2.2 Software Containerization 203 8.2.3 Mixed Kappa and Lambda Data Lake Approach 203 8.2.4 Designing an ML- and AI-Aware Solution 204 8.2.5 Abstracting Computation Optimization Processes 204 8.2.6 Automating Dependency Resolution and Linking 205 8.2.7 Achieving Low Latency End-to-End 205 8.2.8 Decoupling Processing and API Access 205 8.2.9 Offering Dynamic Resource Allocation 206 8.2.10 Decoupling Services and Security 206 8.3 Platform System Overview 206 8.4 Platform System Blocks Description 209 8.4.1 API Blocks 209 8.4.2 Control Blocks 210 8.4.3 Core Blocks 212 8.4.4 Virtualization Management and Infrastructure Blocks 214 8.5 Functional Decomposition 214 8.5.1 Data Collection Functions 215 8.5.2 Persistence and Message Queue Functions 216 8.5.3 Positioning and Analytics Functions 218 8.5.3.1 Positioning Functions 218 8.5.3.2 Analytics Functions 218 8.5.4 Security and Privacy Functions 219 8.5.4.1 Security Functions 219 8.5.4.2 Privacy Functions 221 8.5.5 Analytics API Functions 221 8.5.6 Control Functions 221 8.5.7 Management, Orchestration, and Virtualization Functions 222 8.6 SystemWorkflows and Data Schema Analysis 224 8.6.1 SystemWorkflows 224 8.6.1.1 Service Activation 224 8.6.1.2 Service Consumption 226 8.6.1.3 Southbound Data Collection 226 8.6.1.4 Positioning and Analytics Service Operation 228 8.6.2 Applicable Data Schema 231 8.6.2.1 GeoJSON Data Format 231 8.6.2.2 JSON SQL Table Schema Format 231 8.6.2.3 3GPP Location Input Data 232 8.7 Platform Implementation: Available Technologies 232 8.7.1 Access Control Module 234 8.7.2 Service Discovery Module 234 8.7.3 API Gateway and Service Subscription Module 234 8.7.4 Data Operations Controller 234 8.7.5 ML Pipeline Controller 235 8.7.6 ML Model Repository 235 8.7.7 Data Collection Module 235 8.7.8 Data Persistence Module 235 8.7.9 Message Queue 236 8.7.10 Virtualization layer 236 8.7.11 Management and Orchestration 237 9 Reference Standard Architectures 239Giacomo Bernini, Aristotelis Margaris, Athina Ropodi, and Kostas Tsagkaris 9.1 Data Analytics in the 3GPP Architecture 239 9.1.1 Evolved Network Data Analytics in 3GPP R17 240 9.1.2 Mapping with Location Data Analytics 244 9.2 3GPP CAPIF 245 9.3 3GPP SEAL 246 9.4 ETSI NFV 248 9.4.1 Mapping with Location Analytics Functions Management 250 9.5 ETSI Zero Touch Network and Service Management (ZSM) 250 9.5.1 Mapping with Location Analytics Services Management 251 References 253 Index 255

    15 in stock

    £88.65

  • Resource Management on Distributed Systems

    John Wiley & Sons Inc Resource Management on Distributed Systems

    15 in stock

    Book Synopsis

    15 in stock

    £91.80

  • The Analysis and Design of Linear Circuits

    John Wiley & Sons Inc The Analysis and Design of Linear Circuits

    15 in stock

    Book SynopsisTable of ContentsChapter 1 Introduction 1 1 – 1 About This Book 2 1 – 2 Symbols and Units 4 1 – 3 Circuit Variables 5 1 – 4 Computational and Simulation Software Introduction 11 Summary 12 Problems P- 1 Integrating Problems P- 2 Chapter 2 Basic circuit Analysis 15 2 – 1 Element Constraints 16 2 – 2 Connection Constraints 21 2 – 3 Combined Constraints 28 2 – 4 Equivalent Circuits 35 2 – 5 Voltage and Current Division 43 2 – 6 Circuit Reduction 52 2 – 7 Computer-Aided Circuit Analysis 56 Summary 62 Problems P- 5 Integrating Problems P- 13 Chapter 3 circuit Analysis Techniques 63 3 – 1 Node-Voltage Analysis 64 3 – 2 Mesh-Current Analysis 80 3 – 3 Linearity Properties 88 3 – 4 Thévenin and Norton Equivalent Circuits 98 3 – 5 Maximum Signal Transfer 109 3 – 6 Interface Circuit Design 112 Summary 124 Problems P- 17 Integrating Problems P- 27 Chapter 4 Active circuits 125 4 – 1 Linear Dependent Sources 126 4 – 2 Analysis of Circuits with Dependent Sources 127 4 – 3 The Operational Amplifier 149 4 – 4 OP AMP Circuit Analysis 157 4 – 5 OP AMP Circuit Design 174 4 – 6 OP AMP Circuit Applications 181 Summary 206 Problems P- 31 Integrating Problems P- 42 Chapter 5 Signal Waveforms 207 5 – 1 Introduction 208 5 – 2 The Step Waveform 209 5 – 3 The Exponential Waveform 214 5 – 4 The Sinusoidal Waveform 220 5 – 5 Composite Waveforms 227 5 – 6 Waveform Partial Descriptors 234 Summary 240 Problems P- 45 Integrating Problems P- 50 Chapter 6 capacitance and Inductance 241 6 – 1 The Capacitor 242 6 – 2 The Inductor 249 6 – 3 Dynamic OP AMP Circuits 256 6 – 4 Equivalent Capacitance and Inductance 265 Summary 269 Problems P- 53 Integrating Problems P- 58 Chapter 7 First- and Second-order circuits 271 7 – 1 RC and RL Circuits 272 7 – 2 First-Order Circuit Step Response 284 7 – 3 Initial and Final Conditions 293 7 – 4 First-Order Circuit Response to Exponential and Sinusoidal Inputs 300 7 – 5 The Series RLC Circuit 309 7 – 6 The Parallel RLC Circuit 320 7 – 7 Second-Order Circuit Step Response 325 Summary 336 Problems P- 61 Integrating Problems P- 69 Chapter 8 Sinusoidal Steady-state Response 337 8 – 1 Sinusoids and Phasors 338 8 – 2 Phasor Circuit Analysis 344 8 – 3 Basic Phasor Circuit Analysis and Design 350 8 – 4 Circuit Theorems with Phasors 366 8 – 5 General Circuit Analysis with Phasors 379 8 – 6 Energy and Power 394 Summary 399 Problems P- 73 Integrating Problems P- 82 Chapter 9 Laplace Transforms 401 9 – 1 Signal Waveforms and Transforms 402 9 – 2 Basic Properties and Pairs 406 9 – 3 Pole-Zero Diagrams 414 9 – 4 Inverse Laplace Transforms 417 9 – 5 Circuit Response Using Laplace Transforms 428 9 – 6 Initial and Final Value Properties 436 Summary 439 Problems P- 85 Integrating Problems P- 89 Chapter 10 s-Domain Circuit Analysis 441 10– 1 Transformed Circuits 442 10– 2 Basic Circuit Analysis in the s Domain 451 10– 3 Circuit Theorems in the s Domain 457 10– 4 Node-Voltage Analysis in the s Domain 467 10– 5 Mesh-Current Analysis in the s Domain 476 10– 6 Summary of s -Domain Circuit Analysis 482 Summary 486 Problems P- 93 Integrating Problems P- 101 Chapter 11 Network Functions 487 11– 1 Definition of a Network Function 488 11– 2 Network Functions of One- and Two-Port Circuits 491 11– 3 Network Functions and Impulse Response 503 11– 4 Network Functions and Step Response 506 11– 5 Network Functions and Sinusoidal Steady-State Response 510 11– 6 Impulse Response and Convolution 519 11– 7 Network Function Design and Evaluation 525 Summary 540 Problems P- 105 Integrating Problems P- 112 Chapter 12 Frequency Response 543 12– 1 The Electromagnetic Spectrum and Frequency-Response Descriptors 544 12– 2 Bode Diagram Descriptors 547 12– 3 First-Order Low-Pass and High-Pass Responses 549 12– 4 Bandpass and Bandstop Responses 566 12– 5 The Frequency Response of RLC Circuits 574 12– 6 Bode Diagrams 584 12– 7 Frequency Response and Step Response 596 Summary 602 Problems P- 115 Integrating Problems P- 122 Chapter 13 Fourier Series 603 13– 1 Overview of Fourier Series 604 13– 2 Fourier Coefficients 605 13– 3 Waveform Symmetries 615 13– 4 Circuit Analysis Using the Fourier Series 617 13– 5 RMS Value and Average Power 626 Summary 633 Problems P- 127 Integrating Problems P- 131 Chapter 14 Active Filter Design 635 14– 1 Active Filters 636 14– 2 Second-Order Low-Pass and High-Pass Filters 637 14– 3 Second-Order Bandpass and Bandstop Filters 646 14– 4 Low-Pass Filter Design 656 14– 5 Low-Pass Filter Evaluation 677 14– 6 High-Pass Filter Design and Evaluation 682 14– 7 Bandpass and Bandstop Filter Design 694 Summary 700 Problems P- 133 Integrating Problems P- 137 Chapter 15 Mutual Inductance and Transformers 701 15– 1 Coupled Inductors 702 15– 2 The Dot Convention 704 15– 3 Energy Analysis 709 15– 4 The Ideal Transformer 711 15– 5 Linear Transformers 719 Summary 726 Problems P- 141 Integrating Problems P- 143 Chapter 16 Ac Power Systems 729 16– 1 Average and Reactive Power 730 16– 2 Complex Power 732 16– 3 Single-Phase Circuit Analysis 735 16– 4 Single-Phase Power Flow 740 16– 5 Balanced Three-Phase Circuits 745 16– 6 Three-Phase Circuit Analysis 750 16– 7 Three-Phase Power Flow 763 Summary 766 Problems P- 145 Integrating Problems P- 150 Chapter 17 Two-port Networks 767 17– 1 Introduction 768 17– 2 Impedance Parameters 769 17– 3 Admittance Parameters 772 17– 4 Hybrid Parameters 774 17– 5 Transmission Parameters 777 17– 6 Two-Port Conversions and Connections 780 Summary 785 Problems P- 151 Integrating Problems P- 153 Chapter 18 Fourier Transforms 787 18– 1 Introduction to Fourier Transforms 788 18– 2 Circuit Analysis Using Fourier Transforms 803 18– 3 Impulse Response and Convolution 806 18– 4 Parseval’ sTheorem 809 Summary 814 Problems P- 155 Integrating Problems P- 157 Appendix A Solution of Linear Equations A- 1 Appendix B Butterworth and Chebyshev Poles B- 1 Appendix C Behaviorally Motivated Learning C- 1 Appendix D Computational Tools D- 1 Appendix E Solutions To Exercises (Available online) E- 1 Appendix F Complex Numbers F- 1 Appendix G Standard Values and References G- 1 Appendix H Answers to Selected Problems H- 1 Index I- 1

    15 in stock

    £115.16

  • Geometric Quantum Mechanics

    John Wiley & Sons Inc Geometric Quantum Mechanics

    15 in stock

    Book SynopsisTable of Contents1 Space 1.1 The exponential function 1.2 The two-dimensional plane 1.3 Calculus and operators 1.4 Function space for rotation in a plane 1.5 Three-dimensional space 1.6 Spinors 1.7 Pauli matrices 1.8 Rotation matrices 1.9 Projections 1.10 Function space in three dimensions 1.11 Fourier transform and translation 1.12 Dual bases 1.13 Dual basis obtained via matrix inversion 1.14 The unit sphere 1.15 Function space for rotation in three dimensions 1.16 Higher-order operators 1.17 Operator techniques for angular momentum 1.18 Chapter summary 2 Spacetime 2.1 Introduction 2.2 The four-vector 2.3 Four-momentum for particles 2.4 Function space for spacetime 2.5 Spacetime spinors 2.6 γ matrices 2.7 Motion in an electromagnetic field 2.8 Creation of electromagnetic fields: Maxwell’s equations 2.9 Nonrelativistic limit of Dirac equation 2.10 Interactions between particles and electromagnetic field 2.11 Spin-orbit coupling 2.12 Spin-orbit coupling 2.13 Schrödinger/Heisenberg equations and propagators 2.14 Electroweak interaction 3 Single-particle problems 3.1 Introduction 3.2 Quantum harmonic oscillator 3.3 Perturbed harmonic oscillator 3.4 Two-dimensional harmonic oscillator via differential equation 3.5 Two-dimensional harmonic oscillator via unit vectors 3.6 Radial equation for hydrogen atom 3.7 Transitions on atoms 3.8 Molecules and solids 3.9 Periodic potential in a solid 3.10 Scattering from local potential 3.11 Single state and a band 4 Many-particle systems 4.1 Introduction 4.2 Wavefunctions for many-body systems 4.3 Quantum statistics 4.4 The Fermi sea in solids 4.5 Tensors 4.6 Electon interactions on an atom 4.7 Strong interaction: mesons 4.8 Strong interaction: baryon 4.9 Nuclear structure 5 Collective and emergent phenomena 5.1 Magnetism 5.2 Superconductivity 5.3 Mass generation 5.4 Symmetry breaking 5.5 Screening in solids 5.6 Plasmons in solids 5.7 Superfluidity

    15 in stock

    £68.15

  • The Project Managers Guide to Mastering Agile

    John Wiley & Sons Inc The Project Managers Guide to Mastering Agile

    15 in stock

    Book SynopsisTHE PROJECT MANAGER'S GUIDE TO MASTERING AGILE Updated guide to Agile methodologies, with real-world case studies and valuable frameworks for project managers moving to Agile The Project Manager's Guide to Mastering Agile helps project managers who are faced with the challenge of adapting their project management approach to an Agile environment, showing how these approaches can work jointly to improve project outcomes in any project, with discussion topics and real-world case studies that facilitate hands-on learning. It also provides project managers with the fundamental knowledge to take a leadership role in working with companies to develop a well-integrated, enterprise-level Agile Project Management approach to fit their business. The original edition of this book has been very successful and is used as a graduate-level textbook in several universities. This new edition builds on the success of the original edition and includes updated contenTable of ContentsChapter 1: Introduction to Agile Project Management The Chasm in Project Management Philosophies The Impact on the Project Management Profession The Evolution of Agile and Waterfall The Evolution of the Project Management Profession Agile Project Management Benefits Summary of Key Points Discussion Topics Part 1: Fundamentals of Agile Chapter 2: Agile History and the Agile Manifesto Agile Early History Agile Manifesto (2001) Summary of Key Points Discussion Topics Chapter 3: Scrum Overview Scrum Roles Scrum Framework General Scrum/Agile Principles Scrum Values Summary of Key Points Discussion Topics Chapter 4: Agile Planning, Requirements, and Product Backlog Agile Planning Practices Agile Requirements Practices User Personas and Stories Product Backlog Summary of Key Points Discussion Topics Part 2: Agile Project Management Chapter 5: Agile Development, Quality, and Testing Practices Agile Software Development Practices Agile Quality Management Practices Agile Testing Practices Summary of Key Points Discussion Topics Chapter 6: Time-Boxing, Kanban, and Theory of Constraints The Importance of Flow Time-Boxing Kanban Process Theory of Constraints Summary of Key Points Discussion Topics Chapter 7: Agile Estimation Agile Estimation Overview Agile Estimation Practices Velocity and burn-down/burn-up charts Summary of key points Discussion topics Chapter 8: Agile Project Management Role Agile Project Management Shifts in Thinking Potential Agile Project Management Roles Agile, PMI®, and PMBOK® Summary of Key Points Discussion Topics Chapter 9: Agile Communications and Tools Agile Communications Practices Agile Project Management Tools Summary of Key Points Discussion Topics Chapter 10: Learning to See the Big Picture Systems Thinking Complex Adaptive Systems Summary of Key Points Discussion Topics Chapter 11: The Roots of Agile Influence of Total Quality Management (TQM) Influence of Lean Manufacturing Principles of Product Development Flow Summary of Key Points Discussion Topics Part 3: Agile Project Management Planning and Management Chapter 12: Hybrid Agile Models What is a Hybrid Agile Model and Why Would You Use It? What Are the Benefits of a Hybrid Agile Model? What Is Different About a Hybrid Agile Model? Choosing the Right Approach Summary of Key Points Discussion Topics Chapter 13: Value-driven Delivery Value-driven Delivery Overview Principles of Value-driven Delivery Customer-value Prioritization Overview Value-driven Delivery Tools Summary of Key Points Discussion Topics Chapter 14: Adaptive Planning What is Adaptive Planning? Rolling Wave Planning Progressive Elaboration and Multi-level Planning Summary of Key Points Discussion Topics Chapter 15: Agile Planning Practices and Tools Product/Project Vision Product Roadmaps Exploratory 360 Assessment Agile Functional Decomposition Agile Project Charter Summary of Key Points Discussion Topics Chapter 16: Agile Stakeholder Management and Agile Contracts Why Is Stakeholder Management Important? What Is a Stakeholder? Stakeholder Management Process What's Different About Agile Stakeholder Management? Agile Contracts Summary of Key Points Discussion Topics Chapter 17: Distributed Project Management in Agile What Is Distributed Project Management? Distributed Project Management Roles Summary of Key Points Discussion Topics Part 4: Making Agile Work for a Business Chapter 18: Scaling Agile to an Enterprise Level Enterprise-Level Agile Challenges Enterprise-Level Obstacles to Overcome Enterprise-Level Implementation Considerations Enterprise-Level Management Practices Summary of Key Points Discussion Topics Chapter 19: Scaling Agile for Multiple Team Projects Scrum of Scrums Approach Large Scale Scrum (LeSS) Nexus Scrum at Scale Summary of Key Points Discussion Topics Chapter 20: Adapting an Agile Approach to Fit a Business The Impact of Different Business Environments on Agile Typical Levels of Management Corporate Culture and Values Summary of Key Points Discussion Topics Chapter 21: Enterprise-Level Agile Transformations Planning an Agile Transformation Adaptive Project Governance Model Summary of Key Points Discussion Topics Part 5: Enterprise-Level Agile Frameworks Chapter 22: Scaled Agile Framework SAFe Competency Areas SAFe Core Values Lean Agile Mindset SAFe Lean Agile Principles SAFe Artifacts and Supporting Capabilities Summary of Key Points Discussion Topics Chapter 23: Disciplined Agile Delivery DA Full Delivery Lifecycles DA Roles DA Mindset DA Tool Kit Summary of Key Points Discussion Topics Chapter 24: Managed Agile Development Framework Managed Agile Development Overview Objectives of Managed Agile Development Framework Description Roles and Responsibilities Summary of Key Points Discussion Topics Chapter 25: Summary of Enterprise-Level Frameworks High-level Comparison How These Frameworks Have Evolved Part 6: Case Studies Chapter 26: “Not-So-Successful” Case Studies Company A Company B Company C Chapter 27: Case Study—Valpak Background Overview Challenges Key Success Factors Results and Conclusions Lessons Learned Chapter 28: Case Study—Harvard Pilgrim Health Care Background Overview Project management approach Challenges Key Success Factors Conclusions Lessons Learned Chapter 29: Case Study—General Dynamics UK Limited. Background Overview Project Management Approach Challenges Key Success Factors Conclusions Lessons Learned Chapter 30: Agile Hardware Development Agile Hardware Development Overview How It’s Done at Tesla Overall Summary Chapter 31: Non-Software Case Studies Agile Home Remodeling Agile Book Publishing Chapter 32: Overall Summary Evolution of the Project Management Profession What To Do Differently General Recommendations Appendices Appendix A: Additional Reading Appendix B: Glossary of Terms Appendix C: Example Project/Program Charter Template Appendix D: Suggested Course Outline Index

    15 in stock

    £47.25

  • Software Reliability Techniques for RealWorld

    John Wiley & Sons Inc Software Reliability Techniques for RealWorld

    15 in stock

    Book SynopsisAuthoritative resource providing step-by-step guidance for producing reliable software to be tailored for specific projects Software Reliability Techniques for Real-World Applications is a practical, up to date, go-to source that can be referenced repeatedly to efficiently prevent software defects, find and correct defects if they occur, and create a higher level of confidence in software products. From content development to software support and maintenance, the author creates a depiction of each phase in a project such as design and coding, operation and maintenance, management, product production, and concept development and describes the activities and products needed for each. Software Reliability Techniques for Real-World Applications introduces clear ways to understand each process of software reliability and explains how it can be managed effectively and reliably. The book is supported by a plethora of detailed examples and systematic approTable of ContentsPreface xi Series Editor’s Foreword by Dr. Andre Kleyner xiii Acronyms xv Glossary xvii 1 Introduction 1 1.1 Description of the Problem 1 1.2 Implications for Software Reliability 2 References 3 2 Understanding Defects 5 2.1 Where Defects Enter the Project System 5 2.2 Effects of Defects 6 2.3 Detection of Defects 7 2.4 Causes of Defects 9 References 12 3 Handling Defects 13 3.1 Strategy for Handling Defects 13 3.2 Objectives 14 3.3 Plan 15 3.4 Implementation, Monitoring, and Feedback 28 3.5 Analogies Between Hardware and Software Reliability Engineering 31 References 33 4 Project Phases 35 4.1 Introduction to Project Phases 35 4.2 Concept Development and Planning 43 4.2.1 Description of the CDP Phase 43 4.2.2 Defects Typical for the CDP Phase 46 4.2.3 Techniques and Processes for the CDP Phase 47 4.2.4 Metrics for the CDP Phase 51 4.3 Requirements and Interfaces 62 4.3.1 Description of the Requirements and Interfaces Phase 62 4.3.2 Defects Typical for the Requirements and Interfaces Phase 63 4.3.3 Techniques and Processes for the Requirements and Interfaces Phase 65 4.3.4 Metrics for the Requirements and Interfaces Phase 68 4.4 Design and Coding 73 4.4.1 Description of the DC Phase 73 4.4.2 Defects Typical for the DC Phase 76 4.4.3 Techniques and Processes for the DC Phase 78 4.4.4 Metrics for the DC Phase 82 4.5 Integration, Verification, and Validation 91 4.5.1 Description of the IV&V Phase 91 4.5.2 Defects Typical for the IV&V Phase 94 4.5.3 Techniques and Processes for the IV&V Phase 96 4.5.4 Metrics for the IV&V Phase 98 4.6 Product Production and Release 105 4.6.1 Description of the Product Production and Release Phase 106 4.6.2 Defects Typical for the Product Production and Release Phase 107 4.6.3 Techniques and Processes for the Product Production and Release Phase 108 4.6.4 Metrics for the Product Production and Release Phase 111 4.7 Operation and Maintenance 115 4.7.1 Description of the Operation and Maintenance Phase 116 4.7.2 Defects Typical for the OM Phase 119 4.7.3 Techniques and Processes for the OM Phase 119 4.7.4 Metrics for the OM Phase 121 4.8 Management 125 4.8.1 Description of Management 125 4.8.2 Defects Typical for Management 126 4.8.3 Techniques and Processes for Management 128 4.8.4 Metrics for Management 131 References 139 5 Roadmap and Practical Guidelines 141 5.1 Summary and Roadmap 141 5.1.1 Start of a Project 142 5.1.2 As a Member of an Organization 145 5.1.3 Troubled Projects 145 5.2 Guidelines 149 References 150 6 Techniques 151 6.1 Introduction to the Techniques 151 6.2 Techniques for Systems Engineering 151 6.3 Techniques for Software 161 6.4 Techniques for Reliability Engineering 179 6.5 Project-Wide Techniques and Techniques for Quality Assurance 254 References 316 Index 323

    15 in stock

    £94.50

  • MIMO Antenna Systems for 5G and Beyond

    John Wiley & Sons Inc MIMO Antenna Systems for 5G and Beyond

    15 in stock

    Book SynopsisDiscover current design practices and performance metrics in this comprehensive guide to the latest methods of developing MIMO antenna systems Multiple-input multiple-output (MIMO) antenna systems use multiple sets of antennas to increase the capacity of a radio link, or to send and receive multiple simultaneous data signals over the same radio channel. It's become an increasingly integral part of wireless and mobile data networks, from the earliest generations of wireless internet to cutting-edge 5G systems. The coming 6G networks will also rely on 6G antenna systems, making it all the more critical for the next generation of engineers and antenna designers to have a firm grasp of this foundational technology. MIMO Antenna Systems for 5G and Beyond offers a timely introduction to these systems and their design principles. Incorporating the latest designs and a comprehensive overview of current system configurations, it provides complete design procedures and performance metrics for MIMO systems. The result is a one-stop shop for all MIMO applications and wireless standards. MIMO Antenna Systems for 5G and Beyond readers will also find: The first book ever to cover MIMO design practices specific to 5G wireless communicationsand beyondDetailed discussion of MIMO configurations including passive, reconfigurable, beamforming, and moreDetailed illustrations and design files MIMO Antenna Systems for 5G and Beyond is ideal for practicing engineers, as well as researchers in wireless and radio engineering sectors.

    15 in stock

    £102.60

  • Metaverse For Dummies

    John Wiley & Sons Inc Metaverse For Dummies

    1 in stock

    Book SynopsisYour first step to understanding what the metaverse is all about You've probably heard that the metaversea word that seemingly went from nonexistent to everywhere is the next big thing in technology. What is it, anyway? Written by a leading futurist, Metaverse For Dummies unravels the mysteries of the metaverse, for the curious and for anyone looking to get in on the ground floor. Discover how to carve out your niche in the metaverse with easy-to-understand breakdowns of the major technologies and platforms, a guide to doing business in the metaverse, and explorations of what meta means for sports, education, and just about every other area of life. The book even gives you a guide to safety in the metaverse, including how much of your real life you should share in your virtual one. This book answers all the big questions about the metaverse, in simple terms. Explore the metaverse and the major playersGet a look at how the metaverse will disrupt industries from gaming to online commerceDiscover business opportunities on the metaverseDive into metaverse gaming and virtual eventssafely This book is a must for anyone looking for an approachable primer on what the metaverse is, how it works, and the opportunities within it.Table of ContentsIntroduction 1 Part 1: Getting Started with the Metaverse 5 Chapter 1: Making Sense of the Metaverse 7 Chapter 2: Investigating Metaverse Platforms 19 Chapter 3: Staying Safe in the Metaverse 41 Chapter 4: Mastering Money in the Metaverse 51 Part 2: Engaging in Hobbies and Personal Interests 67 Chapter 5: Getting into Experiential Gaming 69 Chapter 6: All About Headsets 81 Chapter 7: Getting Equipped to Game in the Metaverse 95 Chapter 8: Enjoying Entertainment in the Metaverse 113 Chapter 9: Getting Involved with Your Interests in the Metaverse 125 Part 3: Creating a Business in the Metaverse 137 Chapter 10: Getting Familiar with Business Essentials 139 Chapter 11: Getting the Word out to the Metaverse 151 Chapter 12: The Future of Work in the Metaverse 169 Chapter 13: Hiring, Training, and Connecting Employees 183 Part 4: The Future of Industry in the Metaverse 193 Chapter 14: Teaching and Learning in the Metaverse 195 Chapter 15: Health Care, Fitness, and Well-Being 209 Chapter 16: Moving Events into the Metaverse 225 Chapter 17: Woo-Hoo! Going Meta in Sports and Gaming 235 Part 5: The Part of Tens 251 Chapter 18: Ten Ways the Metaverse Can Help Businesses 253 Chapter 19: Ten Use Cases in the Metaverse 261 Index 267

    1 in stock

    £21.84

  • Quantum Computing For Dummies

    John Wiley & Sons Inc Quantum Computing For Dummies

    15 in stock

    Book SynopsisTable of ContentsIntroduction 1 Part 1: The Power of Quantum Computing 7 Chapter 1: Quantum Computing Boot Camp 9 Chapter 2: Looking Back to Early and Classical Computing 27 Chapter 3: Examining the Roots of Quantum Computing 47 Chapter 4: Introducing Quantum Technology 1.0 69 Chapter 5: Unveiling Quantum Computing 83 Chapter 6: Quantum Computing Accelerates 99 Part 2: Quantum Computing Options 113 Chapter 7: Choosing Between Classical and Quantum Computing 115 Chapter 8: Getting Started with Quantum Computing 131 Chapter 9: It’s All about the Stack 153 Chapter 10: Racing for the Perfect Qubit 173 Chapter 11: Choosing a Qubit Type 187 Part 3: Getting Entangled with Quantum Computing 207 Chapter 12: Programming a Quantum Computer 209 Chapter 13: Quantum Computing Applications 237 Chapter 14: Quantum Computing Algorithms 255 Chapter 15: Cloud Access Options 281 Chapter 16: Educational Resources 305 Part 4: The Part of Tens 327 Chapter 17: Ten Myths Surrounding Quantum Computing 329 Chapter 18: Ten Tech Questions Answered 339 Chapter 19: Ten Business Questions Answered 347 Chapter 20: Ten University Research Programs 355 Index 361

    15 in stock

    £18.39

  • Integration of Mtc and Satellites for Iot Toward

    John Wiley & Sons Inc Integration of Mtc and Satellites for Iot Toward

    15 in stock

    Book Synopsis

    15 in stock

    £102.60

  • Using Leds LCDs and Glcds in Microcontroller

    John Wiley & Sons Inc Using Leds LCDs and Glcds in Microcontroller

    10 in stock

    Book SynopsisDescribing the use of displays in microcontroller based projects, the author makes extensive use of real-world, tested projects. The complete details of each project are given, including the full circuit diagram and source code.Table of ContentsPreface xiii Acknowledgements xv 1 Introduction to Microcontrollers and Display Systems 1 1.1 Microcontrollers and Microprocessors 2 1.2 Evolution of the Microcontroller 3 1.3 Parts of a Microcontroller 4 1.3.1 Address 4 1.3.2 ALU 5 1.3.3 Analogue Comparator 5 1.3.4 Analogue-to-Digital Converter 5 1.3.5 Brown-out Detector 5 1.3.6 Bus 5 1.3.7 CAN 6 1.3.8 CISC 6 1.3.9 Clock 6 1.3.10 CPU 6 1.3.11 EEPROM 6 1.3.12 EPROM 6 1.3.13 Ethernet 7 1.3.14 Flash Memory 7 1.3.15 Harvard Architecture 7 1.3.16 Idle Mode 7 1.3.17 Interrupts 7 1.3.18 LCD Drivers 8 1.3.19 Pipelining 8 1.3.20 Power-on Reset 8 1.3.21 PROM 8 1.3.22 RAM 8 1.3.23 Real-time Clock 8 1.3.24 Register 9 1.3.25 Reset 9 1.3.26 RISC 9 1.3.27 ROM 9 1.3.28 Serial Input-Output 9 1.3.29 Sleep Mode 9 1.3.30 Supply Voltage 10 1.3.31 Timers 10 1.3.32 USB 10 1.3.33 Watchdog 10 1.4 Display Devices 10 1.4.1 LED 10 1.4.2 7-Segment LED 11 1.4.3 OLED 12 1.4.4 LCD 12 1.5 Summary 15 Exercises 15 2 PIC18F Microcontrollers 17 2.1 The PIC18F2410 Microcontroller 18 2.2 PIC18F2410 Architecture 19 2.2.1 The Program Memory 21 2.2.2 The Data Memory 21 2.2.3 Power Supply Requirements 22 2.2.4 Oscillator Configurations 24 2.2.5 The Reset 30 2.2.6 Parallel I/O Ports 31 2.2.7 Timer Modules 38 2.2.8 Analogue-to-Digital Converter Module 43 2.2.9 Special Features of the CPU 48 2.2.10 Interrupts 49 2.2.11 Pulse Width Modulator Module 53 2.3 Summary 56 Exercises 56 3 C Programming Language 59 3.1 C Languages for Microcontrollers 59 3.2 Your First mikroC Pro for PIC Program 61 3.2.1 Comments 61 3.2.2 Beginning and Ending a Program 62 3.2.3 White Spaces 63 3.2.4 Variable Names 63 3.2.5 Reserved Names 64 3.2.6 Variable Types 64 3.2.7 Constants 66 3.2.8 Escape Sequences 68 3.2.9 Volatile Variables 69 3.2.10 Accessing Bits of a Variable 69 3.2.11 sbit Type 70 3.2.12 bit Type 70 3.2.13 Arrays 70 3.2.14 Pointers 73 3.2.15 Structures 76 3.2.16 Unions 80 3.2.17 Operators in mikroC Pro for PIC 80 3.2.18 The Flow of Control 90 3.3 Functions in mikroC Pro for PIC 101 3.3.1 Function Prototypes 102 3.3.2 void Functions 103 3.3.3 Passing Parameters to Functions 104 3.3.4 Passing Arrays to Functions 106 3.3.5 Interrupt Processing 106 3.4 mikroC Pro for PIC Built-in Functions 108 3.5 mikroC Pro for PIC Libraries 109 3.5.1 ANSI C Library 109 3.5.2 Miscellaneous Library 111 3.6 Using the mikroC Pro for PIC Compiler 111 3.6.1 mikroC Pro for PIC IDE 112 3.6.2 Creating a New Source File 118 3.6.3 Compiling the Source File 122 3.7 Using the mikroC Pro for PIC Simulator 123 3.7.1 Setting a Break-Point 124 3.8 Other mikroC Pro for PIC Features 126 3.8.1 View Statistics 126 3.8.2 View Assembly 127 3.8.3 ASCII Chart 127 3.8.4 USART Terminal 127 3.8.5 Seven Segment Editor 127 3.8.6 Help 128 3.9 Summary 128 Exercises 129 4 PIC Microcontroller Development Tools – Including Display Development Tools 131 4.1 PIC Hardware Development Boards 132 4.1.1 Super Bundle Development Kit 132 4.1.2 PIC18 Explorer Board 132 4.1.3 PIC18F4XK20 Starter Kit 134 4.1.4 PICDEM 4 135 4.1.5 PIC16F887 Development Kit 135 4.1.6 FUTURLEC PIC18F4550 Development Board 137 4.1.7 EasyPIC6 Development Board 137 4.1.8 EasyPIC7 Development Board 139 4.2 PIC Microcontroller Display Development Tools 140 4.2.1 Display Hardware Tools 140 4.2.2 Display Software Tools 143 4.3 Using the In-Circuit Debugger with the EasyPIC7 Development Board 145 4.4 Summary 149 Exercises 149 5 Light Emitting Diodes (LEDs) 151 5.1 ATypical LED 151 5.2 LED Colours 153 5.3 LED Sizes 154 5.4 Bi-Colour LEDs 154 5.5 Tri-Colour LEDs 155 5.6 Flashing LEDs 155 5.7 Other LED Shapes 155 5.8 7-Segment LEDs 156 5.8.1 Displaying Numbers 157 5.8.2 Multi-digit 7-Segment Displays 159 5.9 Alphanumeric LEDs 159 5.10 mikroC Pro for PIC 7-Segment LED Editor 163 5.11 Summary 163 Exercises 164 6 Liquid Crystal Displays (LCDs) and mikroC Pro for PIC LCD Functions 165 6.1 HD44780 Controller 165 6.2 Displaying User Defined Data 168 6.3 DDRAM Addresses 169 6.4 Display Timing and Control 171 6.4.1 Clear Display 172 6.4.2 Return Cursor to Home 172 6.4.3 Cursor Move Direction 172 6.4.4 Display ON/OFF 172 6.4.5 Cursor and Display Shift 173 6.4.6 Function Set 173 6.4.7 Set CGRAM Address 173 6.4.8 Set DDRAM Address 173 6.4.9 Read Busy Flag 174 6.4.10 Write Data to CGRAM or DDRAM 174 6.4.11 Read Data from CGRAM or DDRAM 174 6.5 LCD Initialisation 174 6.5.1 8-bit Mode Initialisation 175 6.5.2 4-bit Mode Initialisation 175 6.6 Example LCD Display Setup Program 177 6.7 mikroC Pro for PIC LCD Functions 180 6.7.1 Lcd_Init 180 6.7.2 Lcd_Out 181 6.7.3 Lcd_Out_Cp 181 6.7.4 Lcd_Chr 181 6.7.5 Lcd_Chr_Cp 181 6.7.6 Lcd_Cmd 182 6.8 Summary 182 Exercises 183 7 Graphics LCD Displays (GLCD) 185 7.1 The 128 x 64 Pixel GLCD 185 7.2 Operation of the GLCD Display 187 7.3 mikroC Pro for PIC GLCD Library Functions 189 7.3.1 Glcd_Init 189 7.3.2 Glcd_Set_Side 190 7.3.3 Glcd_Set_X 190 7.3.4 Glcd_Set_Page 190 7.3.5 Glcd_Write_Data 190 7.3.6 Glcd_Fill 190 7.3.7 Glcd_Dot 191 7.3.8 Glcd_Line 191 7.3.9 Glcd_V_Line 191 7.3.10 Glcd_H_Line 191 7.3.11 Glcd_Rectangle 192 7.3.12 Glcd_Rectangle_Round_Edges 192 7.3.13 Glcd_Rectangle_Round_Edges_Fill 192 7.3.14 Glcd_Box 193 7.3.15 Glcd_Circle 193 7.3.16 Glcd_Circle_Fill 194 7.3.17 Glcd_Set_Font 194 7.3.18 Glcd_Set_Font_Adv 194 7.3.19 Glcd_Write_Char 195 7.3.20 Glcd_Write_Char_Adv 195 7.3.21 Glcd_Write_Text 195 7.3.22 Glcd_Write_Text_Adv 195 7.3.23 Glcd_Write_Const_Text_Adv 196 7.3.24 Glcd_Image 196 7.4 Example GLCD Display 196 7.5 mikroC Pro for PIC Bitmap Editor 198 7.6 Adding Touch-screen to GLCDs 199 7.6.1 Types of Touch-screen Displays 200 7.6.2 Resistive Touch Screens 200 7.7 Summary 203 Exercises 204 8 Microcontroller Program Development 205 8.1 Using the Program Description Language and Flowcharts 205 8.1.1 BEGIN – END 206 8.1.2 Sequencing 206 8.1.3 IF – THEN – ELSE – ENDIF 206 8.1.4 DO – ENDDO 207 8.1.5 REPEAT – UNTIL 209 8.1.6 Calling Subprograms 209 8.1.7 Subprogram Structure 209 8.2 Examples 211 8.3 Representing for Loops in Flowcharts 216 8.4 Summary 218 Exercises 218 9 LED Based Projects 219 9.1 PROJECT 9.1 – Flashing LED 219 9.2 PROJECT 9.2 – Binary Counting Up LEDs 226 9.3 PROJECT 9.3 – Rotating LEDs 229 9.4 PROJECT 9.4 – Wheel of Lucky Day 231 9.5 PROJECT 9.5 – Random Flashing LEDs 239 9.6 PROJECT 9.6 – LED Dice 240 9.7 PROJECT 9.7 – Connecting more than one LED to a Port Pin 246 9.8 PROJECT 9.8 – Changing the Brightness of LEDs 250 9.9 PROJECT 9.9 – LED Candle 264 9.10 Summary 267 Exercises 267 10 7-Segment LED Display Based Projects 269 10.1 PROJECT 10.1 – Single Digit Up Counting 7-Segment LED Display 269 10.2 PROJECT 10.2 – Display a Number on 2-Digit 7-Segment LED Display 271 10.3 PROJECT 10.3 – Display Lottery Numbers on 2-Digit 7-Segment LED Display 278 10.4 PROJECT 10.4 – Event Counter Using 4-Digit 7-Segment LED Display 285 10.5 PROJECT 10.5 – External Interrupt Based Event Counter Using 4-Digit 7-Segment LED Display with Serial Driver 292 10.6 Summary 302 Exercises 303 11 Text Based LCD Projects 305 11.1 PROJECT 11.1 – Displaying Text on LCD 305 11.2 PROJECT 11.2 – Moving Text on LCD 307 11.3 PROJECT 11.3 – Counting with the LCD 310 11.4 PROJECT 11.4 – Creating Custom Fonts on the LCD 315 11.5 PROJECT 11.5 – LCD Dice 317 11.6 PROJECT 11.6 – Digital Voltmeter 325 11.7 PROJECT 11.7 – Temperature and Pressure Display 327 11.8 PROJECT 11.8 – The High/Low Game 333 11.9 Summary 344 Exercises 345 12 Graphics LCD Projects 347 12.1 PROJECT 12.1 – Creating and Displaying a Bitmap Image 347 12.2 PROJECT 12.2 – Moving Ball Animation 355 12.3 PROJECT 12.3 – GLCD Dice 357 12.4 PROJECT 12.4 – GLCD X-Y Plotting 372 12.5 PROJECT 12.5 – Plotting Temperature Variation on the GLCD 374 12.6 PROJECT 12.6 – Temperature and Relative Humidity Measurement 385 12.7 Operation of the SHT11 386 12.8 Acknowledgement 389 12.9 Summary 400 Exercises 400 13 Touch Screen Graphics LCD Projects 401 13.1 PROJECT 13.1 – Touch Screen LED ON-OFF 401 13.2 PROJECT 13.2 – LED Flashing with Variable Rate 410 13.3 Summary 418 Exercises 418 14 Using the Visual GLCD Software in GLCD Projects 419 14.1 PROJECT 14.1 – Toggle LED 420 14.2 PROJECT 14.2 – Toggle more than One LED 425 14.3 PROJECT 14.3 – Mini Electronic Organ 426 14.4 PROJECT 14.4 – Using the SmartGLCD 430 14.5 PROJECT 14.5 – Decimal to Hexadecimal Converter using the SmartGLCD 444 14.6 Summary 452 Exercises 452 15 Using the Visual TFT Software in Graphics Projects 453 15.1 PROJECT 15.1 – Countdown Timer 454 15.2 PROJECT 15.2 – Electronic Book 462 15.3 PROJECT 15.3 – Picture Show 467 15.4 Summary 472 Exercises 472 Bibliography 473 Index 475

    10 in stock

    £124.92

  • Direct Eigen Control for Induction Machines and

    John Wiley & Sons Inc Direct Eigen Control for Induction Machines and

    1 in stock

    Book SynopsisClear presentation of a new control process applied toinduction machine (IM), surface mounted permanent magnet synchronous motor (SMPM-SM) and interior permanent magnet synchronous motor (IPM-SM) Direct Eigen Control forInduction Machinesand Synchronous Motors provides a clear and consise explanation of a new method in alternating current (AC) motor control. Unlike similar books on the market, it does not present various control algorithms for each type of AC motor but explains one method designed to control all AC motor types: Induction Machine (IM), Surface Mounted Permanent Magnet Synchronous Motor (SMPM-SM) (i.e. Brushless) and Interior Permanent Magnet Synchronous Motor (IPM-SM). This totally new control method can be used not only for AC motor control but also to control input filter current and voltage of an inverter feeding an AC motor. Accessible and clear, describes a new fast type of motor control applied toinduction machineTable of ContentsForeword by Prof. Dr Ing. Jean-Luc Thomas xiii Foreword by Dr Abdelkrim Benchaïb xv Acknowledgements xvii Introduction xix 1 Induction Machine 1 1. 1 Electrical Equations and Equivalent Circuits 1 1. 2 Working out the State-Space Equation System 9 1. 3 Discretized State-Space Equation Inversion 22 1. 4 Control 31 1. 5 Conclusion on the Induction Machine Control 63 2 Surface-Mounted Permanent-Magnet Synchronous Motor 65 2. 1 Electrical Equations and Equivalent Circuit 66 2. 2 Working out the State-Space Equation System 69 2. 3 Discretized State-Space Equation Inversion 76 2. 4 Control 84 2. 5 Conclusion on SMPM-SM 118 3 Interior Permanent Magnet Synchronous Motor 121 3. 1 Electrical Equations and Equivalent Circuits 122 3. 2 Working out the State-Space Equation System 127 3. 3 Discretized State-Space Equation Inversion 134 3. 4 Control 143 3. 5 Conclusions on the IPM-SM 189 4 Inverter Supply – LC Filter 191 4. 1 Electrical Equations and Equivalent Circuit 191 4. 2 Working out the State-Space Equation System 193 4. 3 Discretized State-Space Equation Inversion 198 4. 4 Control 201 4. 5 Conclusions on Power LC Filter Stabilization 211 5 Conclusion 213 Appendix A Calculation of Vector PWM 217 A.1 PWM Types 218 A.2 Working out the Control Voltage Vector 218 A.3 Other Examples of Vector PWM 221 A.4 Sampled Shape of the Voltage and Current Waves 224 Appendix B Transfer Matrix Calculation 225 B.1 First Eigenvector Calculation 225 B.2 Second Eigenvector Calculation 227 B.3 Third Eigenvector Calculation 228 B.4 Fourth Eigenvector Calculation 230 B.5 Transfer Matrix Calculation 231 Appendix C Transfer Matrix Inversion 233 C.1 Transfer Matrix Determinant Calculation 234 C.2 First Row, First Column 234 C.3 First Row, Second Column 235 C.4 First Row, Third Column 235 C.5 First Row, Fourth Column 235 C.6 Second Row, First Column 236 C.7 Second Row, Second Column 236 C.8 Second Row, Third Column 236 C.9 Second Row, Fourth Column 237 C.10 Third Row, First Column 237 C.11 Third Row, Second Column 237 C.12 Third Row, Third Column 237 C.13 Third Row, Fourth Column 237 C.14 Fourth Row, First Column 238 C.15 Fourth Row, Second Column 238 C.16 Fourth Row, Third Column 238 C.17 Fourth Row, Fourth Column 238 C.18 Inverse Transfer Matrix Calculation 238 Appendix D State-Space Eigenvector Calculation 239 Appendix E F and G Matrix Calculations 245 E.1 Transition Matrix Calculation 245 E.2 Discretized Input Matrix Calculation 249 References 251 Index 253

    1 in stock

    £95.36

  • Electric Vehicle Technology Explained

    John Wiley & Sons Inc Electric Vehicle Technology Explained

    15 in stock

    Book Synopsis*Table of ContentsAbout the Author xiii Preface xv Acknowledgments xvii Abbreviations xix Symbols xxiii 1 Introduction 1 1.1 A Brief History 2 1.1.1 Early Days 2 1.1.2 The Middle of the Twentieth Century 7 1.1.3 Developments towards the End of the Twentieth Century and the Early Twenty-First Century 8 1.2 Electric Vehicles and the Environment 13 1.2.1 Energy Saving and Overall Reduction of Carbon Emissions 14 1.2.2 Reducing Local Pollution 15 1.2.3 Reducing Dependence on Oil 15 1.3 Usage Patterns for Electric Road Vehicles 15 Further Reading 17 2 Types of Electric Vehicles – EV Architecture 19 2.1 Battery Electric Vehicles 19 2.2 The IC Engine/Electric Hybrid Vehicle 19 2.3 Fuelled EVs 24 2.4 EVs using Supply Lines 25 2.5 EVs which use Flywheels or Supercapacitors 25 2.6 Solar-Powered Vehicles 26 2.7 Vehicles using Linear Motors 27 2.8 EVs for the Future 27 Further Reading 27 3 Batteries, Flywheels and Supercapacitors 29 3.1 Introduction 29 3.2 Battery Parameters 30 3.2.1 Cell and Battery Voltages 30 3.2.2 Charge (or Amphour) Capacity 31 3.2.3 Energy Stored 32 3.2.4 Specific Energy 33 3.2.5 Energy Density 33 3.2.6 Specific Power 34 3.2.7 Amphour (or Charge) Efficiency 34 3.2.8 Energy Efficiency 35 3.2.9 Self-discharge Rates 35 3.2.10 Battery Geometry 35 3.2.11 Battery Temperature, Heating and Cooling Needs 35 3.2.12 Battery Life and Number of Deep Cycles 35 3.3 Lead Acid Batteries 36 3.3.1 Lead Acid Battery Basics 36 3.3.2 Special Characteristics of Lead Acid Batteries 38 3.3.3 Battery Life and Maintenance 40 3.3.4 Battery Charging 40 3.3.5 Summary of Lead Acid Batteries 41 3.4 Nickel-Based Batteries 41 3.4.1 Introduction 41 3.4.2 Nickel Cadmium 41 3.4.3 Nickel Metal Hydride Batteries 44 3.5 Sodium-Based Batteries 46 3.5.1 Introduction 46 3.5.2 Sodium Sulfur Batteries 47 3.5.3 Sodium Metal Chloride (ZEBRA) Batteries 48 3.6 Lithium Batteries 50 3.6.1 Introduction 50 3.6.2 The Lithium Polymer Battery 50 3.6.3 The Lithium Ion Battery 51 3.7 Metal–Air Batteries 52 3.7.1 Introduction 52 3.7.2 The Aluminium–Air Battery 52 3.7.3 The Zinc–Air Battery 53 3.8 Supercapacitors and Flywheels 54 3.8.1 Supercapacitors 54 3.8.2 Flywheels 56 3.9 Battery Charging 59 3.9.1 Battery Chargers 59 3.9.2 Charge Equalisation 60 3.10 The Designer’s Choice of Battery 63 3.10.1 Introduction 63 3.10.2 Batteries which are Currently Available Commercially 63 3.11 Use of Batteries in Hybrid Vehicles 64 3.11.1 Introduction 64 3.11.2 IC/Battery Electric Hybrids 64 3.11.3 Battery/Battery Electric Hybrids 64 3.11.4 Combinations using Flywheels 65 3.11.5 Complex Hybrids 65 3.12 Battery Modelling 65 3.12.1 The Purpose of Battery Modelling 65 3.12.2 Battery Equivalent Circuit 66 3.12.3 Modelling Battery Capacity 68 3.12.4 Simulating a Battery at a Set Power 71 3.12.5 Calculating the Peukert Coefficient 75 3.12.6 Approximate Battery Sizing 76 3.13 In Conclusion 77 References 78 4 Electricity Supply 79 4.1 Normal Existing Domestic and Industrial Electricity Supply 79 4.2 Infrastructure Needed for Charging Electric Vehicles 80 4.3 Electricity Supply Rails 81 4.4 Inductive Power Transfer for Moving Vehicles 82 4.5 Battery Swapping 84 Further Reading 85 5 Fuel Cells 87 5.1 Fuel Cells – A Real Option? 87 5.2 Hydrogen Fuel Cells – Basic Principles 89 5.2.1 Electrode Reactions 89 5.2.2 Different Electrolytes 90 5.2.3 Fuel Cell Electrodes 93 5.3 Fuel Cell Thermodynamics – An Introduction 95 5.3.1 Fuel Cell Efficiency and Efficiency Limits 95 5.3.2 Efficiency and the Fuel Cell Voltage 98 5.3.3 Practical Fuel Cell Voltages 100 5.3.4 The Effect of Pressure and Gas Concentration 101 5.4 Connecting Cells in Series – The Bipolar Plate 102 5.5 Water Management in the PEMFC 106 5.5.1 Introduction to the Water Problem 106 5.5.2 The Electrolyte of a PEMFC 107 5.5.3 Keeping the PEM Hydrated 109 5.6 Thermal Management of the PEMFC 110 5.7 A Complete Fuel Cell System 111 5.8 Practical Efficiency of Fuel Cells 114 References 114 6 Hydrogen as a Fuel – Its Production and Storage 115 6.1 Introduction 115 6.2 Hydrogen as a Fuel 117 6.3 Fuel Reforming 118 6.3.1 Fuel Cell Requirements 118 6.3.2 Steam Reforming 118 6.3.3 Partial Oxidation and Autothermal Reforming 120 6.3.4 Further Fuel Processing – Carbon Monoxide Removal 121 6.3.5 Practical Fuel Processing for Mobile Applications 122 6.3.6 Energy Efficiency of Reforming 123 6.4 Energy Efficiency of Reforming 124 6.5 Hydrogen Storage I – Storage as Hydrogen 124 6.5.1 Introduction to the Problem 124 6.5.2 Safety 124 6.5.3 The Storage of Hydrogen as a Compressed Gas 125 6.5.4 Storage of Hydrogen as a Liquid 127 6.5.5 Reversible Metal Hydride Hydrogen Stores 129 6.5.6 Carbon Nanofibres 131 6.5.7 Storage Methods Compared 131 6.6 Hydrogen Storage II – Chemical Methods 132 6.6.1 Introduction 132 6.6.2 Methanol 133 6.6.3 Alkali Metal Hydrides 135 6.6.4 Sodium Borohydride 136 6.6.5 Ammonia 140 6.6.6 Storage Methods Compared 142 References 143 7 Electric Machines and their Controllers 145 7.1 The ‘Brushed’ DC Electric Motor 145 7.1.1 Operation of the Basic DC Motor 145 7.1.2 Torque Speed Characteristics 147 7.1.3 Controlling the Brushed DC Motor 151 7.1.4 Providing the Magnetic Field for DC Motors 152 7.1.5 DC Motor Efficiency 153 7.1.6 Motor Losses and Motor Size 156 7.1.7 Electric Motors as Brakes 156 7.2 DC Regulation and Voltage Conversion 159 7.2.1 Switching Devices 159 7.2.2 Step-Down or ‘Buck’ Regulators 161 7.2.3 Step-Up or ‘Boost’ Switching Regulator 162 7.2.4 Single-Phase Inverters 165 7.2.5 Three Phase 167 7.3 Brushless Electric Motors 169 7.3.1 Introduction 169 7.3.2 The Brushless DC Motor 169 7.3.3 Switched Reluctance Motors 173 7.3.4 The Induction Motor 177 7.4 Motor Cooling, Efficiency, Size and Mass 179 7.4.1 Improving Motor Efficiency 179 7.4.2 Motor Mass 181 7.5 Electric Machines for Hybrid Vehicles 182 7.6 Linear Motors 185 References 185 8 Electric Vehicle Modelling 187 8.1 Introduction 187 8.2 Tractive Effort 188 8.2.1 Introduction 188 8.2.2 Rolling Resistance Force 188 8.2.3 Aerodynamic Drag 189 8.2.4 Hill Climbing Force 189 8.2.5 Acceleration Force 189 8.2.6 Total Tractive Effort 191 8.3 Modelling Vehicle Acceleration 191 8.3.1 Acceleration Performance Parameters 191 8.3.2 Modelling the Acceleration of an Electric Scooter 193 8.3.3 Modelling the Acceleration of a Small Car 197 8.4 Modelling Electric Vehicle Range 198 8.4.1 Driving Cycles 198 8.4.2 Range Modelling of Battery Electric Vehicles 204 8.4.3 Constant Velocity Range Modelling 210 8.4.4 Other uses of Simulations 210 8.4.5 Range Modelling of Fuel Cell Vehicles 212 8.4.6 Range Modelling of Hybrid Electric Vehicles 215 8.5 Simulations – A Summary 215 References 216 9 Design Considerations 217 9.1 Introduction 217 9.2 Aerodynamic Considerations 217 9.2.1 Aerodynamics and Energy 217 9.2.2 Body/Chassis Aerodynamic Shape 220 9.3 Consideration of Rolling Resistance 222 9.4 Transmission Efficiency 223 9.5 Consideration of Vehicle Mass 227 9.6 Electric Vehicle Chassis and Body Design 229 9.6.1 Body/Chassis Requirements 229 9.6.2 Body/Chassis Layout 230 9.6.3 Body/Chassis Strength, Rigidity and Crash Resistance 231 9.6.4 Designing for Stability 234 9.6.5 Suspension for Electric Vehicles 234 9.6.6 Examples of Chassis used in Modern Battery and Hybrid Electric Vehicles 235 9.6.7 Chassis used in Modern Fuel Cell Electric Vehicles 235 9.7 General Issues in Design 237 9.7.1 Design Specifications 237 9.7.2 Software in the use of Electric Vehicle Design 237 10 Design of Ancillary Systems 239 10.1 Introduction 239 10.2 Heating and Cooling Systems 239 10.3 Design of the Controls 242 10.4 Power Steering 244 10.5 Choice of Tyres 245 10.6 Wing Mirrors, Aerials and Luggage Racks 245 10.7 Electric Vehicle Recharging and Refuelling Systems 245 11 Efficiencies and Carbon Release Comparison 247 11.1 Introduction 247 11.2 Definition of Efficiency 248 11.3 Carbon Dioxide Emission and Chemical Energy in Fuel 248 12 Electric Vehicles and the Environment 253 12.1 Introduction 253 12.2 Vehicle Pollution – The Effects 253 12.3 Vehicle Pollution in Context 256 12.4 The Role of Regulations and Lawmakers 256 Further Reading 258 13 Power Generation for Transport – Particularly for Zero Emissions 259 13.1 Introduction 259 13.2 Power Generation using Fossil Fuels 260 13.3 Alternative and Sustainable Energy 260 13.3.1 Solar Energy 260 13.3.2 Wind Energy 262 13.3.3 Hydroelectricity 263 13.3.4 Tidal Energy 264 13.3.5 Marine Currents 266 13.3.6 Wave Energy 266 13.3.7 Biomass Energy 267 13.3.8 Obtaining Energy from Waste 267 13.3.9 Geothermal Energy 267 13.4 Nuclear Energy 267 13.4.1 Nuclear Fission 267 13.4.2 Nuclear Fusion 268 13.5 In Conclusion 269 Further Reading 269 14 Recent Electric Vehicles 271 14.1 Introduction 271 14.2 Low-Speed Rechargeable Battery Vehicles 271 14.2.1 Electric Bicycles 271 14.2.2 Electric Mobility Aids 272 14.2.3 Low-Speed Vehicles 274 14.3 Battery-Powered Cars and Vans 274 14.3.1 Peugeot 106 and the Partner 274 14.3.2 The GM EV1 275 14.3.3 The Nissan Leaf 279 14.3.4 The Mitsubishi MiEV 279 14.4 Hybrid Vehicles 279 14.4.1 The Honda Insight 280 14.4.2 The Toyota Prius 281 14.4.3 The Chevrolet Volt 283 14.5 Fuel-Cell-Powered Bus 284 14.6 Conventional High-Speed Trains 286 14.6.1 Introduction 286 14.6.2 The Technology of High-Speed Trains 288 14.7 Conclusion 289 References 290 15 The Future of Electric Vehicles 291 15.1 Introduction 291 15.2 The Tesla S 291 15.3 The Honda FCX Clarity 292 15.4 Maglev Trains 292 15.5 Electric Road–Rail Systems 294 15.6 Conclusion 295 Further Reading 296 Appendices: MATLAB® Examples 297 Appendix 1: Performance Simulation of the GM EV1 297 Appendix 2: Importing and Creating Driving Cycles 298 Appendix 3: Simulating One Cycle 300 Appendix 4: Range Simulation of the GM EV1 Electric Car 302 Appendix 5: Electric Scooter Range Modelling 304 Appendix 6: Fuel Cell Range Simulation 306 Appendix 7: Motor Efficiency Plots 308 Index 311

    15 in stock

    £79.16

  • Global Networks

    John Wiley & Sons Inc Global Networks

    10 in stock

    Book SynopsisThis book provides an in-depth look at the current and developing trends in the telecommunications industry, as well as examining the complex issues of developing, introducing, and managing cutting-edge technologies.Table of ContentsList of Figures xv About the Author xix Foreword xxi Preface xxiii Acknowledgments xxv List of Acronyms xxvii Part I NETWORKS 1 Carrier Networks 3 1.1 Operating Global Networks 3 1.1.1 The Power of Redundancy 4 1.1.2 The Virtuous Cycle 6 1.1.3 Measurement and Accountability 7 1.2 Engineering Global Networks 8 1.2.1 Architecture 8 1.2.2 Systems Engineering 8 1.2.3 Capacity Management 8 1.3 Network Taxonomy 10 1.3.1 Voice Systems 10 1.3.2 Data Systems 12 1.3.3 Networks 13 1.3.4 Network Systems 13 1.4 Summary 14 References 14 2 Network Systems Hardware 15 2.1 Models 15 2.2 Telco Systems Model 16 2.2.1 Form and Function 16 2.2.2 Frames and Shelves 20 2.2.3 Chassis 20 2.2.4 Line I/O 21 2.2.5 Power Supply Cards 25 2.2.6 Network Fabric Cards 25 2.2.7 Application Processing 28 2.3 Modular Computing – Advanced Telecommunications Computing Architecture (AdvancedTCA™) 29 2.3.1 Chassis 29 2.4 Blade Center Model 30 2.4.1 Midplane Design 31 2.4.2 Flexible High Speed Interconnection 32 2.4.3 Management Controller 32 2.4.4 Power and Fans 33 2.5 Summary 33 References 33 3 Network Systems Software 35 3.1 Carrier Grade Software 35 3.1.1 Real-Time 35 3.1.2 Reliable 36 3.1.3 Scalable 36 3.1.4 Upgradable and Manageable 38 3.2 Defensive Programming 38 3.2.1 Are You Really Sure? 38 3.2.2 Default Parameters 39 3.2.3 Heap Management 39 3.2.4 Exception Handling and Phased Recovery 39 3.2.5 Last Gasp Forensics 40 3.2.6 Buffer Discards and Dumps 40 3.3 Managed Objects 40 3.3.1 Administrative States 42 3.3.2 Service States 42 3.4 Operational Tests and Fault Conditions 43 3.4.1 Service Turn Up 43 3.4.2 Interrupt or Fault Induced 43 3.4.3 Out of Service Retries 43 3.4.4 On Demand 44 3.5 Alarms 44 3.5.1 Notifications 44 3.5.2 Severity 44 3.5.3 Scope 45 3.5.4 Creation and Persistence 46 3.5.5 Ethernet NIC Example 46 3.6 Network System Data Management 49 3.6.1 Management Information Bases (MIBs) 51 3.6.2 Syslog 52 3.6.3 Audits 53 3.7 Summary 54 References 54 4 Service and Network Objectives 55 4.1 Consumer Wireline Voice 55 4.1.1 Service Request 55 4.1.2 Address Signaling 56 4.1.3 Call Setup 56 4.1.4 Alerting 56 4.1.5 Call Completion 56 4.1.6 Disconnect 56 4.1.7 Network Service Objectives 57 4.1.8 Consumer Wireline Voice Network Model 57 4.1.9 Local Loops 58 4.1.10 Originating Office A 58 4.1.11 Toll Connect Group A–C 59 4.1.12 Tandem Office C 60 4.1.13 Toll Completing Group C–B 60 4.1.14 Terminating Office B 60 4.1.15 Long Term Downtime 60 4.1.16 Measurement Summary 60 4.2 Enterprise Voice over IP Service 61 4.2.1 Five 9’s 61 4.2.2 Meaningful and Measurable Objectives 61 4.3 Technology Transitions 65 4.4 Summary 66 References 66 5 Access and Aggregation Networks 69 5.1 Wireline Networks 70 5.1.1 Voice Services 70 5.1.2 Broadband Services 74 5.1.3 DSL 74 5.1.4 DSL Design and Engineering 76 5.1.5 DSL Operations 79 5.1.6 DSL Objectives, Metrics, and Line Management 80 5.1.7 ADSL Aggregation Networks 82 5.1.8 ADSL2+ and VDSL Aggregation Networks 82 5.1.9 Fiber to the Home (FTTH) 83 5.1.10 Fiber to the Curb (FTTC) 87 5.1.11 Fiber to the Node (FTTN) 87 5.1.12 FTTH Design and Engineering 87 5.1.13 FTTH Operations 90 5.1.14 FTTH Aggregation Networks 91 5.2 Hybrid Fiber Coax (HFC) Networks 92 5.2.1 Node Design 93 5.2.2 Digital TV 93 5.2.3 DOCSIS 94 5.2.4 HFC Design and Engineering 94 5.2.5 HFC Operations 95 5.3 Wireless Mobile Networks 96 5.3.1 GSM 97 5.3.2 Universal Mobile Telecommunications Systems (UMTS) 106 5.3.3 Long Term Evolution (LTE) 111 5.4 Wireless Design and Engineering 118 5.4.1 Air Interface 118 5.4.2 Mobility 121 5.4.3 Inter-Radio Access Technology (IRAT) 122 5.4.4 Device Behavior 122 5.5 Summary 123 References 123 6 Backbone Networks 125 6.1 Transport 127 6.1.1 Transport Services 127 6.1.2 Transport Resiliency and Protection 130 6.2 IP Core 135 6.2.1 Regional IP Backbones 136 6.2.2 Points of Presence (POPs) 137 6.2.3 Multiprotocol Label Switching (MPLS) 137 6.2.4 Route Reflectors 143 6.3 Backbone Design and Engineering 143 6.3.1 Location and Size of POPs 144 6.3.2 Fault Recovery 144 6.3.3 Quality of Service QoS 145 6.3.4 Traffic Demand 146 6.3.5 Control Plane 146 6.4 Summary 147 References 147 7 Cloud Services 149 7.1 Competition 149 7.2 Defining the Cloud 150 7.2.1 Architecture 150 7.2.2 Infrastructure 151 7.2.3 Intelligent Networks and Intelligent Clouds 152 7.2.4 Internet Protocol Multimedia Subsystem (IMS) 156 7.2.5 Application Servers and Enablers 162 7.2.6 IMS Design and Engineering 164 7.3 Cloud Services 166 7.3.1 Network-Based Security 166 7.3.2 Voice over IP (VoIP) Services 167 7.3.3 Conferencing 170 7.3.4 Compute and Storage 170 7.3.5 The Mobile Cloud 170 7.4 Summary 171 References 171 8 Network Peering and Interconnection 173 8.1 Wireline Voice 173 8.1.1 Interexchange Carriers (IXCs) 174 8.1.2 Competitive Local Exchange Carriers (CLECs) 177 8.2 SS7 Interconnection 178 8.2.1 Services 178 8.3 IP Interconnection 180 8.3.1 VPN Peering 180 8.3.2 Internet Peering 180 8.3.3 Public Peering 183 8.3.4 Mobility Peering 185 8.4 Summary 187 References 188 Part II TEAMS AND SYSTEMS 9 Engineering and Operations 191 9.1 Engineering 192 9.1.1 Systems Engineers 192 9.1.2 Network Planning 196 9.1.3 Network and Central Office Engineers 196 9.1.4 Outside Plant Engineers 197 9.1.5 Common Systems Engineers 197 9.2 Operations 197 9.2.1 Network Operations Center (NOCs) 198 9.2.2 Tiered Maintenance 202 9.3 Summary 204 References 205 10 Customer Marketing, Sales, and Care 207 10.1 Industry Markets 207 10.1.1 Competitive Local Exchange Carriers (CLECs) 207 10.1.2 Interexchange Carriers (IXCs) 210 10.2 Consumer Markets 211 10.2.1 Product Marketing 212 10.2.2 Consumer Care 214 10.3 Enterprise Markets 218 10.3.1 Pre-Sales Support 219 10.3.2 Sales Support 220 10.3.3 Engineering and Implementation 220 10.4 Summary 220 References 221 11 Fault Management 223 11.1 Network Management Work Groups 223 11.2 Systems Planes 224 11.2.1 Bearer Planes 224 11.2.2 Control Planes 225 11.2.3 Management Planes 226 11.3 Management Systems 227 11.3.1 Network Management Systems 227 11.3.2 Element Management Systems 230 11.3.3 Network Elements 231 11.3.4 Management Interfaces 231 11.3.5 Specialized Management Systems 240 11.4 Management Domains 244 11.4.1 Optical Networks 245 11.4.2 IP/MPLS Networks 246 11.4.3 Other Domains 247 11.5 Network Management and the Virtuous Cycle 247 11.5.1 Notifications 247 11.5.2 Sectionalization 249 11.5.3 Fault Isolation 249 11.6 Summary 250 References 251 12 Support Systems 253 12.1 Support Systems Standards and Design 253 12.2 Capacity Management Systems 255 12.2.1 Work Groups 256 12.2.2 Data Collection 257 12.2.3 Engineering Rules 259 12.2.4 Capacity Management Applications 260 12.2.5 Supply Chain Management 261 12.3 Service Fulfillment 261 12.3.1 Offers and Proposals 262 12.3.2 Service Ordering 264 12.3.3 Service Activation 267 12.4 Design and Engineering 268 12.5 Summary 268 References 268 Part III TRANSFORMATION 13 Integration and Innovation 271 13.1 Technology Integration 271 13.1.1 Technology Scanning 272 13.1.2 Technology Selection 273 13.1.3 Network System Testing and Verification 277 13.1.4 Support Systems Integration 287 13.2 Lifecycle Support 288 13.3 Invention and Innovation 290 13.3.1 The Role of Research 291 13.3.2 The Bridge to Research 292 13.4 Summary 295 References 296 14 Disasters and Outages 297 14.1 Disasters 297 14.1.1 Carrier Teams 298 14.1.2 Disaster Response 300 14.1.3 Engineering and Design 300 14.2 Outages 302 14.2.1 Anatomy of an Outage 302 14.2.2 Congestion Onset 307 14.2.3 Congestion Propagation 307 14.2.4 Root Cause 308 14.2.5 Contributing Cause 309 14.2.6 Triggering Events 309 14.2.7 Teams in an Outage 309 14.2.8 Press and External Affairs 311 14.3 The Vicious Cycle 313 14.3.1 Engineering and Operational Defense 314 14.4 Summary 316 References 316 15 Technologies that Matter 317 15.1 Convergence or Conspiracy? 317 15.1.1 Enter the World Wide Web 318 15.1.2 Silicon Valley – A Silent Partner 318 15.1.3 US Telecommunication Policy 318 15.1.4 The Conspiracy – A Confluence of Events 319 15.1.5 Local Phone Service in Jeopardy 320 15.1.6 Technologies in Response 322 15.2 Technologies Beyond 2012 324 15.2.1 IPv6 324 15.2.2 Invisible Computing 332 15.2.3 Beyond 400G 334 15.3 HTML5 and WEBRTC 335 15.3.1 Video Evolution 337 15.3.2 High Definition Voice 338 15.4 Summary 340 References 341 16 Carriers Transformed 343 16.1 Historical Transformations 343 16.1.1 Stored Program Control Switching 1965–1985 343 16.1.2 Digital Wireline Communications 1975–2000 344 16.1.3 Digital Wireless Communication 1990–Onwards 345 16.2 Regulation and Investment 346 16.2.1 Regulation 346 16.2.2 Investment 347 16.3 Consumer Wireline Networks and Services 347 16.3.1 Market Trends 347 16.3.2 Technology 348 16.4 Wireless Networks and Services 351 16.4.1 Market Trends 351 16.4.2 Technology 352 16.5 Backbone Networks 352 16.6 Science and Technology Matter 353 References 353 Appendix A: IPv6 Technologies 355 Appendix B: The Next Generation Network and Why We’ll Never See It 361 Index 367

    10 in stock

    £85.45

  • Official Google Cloud Certified Professional

    John Wiley & Sons Inc Official Google Cloud Certified Professional

    15 in stock

    Book SynopsisTable of ContentsIntroduction xxi Assessment Testxxxii Chapter 1 Framing ML Problems 1 Translating Business Use Cases 3 Machine Learning Approaches 5 Supervised, Unsupervised, and Semi- supervised Learning 5 Classification, Regression, Forecasting, and Clustering 7 ML Success Metrics 8 Regression 12 Responsible AI Practices 13 Summary 14 Exam Essentials 14 Review Questions 15 Chapter 2 Exploring Data and Building Data Pipelines 19 Visualization 20 Box Plot 20 Line Plot 21 Bar Plot 21 Scatterplot 22 Statistics Fundamentals 22 Mean 22 Median 22 Mode 23 Outlier Detection 23 Standard Deviation 23 Correlation 24 Data Quality and Reliability 24 Data Skew 25 Data Cleaning 25 Scaling 25 Log Scaling 26 Z-score 26 Clipping 26 Handling Outliers 26 Establishing Data Constraints 27 Exploration and Validation at Big- Data Scale 27 Running TFDV on Google Cloud Platform 28 Organizing and Optimizing Training Datasets 29 Imbalanced Data 29 Data Splitting 31 Data Splitting Strategy for Online Systems 31 Handling Missing Data 32 Data Leakage 33 Summary 34 Exam Essentials 34 Review Questions 36 Chapter 3 Feature Engineering 39 Consistent Data Preprocessing 40 Encoding Structured Data Types 41 Mapping Numeric Values 42 Mapping Categorical Values 42 Feature Selection 44 Class Imbalance 44 Classification Threshold with Precision and Recall 45 Area under the Curve (AUC) 46 Feature Crosses 46 TensorFlow Transform 49 TensorFlow Data API (tf.data) 49 TensorFlow Transform 49 GCP Data and ETL Tools 51 Summary 51 Exam Essentials 52 Review Questions 53 Chapter 4 Choosing the Right ML Infrastructure 57 Pretrained vs. AutoML vs. Custom Models 58 Pretrained Models 60 Vision AI 61 Video AI 62 Natural Language AI 62 Translation AI 63 Speech- to- Text 63 Text- to- Speech 64 AutoML 64 AutoML for Tables or Structured Data 64 AutoML for Images and Video 66 AutoML for Text 67 Recommendations AI/Retail AI 68 Document AI 69 Dialogflow and Contact Center AI 69 Custom Training 70 How a CPU Works 71 GPU 71 TPU 72 Provisioning for Predictions 74 Scaling Behavior 75 Finding the Ideal Machine Type 75 Edge TPU 76 Deploy to Android or iOS Device 76 Summary 77 Exam Essentials 77 Review Questions 78 Chapter 5 Architecting ML Solutions 83 Designing Reliable, Scalable, and Highly Available ml Solutions 84 Choosing an Appropriate ML Service 86 Data Collection and Data Management 87 Google Cloud Storage (GCS) 88 BigQuery 88 Vertex AI Managed Datasets 89 Vertex AI Feature Store 89 NoSQL Data Store 90 Automation and Orchestration 91 Use Vertex AI Pipelines to Orchestrate the ML Workflow 92 Use Kubeflow Pipelines for Flexible Pipeline Construction 92 Use TensorFlow Extended SDK to Leverage Pre-built Components for Common Steps 93 When to Use Which Pipeline 93 Serving 94 Offline or Batch Prediction 94 Online Prediction 95 Summary 97 Exam Essentials 97 Review Questions 98 Chapter 6 Building Secure ML Pipelines 103 Building Secure ML Systems 104 Encryption at Rest 104 Encryption in Transit 105 Encryption in Use 105 Identity and Access Management 105 IAM Permissions for Vertex AI Workbench 106 Securing a Network with Vertex AI 109 Privacy Implications of Data Usage and Collection 113 Google Cloud Data Loss Prevention 114 Google Cloud Healthcare API for PHI Identification 115 Best Practices for Removing Sensitive Data 116 Summary 117 Exam Essentials 118 Review Questions 119 Chapter 7 Model Building 121 Choice of Framework and Model Parallelism 122 Data Parallelism 122 Model Parallelism 123 Modeling Techniques 125 Artificial Neural Network 126 Deep Neural Network (DNN) 126 Convolutional Neural Network 126 Recurrent Neural Network 127 What Loss Function to Use 127 Gradient Descent 128 Learning Rate 129 Batch 129 Batch Size 129 Epoch 129 Hyperparameters 129 Transfer Learning 130 Semi-supervised Learning 131 When You Need Semi-supervised Learning 131 Limitations of SSL 131 Data Augmentation 132 Offline Augmentation 132 Online Augmentation 132 Model Generalization and Strategies to Handle Overfitting and Underfitting 133 Bias Variance Trade- Off 133 Underfitting 133 Overfitting 134 Regularization 134 Summary 136 Exam Essentials 137 Review Questions 138 Chapter 8 Model Training and Hyperparameter Tuning 143 Ingestion of Various File Types into Training 145 Collect 146 Process 147 Store and Analyze 150 Developing Models in Vertex AI Workbench by Using Common Frameworks 151 Creating a Managed Notebook 153 Exploring Managed JupyterLab Features 154 Data Integration 155 BigQuery Integration 155 Ability to Scale the Compute Up or Down 156 Git Integration for Team Collaboration 156 Schedule or Execute a Notebook Code 158 Creating a User-Managed Notebook 159 Training a Model as a Job in Different Environments 161 Training Workflow with Vertex AI 162 Training Dataset Options in Vertex AI 163 Pre-built Containers 163 Custom Containers 166 Distributed Training 168 Hyperparameter Tuning 169 Why Hyperparameters Are Important 170 Techniques to Speed Up Hyperparameter Optimization 171 How Vertex AI Hyperparameter Tuning Works 171 Vertex AI Vizier 174 Tracking Metrics During Training 175 Interactive Shell 175 TensorFlow Profiler 177 What-If Tool 177 Retraining/Redeployment Evaluation 178 Data Drift 178 Concept Drift 178 When Should a Model Be Retrained? 178 Unit Testing for Model Training and Serving 179 Testing for Updates in API Calls 180 Testing for Algorithmic Correctness 180 Summary 180 Exam Essentials 181 Review Questions 182 Chapter 9 Model Explainability on Vertex AI 187 Model Explainability on Vertex AI 188 Explainable AI 188 Interpretability and Explainability 189 Feature Importance 189 Vertex Explainable AI 189 Data Bias and Fairness 193 ML Solution Readiness 194 How to Set Up Explanations in the Vertex AI 195 Summary 196 Exam Essentials 196 Review Questions 197 Chapter 10 Scaling Models in Production 199 Scaling Prediction Service 200 TensorFlow Serving 201 Serving (Online, Batch, and Caching) 203 Real- Time Static and Dynamic Reference Features 203 Pre-computing and Caching Prediction 206 Google Cloud Serving Options 207 Online Predictions 207 Batch Predictions 212 Hosting Third- Party Pipelines (MLFlow) on Google Cloud 213 Testing for Target Performance 214 Configuring Triggers and Pipeline Schedules 215 Summary 216 Exam Essentials 217 Review Questions 218 Chapter 11 Designing ML Training Pipelines 221 Orchestration Frameworks 223 Kubeflow Pipelines 224 Vertex AI Pipelines 225 Apache Airflow 228 Cloud Composer 229 Comparison of Tools 229 Identification of Components, Parameters, Triggers, and Compute Needs 230 Schedule the Workflows with Kubeflow Pipelines 230 Schedule Vertex AI Pipelines 232 System Design with Kubeflow/TFX 232 System Design with Kubeflow DSL 232 System Design with TFX 234 Hybrid or Multicloud Strategies 235 Summary 236 Exam Essentials 237 Review Questions 238 Chapter 12 Model Monitoring, Tracking, and Auditing Metadata 241 Model Monitoring 242 Concept Drift 242 Data Drift 243 Model Monitoring on Vertex AI 243 Drift and Skew Calculation 244 Input Schemas 245 Logging Strategy 247 Types of Prediction Logs 247 Log Settings 248 Model Monitoring and Logging 248 Model and Dataset Lineage 249 Vertex ML Metadata 249 Vertex AI Experiments 252 Vertex AI Debugging 253 Summary 253 Exam Essentials 254 Review Questions 255 Chapter 13 Maintaining ML Solutions 259 MLOps Maturity 260 MLOps Level 0: Manual/Tactical Phase 261 MLOps Level 1: Strategic Automation Phase 263 MLOps Level 2: CI/CD Automation, Transformational Phase 264 Retraining and Versioning Models 266 Triggers for Retraining 267 Versioning Models 267 Feature Store 268 Solution 268 Data Model 269 Ingestion and Serving 269 Vertex AI Permissions Model 270 Custom Service Account 270 Access Transparency in Vertex AI 271 Common Training and Serving Errors 271 Training Time Errors 271 Serving Time Errors 271 TensorFlow Data Validation 272 Vertex AI Debugging Shell 272 Summary 272 Exam Essentials 273 Review Questions 274 Chapter 14 BigQuery ML 279 BigQuery – Data Access 280 BigQuery ML Algorithms 282 Model Training 282 Model Evaluation 284 Prediction 285 Explainability in BigQuery ML 286 BigQuery ML vs. Vertex AI Tables 289 Interoperability with Vertex AI 289 Access BigQuery Public Dataset 289 Import BigQuery Data into Vertex AI 290 Access BigQuery Data from Vertex AI Workbench Notebooks 290 Analyze Test Prediction Data in BigQuery 290 Export Vertex AI Batch Prediction Results 290 Export BigQuery Models into Vertex AI 291 BigQuery Design Patterns 291 Hashed Feature 291 Transforms 291 Summary 292 Exam Essentials 293 Review Questions 294 Appendix Answers to Review Questions 299 Chapter 1: Framing ML Problems 300 Chapter 2: Exploring Data and Building Data Pipelines 301 Chapter 3: Feature Engineering 302 Chapter 4: Choosing the Right ML Infrastructure 302 Chapter 5: Architecting ML Solutions 304 Chapter 6: Building Secure ML Pipelines 305 Chapter 7: Model Building 306 Chapter 8: Model Training and Hyperparameter Tuning 307 Chapter 9: Model Explainability on Vertex AI 308 Chapter 10: Scaling Models in Production 308 Chapter 11: Designing ML Training Pipelines 309 Chapter 12: Model Monitoring, Tracking, and Auditing Metadata 310 Chapter 13: Maintaining ML Solutions 311 Chapter 14: BigQuery ML 313 Index 315

    15 in stock

    £45.00

  • The Telecommunications Handbook

    Wiley The Telecommunications Handbook

    15 in stock

    Book SynopsisTHE TELECOMMUNICATIONS HANDBOOK ENGINEERING GUIDELINES FOR FIXED, MOBILE AND SATELLITE SYSTEMS Taking a practical approach, The Telecommunications Handbook examines the principles and details of all the major and modern telecommunications systems currently available to industry and to end-users. It gives essential information about usage, architectures, functioning, planning, construction, measurements and optimization. The structure of the book is modular, giving both overall descriptions of the architectures and functionality of typical use cases, as well as deeper and practical guidelines for telecom professionals. The focus of the book is on current and future networks, and the most up-to-date functionalities of each network are described in sufficient detail for deployment purposes. The contents include an introduction to each technology, its evolution path, feasibility and utilization, solution and network architecture, and technical functionTable of ContentsPreface xxv Acknowledgements xxvii Abbreviations xxix List of Contributors xlv 1 Introduction 1Jyrki T. J. Penttinen 1.1 General 1 1.2 Short History of Telecommunications 2 1.3 The Telecommunications Scene 5 1.4 The Focus of the Book 15 1.5 Instructions for Reading the Book Contents 16 References 20 2 Standardization and Regulation 23Jyrki T. J. Penttinen 2.1 Introduction 23 2.2 Standardization Bodies 23 2.3 Industry Forums 38 2.4 Other Entities 44 2.5 Frequency Regulation 45 2.6 National Regulators 46 2.7 Guideline for Finding and Interpreting Standards 47 References 47 3 Telecommunications Principles 49Jyrki T. J. Penttinen 3.1 Introduction 49 3.2 Terminology and Planning Principles 49 3.3 Evolution 58 3.4 Spectrum Allocations 64 3.5 Physical Aspects 64 References 71 4 Protocols 73Jyrki T. J. Penttinen 4.1 Introduction 73 4.2 OSI 74 4.3 Fixed Networks 82 4.4 Mobile Networks 89 4.5 Data Networks 90 4.6 Error Recovery 93 4.7 LAP Protocol Family 96 4.8 Cross-Layer Protocol Principles 98 References 99 5 Connectivity and Payment 101Jyrki T. J. Penttinen 5.1 Connectivity 101 5.2 Definitions 101 5.3 IP Connectivity 102 5.4 Wired Connectivity 105 5.5 Radio Connectivity in the Near Field 114 5.6 NFC and Secure Payment 115 5.7 Secure Payment 120 5.8 Bluetooth 125 5.9 Hearing Aid Compatibility 129 5.10 Other Connectivity Technologies 131 References 132 6 Fixed Telecommunications Networks 135Jyrki T. J. Penttinen 6.1 Introduction 135 6.2 Network Topologies 135 6.3 Redundancy 138 6.4 Telephone Network 139 6.5 User Devices 140 6.6 Plain Old Public Telephone System (POTS) 145 6.7 Integrated Services Digital Network (ISDN) 149 6.8 Intelligent Network (IN) 153 6.9 SIP 155 6.10 Telephony Solutions for Companies 159 6.11 Transport 161 6.12 Cloud Computing 161 References 163 7 Data Networks 165Jyrki T. J. Penttinen, Tero Jalkanen and Ilkka Keisala 7.1 Introduction 165 7.2 IPv4 165 7.3 IPv6 169 7.4 Routing 172 7.5 ATM 174 7.6 Frame Relay 176 7.7 LAN and MAN 177 7.8 Wi-Fi 189 7.9 Inter-Operator Networks 202 References 204 8 Telecommunications Network Services and Applications 207Jyrki T. J. Penttinen 8.1 Introduction 207 8.2 Voice 207 8.3 Messaging 208 8.4 Audio and Video 210 8.5 Health Care 212 8.6 Education 212 8.7 CSTA 213 8.8 Advanced Telecommunications Functionalities 214 8.9 Business Exchange 218 8.10 Public IP Network Develops to NGN 218 8.11 Voice Service Access Points 222 8.12 Mobile Services 224 References 236 9 Transmission Networks 237Jyrki T. J. Penttinen and Juha Kallio 9.1 Introduction 237 9.2 Physical Transmission Systems 237 9.3 Coding Techniques 238 9.4 PCM 241 9.5 Coding Techniques 243 9.6 PDH 245 9.7 SDH 245 9.8 WDM 246 9.9 Carrier Ethernet Transport 247 9.10 IP Multimedia Subsystem 250 9.11 Case Example: LTE Transport 257 9.12 Cloud Computing and Transport 257 References 259 10 Modulation and Demodulation 261Patrick Marsch and Jyrki Penttinen 10.1 Introduction 261 10.2 General 261 10.3 Analog Modulation Methods 262 10.4 Digital Modulation and Demodulation 264 References 280 11 3GPP Mobile Communications: GSM 281Jyrki T. J. Penttinen 11.1 Introduction 281 11.2 Development of GSM 281 11.3 Specification of GSM 285 11.4 Architecture of GSM 286 11.5 Functionality of GSM 294 11.6 Numbering of GSM 303 11.7 GSM Data 308 11.8 Dual Half Rate 317 11.9 DFCA 341 11.10 EDGE 349 11.11 DLDC 354 11.12 EDGE2 366 References 367 12 3GPP Mobile Communications: WCDMA and HSPA 371Patrick Marsch, Michat Maternia, Michal Panek, Ali Yaver, Ryszard Dokuczat and Rybakowski Marcin 12.1 Network Architecture 371 12.2 Physical Layer Aspects 376 12.3 Radio Interface Procedures 387 12.4 WCDMA/HSPA Evolution since Release 5 402 12.5 Planning and Dimensioning of WCDMA/HSPA Networks 410 References 415 13 3GPP Mobile Communications: LTE/SAE and LTE-A 417Jacek Góra, Krystian Safjan, Jarostaw Lachowski, Agnieszka Szufarska, Stanistaw Strzyÿz,Szymon Stefánski, Damian Kolmas, Jyrki T. J. Penttinen, Francesco D. Calabrese,Guillaume Monghal, Mohammad Anas, Luis Maestro, Juha Kallio and Olli Ramula 13.1 Introduction 417 13.2 Architecture 418 13.3 Elements 419 13.4 Evolved Universal Terrestrial Radio Access Network 422 13.5 Interfaces 428 13.6 Protocol Stacks 430 13.7 Layer 2 Structure 434 13.8 LTE Radio Network 435 13.9 LTE Spectrum 436 13.10 Physical Layer 438 13.11 SC-FDM and SC-FDMA 448 13.12 Frame Structure and Physical Channels 449 13.13 Physical Layer Procedures 453 13.14 User Mobility 455 13.15 Radio Resource Management Procedures 457 13.16 Link Adaptation 458 13.17 ICIC 459 13.18 Reporting 463 13.19 LTE Radio Resource Management 466 13.20 RRM Principles and Algorithms Common to UL and DL 467 13.21 Uplink RRM 477 13.22 Downlink RRM 482 13.23 Intra-LTE Handover 485 13.24 LTE Release 8/9 Features 487 13.25 LTE-Advanced Features (Rel. 10) 496 13.26 LTE Transport and Core Network 504 13.27 Transport Network 506 13.28 Core Network 509 13.29 Charging 510 References 513 14 Wireless LAN and Evolution 515Jyrki T. J. Penttinen 14.1 Introduction 515 14.2 WLAN Standards 515 14.3 IEEE 802.11 (Wi-Fi) 515 14.4 IEEE 802.16 (WiMAX) 524 14.5 Evolved IEEE 802.16 (4G) 529 14.6 Comparison of Wireless Technologies 534 References 536 15 Terrestrial Broadcast Networks 537Jyrki T. J. Penttinen 15.1 Introduction 537 15.2 Analog Systems 537 15.3 Digital Radio 539 15.4 Digital Television 540 References 552 16 Satellite Systems: Communications 555Jyrki T. J. Penttinen 16.1 Introduction 555 16.2 Principles of Satellite Systems 556 16.3 Voice and Data Services 569 16.4 Broadcast Satellite Systems 571 16.5 Standardization 574 16.6 Commercial Satellite Systems 577 16.7 Radio Link Budget 595 References 601 17 Satellite Systems: Location Services and Telemetry 603Jyrki T. J. Penttinen 17.1 General 603 17.2 GPS 604 17.3 GALILEO 608 17.4 Positioning Systems: Other Initiatives 614 17.5 Space Research 616 17.6 Weather and Meteorological Satellites 616 17.7 Military Systems 617 References 619 18 Other and Special Networks 621Pertti Virtanen and Jyrki T. J. Penttinen 18.1 IS-95 621 18.2 CDMA2000 624 18.3 TETRA 625 References 640 19 Security Aspects of Telecommunications: 3GPP Mobile Networks 641Jyrki T. J. Penttinen 19.1 Introduction 641 19.2 Basic Principles of Protection 641 19.3 GSM Security 642 19.4 UMTS Security 647 19.5 LTE Security 649 19.6 LTE/SAE Service Security: Case Example 659 19.7 Authentication and Authorization 663 19.8 Customer Data Safety 665 19.9 Lawful Interception 665 References 668 20 Planning of 2G Networks 669Jyrki T. J. Penttinen 20.1 General Planning Guidelines for Fixed Networks 669 20.2 Capacity Planning 672 20.3 Coverage Planning 675 20.4 Frequency Planning 679 20.5 Parameter Planning 681 20.6 Network Measurements 683 20.7 Effects of Data Services on GSM Planning 684 20.8 Other Planning Considerations 714 20.9 GSM/GPRS Measurement and Simulation Techniques 722 20.10 Simulations 729 References 741 21 Planning of Advanced 3G Networks 743Jyrki T. J. Penttinen 21.1 Introduction 743 21.2 Radio Network Planning Process 743 21.3 Nominal Network Planning 746 21.4 Capacity Planning 749 21.5 Coverage Planning 750 21.6 Self-Optimizing Network 757 21.7 Parameter Planning 759 References 776 22 Planning of Mobile TV Networks 777Jyrki T. J. Penttinen 22.1 Introduction 777 22.2 High-Level Network Dimensioning Process 777 22.3 Detailed Radio Network Design 795 22.4 Radiation Limitations 818 22.5 Cost Prediction and Optimization 819 References 830 23 Planning of Core Networks 835Jyrki T. J. Penttinen and Jukka Hongisto 23.1 Introduction 835 23.2 General Planning Guidelines for Fixed Networks 835 23.3 Planning of the Networks 836 23.4 Capacity Planning 838 23.5 Network Evolution from 2G/3G PS Core to EPC 840 23.6 Entering Commercial Phase: Support for Multimode LTE/3G/2G Terminals with Pre-Release 8 SGSN 841 23.7 SGSN/MME Evolution 845 23.8 Case Example: Commercial SGSN/MME Offering 846 23.9 Mobile Gateway Evolution 847 23.10 Case Example: Commercial GGSN/S-GW/P-GW Offering 847 23.11 EPC Network Deployment and Topology Considerations 848 23.12 LTE Access Dimensioning 850 Reference 851 24 EMF – Radiation Safety and Health Aspects 853Jouko Rautio and Jyrki T. J. Penttinen 24.1 Introduction 853 24.2 The EMF Question 856 24.3 The Scientific Principle and Process: The Precautionary Principle 856 24.4 The Expert Organizations and Regulation 858 24.5 Some Topics of the EMF Debate 860 24.6 SAR 864 24.7 The Safety Distance and Installation 866 24.8 Summing Up 869 24.9 High-Power Network Planning 870 References 880 25 Deployment and Transition of Telecommunication Systems 883Michat Maternia 25.1 Introduction 883 25.2 Why to Deploy Wireless Systems 883 25.3 Transition of Telecommunication Systems 885 25.4 Network Deployments 886 25.5 Spectrum Considerations for Network Transition 900 25.6 Terminals Support for the Network Transition 904 25.7 Evolution of Macro Sites and Deployment of Small Cells 906 25.8 Beyond 4G Systems: 5G 910 25.9 Challenges and Possibilities 911 References 913 26 Wireless Network Measurements 915Jyrki T. J. Penttinen 26.1 Introduction 915 26.2 Principles of Radio Interface Measurements 915 26.3 GSM/GPRS 915 26.4 LTE 921 26.5 LTE Field Measurements 928 References 934 Index 935

    15 in stock

    £137.66

  • Microwave and Millimeter Wave Circuits and

    John Wiley & Sons Inc Microwave and Millimeter Wave Circuits and

    Out of stock

    Book SynopsisMicrowave and Millimeter Wave Circuits and Systems: Emerging Design, Technologies and Applications provides a wide spectrum of current trends in the design of microwave and millimeter circuits and systems. In addition, the book identifies the state-of-the art challenges in microwave and millimeter wave circuits systems design such as behavioral modeling of circuit components, software radio and digitally enhanced front-ends, new and promising technologies such as substrate-integrated-waveguide (SIW) and wearable electronic systems, and emerging applications such as tracking of moving targets using ultra-wideband radar, and new generation satellite navigation systems. Each chapter treats a selected problem and challenge within the field of Microwave and Millimeter wave circuits, and contains case studies and examples where appropriate. Key Features: Discusses modeling and design strategies for new appealing applications in the domain of microwave and millimTable of ContentsAbout the Editors xiii About the Authors xvii Preface xxxi List of Abbreviations xli List of Symbols xlv Part I DESIGN AND MODELING TRENDS 1 Low Coefficient Accurate Nonlinear Microwave and Millimeter Wave Nonlinear Transmitter Power Amplifier Behavioural Models 3 1.1 Introduction 3 1.1.1 Chapter Structure 4 1.1.2 LDMOS PA Measurements 4 1.1.3 BF Model 7 1.1.4 Modified BF Model (MBF) – Derivation 8 1.1.5 MBF Models of an LDMOS PA 13 1.1.6 MBF Model – Accuracy and Performance Comparisons 15 1.1.7 MBF Model – the Memoryless PA Behavioural Model of Choice 22 Acknowledgements 24 References 24 2 Artificial Neural Network in Microwave Cavity Filter Tuning 27 2.1 Introduction 27 2.2 Artificial Neural Networks Filter Tuning 28 2.2.1 The Inverse Model of the Filter 29 2.2.2 Sequential Method 30 2.2.3 Parallel Method 31 2.2.4 Discussion on the ANN’s Input Data 33 2.3 Practical Implementation – Tuning Experiments 36 2.3.1 Sequential Method 36 2.3.2 Parallel Method 41 2.4 Influence of the Filter Characteristic Domain on Algorithm Efficiency 43 2.5 Robots in the Microwave Filter Tuning 47 2.6 Conclusions 49 Acknowledgement 49 References 49 3 Wideband Directive Antennas with High Impedance Surfaces 51 3.1 Introduction 51 3.2 High Impedance Surfaces (HIS) Used as an Artificial Magnetic Conductor (AMC) for Antenna Applications 52 3.2.1 AMC Characterization 52 3.2.2 Antenna over AMC: Principle 55 3.2.3 AMC’s Wideband Issues 55 3.3 Wideband Directive Antenna Using AMC with a Lumped Element 57 3.3.1 Bow-Tie Antenna in Free Space 57 3.3.2 AMC Reflector Design 59 3.3.3 Performances of the Bow-Tie Antenna over AMC 60 3.3.4 AMC Optimization 61 3.4 Wideband Directive Antenna Using a Hybrid AMC 64 3.4.1 Performances of a Diamond Dipole Antenna over the AMC 65 3.4.2 Beam Splitting Identification and Cancellation Method 69 3.4.3 Performances with the Hybrid AMC 73 3.5 Conclusion 78 Acknowledgments 80 References 80 4 Characterization of Software-Defined and Cognitive Radio Front-Ends for Multimode Operation 83 4.1 Introduction 83 4.2 Multiband Multimode Receiver Architectures 84 4.3 Wideband Nonlinear Behavioral Modeling 87 4.3.1 Details of the BPSR Architecture 87 4.3.2 Proposed Wideband Behavioral Model 89 4.3.3 Parameter Extraction Procedure 92 4.4 Model Validation with a QPSK Signal 95 4.4.1 Frequency Domain Results 95 4.4.2 Symbol Evaluation Results 98 References 99 5 Impact and Digital Suppression of Oscillator Phase Noise in Radio Communications 103 5.1 Introduction 103 5.2 Phase Noise Modelling 104 5.2.1 Free-Running Oscillator 104 5.2.2 Phase-Locked Loop Oscillator 105 5.2.3 Generalized Oscillator 107 5.3 OFDM Radio Link Modelling and Performance under Phase Noise 109 5.3.1 Effect of Phase Noise in Direct-Conversion Receivers 110 5.3.2 Effect of Phase Noise and the Signal Model on OFDM 110 5.3.3 OFDM Link SINR Analysis under Phase Noise 113 5.3.4 OFDM Link Capacity Analysis under Phase Noise 114 5.4 Digital Phase Noise Suppression 118 5.4.1 State of the Art in Phase Noise Estimation and Mitigation 119 5.4.2 Recent Contributions to Phase Noise Estimation and Mitigation 122 5.4.3 Performance of the Algorithms 128 5.5 Conclusions 129 Acknowledgements 131 References 131 6 A Pragmatic Approach to Cooperative Positioning in Wireless Sensor Networks 135 6.1 Introduction 135 6.2 Localization in Wireless Sensor Networks 136 6.2.1 Range-Free Methods 136 6.2.2 Range-Based Methods 139 6.2.3 Cooperative versus Noncooperative 142 6.3 Cooperative Positioning 142 6.3.1 Centralized Algorithms 143 6.3.2 Distributed Algorithms 144 6.4 RSS-Based Cooperative Positioning 147 6.4.1 Measurement Phase 147 6.4.2 Location Update Phase 148 6.5 Node Selection 150 6.5.1 Energy Consumption Model 152 6.5.2 Node Selection Mechanisms 153 6.5.3 Joint Node Selection and Path Loss Exponent Estimation 156 6.6 Numerical Results 160 6.6.1 OLPL-NS-LS Performance 164 6.6.2 Comparison with Existing Methods 164 6.7 Experimental Results 166 6.7.1 Scenario 1 166 6.7.2 Scenario 2 169 6.8 Conclusions 169 References 170 7 Modelling of Substrate Noise and Mitigation Schemes for UWB Systems 173 7.1 Introduction 173 7.1.1 Ultra Wideband Systems – Developments and Challenges 174 7.1.2 Switching Noise – Origin and Coupling Mechanisms 175 7.2 Impact Evaluation of Substrate Noise 176 7.2.1 Experimental Impact Evaluation on a UWB LNA 177 7.2.2 Results and Discussion 178 7.2.3 Conclusion 181 7.3 Analytical Modelling of Switching Noise in Lightly Doped Substrate 182 7.3.1 Introduction 182 7.3.2 The GAP Model 185 7.3.3 The Statistic Model 192 7.3.4 Conclusion 195 7.4 Substrate Noise Suppression and Isolation for UWB Systems 195 7.4.1 Introduction 195 7.4.2 Active Suppression of Switching Noise in Mixed-Signal Integrated Circuits 196 7.5 Summary 204 References 205 Part II APPLICATIONS 8 Short-Range Tracking of Moving Targets by a Handheld UWB Radar System 209 8.1 Introduction 209 8.2 Handheld UWB Radar System 210 8.3 UWB Radar Signal Processing 210 8.3.1 Raw Radar Data Preprocessing 211 8.3.2 Background Subtraction 212 8.3.3 Weak Signal Enhancement 213 8.3.4 Target Detection 214 8.3.5 Time-of-Arrival Estimation 215 8.3.6 Target Localization 217 8.3.7 Target Tracking 217 8.4 Short-Range Tracking Illustration 218 8.5 Conclusions 223 Acknowledgement 224 References 224 9 Advances in the Theory and Implementation of GNSS Antenna Array Receivers 227 9.1 Introduction 227 9.2 GNSS: Satellite-Based Navigation Systems 228 9.3 Challenges in the Acquisition and Tracking of GNSS Signals 230 9.3.1 Interferences 232 9.3.2 Multipath Propagation 232 9.4 Design of Antenna Arrays for GNSS 233 9.4.1 Hardware Components Design 234 9.4.2 Array Signal Processing in the Digital Domain 239 9.5 Receiver Implementation Trade-Offs 244 9.5.1 Computational Resources Required 244 9.5.2 Clock Domain Crossing in FPGAs/Synchronization Issues 247 9.6 Practical Examples of Experimentation Systems 248 9.6.1 L1 Array Receiver of CTTC, Spain 248 9.6.2 GALANT, a Multifrequency GPS/Galileo Array Receiver of DLR, Germany 253 References 272 10 Multiband RF Front-Ends for Radar and Communications Applications 275 10.1 Introduction 275 10.1.1 Standard Approaches for RF Front-Ends 275 10.1.2 Acquisition of Multiband Signals 276 10.1.3 The Direct-Sampling Architecture 277 10.2 Minimum Sub-Nyquist Sampling 278 10.2.1 Mathematical Approach 278 10.2.2 Acquisition of Dual-Band Signals 279 10.2.3 Acquisition of Evenly Spaced Equal-Bandwidth Multiband Signals 282 10.3 Simulation Results 284 10.3.1 Symmetrical and Asymmetrical Cases 284 10.3.2 Verification of the Mathematical Framework 285 10.4 Design of Signal-Interference Multiband Bandpass Filters 287 10.4.1 Evenly Spaced Equal-Bandwidth Multiband Bandpass Filters 288 10.4.2 Stepped-Impedance Line Asymmetrical Multiband Bandpass Filters 289 10.5 Building and Testing of Direct-Sampling RF Front-Ends 290 10.5.1 Quad-Band Bandpass Filter 290 10.5.2 Asymmetrical Dual-Band Bandpass Filter 291 10.6 Conclusions 293 References 294 11 Mm-Wave Broadband Wireless Systems and Enabling MMIC Technologies 295 11.1 Introduction 295 11.2 V-Band Standards and Applications 297 11.2.1 IEEE 802.15.3c Standard 297 11.2.2 ECMA-387 Standard 299 11.2.3 WirelessHD 300 11.2.4 WiGig Standard 301 11.3 V-Band System Architectures 302 11.3.1 Super-Heterodyne Architecture 302 11.3.2 Direct Conversion Architecture 303 11.3.3 Bits to RF and RF to Bits Radio Architectures 305 11.4 SiGeV-Band MMIC 306 11.4.1 Voltage Controlled Oscillator 307 11.4.2 Active Receive Balun 310 11.4.3 On-Chip Butler Matrix 313 11.4.4 High GBPsSiGeV-Band SPST Switch Design Considerations 317 11.5 Outlook 320 References 322 12 Reconfigurable RF Circuits and RF-MEMS 325 12.1 Introduction 325 12.2 Reconfigurable RF Circuits – Transistor-Based Solutions 326 12.2.1 Programmable Microwave Function Arrays 326 12.2.2 PROMFA Concept 327 12.2.3 Design Example: Tunable Band Passfilter 331 12.2.4 Design Examples: Beamforming Network, LNA and VCO 333 12.3 Reconfigurable RF Circuits Using RF-MEMS 335 12.3.1 Integration of RF-MEMS and Active RF Devices 336 12.3.2 Monolithic Integration of RF-MEMS in GaAs/GaN MMIC Processes 337 12.3.3 Monolithic Integration of RF-MEMS in SiGeBiCMOS Process 342 12.3.4 Design Example: RF-MEMS Reconfigurable LNA 344 12.3.5 RF-MEMS-Based Phase Shifters for Electronic Beam Steering 348 12.4 Conclusions 353 References 353 13 MIOS: Millimeter Wave Radiometers for the Space-Based Observation of the Sun 357 13.1 Introduction 357 13.2 Scientific Background 358 13.3 Quiet-Sun Spectral Flux Density 359 13.4 Radiation Mechanism in Flares 361 13.5 Open Problems 361 13.6 Solar Flares Spectral Flux Density 363 13.7 Solar Flares Peak Flux Distribution 364 13.8 Atmospheric Variability 365 13.9 Ionospheric Variability 366 13.10 Antenna Design 369 13.11 Antenna Noise Temperature 371 13.12 Antenna Pointing and Radiometric Background 373 13.13 Instrument Resolution 373 13.14 System Overview 374 13.15 System Design 376 13.16 Calibration Circuitry 378 13.17 Retrieval Equations 381 13.18 Periodicity of the Calibrations 381 13.19 Conclusions 384 References 384 14 Active Antennas in Substrate Integrated Waveguide (SIW) Technology 387 14.1 Introduction 387 14.2 Substrate Integrated Waveguide Technology 388 14.3 Passive SIW Cavity-Backed Antennas 388 14.3.1 Passive SIW Patch Cavity-Backed Antenna 389 14.3.2 Passive SIW Slot Cavity-Backed Antenna 391 14.4 SIW Cavity-Backed Antenna Oscillators 395 14.4.1 SIW Cavity-Backed Patch Antenna Oscillator 395 14.4.2 SIW Cavity-Backed Slot Antenna Oscillator with Frequency Tuning 397 14.4.3 Compact SIW Patch Antenna Oscillator with Frequency Tuning 401 14.5 SIW-Based Coupled Oscillator Arrays 406 14.5.1 Design of Coupled Oscillator Systems for Power Combining 407 14.5.2 Coupled Oscillator Array with Beam-Scanning Capabilities 412 14.6 Conclusions 414 References 415 15 Active Wearable Antenna Modules 417 15.1 Introduction 417 15.2 Electromagnetic Characterization of Fabrics and Flexible Foam Materials 419 15.2.1 Electromagnetic Property Considerations for Wearable Antenna Materials 419 15.2.2 Characterization Techniques Applied to Wearable Antenna Materials 419 15.2.3 Matrix-Pencil Two-Line Method 420 15.2.4 Small-Band Inverse Planar Antenna Resonator Method 427 15.3 Active Antenna Modules for Wearable Textile Systems 436 15.3.1 Active Wearable Antenna with Optimized Noise Characteristics 436 15.3.2 Solar Cell Integration with Wearable Textile Antennas 445 15.4 Conclusions 451 References 452 16 Novel Wearable Sensors for Body Area Network Applications 455 16.1 Body Area Networks 455 16.1.1 Potential Sheet-Shaped Communication Surface Configurations 456 16.1.2 Wireless Body Area Network 460 16.1.3 Chapter Flow Summary 460 16.2 Design of a 2-D Array Free Access Mat 460 16.2.1 Coupling of External Antennas 462 16.2.2 2-D Array Performance Characterization by Measurement 464 16.2.3 Accessible Range of External Antennas on the 2-D Array 467 16.3 Textile-Based Free Access Mat: Flexible Interface for Body-Centric Wireless Communications 467 16.3.1 Wearable Waveguide 470 16.3.2 Summary on the Proposed Wearable Waveguide 475 16.4 Proposed WBAN Application 476 16.4.1 Concept 476 16.5 Summary 478 Acknowledgment 478 References 478 17 Wideband Antennas for Wireless Technologies: Trends and Applications 481 17.1 Introduction 481 17.1.1 Antenna Concept 482 17.2 Wideband Antennas 483 17.2.1 Travelling Wave Antennas 483 17.2.2 Frequency Independent Antennas 484 17.2.3 Self-Complementary Antennas 485 17.2.4 Applications 486 17.2.5 Ultra Wideband (UWB) Arrays: Vivaldi Antenna Arrays 489 17.2.6 Wideband Microstrip Antennas: Stacked Patch Antennas 495 17.3 Antenna Measurements 496 17.4 Antenna Trends and Applications 498 17.4.1 Phase Arrays and Smart Antennas 499 17.4.2 Wearable Antennas 502 17.4.3 Capsule Antennas for Medical Monitoring 503 17.4.4 RF Hyperthermia 503 17.4.5 Wireless Energy Transfer 503 17.4.6 Implantable Antennas 503 Acknowledgements 504 References 504 18 Concluding Remarks 509 Index 511

    Out of stock

    £111.95

  • Cognitive Communications

    John Wiley & Sons Inc Cognitive Communications

    10 in stock

    Book SynopsisThis book discusses in-depth the concept of distributed artificial intelligence (DAI) and its application to cognitive communications In this book, the authors present an overview of cognitive communications, encompassing both cognitive radio and cognitive networks, and also other application areas such as cognitive acoustics. The book also explains the specific rationale for the integration of different forms of distributed artificial intelligence into cognitive communications, something which is often neglected in many forms of technical contributions available today. Furthermore, the chapters are divided into four disciplines: wireless communications, distributed artificial intelligence, regulatory policy and economics and implementation. The book contains contributions from leading experts (academia and industry) in the field. Key Features: Covers the broader field of cognitive communications as a whole, addressing application to communication systemsTable of ContentsList of Figures xiii List of Tables xxv About the Editors xxvii Preface xxix PART I INTRODUCTION 1 Introduction to Cognitive Communications 3 David Grace 1.1 Introduction 3 1.2 A NewWay of Thinking 4 1.3 History of Cognitive Communications 6 1.4 Key Components of Cognitive Communications 8 1.5 Overview of the Rest of the Book 9 1.5.1 Part 2: Wireless Communications 10 1.5.2 Part 3: Application of Distributed Artificial Intelligence 11 1.5.3 Part 4: Regulatory Policy and Economics 12 1.5.4 Part 5: Implementation 13 1.6 Summary and Conclusion 14 References 14 PART II WIRELESS COMMUNICATIONS 2 Cognitive Radio and Networks for Heterogeneous Networking 19 Haesik Kim and Aarne M€ammel€a 2.1 Introduction 19 2.1.1 Historical Sketch 19 2.1.2 Cognitive Radio and Networks 21 2.1.3 Heterogeneous Networks 22 2.2 Cognitive Radio for Heterogeneous Networks 26 2.2.1 Channel Sensing and Network Sensing 26 2.2.2 Interference Mitigation 27 2.2.3 Power Control 31 2.3 Applying Cognitive Networks to Heterogeneous Networks 37 2.3.1 Network Policy for Coexistence of Different Networks 37 2.3.2 Cooperation Mechanisms 39 2.3.3 Network Resource Allocation 41 2.3.4 Self-Organization Mechanisms 44 2.3.5 Handover Mechanisms 45 2.4 Performance Evaluation 47 2.5 Conclusion 50 References 50 3 Channel Assignment and Power Allocation Algorithms in Multi-Carrier-Based Cognitive Radio Environments 53 Musbah Shaat and Faouzi Bader 3.1 Introduction 53 3.2 The Orthogonal Frequency-Division Multiplexing (OFDM) Transmission Scheme 54 3.2.1 Why OFDM is Appropriate for CR 55 3.3 Resource Management in Non-Cognitive OFDM Environments 56 3.3.1 Single User OFDM Systems 56 3.3.2 Multiple User OFDM Systems (OFDMA) 57 3.3.3 Resource Allocation Algorithms in Non-Cognitive OFDM Systems 58 3.4 Resource Management in OFDM-Based Cognitive Radio Systems 58 3.4.1 Algorithms Dealing with In-Band Interference 59 3.4.2 Algorithms Dealing with Mutual Interference 60 3.4.3 System Model 61 3.4.4 Problem Formulation 63 3.4.5 Resource Management in Downlink OFDM-Based CR Systems 64 3.4.6 Resource Management in Uplink OFDM-Based CR Systems 76 3.5 Conclusions 88 References 89 4 Filter Bank Techniques for Multi-Carrier Cognitive Radio Systems 93 Yun Cui, Zhifeng Zhao, Rongpeng Li, Guangchao Zhang and Honggang Zhang 4.1 Introduction 93 4.2 Basic Features of Filter Banks-Based Multi-Carrier Techniques 94 4.2.1 Introduction to the Filter Bank System 95 4.2.2 The Polyphase Structure of Filter Banks 96 4.2.3 Basic Structure of Filter Banks-Based Multi-Carrier Systems 97 4.3 Adaptive Threshold Enhanced Filter Bank for Spectrum Detection in IEEE 802.22 98 4.3.1 Multi-Stage Analysis Filter Banks for Spectrum Detection 99 4.3.2 Complexity and Detection Precision Analysis 101 4.3.3 Spectrum Detection in IEEE 802.22 103 4.3.4 Power Estimation with Adaptive Threshold 106 4.4 Transform Decomposition for Spectrum Interleaving in Multi-Carrier Cognitive Radio Systems 108 4.4.1 FFT Pruning in Cognitive Radio Systems 108 4.4.2 Transform Decomposition for General DFT 110 4.4.3 Improved Transform Decomposition Method for DFT with Sparse Input Points 111 4.4.4 Numerical Results and Computational Complexity Analysis 114 4.5 Remaining Problems in Filter Banks-Based Multi-Carrier Systems 115 4.6 Summary and Conclusion 117 References 117 5 Distributed Clustering of Cognitive Radio Networks: A Message-Passing Approach 119 Kareem E. Baddour, Oktay Ureten and Tricia J. Willink 5.1 Introduction 119 5.1.1 Inter-Node Collaboration in Decentralized Cognitive Networks 119 5.1.2 Scalability Issues and Overhead Costs 120 5.1.3 Self-Organization Based on Distributed Clustering 120 5.2 Clustering Techniques for Cognitive Radio Networks 122 5.3 A Message-Passing Clustering Approach Based on Affinity Propagation 124 5.4 Case Studies 126 5.4.1 Clustering Based on Local Spectrum Availability 127 5.4.2 Sensor Selection for Cooperative Spectrum Sensing 132 5.5 Implementation Challenges 138 5.6 Conclusions 140 References 140 PART III APPLICATION OF DISTRIBUTED ARTIFICIAL INTELLIGENCE 6 Machine Learning Applied to Cognitive Communications 145 Aimilia Bantouna, Kostas Tsagkaris, Vera Stavroulaki, Panagiotis Demestichas and Giorgos Poulios 6.1 Introduction 145 6.2 State of the Art 146 6.3 Learning Techniques 148 6.3.1 Bayesian Statistics 148 6.3.2 Supervised Neural Networks (NNs) 150 6.3.3 Self-Organizing Maps (SOMs): An Unsupervised Neural Network 153 6.3.4 Reinforcement Learning 157 6.4 Advantages and Disadvantages of Applying Machine Learning to Cognitive Radio Networks 158 6.5 Conclusions 159 Acknowledgement 160 References 160 7 Reinforcement Learning for Distributed Power Control and Channel Access in Cognitive Wireless Mesh Networks 163 Xianfu Chen, Zhifeng Zhao and Honggang Zhang 7.1 Introduction 163 7.2 Applying Reinforcement Learning to Distributed Power Control and Channel Access 165 7.2.1 Conjecture-Based Multi-Agent Q-Learning for Distributed Power Control in CogMesh 165 7.2.2 Learning with Dynamic Conjectures for Opportunistic Spectrum Access in CogMesh 176 7.3 Future Challenges 191 7.4 Conclusions 192 References 192 8 Reinforcement Learning-Based Cognitive Radio for Open Spectrum Access 195 Tao Jiang and David Grace 8.1 Open Spectrum Access 195 8.2 Reinforcement Learning-Based Spectrum Sharing in Open Spectrum Bands 196 8.2.1 Learning Model 196 8.2.2 Basic Algorithms 200 8.2.3 Performance 200 8.3 Exploration Control and Efficient Exploration for Reinforcement Learning-Based Cognitive Radio 208 8.3.1 Exploration Control Techniques for Cognitive Radios 208 8.3.2 Efficient Exploration Techniques and Learning Efficiency for Cognitive Radios 218 8.4 Conclusion 229 References 230 9 Learning Techniques for Context Diagnosis and Prediction in Cognitive Communications 231 Aimilia Bantouna, Kostas Tsagkaris, Vera Stavroulaki, Giorgos Poulios and Panagiotis Demestichas 9.1 Introduction 231 9.2 Prediction 232 9.2.1 Building Knowledge: Learning Network Capabilities and User Preferences/ Behaviours 232 9.2.2 Application to Context Diagnosis and Prediction: The Case of Congestion 248 9.3 Future Problems 253 9.4 Conclusions 254 References 255 10 Social Behaviour in Cognitive Radio 257 Husheng Li 10.1 Introduction 257 10.2 Social Behaviour in Cognitive Radio 258 10.2.1 Cooperation Formation 258 10.2.2 Channel Recommendations 261 10.3 Social Network Analysis 267 10.3.1 Model of Recommendation Mechanism 267 10.3.2 Interacting Particles 268 10.3.3 Epidemic Propagation 273 10.4 Conclusions 281 References 281 PART IV REGULATORY POLICY AND ECONOMICS 11 Regulatory Policy and Economics of Cognitive Radio for Secondary Spectrum Access 285 Maziar Nekovee and Peter Anker 11.1 Introduction 285 11.2 Spectrum Regulations: Why and How? 286 11.3 Overview of Regulatory Bodies and Their Inter-Relation 287 11.3.1 ITU 287 11.3.2 CEPT/ECC 288 11.3.3 European Union 289 11.3.4 ETSI 290 11.3.5 National Spectrum Management Authority 291 11.4 Why Secondary Spectrum Access? 291 11.5 Candidate Bands for Secondary Access 293 11.5.1 Terrestrial Broadcasting Bands 294 11.5.2 Radar Bands 294 11.5.3 IMT Bands 295 11.5.4 Military Bands 296 11.6 Regulatory and Policy Issues 296 11.6.1 UK Regulatory Environment 300 11.6.2 US Regulatory Environment 301 11.6.3 European Regulatory Environment 302 11.6.4 Regulatory Environments Elsewhere 303 11.7 Technology Enablers and Options for Secondary Sharing 304 11.7.1 Cognitive Radio 304 11.7.2 Technology Options for Secondary Access 306 11.8 Economic Impact and Business Opportunities of SSA 308 11.8.1 Stakeholders and Economic of SSA 309 11.8.2 Use Cases and Business Models 310 11.9 Outlook 313 11.10 Conclusions 314 Acknowledgements 315 References 315 PART V IMPLEMENTATION 12 Cognitive Radio Networks in TV White Spaces 321 Maziar Nekovee and Dave Wisely 12.1 Introduction 321 12.2 Research and Development Challenges 324 12.2.1 Geolocation Databases 324 12.2.2 Sensing 327 12.2.3 Beacons 330 12.2.4 Physical Layer 330 12.2.5 System Issues 331 12.2.6 Devices 335 12.3 Regulation and Standardization 335 12.3.1 Regulation 335 12.3.2 Standardization 338 12.4 Quantifying Spectrum Opportunities 343 12.5 Commercial Use Cases 346 12.6 Conclusions 354 Acknowledgement 355 References 355 13 Cognitive Femtocell Networks 359 Faisal Tariq and Laurence S. Dooley 13.1 Introduction 359 13.2 Femtocell Network Architecture 361 13.2.1 Underlay and Overlay Architectures for Femtocell Networks 362 13.2.2 Home Femtocell and Enterprise Femtocell 366 13.2.3 Access Mechanism: Closed, Open and Hybrid Access 369 13.2.4 Possible Operating Spectrum 371 13.3 Interference Management Strategies 372 13.3.1 Cross-Tier Interference Management 373 13.3.2 Intra-Tier Interference Management 376 13.4 Self Organized Femtocell Networks (SOFN) 381 13.4.1 Self-Configuration 383 13.4.2 Self-Optimization 383 13.4.3 Self-Healing and Self-Protection 388 13.5 Future Research Directions 388 13.5.1 Green Femtocell Networks 388 13.5.2 Communication Hub for Smart Homes 389 13.5.3 MIMO-Based Interference Alignment for Femtocell Networks 389 13.5.4 Enhanced FFR 390 13.5.5 CoMP-Based Femtocell Network 391 13.5.6 Holistic Approach to SOFN 391 13.6 Conclusion 391 References 391 14 Cognitive Acoustics: A Way to Extend the Lifetime of Underwater Acoustic Sensor Networks 395 Lu Jin, Defeng (David) Huang, Lin Zou and Angela Ying Jun Zhang 14.1 The Concept of Cognitive Acoustics 395 14.2 Underwater Acoustic Communication Channel 397 14.2.1 Propagation Delay 397 14.2.2 Severe Attenuation 397 14.2.3 Ambient Noise 398 14.3 Some Distinct Features of Cognitive Acoustics 401 14.3.1 Purposes of Deployment 401 14.3.2 Grey Space 402 14.3.3 Cost of Field Measurement and System Deployment 402 14.4 Fundamentals of Reinforcement Learning 402 14.4.1 Markov Decision Process 402 14.4.2 Reinforcement Learning 403 14.4.3 Q-Learning 403 14.5 An Application Scenario: Underwater Acoustic Sensor Networks 404 14.5.1 System Description 404 14.5.2 State Space, Action Set and Transition Probabilities 406 14.5.3 Reward Function 407 14.5.4 Routing Protocol Discussion 409 14.6 Numerical Results 410 14.7 Conclusion 414 Acknowledgements 414 References 414 15 CMOS RF Transceiver Considerations for DSA 417 Mark S. Oude Alink, Eric A.M. Klumperink, Andre B.J. Kokkeler, Gerard J.M. Smit and Bram Nauta 15.1 Introduction 417 15.1.1 Terminology 418 15.1.2 Transceivers for DSA: More than an ADC and DAC 420 15.1.3 Flexible Software-Defined Transceiver 421 15.1.4 Why CMOS Transceivers? 421 15.2 DSATransceiver Requirements 421 15.3 Mathematical Abstraction 423 15.4 Filters 426 15.4.1 Integrated Filters 426 15.4.2 External Filters 427 15.5 Receiver Considerations and Implementation 428 15.5.1 Sub-Sampling Receiver 429 15.5.2 Heterodyne Receivers 430 15.5.3 Direct-Conversion Receivers 432 15.6 Cognitive Radio Receivers 436 15.6.1 Wideband RF-Section 436 15.6.2 No External RF-Filterbank 437 15.6.3 Wideband Frequency Generation 447 15.7 Transmitter Considerations and Implementation 449 15.8 Cognitive Radio Transmitters 451 15.8.1 Improving Transmitter Linearity 451 15.8.2 Reducing Harmonic Components 452 15.8.3 The Polyphase Multipath Technique 453 15.9 Spectrum Sensing 456 15.9.1 Analogue Windowing 458 15.9.2 Channelized Receiver 459 15.9.3 Crosscorrelation Spectrum Sensing 459 15.9.4 Improved Image and Harmonic Rejection Using Crosscorrelation 461 15.10 Summary and Conclusions 462 References 462 Index 465

    10 in stock

    £117.75

  • Autonomous Learning Systems

    John Wiley & Sons Inc Autonomous Learning Systems

    Out of stock

    Book SynopsisAutonomous Learning Systems is the result of over a decade of focused research and studies in this emerging area which spans a number of well-known and well-established disciplines that include machine learning, system identification, data mining, fuzzy logic, neural networks, neuro-fuzzy systems, control theory and pattern recognition. The evolution of these systems has been both industry-driven with an increasing demand from sectors such as defence and security, aerospace and advanced process industries, bio-medicine and intelligent transportation, as well as research-driven there is a strong trend of innovation of all of the above well-established research disciplines that is linked to their on-line and real-time application; their adaptability and flexibility. Providing an introduction to the key technologies, detailed technical explanations of the methodology, and an illustration of the practical relevance of the approach with a wide range of applications, this bTrade Review“Overall, this book presents a valuable framework for further investigation and development for researchers and software developers. Summing Up: Recommended. Graduate students and above.” (Choice, 1 October 2013)Table of ContentsForewords xi Preface xix About the Author xxiii 1 Introduction 1 1.1 Autonomous Systems 3 1.2 The Role of Machine Learning in Autonomous Systems 4 1.3 System Identification – an Abstract Model of the Real World 6 1.4 Online versus Offline Identification 9 1.5 Adaptive and Evolving Systems 10 1.6 Evolving or Evolutionary Systems 11 1.7 Supervised versus Unsupervised Learning 13 1.8 Structure of the Book 14 PART I FUNDAMENTALS 2 Fundamentals of Probability Theory 19 2.1 Randomness and Determinism 20 2.2 Frequentistic versus Belief-Based Approach 22 2.3 Probability Densities and Moments 23 2.4 Density Estimation – Kernel-Based Approach 26 2.5 Recursive Density Estimation (RDE) 28 2.6 Detecting Novelties/Anomalies/Outliers using RDE 32 2.7 Conclusions 36 3 Fundamentals of Machine Learning and Pattern Recognition 37 3.1 Preprocessing 37 3.2 Clustering 42 3.3 Classification 56 3.4 Conclusions 58 4 Fundamentals of Fuzzy Systems Theory 61 4.1 Fuzzy Sets 61 4.2 Fuzzy Systems, Fuzzy Rules 64 4.3 Fuzzy Systems with Nonparametric Antecedents (AnYa) 69 4.4 FRB (Offline) Classifiers 73 4.5 Neurofuzzy Systems 75 4.6 State Space Perspective 79 4.7 Conclusions 81 PART II METHODOLOGY OF AUTONOMOUS LEARNING SYSTEMS 5 Evolving System Structure from Streaming Data 85 5.1 Defining System Structure Based on Prior Knowledge 85 5.2 Data Space Partitioning 86 5.3 Normalisation and Standardisation of Streaming Data in an Evolving Environment 96 5.4 Autonomous Monitoring of the Structure Quality 98 5.5 Short- and Long-Term Focal Points and Submodels 104 5.6 Simplification and Interpretability Issues 105 5.7 Conclusions 107 6 Autonomous Learning Parameters of the Local Submodels 109 6.1 Learning Parameters of Local Submodels 110 6.2 Global versus Local Learning 111 6.3 Evolving Systems Structure Recursively 113 6.4 Learning Modes 116 6.5 Robustness to Outliers in Autonomous Learning 118 6.6 Conclusions 118 7 Autonomous Predictors, Estimators, Filters, Inferential Sensors 121 7.1 Predictors, Estimators, Filters – Problem Formulation 121 7.2 Nonlinear Regression 123 7.3 Time Series 124 7.4 Autonomous Learning Sensors 125 7.5 Conclusions 131 8 Autonomous Learning Classifiers 133 8.1 Classifying Data Streams 133 8.2 Why Adapt the Classifier Structure? 134 8.3 Architecture of Autonomous Classifiers of the Family AutoClassify 135 8.4 Learning AutoClassify from Streaming Data 139 8.5 Analysis of AutoClassify 140 8.6 Conclusions 140 9 Autonomous Learning Controllers 143 9.1 Indirect Adaptive Control Scheme 144 9.2 Evolving Inverse Plant Model from Online Streaming Data 145 9.3 Evolving Fuzzy Controller Structure from Online Streaming Data 147 9.4 Examples of Using AutoControl 148 9.5 Conclusions 153 10 Collaborative Autonomous Learning Systems 155 10.1 Distributed Intelligence Scenarios 155 10.2 Autonomous Collaborative Learning 157 10.3 Collaborative Autonomous Clustering, AutoCluster by a Team of ALSs 158 10.4 Collaborative Autonomous Predictors, Estimators, Filters and AutoSense by a Team of ALSs 159 10.5 Collaborative Autonomous Classifiers AutoClassify by a Team of ALSs 160 10.6 Superposition of Local Submodels 161 10.7 Conclusions 161 PART III APPLICATIONS OF ALS 11 Autonomous Learning Sensors for Chemical and Petrochemical Industries 165 11.1 Case Study 1: Quality of the Products in an Oil Refinery 165 11.2 Case Study 2: Polypropylene Manufacturing 172 11.3 Conclusions 178 12 Autonomous Learning Systems in Mobile Robotics 179 12.1 The Mobile Robot Pioneer 3DX 179 12.2 Autonomous Classifier for Landmark Recognition 180 12.3 Autonomous Leader Follower 193 12.4 Results Analysis 196 13 Autonomous Novelty Detection and Object Tracking in Video Streams 197 13.1 Problem Definition 197 13.2 Background Subtraction and KDE for Detecting Visual Novelties 198 13.3 Detecting Visual Novelties with the RDE Method 203 13.4 Object Identification in Image Frames Using RDE 204 13.5 Real-time Tracking in Video Streams Using ALS 206 13.6 Conclusions 209 14 Modelling Evolving User Behaviour with ALS 211 14.1 User Behaviour as an Evolving Phenomenon 211 14.2 Designing the User Behaviour Profile 212 14.3 Applying AutoClassify0 for Modelling Evolving User Behaviour 215 14.4 Case Studies 216 14.5 Conclusions 221 15 Epilogue 223 15.1 Conclusions 223 15.2 Open Problems 227 15.3 Future Directions 227 APPENDICES Appendix A Mathematical Foundations 231 Appendix B Pseudocode of the Basic Algorithms 235 References 245 Glossary 259 Index 263

    Out of stock

    £100.76

  • Publish  Subscribe Systems

    John Wiley & Sons Inc Publish Subscribe Systems

    10 in stock

    Book SynopsisThis book offers an unified treatment of the problems solved by publish/subscribe, how to design and implement the solutions In this book, the author provides an insight into the publish/subscribe technology including the design, implementation, and evaluation of new systems based on the technology. The book also addresses the basic design patterns and solutions, and discusses their application in practical application scenarios. Furthermore, the author examines current standards and industry best practices as well as recent research proposals in the area. Finally, necessary content matching, filtering, and aggregation algorithms and data structures are extensively covered as well as the mechanisms needed for realizing distributed publish/subscribe across the Internet. Key Features: Addresses the basic design patterns and solutions Covers applications and example cases including; combining Publish/Subscribe with cloud, Twitter, Facebook, moTable of ContentsAbout the Author xiii Notes on Contributors xv Preface xvii 1 Introduction 1 1.1 Overview 1 1.2 Components of a Pub/Sub System 4 1.2.1 Basic System 4 1.2.2 Distribution and Overlay Networks 5 1.2.3 Agreements 6 1.2.4 The Event Loop 7 1.2.5 Basic Properties 7 1.3 A Pub/Sub Service Model 9 1.4 Distributed Pub/Sub 10 1.5 Interfaces and Operations 11 1.6 Pub/Sub Semantics for Targeted Delivery 13 1.7 Communication Techniques 15 1.8 Environments 17 1.9 History 18 1.9.1 Research Systems 19 1.9.2 Standards 22 1.9.3 Internet Technology 23 1.9.4 A Taxonomy 24 1.10 Application Areas 26 1.11 Structure of the Book 27 References 29 2 Networking and Messaging 31 2.1 Networking 31 2.1.1 Overview 31 2.1.2 Sockets, Middleware, and Applications 33 2.1.3 Naming and Addressing 34 2.1.4 Organization 35 2.1.5 Firewalls and NATs 35 2.2 Multicast 36 2.2.1 IP (Network Layer) IP-Multicast 36 2.2.2 Application-Layer Multicast 38 2.3 Reverse Path Forwarding and Routing 38 2.4 Causality and Clocks 39 2.4.1 Causal Ordering and Lamport Clocks 39 2.4.2 Vector Clocks 40 2.4.3 Total Ordering 40 2.4.4 Discussion 41 2.5 Message Passing and RPC/RMI 42 2.5.1 Store and Forward 44 2.5.2 Concurrent Message Processing 44 2.5.3 Semantics and QoS 46 2.6 Web Services 46 2.6.1 Overview 47 2.6.2 Asynchronous Processing 48 2.6.3 The Connector Model 49 2.6.4 Web Service Platform 50 2.6.5 Enterprise Service Bus (ESB) 52 2.6.6 Service Composition 52 2.7 Session Initiation Protocol (SIP) 53 2.7.1 SIP Framework 53 2.7.2 Method Types 54 2.7.3 Establishing a Session 55 2.7.4 Extensions 55 2.8 Summary 56 References 56 3 Overlay Networks and Distributed Hash Tables 59 3.1 Overview 59 3.2 Usage 61 3.3 Consistent Hashing 62 3.4 Geometries 63 3.5 DHTs 64 3.5.1 DHT APIs 65 3.5.2 Chord 65 3.5.3 Pastry 67 3.5.4 Discussion 72 3.6 Gossip Systems 73 3.6.1 Overview 73 3.6.2 View Shuffling 75 3.6.3 Gossip for Pub/Sub 76 3.7 Summary 77 References 77 4 Principles and Patterns 79 4.1 Introduction 79 4.2 General Pub/Sub Model 80 4.2.1 Principles and Characteristics 80 4.2.2 Message Service 82 4.2.3 General Patterns 82 4.2.4 Event Notification Patterns 82 4.3 Architectural Patterns 83 4.4 Design Patterns 85 4.4.1 Structural Patterns 85 4.4.2 Behavioural Patterns 86 4.4.3 Concurrency Patterns 86 4.5 Design Patterns for Pub/Sub 86 4.5.1 Broker 86 4.5.2 Observer 87 4.5.3 Model-View-Control (MVC) 89 4.5.4 Rendezvous Point 91 4.5.5 Handoff with Rendezvous 91 4.5.6 Client-Initiated Connection 92 4.5.7 Other Patterns 93 4.6 Event Notifier Pattern 94 4.6.1 Overview 94 4.6.2 Structure 95 4.6.3 Distributed Event Notifier 97 4.6.4 Design Considerations 98 4.7 Enterprise Integration Patterns 101 4.8 Summary 103 References 103 5 Standards and Products 105 5.1 CORBA Event Service 105 5.2 CORBA Notification Service and Channel Management 106 5.3 OMG Data Distribution Service (DDS) 109 5.3.1 Overview 110 5.3.2 QoS Policies 111 5.3.3 Real-Time Communications 111 5.3.4 Applications 112 5.4 SIP Event Framework 113 5.5 Java Delegation Event Model 114 5.6 Java Distributed Event Model 114 5.7 Java Message Service (JMS) 115 5.7.1 Two Communication Models 116 5.7.2 Message Types and Selection 117 5.7.3 JMS Process 118 5.7.4 Message Delivery 120 5.7.5 Transactions 121 5.7.6 Advanced Issues 121 5.7.7 JMS in Java EE and Implementations 121 5.8 TibCo Rendezvous 122 5.9 COM+ and .NET 123 5.10 Websphere MQ 125 5.10.1 Overview 125 5.10.2 Pub/Sub in WebSphere MQ 126 5.11 Advanced Message Queuing Protocol (AMQP) 127 5.12 MQ Telemetry Transport (MQTT) 129 5.13 Summary 130 References 132 6 Web Technology 133 6.1 REST 133 6.2 AJAX 134 6.3 RSS and Atom 135 6.4 SOAP 137 6.5 XMPP 139 6.6 Constrained Application Protocol (CoAP) 140 6.7 W3C DOM Events 141 6.8 WS-Eventing and WS-Notification 142 6.9 Summary 143 References 143 7 Distributed Publish/Subscribe 145 7.1 Overview 145 7.2 Filtering Content 148 7.3 Routing Function 150 7.4 Topic-Based Routing 153 7.4.1 Mechanisms 154 7.4.2 Channelization Problem 154 7.4.3 Distributed Overlay with Many Topics 155 7.4.4 Dynamic Clustering in Topic-Based Pub/Sub 155 7.4.5 Summary 155 7.5 Filter-Based Routing 155 7.6 Content-Based Routing 157 7.6.1 Addressing Model 158 7.6.2 Propagating Routing Information 159 7.6.3 Routing Behaviour: Subscriptions 160 7.6.4 Routing Behaviour: Advertisements 161 7.6.5 Routing Tables 162 7.6.6 Forwarding 163 7.6.7 Performance Issues 164 7.6.8 A Generalized Broker with Advertisements 164 7.7 Rendezvous-Based Routing 166 7.8 Routing Invariants 167 7.8.1 Configurations 167 7.8.2 Pub/Sub Configurations 168 7.8.3 False Positives and Negatives 169 7.8.4 Weakly Valid Routing Configuration 169 7.8.5 Mobility-Safety 170 7.8.6 Stabilization and Eventual Correctness 170 7.8.7 Soft State 171 7.9 Summary 172 References 174 8 Matching Content Against Constraints 177 8.1 Overview 177 8.2 Matching Techniques 178 8.3 Filter Preliminaries 180 8.4 The Counting Algorithm 181 8.4.1 Overview 182 8.4.2 Algorithms 183 8.5 Matching with Posets 186 8.5.1 Poset Preliminaries 187 8.5.2 SIENA Poset 188 8.5.3 Poset-Derived Forest 191 8.5.4 Matching Events 192 8.6 Tree Matcher 193 8.7 XFilter and YFilter 194 8.8 Bloom Filters 196 8.8.1 Definition 197 8.8.2 Summary Subscriptions 198 8.8.3 Multicast Forwarding 198 8.8.4 Content-Based Forwarding 198 8.8.5 Multi-Level Bloom Filters 200 8.9 Summary 200 References 202 9 Research Solutions 205 9.1 Gryphon 205 9.2 The Cambridge Event Architecture (CEA) 207 9.3 Scalable Internet Event Notification Architecture (SIENA) 208 9.3.1 Event Namespace 209 9.3.2 Routing 209 9.3.3 Forwarding 210 9.3.4 Mobility Support 211 9.3.5 CBCB Routing Scheme 211 9.4 Elvin 213 9.4.1 Clustering 213 9.4.2 Federation 214 9.4.3 Quench 214 9.4.4 Mobile Support 214 9.4.5 Nondestructive Notification Receipt 215 9.5 JEDI 215 9.6 PADRES 217 9.6.1 Modular Design 217 9.6.2 Load Balancing 218 9.6.3 Composite Events 218 9.7 REDS 219 9.8 GREEN 220 9.9 Rebeca 220 9.10 XSIENA and StreamMine 221 9.11 Fuego Event Service 222 9.11.1 Fuego Middleware 222 9.11.2 Event Service 223 9.11.3 Filtering 224 9.11.4 Client-Side API 224 9.11.5 Event Router 224 9.11.6 Data Structures for Content-Based Routing 225 9.12 STEAM 227 9.13 ECho and JECho 227 9.14 DHT-Based Systems 228 9.14.1 Scribe 228 9.14.2 Bayeux and Tapestry 230 9.14.3 Hermes 231 9.14.4 Other Systems 233 9.15 Summary 234 References 235 10 IR-Style Document Dissemination in DHTs 239 10.1 Introduction 239 10.2 Data Model and Problem Statement 240 10.2.1 Data Model 240 10.2.2 Problem Statement and Challenges 241 10.3 STAIRS: Threshold-Based Document Filtering in DHTs 242 10.3.1 Overview of DHT-Based P2P Networks 242 10.3.2 Solution Framework 242 10.3.3 Document Forwarding Algorithm 244 10.4 Recent Progress and Discussion 246 10.4.1 Recent Progress 246 10.4.2 Discussion 247 10.5 Summary 248 References 248 11 Advanced Topics 251 11.1 Security 251 11.1.1 Overview 251 11.1.2 Security Threats 252 11.1.3 Security Issues in Pub/Sub Networks 253 11.1.4 EventGuard 254 11.1.5 QUIP 255 11.1.6 Hermes 255 11.1.7 Encrypting Attributes 257 11.1.8 Privacy 257 11.2 Composite Subscriptions 258 11.3 Filter Merging 260 11.4 Load Balancing 263 11.5 Content-Based Channelization 265 11.6 Reconfiguration 266 11.6.1 Middleware Component Reconfiguration 267 11.6.2 Topology Reconfiguration with Failures and Mobile Brokers 267 11.6.3 Self-Organizing Pub/Sub with Clustering 269 11.7 Mobility Support 270 11.7.1 Generic Pub/Sub Mobility 272 11.7.2 Graph Based Mobility with Optimizations 274 11.8 Congestion Control 277 11.8.1 Rate-Control Using Posets 277 11.8.2 Explicit Signalling 279 11.8.3 Rerouting to Avoid Congestion 279 11.9 Evaluation of Pub/Sub Systems 280 11.10 Summary 282 References 283 12 Applications 287 12.1 Cloud Computing 287 12.1.1 Pub/Sub for Cloud 288 12.1.2 The Windows Azure AppFabric Service Bus 288 12.1.3 Amazon Simple Queue Service (SQS) 291 12.1.4 PubNub 291 12.2 SOA and XML Brokering 292 12.3 Facebook Services 294 12.3.1 Facebook Messages 294 12.3.2 Facebook Chat and Messenger 295 12.4 PubSubHubbub 297 12.5 Complex Event Processing (CEP) 299 12.6 Online Advertisement 301 12.7 Online Multiplayer Games 303 12.8 Apple Push Notification Service (APNS) 303 12.9 Internet of Things 304 12.10 Summary 305 References 306 13 Clean-Slate Datacentric Pub/Sub Networking 309 13.1 Datacentric Communication Model 309 13.1.1 Naming of Data 310 13.1.2 Content Security 312 13.2 CCN 314 13.2.1 CCN Node Operation 314 13.2.2 CCN Transport Model 315 13.2.3 Interest Routing 316 13.3 PSIRP/PURSUIT 317 13.4 Internet Interdomain Structure 318 13.4.1 Policy Routing Problem 320 13.4.2 PURSUIT Global Rendezvous 321 13.5 Summary 323 References 325 14 Conclusions 327 Index 333

    10 in stock

    £78.80

  • Voice Over Lte

    John Wiley & Sons Inc Voice Over Lte

    15 in stock

    Book SynopsisDescribes the technological solutions and standards which will enable the migration of voice and SMS services over to LTE/EPC networks Main drivers for the introduction of Long Term Evolution of UTRAN (LTE) is to provide far better end user experience for mobile broadband services.Trade Review“It provides a good introduction to the technology and is useful for operators who may be deploying VoLTE, product managers responsible for VoLTE products and those who work in implementation and standardization of related technologies.” (Radio Electronics, 1 August 2012)Table of ContentsPreface ix Acknowledgements xi List of Abbreviations xiii 1 Background 1 2 VoLTE Deployment Strategies 5 2.1 Common Networks Everywhere 5 2.2 GSM/WCDMA View 6 2.3 CDMA View 6 3 VoLTE System Architecture 9 3.1 Overview 9 3.2 LTE Radio 10 3.2.1 LTE Radio Background 10 3.2.2 LTE Radio Architecture 11 3.3 Evolved Packet Core 14 3.3.1 What is the Evolved Packet Core? 14 3.3.2 EPC Entities and Functionalities 14 3.3.3 EPS Mobility Management 17 3.3.4 EPS Session Management and QoS 20 3.4 Control 22 3.4.1 What is an IP Multimedia Subsystem? 22 3.4.2 IMS Development History 23 3.4.3 IMS Fundamentals 26 3.4.4 IMS Entities 32 3.4.5 Home Subscriber Server 42 3.4.6 Policy and Charging Rule Function 43 3.5 Summary 44 4 VoLTE Functionality 47 4.1 Overview 47 4.2 Radio Functionalities 47 4.2.1 Bearers and Scheduling 47 4.2.2 Mobility 49 4.2.3 Circuit Switched Fallback Handover 51 4.2.4 Mobility from 2G/3G Back to LTE 54 4.2.5 Power Saving Features 55 4.2.6 Positioning Solutions 56 4.2.7 UE Radio Access Capabilities for VoLTE 57 4.3 EPC Functionalities 58 4.3.1 LTE subscriber identification 59 4.3.2 PDN Connectivity Establishment for the VoLTE User 60 4.3.3 EPS Dedicated Bearer Setup 65 4.4 IMS Identification 65 4.4.1 IP Multimedia Services Identity Module 66 4.4.2 Public User Identity 67 4.4.3 Private User Identity 67 4.4.4 Relationship between Private and Public User Identities 67 4.4.5 Identification of User’s Device 68 4.4.6 Identification of Network Entities 70 4.4.7 Identification of Services (Public Service Identities) 70 4.4.8 Identification Without ISIM 70 4.5 IMS Service Provisioning 71 4.5.1 Enforcement of Allowed Services 72 4.5.2 Service-Triggering Information 73 4.5.3 Selection of AS 75 4.5.4 AS Behaviour 75 4.5.5 Service Provisioning in Action 76 4.6 IMS Multimedia Telephony 79 4.6.1 Introduction 79 4.6.2 Multimedia Communication 80 4.6.3 Supplementary Services 81 5 VoLTE End to End and Signalling 99 5.1 Overview 99 5.2 VoLTE Subscription and Device Configuration 100 5.3 EPS Attach for CSFB/IMS VoIP and Default Bearer Activation 102 5.4 IMS Registration 107 5.4.1 Constructing the REGISTER Request 109 5.4.2 From the UE to the P-CSCF 110 5.4.3 From the P-CSCF to the I-CSCF 110 5.4.4 From the I-CSCF to the S-CSCF 111 5.4.5 S-CSCF Challenges the UE 111 5.4.6 UE’s Response to the Challenge 112 5.4.7 Registration at the S-CSCF 113 5.4.8 The 200 (OK) Response 113 5.4.9 Third-Party Registration to Application Servers 114 5.4.10 Subscription to Registration Event Package 115 5.4.11 Re-Registration and Re-Authentication 115 5.4.12 De-Registration 116 5.4.13 Related Standards 117 5.5 IMS VoIP Session 118 5.5.1 Constructing the INVITE Request 120 5.5.2 Routing 122 5.5.3 Media Negotiation 127 5.5.4 Media Resource Reservation and Policy Control 129 5.5.5 Charging 135 5.5.6 Session Release 141 5.5.7 Related Standards 143 5.6 Voice Continuity 144 5.6.1 PS-PS Intersystem Handover 144 5.6.2 Single Radio Voice Call Continuity 145 5.6.3 Summary 157 5.7 IMS Emergency Session 160 5.7.1 PDN Connection Setup for Emergency Session 160 5.7.2 Emergency Registration 161 5.7.3 Emergency Session 163 5.8 CS Fallback for Evolved Packet System Call Case(s) 164 5.8.1 Architecture of CS Fallback for EPS 166 5.8.2 Description of SGs Interface 168 5.8.3 Idle Mode Signalling Reduction and Use of CS Fallback for EPS 169 5.8.4 Idle Mode versus Active Mode UE with CS Fallback for EPS 172 5.8.5 CS Fallback Attachment 173 5.8.6 Mobile Originating Call Using CSFB 174 5.8.7 Mobile Terminating Call Using CSFB 180 5.8.8 Call Unrelated CSFB Procedures 187 5.8.9 Mobile Terminating Roaming Retry and Forwarding 189 5.8.10 Summary 193 5.9 VoLTE Messaging 194 5.9.1 Native IMS Messaging 194 5.9.2 SMS Interworking 196 5.9.3 Multimedia Messaging Service 214 5.9.4 Unstructured Supplementary Services Data Simulation in IMS 214 5.9.5 Summary 215 6 IMS Centralized Services 217 7 VoLTE Radio Performance 223 7.1 Coverage 223 7.2 Capacity 224 7.3 Latency 226 7.4 Summary 228 8 HSPA Voice over IP 229 References 233 Index 237

    15 in stock

    £72.86

  • Tactical Wireless Communications and Networks

    John Wiley & Sons Inc Tactical Wireless Communications and Networks

    15 in stock

    Book SynopsisProviding a complete description of modern tactical military communications and networks technology, this book systematically compares tactical military communications techniques with their commercial equivalents, pointing out similarities and differences. In particular it examines each layer of the protocol stack and shows how specific tactical and security requirements result in changes from the commercial approach. The author systematically leads readers through this complex topic, firstly providing background on the architectural approach upon which the analysis will be based, and then going into detail on tactical wireless communications and networking technologies and techniques. Structured progressively: for readers needing an overall view; for those looking at the communications aspects (lower layers of the protocol stack); and for users interested in the networking aspects (higher layers of the protocol stack) Presents approachTrade Review“I would like to recommend the book for graduate students, engineers and researchers interested in a general understanding of military wireless network technologies, architectures, and challenges facing future generations of this type of networks.” (IEEE Communications Magazine, 1 July 2014) Table of ContentsAbout the Author xi Foreword xiii Preface xv List of Acronyms xvii Part I Theoretical Basis 1 Introduction 3 1.1 The OSI Model 4 1.2 From Network Layer to IP Layer 6 1.3 Pitfall of the OSI Model 7 1.4 Tactical Networks Layers 9 1.5 Historical Perspective 10 Bibliography 11 2 The Physical Layer 13 2.1 Modulation 13 2.1.1 Signal-in-Space (SiS) 16 2.2 Signal Detection 22 2.2.1 Signal Detection in Two-Dimensional Space 24 2.2.2 Multidimensional Constellations for AWGN 28 2.3 Non-Coherent Demodulation 29 2.4 Signal Fading 29 2.5 Power Spectrum 31 2.6 Spread Spectrum Modulation 34 2.6.1 Direct Sequence Spread Spectrum 35 2.6.2 Frequency Hopping Spread Spectrum 38 2.7 Concluding Remarks 40 2.7.1 What Happens Before Modulation and After Demodulation? 40 2.7.2 Historical Perspective 40 Bibliography 41 3 The DLL and Information Theory in Tactical Networks 43 3.1 Information Theory and Channel Capacity 43 3.1.1 Uncertainty and Information 45 3.1.2 Entropy 46 3.1.3 Coding for a Discrete Memoryless Source 48 3.1.4 Mutual Information and Discrete Channels 50 3.1.5 The Binary Symmetric Channel (BSC) Model 53 3.1.6 Capacity of a Discrete Channel 54 3.2 Channel Coding, Error Detection, and Error Correction 57 3.2.1 Hamming Distance and Probability of Bit Error in Channel Coding 58 3.2.2 Overview of Linear Block Codes 60 3.2.3 Convolutional Codes 62 3.2.4 Concatenated Coding and Interleaving 64 3.2.5 Network Coding versus Transport Layer Packet Erasure Coding 65 3.3 Concluding Remarks 67 3.3.1 The Role of Information Theory and Coding in Tactical Wireless Communications and Networking 67 3.3.2 Historical Perspective 68 Appendix 3.A: Using RS Code in Tactical Networks Transport Layer 69 3.A.1 The Utilized RS Code 69 3.A.2 Packet Erasure Analysis 70 3.A.3 Imposed Tactical Requirements 77 Bibliography 80 4 MAC and Network Layers in Tactical Networks 83 4.1 MAC Layer and Multiple Access Techniques 83 4.2 Queuing Theory 87 4.2.1 Statistical Multiplexing of Packets 87 4.2.2 Queuing Models 92 4.3 Concluding Remarks 106 4.3.1 How Congestion Happens in Tactical Wireless Networks 106 4.3.2 Historical Perspective 107 4.3.3 Remarks Regarding the First Part of the Book 108 Bibliography 110 Part II The Evolution Of Tactical Radios 5 Non-IP Tactical Radios and the Move toward IP 113 5.1 Multistep Evolution to the Global Information Grid 113 5.2 Link-16 Waveform 114 5.2.1 Link-16 Messages 119 5.2.2 Link Layer Operations of Link-16 120 5.2.3 JTIDS/LINK-16 Modulation and Coding 120 5.2.4 Enhancements to Link-16 126 5.2.5 Concluding Remarks on Link-16 Waveform 129 5.3 EPLRS Waveform 130 5.4 SINCGARS Waveform 131 5.5 Tactical Internet (TI) 131 5.6 IP Gateways 136 5.6.1 Throughput Efficiency 136 5.6.2 End-to-End Packet Loss 137 5.7 Concluding Remarks 137 5.7.1 What Comes after the GIG? 137 5.7.2 Historical Perspective 137 Bibliography 138 6 IP-Based Tactical Waveforms and the GIG 141 6.1 Tactical GIG Notional Architecture 141 6.2 Tactical GIG Waveforms 144 6.2.1 Wide-Area Network Waveform (WNW) 144 6.2.2 Soldier Radio Waveform (SRW) 163 6.2.3 High-Band Networking Waveform (HNW) 164 6.2.4 Network Centric Waveform (NCW) 165 6.3 The Role of Commercial Satellite in the Tactical GIG 166 6.4 Satellite Delay Analysis 166 6.5 Networking at the Tactical GIG 169 6.6 Historical Perspective 170 Bibliography 173 7 Cognitive Radios 177 7.1 Cognitive Radios and Spectrum Regulations 177 7.2 Conceptualizing Cognitive Radios 180 7.2.1 Cognitive Radio Setting (CRS) Parameters 180 7.2.2 The Cognitive Engine 181 7.3 Cognitive Radios in Tactical Environments 183 7.4 Software Communications Architecture (SCA) 184 7.4.1 The SCA Core Framework 185 7.4.2 SCA Definitions 185 7.4.3 SCA Components 186 7.4.4 SCA and Security Architecture 188 7.5 Spectrum Sensing 190 7.5.1 Multidimensional Spectrum Awareness 190 7.5.2 Complexity of Spectrum Sensing 193 7.5.3 Implementation of Spectrum Sensing 195 7.5.4 Cooperative Spectrum Sensing 199 7.5.5 Spectrum Sensing in Current Wireless Standards 200 7.6 Security in Cognitive Radios 201 7.7 Concluding Remarks 201 7.7.1 Development of Cognitive Radios 201 7.7.2 Modeling and Simulation of Cognitive Radios 202 7.7.3 Historical Perspective 202 Bibliography 202 Part III The Open Architecture Model 8 Open Architecture in Tactical Networks 207 8.1 Commercial Cellular Wireless Open Architecture Model 208 8.2 Tactical Wireless Open Architecture Model 210 8.3 Open Architecture Tactical Protocol Stack Model 211 8.3.1 Tactical Wireless Open Architecture Model Entities 213 8.3.2 Open Architecture Tactical Wireless Model ICDs 216 8.4 The Tactical Edge 219 8.4.1 Tactical Edge Definition 219 8.4.2 Tactical Edge Analysis 220 8.5 Historical Perspective 222 Bibliography 224 9 Open Architecture Details 225 9.1 The Plain Text IP Layer and the Tactical Edge 225 9.2 Measurement Based Resource Management 227 9.2.1 Advantages and Challenges of MBRM 228 9.2.2 Congestion Severity Level 229 9.2.3 Markov Chain Representation of MBAC 231 9.2.4 Regulating the Flow of Traffic between Two Nodes 233 9.2.5 Regulating the Flow of Traffic for Multiple Nodes 233 9.2.6 Packet Loss from the Physical Layer 234 9.3 ICD I: Plain Text IP Layer to HAIPE 238 9.4 ICD V: Plain Text IP Layer Peer-to-Peer 239 9.4.1 TCP Proxy over HAIPE 239 9.4.2 VoIP Proxy over HAIPE 241 9.4.3 Video Proxy over HAIPE 247 9.4.4 RSVP Proxy over HAIPE 248 9.4.5 Multicast Proxy over HAIPE 252 9.5 ICD X Cross Layer Signaling across the HAIPE 255 9.6 Concluding Remarks 258 9.7 Historical Perspective 258 Bibliography 259 10 Bringing Commercial Cellular Capabilities to Tactical Networks 261 10.1 Tactical User Expectations 262 10.2 3G/4G/LTE Technologies within the War Theater 264 10.3 The Tactical Cellular Gateway 265 10.4 Deployment Use Cases 267 10.4.1 Use Case I: Smartphone Tethered to a Soldier Radio Waveform (SRW) Radio 268 10.4.2 Use Case II: 3G/4G/LTE Services on a Dismounted Unit 269 10.4.3 Use Case III: 3G/4G/LTE Access at an Enclave 271 10.5 Concluding Remarks 272 Bibliography 273 11 Network Management Challenges in Tactical Networks 275 11.1 Use of Policy Based Network Management and Gaming Theory in Tactical Networks 275 11.2 Challenges Facing Joint Forces Interoperability 277 11.3 Joint Network Management Architectural Approach 277 11.3.1 Assumptions and Concepts for Operations (ConOps) 279 11.3.2 The Role of Gateway Nodes 281 11.3.3 Abstracting Information 282 11.3.4 Creating Path Information 283 11.3.5 Sequence Diagram 285 11.4 Conflict Resolution for Shared Resources 286 11.4.1 Tactical Network Hierarchy 287 11.4.2 Dynamic Activation of NCW in WNW/NCW-Capable Nodes 287 11.4.3 Interfacing between the WIN-NM and the JWNM for NCW Resources 288 11.4.4 NCW Resource Attributes 289 11.5 Concluding Remarks 290 Bibliography 291 Index 293

    15 in stock

    £81.86

  • Handbook of Power Systems Engineering with Power

    John Wiley & Sons Inc Handbook of Power Systems Engineering with Power

    15 in stock

    Book SynopsisFormerly known as Handbook of Power System Engineering, this second edition provides rigorous revisions to the original treatment of systems analysis together with a substantial new four-chapter section on power electronics applications. Encompassing a whole range of equipment, phenomena, and analytical approaches, this handbook offers a complete overview of power systems and their power electronics applications, and presents a thorough examination of the fundamental principles, combining theories and technologies that are usually treated in separate specialised fields, in a single unified hierarchy. Key features of this new edition: Updates throughout the entire book with new material covering applications to current topics such as brushless generators, speed adjustable pumped storage hydro generation, wind generation, small-hydro generation, solar generation, DC-transmission, SVC, SVG (STATCOM), FACTS, active-filters, UPS and advanced railway traffic appTable of ContentsPREFACE xxi ACKNOWLEDGEMENTS xxiii ABOUT THE AUTHOR xxv INTRODUCTION xxvii 1 OVERHEAD TRANSMISSION LINES AND THEIR CIRCUIT CONSTANTS 1 1.1 Overhead Transmission Lines with LR Constants 1 1.2 Stray Capacitance of Overhead Transmission Lines 10 1.3 Working Inductance and Working Capacitance 18 1.4 Supplement: Proof of Equivalent Radius req () for a Multi-bundled Conductor 25 2 SYMMETRICAL COORDINATE METHOD (SYMMETRICAL COMPONENTS) 29 2.1 Fundamental Concept of Symmetrical Components 29 2.2 Definition of Symmetrical Components 31 2.3 Conversion of Three-phase Circuit into Symmetrical Coordinated Circuit 34 2.4 Transmission Lines by Symmetrical Components 36 2.5 Typical Transmission Line Constants 46 2.6 Generator by Symmetrical Components (Easy Description) 49 2.7 Description of Three-phase Load Circuit by Symmetrical Components 52 3 FAULT ANALYSIS BY SYMMETRICAL COMPONENTS 53 3.1 Fundamental Concept of Symmetrical Coordinate Method 53 3.2 Line-to-ground Fault (Phase a to Ground Fault: 1fG) 54 3.3 Fault Analysis at Various Fault Modes 59 3.4 Conductor Opening 59 4 FAULT ANALYSIS OF PARALLEL CIRCUIT LINES (INCLUDING SIMULTANEOUS DOUBLE CIRCUIT FAULT) 69 4.1 Two-phase Circuit and its Symmetrical Coordinate Method 69 4.2 Double Circuit Line by Two-phase Symmetrical Transformation 73 4.3 Fault Analysis of Double Circuit Line (General Process) 77 4.4 Single Circuit Fault on the Double Circuit Line 80 4.5 Double Circuit Fault at Single Point f 81 4.6 Simultaneous Double Circuit Faults at Different Points f, F on the Same Line 85 5 PER UNIT METHOD AND INTRODUCTION OF TRANSFORMER CIRCUIT 91 5.1 Fundamental Concept of the PU Method 91 5.2 PU Method for Three-phase Circuits 97 5.3 Three-phase Three-winding Transformer, its Symmetrical Components Equations, and the Equivalent Circuit 99 5.4 Base Quantity Modification of Unitized Impedance 110 5.5 Autotransformer 111 5.6 Numerical Example to Find the Unitized Symmetrical Equivalent Circuit 112 5.7 Supplement: Transformation from Equation 5.18 to Equation 5.19 122 6 THE ab0 COORDINATE METHOD (CLARKE COMPONENTS) AND ITS APPLICATION 127 6.1 Definition of ab0 Coordinate Method (ab0 Components) 127 6.2 Interrelation Between ab0 Components and Symmetrical Components 130 6.3 Circuit Equation and Impedance by the ab0 Coordinate Method 134 6.4 Three-phase Circuit in ab0 Components 134 6.5 Fault Analysis by ab0 Components 139 7 SYMMETRICAL AND ab0 COMPONENTS AS ANALYTICAL TOOLS FOR TRANSIENT PHENOMENA 145 7.1 The Symbolic Method and its Application to Transient Phenomena 145 7.2 Transient Analysis by Symmetrical and ab0 Components 147 7.3 Comparison of Transient Analysis by Symmetrical and ab0 Components 150 8 NEUTRAL GROUNDING METHODS 153 8.1 Comparison of Neutral Grounding Methods 153 8.2 Overvoltages on the Unfaulted Phases Caused by a Line-to-ground fault 158 8.3 Arc-suppression Coil (Petersen Coil) Neutral Grounded Method 159 8.4 Possibility of Voltage Resonance 160 9 VISUAL VECTOR DIAGRAMS OF VOLTAGES AND CURRENTS UNDER FAULT CONDITIONS 169 9.1 Three-phase Fault: 3fS, 3fG (Solidly Neutral Grounding System, High-resistive Neutral Grounding System) 169 9.2 Phase b–c Fault: 2fS (for Solidly Neutral Grounding System, High-resistive Neutral Grounding System) 170 9.3 Phase a to Ground Fault: 1fG (Solidly Neutral Grounding System) 173 9.4 Double Line-to-ground (Phases b and c) Fault: 2fG (Solidly Neutral Grounding System) 175 9.5 Phase a Line-to-ground Fault: 1fG (High-resistive Neutral Grounding System) 178 9.6 Double Line-to-ground (Phases b and c) Fault: 2fG (High-resistive Neutral Grounding System) 180 10 THEORY OF GENERATORS 183 10.1 Mathematical Description of a Synchronous Generator 183 10.2 Introduction of d–q–0 Method (d–q–0 Components) 191 10.3 Transformation of Generator Equations from a–b–c to d–q–0 Domain 195 10.4 Generator Operating Characteristics and its Vector Diagrams on d- and q-axes Plane 208 10.5 Transient Phenomena and the Generator’s Transient Reactances 211 10.6 Symmetrical Equivalent Circuits of Generators 213 10.7 Laplace-transformed Generator Equations and the Time Constants 220 10.8 Measuring of Generator Reactances 224 10.9 Relations Between the d–q–0 and a–b–0 Domains 228 10.10 Detailed Calculation of Generator Short-circuit Transient Current under Load Operation 228 10.11 Supplement 234 11 APPARENT POWER AND ITS EXPRESSION IN THE 0–1–2 AND d–q–0 DOMAINS 241 11.1 Apparent Power and its Symbolic Expression for Arbitrary Waveform Voltages and Currents 241 11.2 Apparent Power of a Three-phase Circuit in the 0–1–2 Domain 243 11.3 Apparent Power in the d–q–0 Domain 246 12 GENERATING POWER AND STEADY-STATE STABILITY 251 12.1 Generating Power and the P–d and Q–d Curves 251 12.2 Power Transfer Limit between a Generator and a Power System Network 254 12.3 Supplement: Derivation of Equation 12.17 from Equations 12.15st and 12.16 261 13 THE GENERATOR AS ROTATING MACHINERY 263 13.1 Mechanical (Kinetic) Power and Generating (Electrical) Power 263 13.2 Kinetic Equation of the Generator 265 13.3 Mechanism of Power Conversion from Rotor Mechanical Power to Stator Electrical Power 268 13.4 Speed Governors, the Rotating Speed Control Equipment for Generators 274 14 TRANSIENT/DYNAMIC STABILITY, P–Q–V CHARACTERISTICS AND VOLTAGE STABILITY OF A POWER SYSTEM 281 14.1 Steady-state Stability, Transient Stability, Dynamic Stability 281 14.2 Mechanical Acceleration Equation for the Two-generator System and Disturbance Response 282 14.3 Transient Stability and Dynamic Stability (Case Study) 284 14.4 Four-terminal Circuit and the Pd Curve under Fault Conditions and Operational Reactance 286 14.5 PQV Characteristics and Voltage Stability (Voltage Instability Phenomena) 290 14.6 Supplement 1: Derivation of DV/DP, DV/DQ Sensitivity Equation (Equation 14.20 from Equation 14.19) 298 14.7 Supplement 2: Derivation of Power Circle Diagram Equation (Equation 14.31 from Equation 14.18 s) 299 15 GENERATOR CHARACTERISTICS WITH AVR AND STABLE OPERATION LIMIT 301 15.1 Theory of AVR, and Transfer Function of Generator System with AVR 301 15.2 Duties of AVR and Transfer Function of Generator + AVR 305 15.3 Response Characteristics of Total System and Generator Operational Limit 308 15.4 Transmission Line Charging by Generator with AVR 312 15.5 Supplement 1: Derivation of ed (s), eq(s) as Function of ef (s) (Equation 15.9 from Equations 15.7 and 15.8) 313 15.6 Supplement 2: Derivation of eG(s) as Function of ef (s) (Equation 15.10 from Equations 15.8 and 15.9) 314 16 OPERATING CHARACTERISTICS AND THE CAPABILITY LIMITS OF GENERATORS 319 16.1 General Equations of Generators in Terms of p–q Coordinates 319 16.2 Rating Items and the Capability Curve of the Generator 322 16.3 Leading Power-factor (Under-excitation Domain) Operation, and UEL Function by AVR 328 16.4 V–Q (Voltage and Reactive Power) Control by AVR 334 16.5 Thermal Generators’ Weak Points (Negative-sequence Current, Higher Harmonic Current, Shaft-torsional Distortion) 337 16.6 General Description of Modern Thermal/Nuclear TG Unit 346 16.7 Supplement: Derivation of Equation 16.14 from Equation 16.9 351 17 R–X COORDINATES AND THE THEORY OF DIRECTIONAL DISTANCE RELAYS 353 17.1 Protective Relays, Their Mission and Classification 353 17.2 Principle of Directional Distance Relays and R–X Coordinates Plane 355 17.3 Impedance Locus in R–X Coordinates in Case of a Fault (under No-load Condition) 358 17.4 Impedance Locus under Normal States and Step-out Condition 365 17.5 Impedance Locus under Faults with Load Flow Conditions 370 17.6 Loss of Excitation Detection by DZ-Relays 371 17.7 Supplement 1: The Drawing Method for the Locus () of Equation 17.22 372 17.8 Supplement 2: The Drawing Method for () of Equation 17.24 374 18 TRAVELLING-WAVE (SURGE) PHENOMENA 379 18.1 Theory of Travelling-wave Phenomena along Transmission Lines (Distributed-constants Circuit) 379 18.2 Approximation of Distributed-constants Circuit and Accuracy of Concentrated-constants Circuit 390 18.3 Behaviour of Travelling Wave at a Transition Point 391 18.4 Surge Overvoltages and their Three Different and Confusing Notations 395 18.5 Behaviour of Travelling Waves at a Lightning-strike Point 396 18.6 Travelling-wave Phenomena of Three-phase Transmission Line 398 18.7 Line-to-ground and Line-to-line Travelling Waves 400 18.8 The Reflection Lattice and Transient Behaviour Modes 402 18.9 Supplement 1: General Solution Equation 18.10 for Differential Equation 18.9 405 18.10 Supplement 2: Derivation of Equation 18.19 from Equation 18.18 407 19 SWITCHING SURGE PHENOMENA BY CIRCUIT-BREAKERS AND LINE SWITCHES 411 19.1 Transient Calculation of a Single-Phase Circuit by Breaker Opening 411 19.2 Calculation of Transient Recovery Voltages Across a Breaker's Three Poles by 3fS Fault Tripping 420 19.3 Fundamental Concepts of High-voltage Circuit-breakers 430 19.4 Current Tripping by Circuit-breakers: Actual Phenomena 434 19.5 Overvoltages Caused by Breaker Closing (Close-switching Surge) 444 19.6 Resistive Tripping and Resistive Closing by Circuit-breakers 447 19.7 Switching Surge Caused by Line Switches (Disconnecting Switches) 453 19.8 Supplement 1: Calculation of the Coefficients k1k4 of Equation 19.6 455 19.9 Supplement 2: Calculation of the Coefficients k1k6 of Equation 19.17 455 20 OVERVOLTAGE PHENOMENA 459 20.1 Classification of Overvoltage Phenomena 459 20.2 Fundamental (Power) Frequency Overvoltages (Non-resonant Phenomena) 459 20.3 Lower Frequency Harmonic Resonant Overvoltages 463 20.4 Switching Surges 467 20.5 Overvoltage Phenomena by Lightning Strikes 469 21 INSULATION COORDINATION 475 21.1 Overvoltages as Insulation Stresses 475 21.2 Fundamental Concept of Insulation Coordination 481 21.3 Countermeasures on Transmission Lines to Reduce Overvoltages and Flashover 483 21.4 Overvoltage Protection at Substations 488 21.5 Insulation Coordination Details 500 21.6 Transfer Surge Voltages Through the Transformer, and Generator Protection 511 21.7 Internal High-frequency Voltage Oscillation of Transformers Caused by Incident Surge 520 21.8 Oil-filled Transformers Versus Gas-filled Transformers 526 21.9 Supplement: Proof that Equation 21.21 is the Solution of Equation 21.20 529 22 WAVEFORM DISTORTION AND LOWER ORDER HARMONIC RESONANCE 531 22.1 Causes and Influences of Waveform Distortion 531 22.2 Fault Current Waveform Distortion Caused on Cable Lines 534 23 POWER CABLES AND POWER CABLE CIRCUITS 541 23.1 Power Cables and Their General Features 541 23.2 Distinguishing Features of Power Cable 545 23.3 Circuit Constants of Power Cables 550 23.4 Metallic Sheath and Outer Covering 557 23.5 Cross-bonding Metallic-shielding Method 559 23.6 Surge Voltages: Phenomena Travelling Through a Power Cable 563 23.7 Surge Voltages Phenomena on Cable and Overhead Line Jointing Terminal 566 23.8 Surge Voltages at Cable End Terminal Connected to GIS 568 24 APPROACHES FOR SPECIAL CIRCUITS 573 24.1 On-load Tap-changing Transformer (LTC Transformer) 573 24.2 Phase-shifting Transformer 575 24.3 Woodbridge Transformer and Scott Transformer 579 24.4 Neutral Grounding Transformer 583 24.5 Mis-connection of Three-phase Orders 585 25 THEORY OF INDUCTION GENERATORS AND MOTORS 591 25.1 Introduction of Induction Motors and Their Driving Control 591 25.2 Theory of Three-phase Induction Machines (IM) with Wye-connected Rotor Windings 592 25.3 Squirrel-cage Type Induction Motors 612 25.4 Supplement 1: Calculation of Equations (25.17), (25.18), and (25.19) 627 26 POWER ELECTRONIC DEVICES AND THE FUNDAMENTAL CONCEPT OF SWITCHING 629 26.1 Power Electronics and the Fundamental Concept 629 26.2 Power Switching by Power Devices 630 26.3 Snubber Circuit 633 26.4 Voltage Conversion by Switching 635 26.5 Power Electronic Devices 635 26.6 Mathematical Backgrounds for Power Electronic Application Analysis 643 27 POWER ELECTRONIC CONVERTERS 651 27.1 AC to DC Conversion: Rectifier by a Diode 651 27.2 AC to DC Controlled Conversion: Rectifier by Thyristors 661 27.3 DC to DC Converters (DC to DC Choppers) 671 27.4 DC to AC Inverters 680 27.5 PWM (Pulse Width Modulation) Control of Inverters 687 27.6 AC to AC Converter (Cycloconverter) 691 27.7 Supplement: Transformer Core Flux Saturation (Flux Bias Caused by DC Biased Current Component) 692 28 POWER ELECTRONICS APPLICATIONS IN UTILITY POWER SYSTEMS AND SOME INDUSTRIES 695 28.1 Introduction 695 28.2 Motor Drive Application 695 28.3 Generator Excitation System 704 28.4 (Double-fed) Adjustable Speed Pumped Storage Generator-motor Unit 706 28.5 Wind Generation 710 28.6 Small Hydro Generation 715 28.7 Solar Generation (Photovoltaic Generation) 716 28.8 Static Var Compensators (SVC: Thyristor Based External Commutated Scheme) 717 28.9 Active Filters 726 28.10 High-Voltage DC Transmission (HVDC Transmission) 734 28.11 FACTS (Flexible AC Transmission Systems) Technology 736 28.12 Railway Applications 741 28.13 UPSs (Uninterruptible Power Supplies) 745 APPENDIX A – MATHEMATICAL FORMULAE 747 APPENDIX B – MATRIX EQUATION FORMULAE 751 ANALYTICAL METHODS INDEX 757 COMPONENTS INDEX 759 SUBJECT INDEX 763

    15 in stock

    £108.86

  • Next Generation Wireless Communications Using

    John Wiley & Sons Inc Next Generation Wireless Communications Using

    10 in stock

    Book SynopsisTaking a coherent and logical approach, this book describes the potential use of co-ordinated multipoint systems supported by radio over fiber. It covers an impressive breadth of topics, ranging from components, subsystem and system architecture, to network management and business perspectives.Trade Review“The book will be very useful for specialists in optical communications.” (Optics & Photonics News, 3 May 2013) Table of ContentsList of Contributors xiii Foreword xv Preface xvii Acknowledgments xxi List of Abbreviations xxiii 1 Background and Introduction 1 Paulo P. Monteiro, Atýlio Gameiro and Nathan J. Gomes 1.1 The Trends and Challenges to Achieving 4G Wireless 2 1.2 The FUTON Concept for Next-Generation Distributed and Heterogeneous Radio Architectures 8 1.3 Overview of this Book 12 2 Trends inWireless Communications 17 Aarne Mammela, Mika Lasanen and Jarno Pinola 2.1 Introduction 17 2.2 Basic Transmission Problems and Solutions 18 2.3 Regulation and Standardization 37 2.4 Conclusions 41 3 System Concepts for the Central Processing of Signals 47 Atýlio Gameiro and Daniel Castanheira 3.1 Introduction 47 3.2 Wireless Trends 48 3.3 Architecture Options 51 3.4 The Global Centralized Architecture 52 3.5 FUTON Scenarios 55 3.6 The Optical Infrastructure 58 3.7 Conclusions 60 4 Introduction to Radio over Fiber 61 Nathan J. Gomes and David Wake 4.1 Introduction 61 4.2 The Concept of a Radio over Fiber System 62 4.3 Categories of Radio over Fiber Systems 64 4.4 Performance of Radio over Fiber Systems 72 4.5 Applications of Radio over Fiber Technology 79 4.6 Conclusions 84 5 Radio over Fiber System Design for Distributed Broadband Wireless Systems 91 David Wake and Nathan J. Gomes 5.1 Introduction 91 5.2 Radio over Fiber Link Design Issues 93 5.3 Example Link Design 97 5.4 Analog or Digital Transmission? 108 5.5 Conclusions 110 6 Optical Network Architectures for the Support of Future Wireless Systems 113 Sýlvia Pato and Jo~ao Pedro 6.1 Introduction 113 6.2 Using PONs to Support Radio over Fiber Services 114 6.3 Candidate Architectures 117 6.4 Power-Loss Budget Analysis 122 6.5 Comparative Economic Analysis 128 6.6 Support of Legacy Systems 130 6.7 Conclusions 131 7 Optical Transmitters for Low-Cost Broadband Transport 133 Guilhem de Valicourt, Romain Brenot, Frederic Van Dijk and Guanghua Duan 7.1 Introduction 133 7.2 Basics of Semiconductor Lasers and Reflective SOAs 133 7.3 Semiconductor Lasers for Radio over Fiber Applications 139 7.4 Reflective Semiconductor Optical Amplifiers 148 7.5 Conclusions 157 8 Algorithms for Coordinated Multipoint Techniques 159 Fabian Diehm, Mohamed Kamoun and Gerhard Fettweis 8.1 Introduction 159 8.2 Basic Ideas about CoMP 160 8.3 CoMP in Cellular Systems: Benefits and Practical Design 163 8.4 Numerical Illustrations of CoMP Concepts 169 8.5 CoMP in the FUTON System Concept 174 8.6 The FUTON Prototype: CoMP with the FUTON RoF Architecture 177 8.7 Conclusions 186 9 Cross-Layer Resource Allocation and Scheduling 191 Ilkka Harjula, Mikko Hiivala, Vinay Uday Prabhu, Dimitris Toumpakaris and Huiling Zhu 9.1 Introduction 191 9.2 Low-Complexity Chunk-Based Resource Allocation for the Downlink 192 9.3 Modified MAC-Aware Per-User Unitary Rate Control Scheme 197 9.4 Channel Estimation Based on Superimposed Pilots 201 9.5 Conclusions 209 10 Compensation of Impairments in the Radio over Fiber Infrastructure 211 Atso Hekkala, Mika Lasanen, Mikko Hiivala, Luis Vieira, Nathan J. Gomes, Vincent Kotzsch and Gerhard Fettweis 10.1 Introduction 211 10.2 Compensation Techniques for RoF Links 212 10.3 RoF Link Model 214 10.4 Distortion Compensation Algorithms and Architectures 222 10.5 Distortion Compensation Analyses, Simulations and Measurements 227 10.6 Impact of Timing Delays in Centralized Distributed Antenna Systems 232 10.7 Conclusions 243 11 Radio over Fiber Network Management 247 Carlos Santiago, Bodhisattwa Gangopadhyay and ArturArsenio 11.1 Introduction 247 11.2 Overview of RoF Management Systems 248 11.3 RoF Manager Architecture 251 11.4 Interoperation of RoF Manager and Middleware 256 11.5 Conclusions 262 12 System-Level Evaluation 265 Ramiro Samano-Robles and Atýlio Gameiro 12.1 Introduction 265 12.2 System-Level Simulation of Wireless Networks and DAS 269 12.3 The FUTON System-Level Simulator 272 12.4 Radio Resource Management Implementation for the DBWS 285 12.5 Results of the Simulation 286 12.6 Conclusions 289 13 Business Evaluation and Perspectives 291 George Agapiou, Vitor Sim~oes Ribeiro, Angela Maria Ferro Venturi, Silmar Freire Palmeira and A. Manuel de Oliveira Duarte 13.1 Introduction 291 13.2 Evolution of Services in Advanced Access Technologies 292 13.3 Business Model Description 293 13.4 Business Plan 294 13.5 Market Characterization 296 13.6 Modeling the Business Plan 297 13.7 Deployment Models 304 13.8 Conclusions 312 14 Summary and Conclusions 313 Paulo P. Monteiro, Atýlio Gameiro and Nathan J. Gomes 14.1 Introduction 313 14.2 Main Achievements of the FUTON Project 313 14.3 Technical Benefits 314 14.4 Business Benefits 315 14.5 Business Vision 315 References 316 Index 317

    10 in stock

    £106.35

  • Service Availability

    John Wiley & Sons Inc Service Availability

    10 in stock

    Book SynopsisOur society increasingly depends on computer-based systems; the number of applications deployed has increased dramatically in recent years and this trend is accelerating. Many of these applications are expected to provide their services continuously. The Service Availability Forum has recognized this need and developed a set of specifications to help software designers and developers to focus on the value added function of applications, leaving the availability management functions for the middleware. A practical and informative reference for the Service Availability Forum specifications, this book gives a cohesive explanation of the founding principles, motivation behind the design of the specifications, and the solutions, usage scenarios and limitations that a final system may have. Avoiding complex mathematical explanations, the book takes a pragmatic approach by discussing issues that are as close as possible to the daily software design/development by practitioners, and yet atTable of ContentsList of Contributors xiii Foreword xv Preface xix Acknowledgments xxv List of Abbreviations xxvii Part I INTRODUCTION TO SERVICE AVAILABILITY 1 Definitions, Concepts, and Principles 3 Francis Tam 1.1 Introduction 3 1.2 Why Service Availability? 4 1.2.1 Dossier on Unavailability of Service 4 1.2.2 Issues and Challenges 5 1.3 Service Availability Fundamentals 6 1.3.1 System, Behavior, and Service 6 1.3.2 Dependable Computing Concepts 8 1.3.3 The Meaning of Availability 10 1.4 Achieving Service Availability 13 1.4.1 Following the Framework of Fault Tolerance 13 1.4.2 Redundancy is a Requisite 14 1.4.3 Dealing with Failures 16 1.4.4 Upgrade Matters 19 1.5 Conclusion 20 2 The Birth of the Service Availability Forum 23 Francis Tam 2.1 Introduction 23 2.2 Technology Environment 23 2.3 Business Environment 24 2.3.1 Ecosystem 25 2.3.2 COTS and Open Systems 26 2.4 The Service Availability Forum Era 27 2.5 Concluding Remarks 28 Part II THE SA FORUM SYSTEM: SERVICES AND FRAMEWORKS 3 Overview of the Service Availability Architecture 33 Dave Penkler 3.1 Introduction 33 3.1.1 Background and Business Context 33 3.1.2 Goals and Requirements 34 3.1.3 Service Availability Architecture Scope and Presentation 36 3.2 HA Concepts Applied 39 3.2.1 To Be or Not to Be High Availability Aware 39 3.2.2 HA Aware Application Perspective 42 3.3 Architecture 43 3.3.1 Basic Architectural Model 43 3.3.2 The AIS Services and Frameworks Architecture 47 3.3.3 Service Dependencies 58 3.4 Open Issues 59 3.4.1 The Optional Features Issue 60 3.4.2 Integrated AIS Service API 60 3.4.3 Common Low Level Communication Facility Interface 60 3.4.4 Common Distributed Process Management Interface 61 3.4.5 System Trace Service 61 3.4.6 Diagnostics Framework 61 3.4.7 Overload Control Framework 61 3.5 Conclusion 62 4 The SA Forum Information Model: The Heart of Control and Monitoring 63 Maria Toeroe 4.1 Introduction 63 4.2 Background 64 4.2.1 Management Models Out There 64 4.2.2 The SA Forum Needs 65 4.3 The SA Forum Information Model 67 4.3.1 Overview of the SA Forum Solution 67 4.3.2 Administrative and Management Aspects 80 4.3.3 Application Information Models 81 4.3.4 Open Issues and Recommendations 81 4.4 Conclusion 83 5 Consistent and High Level Platform View 85 Maria Toeroe 5.1 Introduction 85 5.2 Hardware Platform Interface 86 5.2.1 Background 86 5.2.2 Overview of the Hardware Platform Interface 87 5.2.3 The HPI Model 88 5.2.4 HPI Capability Discovery 93 5.2.5 Error Handling and Administrative Operations 94 5.2.6 Open Issues and Conclusions 95 5.3 Platform Management Service 96 5.3.1 The Conception of PLM 96 5.3.2 Overview of the SA Forum Platform Management 97 5.3.3 The PLM Information Model 98 5.3.4 Tracking of PLM Entities 107 5.3.5 Administrative and Management Aspects 110 5.3.6 Service Interaction 118 5.3.7 Open Issues and Conclusions 120 5.4 Cluster Membership Service 121 5.4.1 Background 121 5.4.2 Overview of the Cluster Membership Service 122 5.4.3 CLM Configuration: The Bootstrap Trap 125 5.4.4 Are You a Member? 126 5.4.5 Administrative and Management Aspects 127 5.4.6 Service Interaction 129 5.4.7 Open Issues 130 5.4.8 Recommendation 131 5.5 Conclusion 131 6 Model Based Availability Management: The Availability Management Framework 133 Maria Toeroe 6.1 Introduction 133 6.2 Background 134 6.2.1 Error Detection and Repair 134 6.2.2 Fault Zones and Error Escalation 135 6.2.3 Separation of Services from Serving Entities 136 6.2.4 Service Provisioning Roles 136 6.2.5 Delicacies of Service State Replication 137 6.3 The Availability Management Framework 138 6.3.1 Overview of the SA Forum Solution 138 6.3.2 Components and Component Service Instances 139 6.3.3 The AMF Information Model 148 6.3.4 Redundancy Models 167 6.3.5 The AMF Administrative Interface 176 6.3.6 Interactions Between AMF and Other AIS Services 187 6.3.7 Open Issues 190 6.3.8 Recommendation 191 6.4 Conclusion 191 7 Communication and Synchronization Utilities 193 Maria Toeroe and Sayandeb Saha 7.1 Introduction 193 7.2 Event Service 194 7.2.1 Background: Event Service Issues, Controversies, and Problems 194 7.2.2 Overview of the SA Forum Event Service 195 7.2.3 Event Service Architecture and Model 196 7.2.4 User Perspective 200 7.2.5 Administrative and Management Aspects 201 7.2.6 Service Interactions 201 7.2.7 Open Issues and Recommendations 202 7.3 Message Service 202 7.3.1 Need for Reliability and Load Distribution 202 7.3.2 Overview of the SA Forum Message Service 203 7.3.3 Message Service Architecture and Model 205 7.3.4 User Perspective 207 7.3.5 Administrative and Management Aspects 210 7.3.6 Service Interaction 210 7.3.7 Open Issues and Recommendations 211 7.4 Checkpoint Service 212 7.4.1 Background: Why Checkpoints 212 7.4.2 Overview of the SA Forum Checkpoint Service 213 7.4.3 Checkpoint Service Model 215 7.4.4 User Perspective 217 7.4.5 Administrative and Management Aspects 220 7.4.6 Service Interaction 221 7.4.7 Open Issues 222 7.4.8 Recommendation 222 7.5 Conclusion 223 7.5.1 Common Issue: Entity Names 223 7.5.2 Conclusion 223 8 Services Needed for System Management 227 Maria Toeroe 8.1 Introduction 227 8.2 Log Service 228 8.2.1 Background: Data, Data, and More Data 228 8.2.2 Overview of the SA Forum Solution 229 8.2.3 The LOG Information Model 231 8.2.4 User Perspective 232 8.2.5 Administrative and Management Aspects 233 8.2.6 Service Interaction 233 8.2.7 Open Issues and Recommendations 235 8.3 Notification Service 236 8.3.1 Background: Issues, Controversies, and Problems 236 8.3.2 Overview of the SA Forum Notification Service 237 8.3.3 User Perspective 239 8.3.4 Correlation of Notifications 241 8.3.5 Administrative and Management Aspects 243 8.3.6 Service Interaction 244 8.3.7 Open Issues and Recommendation 246 8.4 Information Model Management Service 247 8.4.1 Background: Issues, Controversies, and Problems 247 8.4.2 Overview of the SA Forum IMM Solution 249 8.4.3 The Object Manager API 251 8.4.4 The Object Implementer API 255 8.4.5 IMM XML File 258 8.4.6 Administrative and Management Aspects 258 8.4.7 Service Interaction 258 8.4.8 Open Issues 260 8.4.9 Recommendation 261 8.5 Conclusion 262 9 Model-Based Software Management: The Software Management Framework 265 Maria Toeroe 9.1 Introduction 265 9.2 Background 266 9.3 Software Management a la Carte 268 9.3.1 Overview of the SA Forum Solution 268 9.3.2 Entity Types File: Is It Eaten or Drunk by SMF? 271 9.3.3 The Upgrade Campaign and Its Specification 273 9.3.4 Upgrade Campaign Execution Status and Failure Handling 279 9.3.5 Administrative and Management Aspects 285 9.3.6 User Perspective 288 9.3.7 Service Interaction 289 9.3.8 Open Issues 291 9.3.9 Recommendation 292 9.4 Conclusion 294 10 Combining the Services 297 Maria Toeroe 10.1 Introduction 297 10.2 Application Design and Development 297 10.3 Application Platform Design 299 10.4 Operation and Maintenance 301 Part III SA FORUM MIDDLEWARE IN ACTION 11 SA Forum Programming Model and API Conventions 305 Francis Tam 11.1 Introduction 305 11.2 Programming Model 306 11.2.1 AIS Area Service Interfaces 306 11.2.2 Real-Time Support 306 11.2.3 Naming Conventions and Type Definitions 308 11.2.4 Usage Model and Library Life Cycle 309 11.2.5 Tracking 311 11.3 Making Sense of the API Specifications 312 11.3.1 Structure of Service API Specification 314 11.3.2 Administration API 315 11.4 Practical Topics 316 11.4.1 Interacting with POSIX 316 11.4.2 Allocating and Freeing Memory 319 11.4.3 Handling Pointers 319 11.4.4 Finding Out Implementation Limits 320 11.4.5 When an Area Service is Unavailable 321 11.4.6 Backward Compatibility 322 11.5 Concluding Remarks 322 12 SA Forum Java Mappings: Specifications, Usage, and Experience 325 Robert Hyerle and Jens Jensen 12.1 Introduction 325 12.2 Background 325 12.2.1 Early Exploration of Java Mappings in Hewlett–Packard 325 12.2.2 Java in Ericsson 326 12.2.3 The SA Forum Java Mapping Initiative 327 12.3 Understanding the Java Mappings 328 12.3.1 Java Application Integration Architecture 328 12.3.2 Naming 329 12.3.3 Package Structure 330 12.3.4 The Underlying Objects 330 12.3.5 Types 331 12.3.6 Parameters, Exceptions, and Method Signatures 332 12.3.7 Factories, Callbacks, and Life-cycles 333 12.3.8 Callbacks and the Selection Object in Java 334 12.4 Using the Java Mappings 335 12.4.1 Integrating AIS Services with Java Applications 335 12.4.2 Integrating AIS Services with Containerized Java Applications 342 12.4.3 AIS Services in Mixed Language and Mixed Implementation Environments 343 12.5 Going Further 343 12.5.1 The Java Mapping Roadmap 343 12.5.2 Related Java Standards and Other References 344 13 SA Forum Middleware Implementations 347 Mario Angelic and Ulrich Kleber 13.1 Introduction 347 13.1.1 OpenHPI 347 13.1.2 OpenSAF 348 13.2 The OpenHPI Project 348 13.2.1 Overview of the OpenHPI Solution 348 13.2.2 User Perspective 351 13.2.3 OpenHPI Tools 353 13.2.4 Open Issues and Recommendations 354 13.3 The OpenSAF Project 355 13.3.1 Background 355 13.3.2 OpenSAF Architecture 356 13.3.3 SA Forum Compliant Services 360 13.3.4 OpenSAF Infrastructure Services 364 13.3.5 Managing OpenSAF 365 13.3.6 Deploying OpenSAF 367 13.4 Conclusion 368 14 Integration of the VideoLAN Client with OpenSAF: An Example 371 Anik Mishra and Ali Kanso 14.1 Introduction 371 14.2 Going Under the Hood: The VLC Workflow 372 14.3 Integrating VLC with OpenSAF 373 14.3.1 Nonproxied-Non-SA-Aware Integration 374 14.3.2 SA-Aware VLC Integration 379 14.3.3 SA-Aware VLC with Service Continuity 384 14.4 Summary and Conclusion 387 15 Migration Paths for Legacy Applications 391 Mario Angelic 15.1 Introduction 391 15.2 Reasons for Migration 392 15.2.1 Benefits for System Owners 392 15.2.2 Benefits for ISVs 392 15.3 Integration Criteria 393 15.3.1 Main Factors 393 15.3.2 Easy Management 394 15.3.3 Streamlined Architecture 396 15.3.4 Code Quality 397 15.3.5 Integration Levels 397 15.4 How to Migrate 399 15.4.1 Availability Integration 399 15.4.2 Manageability Integration 409 15.5 Open Issues 413 15.6 Conclusion 413 16 Overcoming Complexity: Formal Modeling Techniques at the Rescue 415 Maria Toeroe and Ferhat Khendek 16.1 Introduction 415 16.2 Background 416 16.2.1 The Model-Based Approach 416 16.2.2 Starting Points in the Specifications 417 16.3 Model-Based Software Management 419 16.3.1 Configuration Model 419 16.3.2 Configuration Generation 420 16.3.3 Upgrade Campaign Generation 424 16.3.4 Analytical Models and How They Can Help 427 16.4 Conclusion 428 17 Conclusion 431 17.1 Summary 431 17.2 The Future 433 References 435 Index 443

    10 in stock

    £89.25

  • 3D Visual Communications

    John Wiley & Sons Inc 3D Visual Communications

    10 in stock

    Book SynopsisProvides coverage of the major theories and technologies involved in the lifecycle of 3D video content delivery Presenting the technologies used in end-to-end 3D video communication systems, this reference covers 3D graphics and video coding, content creation and display, and communications and networking.Table of ContentsPreface ix About the Authors xiii 1 Introduction 1 1.1 Why 3D Communications? 1 1.2 End-to-End 3D Visual Ecosystem 3 1.3 3D Visual Communications 10 1.4 Challenges and Opportunities 11 References 15 2 3D Graphics and Rendering 17 2.1 3DTV Content Processing Procedure 19 2.2 3D Scene Representation with Explicit Geometry – Geometry Based Representation 22 2.3 3D Scene Representation without Geometry – Image-Based Representation 43 2.4 3D Scene Representation with Implicit Geometry – Depth-Image-Based Representation 51 References 57 3 3D Display Systems 63 3.1 Depth Cues and Applications to 3D Display 63 3.2 Stereoscopic Display 65 3.3 Autostereoscopic Display 71 3.4 Multi-View System 78 3.5 Recent Advances in Hologram System Study 83 References 84 4 3D Content Creation 85 4.1 3D Scene Modeling and Creation 85 4.2 3D Content Capturing 87 4.3 2D-to-3D Video Conversion 101 4.4 3D Multi-View Generation 125 References 126 5 3D Video Coding and Standards 129 5.1 Fundamentals of Video Coding 129 5.2 Two-View Stereo Video Coding 142 5.3 Frame-Compatible Stereo Coding 144 5.4 Video Plus Depth Coding 148 5.5 Multiple View Coding 156 5.6 Multi-View Video Plus Depth (MVD) Video 160 5.7 Layered Depth Video (LDV) 163 5.8 MPEG-4 BIFS and AFX 165 5.9 Free-View Point Video 166 References 167 6 Communication Networks 171 6.1 IP Networks 171 6.2 Wireless Communications 174 6.3 Wireless Networking 193 6.4 4G Standards and Systems 193 References 203 7 Quality of Experience 205 7.1 3D Artifacts 205 7.2 QoE Measurement 220 7.3 QoE Oriented System Design 247 References 250 8 3D Video over Networks 259 8.1 Transmission-Induced Error 259 8.2 Error Resilience 267 8.3 Error Concealment 270 8.4 Unequal Error Protection 275 8.5 Multiple Description Coding 279 8.6 Cross-Layer Design 282 References 286 9 3D Applications 289 9.1 Glass-Less Two-View Systems 289 9.2 3D Capture and Display Systems 291 9.3 Two-View Gaming Systems 294 9.4 3D Mobile 298 9.5 Augmented Reality 302 References 309 10 Advanced 3D Video Streaming Applications 313 10.1 Rate Control in Adaptive Streaming 313 10.2 Multi-View Video View Switching 321 10.3 Peer-to-Peer 3D Video Streaming 325 10.4 3D Video Broadcasting 328 10.5 3D Video over 4G Networks 329 References 331 Index 335

    10 in stock

    £89.25

  • Physics of Energy Sources

    John Wiley & Sons Inc Physics of Energy Sources

    10 in stock

    Book SynopsisPhysics of Energy Sourcesprovides readers with a balanced presentation of the fundamental physics needed to understand and analyze conventional and renewable energy sources including nuclear, solar, wind and water power. It also presents various ways in which energy can be stored for future use.Table of ContentsEditors’ preface to the Manchester Physics Series xiAuthor’s preface xiii1 Introduction 11.1 Energy consumption 11.2 Energy sources 31.3 Renewable and non-renewable energy sources 51.4 The form and conversion of energy 61.4.1 Thermal energy sources 71.4.2 Mechanical energy sources 71.4.3 Photovoltaic sources 71.4.4 Energy storage 8Problems 1 92 The atomic nucleus 112.1 The composition and properties of nuclei 122.1.1 The composition of nuclei 122.1.2 The size of a nucleus 142.1.3 The distributions of nuclear matter and charge 192.1.4 The mass of a nucleus 212.1.5 The charge of a nucleus 242.1.6 Nuclear binding energy 272.1.7 Binding energy curve of the nuclides 302.1.8 The semi-empirical mass formula 322.2 Nuclear forces and energies 352.2.1 Characteristics of the nuclear force 352.2.2 Nuclear energies 362.2.3 Quantum mechanical description of a particle in a potential well 392.3 Radioactivity and nuclear stability 472.3.1 Segré chart of the stable nuclides 482.3.2 Decay laws of radioactivity 492.3.3 α, β and γ decay 57Problems 2 673 Nuclearpower 713.1 How to get energy from the nucleus 713.2 Nuclear reactions 733.2.1 Nuclear reactions 733.2.2 Q-value of a nuclear reaction 743.2.3 Reaction cross-sections and reaction rates 763.3 Nuclear fission 823.3.1 Liquid-drop model of nuclear fission 833.3.2 Induced nuclear fission 863.3.3 Fission cross-sections 873.3.4 Fission reactions and products 883.3.5 Energy in fission 903.3.6 Moderation of fast neutrons 923.3.7 Uranium enrichment 933.4 Controlled fission reactions 973.4.1 Chain reactions 973.4.2 Control of fission reactions 1013.4.3 Fission reactors 1033.4.4 Commercial nuclear reactors 1053.4.5 Nuclear waste 1073.5 Nuclear fusion 1093.5.1 Fusion reactions 1103.5.2 Energy in fusion 1113.5.3 Coulomb barrier for nuclear fusion 1133.5.4 Fusion reaction rates 1133.5.5 Performance criteria 1153.5.6 Controlled thermonuclear fusion 117Problems 3 1234 Solar power 1274.1 Stellar fusion 1284.1.1 Star formation and evolution 1284.1.2 Thermonuclear fusion in the Sun: the proton–proton cycle 1314.1.3 Solar radiation 1324.2 Blackbody radiation 1344.2.1 Laws of blackbody radiation 1354.2.2 Emissivity 1374.2.3 Birth of the photon 1414.3 Solar radiation and its interaction with the Earth 1454.3.1 Characteristics of solar radiation 1454.3.2 Interaction of solar radiation with Earth and its atmosphere 1474.3.3 Penetration of solar energy into the ground 1554.4 Geothermal energy 1594.4.1 Shallow geothermal energy 1604.4.2 Deep geothermal energy 1614.5 Solar heaters 1624.5.1 Solar water heaters 1624.5.2 Heat transfer processes 1654.5.3 Solar thermal power systems 1724.6 Heat engines: converting heat into work 1744.6.1 Equation of state of an ideal gas 1754.6.2 Internal energy, work and heat: the first law of thermodynamics 1774.6.3 Specific heats of gases 1814.6.4 Isothermal and adiabatic expansion 1834.6.5 Heat engines and the second law of thermodynamics 185Problems 4 1965 Semiconductor solar cells 2015.1 Introduction 2015.2 Semiconductors 2045.2.1 The band structure of crystalline solids 2045.2.2 Intrinsic and extrinsic semiconductors 2085.3 The p–n junction 2145.3.1 The p–n junction in equilibrium 2145.3.2 The biased p–n junction 2175.3.3 The current–voltage characteristic of a p–n junction 2195.3.4 Electron and hole concentrations in a semiconductor 2225.3.5 The Fermi energy in a p–n junction 2275.4 Semiconductor solar cells 2295.4.1 Photon absorption at a p–n junction 2295.4.2 Power generation by a solar cell 2315.4.3 Maximum power delivery from a solar cell 2355.4.4 The Shockley–Queisser limit 2385.4.5 Solar cell construction 2405.4.6 Increasing the efficiency of solar cells and alternative solar cell materials 243Problems 5 2486 Windpower 2516.1 A brief history of wind power 2516.2 Origin and directions of the wind 2536.2.1 The Coriolis force 2536.3 The flow of ideal fluids 2566.3.1 The continuity equation 2576.3.2 Bernoulli’s equation 2586.4 Extraction of wind power by a turbine 2636.4.1 The Betz criterion 2656.4.2 Action of wind turbine blades 2686.5 Wind turbine design and operation 2716.6 Siting of a wind turbine 277Problems 6 2807 Water power 2837.1 Hydroelectric power 2847.1.1 The hydroelectric plant and its principles of operation 2847.1.2 Flow of a viscous fluid in a pipe 2867.1.3 Hydroelectric turbines 2887.2 Wave power 2917.2.1 Wave motion 2927.2.2 Water waves 3067.2.3 Wave energy converters 3197.3 Tidal power 3247.3.1 Origin of the tides 3257.3.2 Variation and enhancement of tidal range 3357.3.3 Harnessing tidal power 341Problems 7 3468 Energy storage 3498.1 Types of energy storage 3508.2 Chemical energy storage 3518.2.1 Biological energy storage 3518.2.2 Hydrogen energy storage 3518.3 Thermal energy storage 3528.4 Mechanical energy storage 3558.4.1 Pumped hydroelectric energy storage 3558.4.2 Compressed air energy storage 3578.4.3 Flywheel energy storage 3618.5 Electrical energy storage 3648.5.1 Capacitors and super-capacitors 3658.5.2 Superconducting magnetic storage 3678.5.3 Rechargeable batteries 3688.5.4 Fuel cells 3708.6 Distribution of electrical power 372Problems 8 374Solutions to problems 377Index 397

    10 in stock

    £139.60

  • LTE and the Evolution to 4G Wireless

    John Wiley & Sons Inc LTE and the Evolution to 4G Wireless

    15 in stock

    Book SynopsisA practical guide to LTE design, test and measurement, this new edition has been updated to include the latest developments This book presents the latest details on LTE from a practical and technical perspective.Table of ContentsChapter 1 LTE Introduction 1Moray Rumney1.1 Introduction 11.2 LTE System Overview 11.3 The Evolution from UMTS to LTE 31.4 LTE/SAE Requirements 41.5 LTE/SAE Timeline 71.6 Introduction to the 3GPP LTE/SAE Specification Documents 81.7 References 10Chapter 2 Air Interface Concepts 112.1 Radio Frequency Aspects 11Moray Rumney2.2 Orthogonal Frequency Division Multiplexing 53Moray Rumney2.3 Single-Carrier Frequency Division Multiple Access 62Moray Rumney2.4 Multi-Antenna Operation and MIMO 67Peter Cain2.5 References 89Chapter 3 Physical Layer 913.1 Introduction to the Physical Layer 913.2 Physical Channels and Modulation 91Mitsuru Yokoyama, Bai Ying3.3 Multiplexing and Channel Coding 111Ryo Yonezawa3.4 Introduction to Physical Layer Signaling 128Mark Stambaugh, Jean-Philippe Gregoire, Peter Goldsack3.5 Physical Layer Procedures 142Peter Goldsack, Dr. Michael Leung, Dr. K. F. Tsang, CityU3.6 Physical Layer Measurements and Radio Resource Management 148Moray Rumney3.7 Summary 1573.8 References 157Chapter 4 Upper Layer Signaling 1594.1 Access Stratum 159Peter Goldsack, Sarabjit Singh, Steve Charlton, Venkata Ratnakar and Darshpreet Sabharwal4.2 Non-Access Stratum 178Sarabjit Singh, Niranjan Das, andPeter Goldsack4.3 References 194Chapter 5 System Architecture Evolution 195Per Kangru, JDSU; Eng Wei Koo, JDSU; Mary Jane Pahls; Sandy Fraser5.1 Requirements for an Evolved Architecture 1955.2 Overview of the Evolved Packet System 1995.3 Quality of Service in EPS 2175.4 Security in the Network 2215.5 Services 2225.6 References 226Chapter 6 Design and Verification Challenges 2296.1 Introduction 229Moray Rumney6.2 Simulation and Early R&D Hardware Testing 232Jinbiao Xu and Greg Jue6.3 Testing RFICs With DigRF Interconnects 285Chris Van Woerkom and Roland Scherzinger6.4 Transmitter Design and Measurement Challenges 296Ben Zarlingo, Moto Itagaki, Craig Grimley and Moray Rumney6.5 Receiver Design and Measurement Challenges 340Randy Becker, Naoya Izuchi and Sandy Fraser6.6 Receiver Performance Testing 356Sandy Fraser, Naoya Izuchi and Randy Becker6.7 Testing Open- and Closed-Loop Behaviors of the Physical Layer 378Peter Cain6.8 Design and Verification Challenges of MIMO 392Peter Cain and Greg Jue6.9 Beamforming 430Craig Grimley6.10 SISO and MIMO Over-the-Air Testing 455Allison Douglas and Moray Rumney6.11 Signaling Protocol Development and Testing 472Ian Reading6.12 UE Functional Testing 480Mike Lawton6.13 Battery Drain Testing 493Moray Rumne and, Ed Brorein6.14 Drive Testing 499Bob Irvine, JDSU6.15 UE Manufacturing Test 509Jeff Dralla, Ken Horn and Moray Rumney6.16 References 526Chapter 7 Conformance and Acceptance Testing 5297.1 Introduction to Conformance Testing 529Moray Rumney7.2 RF Conformance Testing 531Hiroshi Yanagawa, Gim-Seng Lau, Andrea Leonardi and Moray Rumney7.3 UE Signaling Conformance Testing 549Pankaj Gupta, and Moray Rumney7.4 UE Certification Process (GCF and PTCRB) 555Masatoshi Obara, Mike Lawton and Moray Rumney7.5 Operator Acceptance Testing 560Bill McKinley7.6 References 564Chapter 8 Looking Towards 4G: LTE-Advanced 567Moray Rumney8.1 Summary of Release 8 5678.2 Release 9 5688.3 Release 10 and LTE-Advanced 5738.4 Release 11 5878.5 Release 12 5958.6 References 600List of Acronyms 601Index 613

    15 in stock

    £79.16

  • Predictive Control of Power Converters and

    John Wiley & Sons Inc Predictive Control of Power Converters and

    15 in stock

    Book Synopsis* Unique in presenting a completely new theoretic solution to control electric power in a simple way * Discusses the application of predicitive control in motor drives, with several examples and case studies * Matlab is included on a complimentary website so the reader can run their own simulations .Table of ContentsForeword xi Preface xiii Acknowledgments xv Part One INTRODUCTION 1 Introduction 3 1.1 Applications of Power Converters and Drives 3 1.2 Types of Power Converters 5 1.2.1 Generic Drive System 5 1.2.2 Classification of Power Converters 5 1.3 Control of Power Converters and Drives 7 1.3.1 Power Converter Control in the Past 7 1.3.2 Power Converter Control Today 10 1.3.3 Control Requirements and Challenges 11 1.3.4 Digital Control Platforms 12 1.4 Why Predictive Control is Particularly Suited for Power Electronics 13 1.5 Contents of this Book 15 References 16 2 Classical Control Methods for Power Converters and Drives 17 2.1 Classical Current Control Methods 17 2.1.1 Hysteresis Current Control 18 2.1.2 Linear Control with Pulse Width Modulation or Space Vector Modulation 20 2.2 Classical Electrical Drive Control Methods 24 2.2.1 Field Oriented Control 24 2.2.2 Direct Torque Control 26 2.3 Summary 30 References 30 3 Model Predictive Control 31 3.1 Predictive Control Methods for Power Converters and Drives 31 3.2 Basic Principles of Model Predictive Control 32 3.3 Model Predictive Control for Power Electronics and Drives 34 3.3.1 Controller Design 35 3.3.2 Implementation 37 3.3.3 General Control Scheme 38 3.4 Summary 38 References 38 Part Two MODEL PREDICTIVE CONTROL APPLIED TO POWER CONVERTERS 4 Predictive Control of a Three-Phase Inverter 43 4.1 Introduction 43 4.2 Predictive Current Control 43 4.3 Cost Function 44 4.4 Converter Model 44 4.5 Load Model 48 4.6 Discrete-Time Model for Prediction 49 4.7 Working Principle 50 4.8 Implementation of the Predictive Control Strategy 50 4.9 Comparison to a Classical Control Scheme 59 4.10 Summary 63 References 63 5 Predictive Control of a Three-Phase Neutral-Point Clamped Inverter 65 5.1 Introduction 65 5.2 System Model 66 5.3 Linear Current Control Method with Pulse Width Modulation 70 5.4 Predictive Current Control Method 70 5.5 Implementation 72 5.5.1 Reduction of the Switching Frequency 74 5.5.2 Capacitor Voltage Balance 77 5.6 Summary 78 References 79 6 Control of an Active Front-End Rectifier 81 6.1 Introduction 81 6.2 Rectifier Model 84 6.2.1 Space Vector Model 84 6.2.2 Discrete-Time Model 85 6.3 Predictive Current Control in an Active Front-End 86 6.3.1 Cost Function 86 6.4 Predictive Power Control 89 6.4.1 Cost Function and Control Scheme 89 6.5 Predictive Control of an AC–DC–AC Converter 92 6.5.1 Control of the Inverter Side 92 6.5.2 Control of the Rectifier Side 94 6.5.3 Control Scheme 94 6.6 Summary 96 References 97 7 Control of a Matrix Converter 99 7.1 Introduction 99 7.2 System Model 99 7.2.1 Matrix Converter Model 99 7.2.2 Working Principle of the Matrix Converter 101 7.2.3 Commutation of the Switches 102 7.3 Classical Control: The Venturini Method 103 7.4 Predictive Current Control of the Matrix Converter 104 7.4.1 Model of the Matrix Converter for Predictive Control 104 7.4.2 Output Current Control 107 7.4.3 Output Current Control with Minimization of the Input Reactive Power 108 7.4.4 Input Reactive Power Control 113 7.5 Summary 113 References 114 Part Three MODEL PREDICTIVE CONTROL APPLIED TO MOTOR DRIVES 8 Predictive Control of Induction Machines 117 8.1 Introduction 117 8.2 Dynamic Model of an Induction Machine 118 8.3 Field Oriented Control of an Induction Machine Fed by a Matrix Converter Using Predictive Current Control 121 8.3.1 Control Scheme 121 8.4 Predictive Torque Control of an Induction Machine Fed by a Voltage Source Inverter 123 8.5 Predictive Torque Control of an Induction Machine Fed by a Matrix Converter 128 8.5.1 Torque and Flux Control 128 8.5.2 Torque and Flux Control with Minimization of the Input Reactive Power 129 8.6 Summary 130 References 131 9 Predictive Control of Permanent Magnet Synchronous Motors 133 9.1 Introduction 133 9.2 Machine Equations 133 9.3 Field Oriented Control Using Predictive Current Control 135 9.3.1 Discrete-Time Model 136 9.3.2 Control Scheme 136 9.4 Predictive Speed Control 139 9.4.1 Discrete-Time Model 139 9.4.2 Control Scheme 140 9.4.3 Rotor Speed Estimation 141 9.5 Summary 142 References 143 Part Four DESIGN AND IMPLEMENTATION ISSUES OF MODEL PREDICTIVE CONTROL 10 Cost Function Selection 147 10.1 Introduction 147 10.2 Reference Following 147 10.2.1 Some Examples 148 10.3 Actuation Constraints 148 10.3.1 Minimization of the Switching Frequency 150 10.3.2 Minimization of the Switching Losses 152 10.4 Hard Constraints 155 10.5 Spectral Content 157 10.6 Summary 161 References 161 11 Weighting Factor Design 163 11.1 Introduction 163 11.2 Cost Function Classification 164 11.2.1 Cost Functions without Weighting Factors 164 11.2.2 Cost Functions with Secondary Terms 164 11.2.3 Cost Functions with Equally Important Terms 165 11.3 Weighting Factors Adjustment 166 11.3.1 For Cost Functions with Secondary Terms 166 11.3.2 For Cost Functions with Equally Important Terms 167 11.4 Examples 168 11.4.1 Switching Frequency Reduction 168 11.4.2 Common-Mode Voltage Reduction 168 11.4.3 Input Reactive Power Reduction 170 11.4.4 Torque and Flux Control 170 11.4.5 Capacitor Voltage Balancing 174 11.5 Summary 175 References 176 12 Delay Compensation 177 12.1 Introduction 177 12.2 Effect of Delay due to Calculation Time 177 12.3 Delay Compensation Method 180 12.4 Prediction of Future References 181 12.4.1 Calculation of Future References Using Extrapolation 185 12.4.2 Calculation of Future References Using Vector Angle Compensation 185 12.5 Summary 188 References 188 13 Effect of Model Parameter Errors 191 13.1 Introduction 191 13.2 Three-Phase Inverter 191 13.3 Proportional–Integral Controllers with Pulse Width Modulation 192 13.3.1 Control Scheme 192 13.3.2 Effect of Model Parameter Errors 193 13.4 Deadbeat Control with Pulse Width Modulation 194 13.4.1 Control Scheme 194 13.4.2 Effect of Model Parameter Errors 195 13.5 Model Predictive Control 195 13.5.1 Effect of Load Parameter Variation 196 13.6 Comparative Results 197 13.7 Summary 201 References 201 Appendix A Predictive Control Simulation – Three-Phase Inverter 203 A.1 Predictive Current Control of a Three-Phase Inverter 203 A.1.1 Definition of Simulation Parameters 207 A.1.2 MATLAB® Code for Predictive Current Control 208 Appendix B Predictive Control Simulation – Torque Control of an Induction Machine Fed by a Two-Level Voltage Source Inverter 211 B.1 Definition of Predictive Torque Control Simulation Parameters 213 B.2 MATLAB® Code for the Predictive Torque Control Simulation 215 Appendix C Predictive Control Simulation – Matrix Converter 219 C.1 Predictive Current Control of a Direct Matrix Converter 219 C.1.1 Definition of Simulation Parameters 221 C.1.2 MATLAB® Code for Predictive Current Control with Instantaneous Reactive Power Minimization 222 Index 227

    15 in stock

    £89.96

  • Guide to the Iet Wiring Regulations

    John Wiley & Sons Inc Guide to the Iet Wiring Regulations

    15 in stock

    Book SynopsisThis authoritative, best-selling guide has been extensively updated with the new technical requirements of the IET Wiring Regulations 17th Edition. With clear description, it provides a practical interpretation of the amended regulations effective January 2012 and offers real solutions to the problems that can occur in practice.Table of ContentsForeword by Giuliano Digilio xi Preface xiii Acknowledgements xv Chapter A – BS 7671:2008 Amd No. 1:2011 Requirements for Electrical Installations – Introduction and Overview 1 A 1 Introduction to BS 7671:2008 1 A 2 Plan and layout of BS 7671:2008 2 A 3 Overview of major changes 5 A 4 Amendment No. 1:2011 9 Chapter B – Legal Relationship and General Requirements of BS 7671:2008 Amd No. 1:2011 11 B 1 Legal requirements and relationship 11 B 1.1 Key legal UK legislation 11 B 1.2 The Electricity at Work Regulations 1989 (EWR 1989) 12 B 1.3 The Electricity Safety, Quality and Continuity Regulations 2002 (as amended) 13 B 1.4 The Electricity Act 1984 (as amended) 14 B 1.5 The Building Act 1984, The Building Regulations and Part P 14 B 1.6 The Electromagnetic Compatibility Regulations 2006 15 B 1.7 Tort and negligence 15 B 2 The role of Standards 17 B 3 Part 3 of BS 7671:2008 – assessment of general characteristics 18 Chapter C – Circuitry and Related Parts of BS 7671:2008 Amd No. 1:2011 21 C 1 Introduction 21 C 2 Design procedure overview 21 C 3 Load assessment 23 C 3.1 Principles and definitions 23 C 3.2 Maximum demand assessment 24 C 3.3 Diversity 25 C 4 Circuitry design 26 C 4.1 Introduction 26 C 4.2 Protection against overcurrent in general 28 C 4.3 Overload protection 28 C 4.4 Fault protection 40 C 4.5 Voltage drop 44 C 4.6 Disconnection and electric shock protection 49 C 5 Sub-mains 56 C 5.1 Diversity 56 C 5.2 Distribution circuit (sub-main) selection 57 C 5.3 Armouring as a CPC 57 C 5.4 Automatic disconnection for sub-mains 58 C 6 Discrimination co-ordination 58 C 6.1 Principles and system co-ordination 58 C 6.2 Fuse-to-fuse discrimination 59 C 6.3 Circuit breaker to circuit breaker discrimination 60 C 6.4 Circuit breaker to fuse discrimination 62 C 7 Parallel cables 62 C 7.1 General and BS 7671 requirements 62 C 7.2 Unequal current sharing 63 C 8 Harmonics 63 C 8.1 Requirements 63 C 8.2 Harmonic assessment 63 C 9 Standard final circuit designs 64 C 9.1 Introduction and scope 64 C 9.2 Standard domestic circuits 72 C 9.3 All purpose standard final circuits 73 C 10 RcDs and circuitry 73 C 10.1 Introduction – increased use of RcDs 73 C 10.2 consumer unit arrangements for RcDs 74 C 11 Ring and radial final circuits 75 C 11.1 Introduction 75 C 11.2 Ring final circuits 75 C 11.3 Radial final circuits 77 Chapter D – Selection and Erection – Equipment 79 D 1 Introduction and fundamentals 79 D 2 Compliance with Standards 80 D 3 Identification of conductors – introduction 81 D 3.1 Principle of required identification (Regulation 514.3.1) 81 D 3.2 Identification by colour 83 D 3.3 Identification by marking 85 D 3.4 Alterations and additions – identification 85 D 3.5 Interface marking 85 D 3.6 DC identification 86 D 4 Protection against voltage and electromagnetic disturbance 86 D 4.1 General 86 D 4.2 Electromagnetic compatibility and prevention of mutual detrimental influences 88 D 5 Wiring systems 95 D 5.1 The choice of wiring systems 95 D 5.2 Circulating currents and eddy currents in single-core installations 98 D 5.3 Electrical connections and joints 100 D 5.4 Wiring systems – minimizing spread of fire 104 D 5.5 Proximity to other services 106 D 6 Circuit breakers 106 D 6.1 General 106 D 6.2 Operation and characteristics 107 D 6.3 Ambient temperature de-rating 110 D 7 Residual current devices 111 D 7.1 BS 7671 applications 111 D 7.2 Operation and BS 7671 requirements 112 D 7.3 Unwanted RCD tripping and discrimination 113 D 7.4 d.c. issues for RCDs 115 D 7.5 TT installations and RCDs 115 D 8 Other equipment 116 D 8.1 Isolation and switching 116 D 8.2 Consumer units for domestic installations 116 D 8.3 Overvoltage, undervoltage and electromagnetic disturbances 116 D 8.4 Surge protective devices 118 D 8.5 Insulation monitoring devices (IMDs) 118 D 8.6 Residual current monitors (RCMs) 119 D 9 Generating sets 121 D 10 Rotating machines 121 D 11 Plugs and socket-outlets 122 D 12 Electrode water heaters and electrode boilers 123 D 13 Heating conductors 124 D 14 Lighting and luminaires 124 D 15 Safety services 127 D 15.1 Introduction 127 D 15.2 Classification of break times 127 D 15.3 Safety sources 127 D 15.4 Circuits for safety services 127 D 16 Ingress protection (IP), external influences 129 D 16.1 General 129 D 16.2 Equipment applications and examples 131 ftoc.indd 7 11/15/2021 21:34:01 Chapter E – Earthing and Bonding 133 E 1 Introduction 133 E 2 Earthing arrangements 133 E 3 General requirements of earthing and bonding 138 E 4 Protective conductors 139 E 4.1 General 139 E 4.2 Physical types of protective conductor 140 E 4.3 Sizing protective conductors 141 E 4.4 Protective conductors up to 16 mm 2 142 E 4.5 The earthing conductor 146 E 5 Armoured cables as protective conductors 147 E 5.1 General 147 E 5.2 ERA Report on current sharing between armouring and CPC 148 E 5.3 ECA advice and recommendations 148 E 6 Protective bonding 149 E 6.1 Purpose of protective equipotential bonding 149 E 6.2 BS 7671 requirements 149 E 6.3 Bonding solutions for the modern installation 149 E 6.4 Sizing main bonding conductors 154 E 6.5 Domestic protective bonding layouts 155 E 6.6 Supplementary equipotential bonding 157 E 7 High earth leakage installations 158 Chapter F – Inspection Testing and Certification (Part 6) 161 F 1 Introduction 161 F 1.1 Inspection and testing – an integrated procedure 161 F 2 Visual inspection 162 F 3 Testing 164 F 3.1 Introduction – pass and fail nature 164 F 3.2 Required tests 164 F 3.3 Continuity testing 165 F 3.4 Ring continuity 168 F 3.5 Insulation resistance testing 171 F 3.6 Polarity testing 174 F 3.7 Earth fault loop impedance (ELI) testing 175 F 3.8 Prospective fault current testing 179 F 3.9 Testing RCDs and other functional tests 181 F 3.10 Verification of voltage drop 182 F 4 Certification paperwork 183 F 4.1 Introduction, various certificates and schedules 183 F 4.2 Overview of certificates and schedules 184 F 4.3 Completing the paperwork 184 Chapter G – Special Locations 201 G 1 Introduction purpose and principles 201 G 1.1 Introduction 201 G 1.2 Purpose and principles 201 G 1.3 Particular requirements and numbering 202 G 2 Locations containing a bath or shower (701) 203 G 2.1 Introduction and risks 203 G 2.2 Zone concept 203 G 2.3 Electric shock requirements 204 G 2.4 Equipment selection and erection 207 G 3 Swimming pools and other basins (702) 208 G 3.1 Introduction and risks 208 G 3.2 Zone concept 209 G 3.3 Requirements and guidance 211 G 4 Agricultural and horticultural premises (705) 214 G 4.1 Introduction, purpose and principles 214 G 4.2 Requirements and guidance 214 G 5 Caravan parks and camping parks (708) 218 G 5.1 Introduction purpose and principles 218 G 5.2 Requirements and guidance 218 G 6 Medical locations (710) 222 G 6.1 Introduction and risks 222 G 6.2 Medical groups and class of safety service supply 222 G 6.3 Requirements 223 G 7 Exhibitions, shows and stands (711) 227 G 7.1 Introduction and risks 227 G 7.2 Requirements and guidance 228 G 8 Solar photovoltaic (PV) power supply systems (712) 229 G 8.1 Introduction principles and terminology 229 G 8.2 Requirements 231 G 8.3 Notes and guidance 232 G 9 Mobile or transportable units (717) 235 G 9.1 Scope and application 235 G 9.2 Requirements 235 G 9.3 Notes and guidance 236 G 10 Floor and ceiling heating systems (753) 237 G 10.1 Introduction 237 G 10.2 Requirements 238 G 10.3 Notes and guidance 238 References 240 Appendices 243 Appendix 1 – Standards and bibliography 244 Appendix 2 – Popular cables: current rating tables from BS 7671:2008 Appendix 4 249 Appendix 3 – Limiting earth fault loop impedance tables from BS 7671:2008 252 Appendix 4 – Cable data resistance, impedance and ‘R1 + R2’ values 254 Appendix 5 – Fuse I2t characteristics 258 Index 259

    15 in stock

    £25.60

  • ESD

    John Wiley & Sons Inc ESD

    10 in stock

    Book SynopsisA comprehensive and in-depth review of analog circuit layout, schematic architecture, device, power network and ESD design This book will provide a balanced overview of analog circuit design layout,analog circuit schematic development, architecture of chips,and ESD design. It will start at an introductory level and will bring the reader right up to the state-of-the-art. Two critical design aspects for analog and power integrated circuits are combined. The first design aspect covers analog circuit design techniques to achieve the desired circuit performance. The second and main aspect presents the additional challenges associated with the design of adequate and effective ESD protection elements and schemes. A comprehensive list of practical application examples is used to demonstrate the successful combination of both techniques and any potential design trade-offs. Chapter One looks at analog design discipline, including layout and analog matching and analTable of ContentsAbout the Author xvii Preface xix Acknowledgments xxiii 1 Analog, ESD, and EOS 1 1.1 ESD in Analog Design 1 1.2 Analog Design Discipline and ESD Circuit Techniques 2 1.2.1 Analog Design: Local Matching 3 1.2.2 Analog Design: Global Matching 3 1.2.3 Symmetry 3 1.2.3.1 Layout Symmetry 4 1.2.3.2 Thermal Symmetry 4 1.2.4 Analog Design: Across Chip Linewidth Variation 4 1.3 Design Symmetry and ESD 5 1.4 ESD Design Synthesis and Architecture Flow 6 1.5 ESD Design and Noise 7 1.6 ESD Design Concepts: Adjacency 8 1.7 Electrical Overstress 8 1.7.1 Electrical Overcurrent 10 1.7.2 Electrical Overvoltage 11 1.7.3 Electrical Overstress Events 11 1.7.3.1 Characteristic Time Response 11 1.7.4 Comparison of EOS versus ESD Waveforms 13 1.8 Reliability Technology Scaling and the Reliability Bathtub Curve 13 1.8.1 The Shrinking Reliability Design Box 14 1.8.2 Application Voltage, Trigger Voltage, and Absolute Maximum Voltage 14 1.9 Safe Operating Area 15 1.9.1 Electrical Safe Operating Area 16 1.9.2 Thermal Safe Operating Area (T-SOA) 16 1.9.3 Transient Safe Operating Area 16 1.10 Closing Comments and Summary 17 References 18 2 Analog Design Layout 19 2.1 Analog Design Layout Revisited 19 2.1.1 Analog Design: Local Matching 20 2.1.2 Analog Design: Global Matching 21 2.1.3 Symmetry 21 2.1.4 Layout Design Symmetry 21 2.1.5 Thermal Symmetry 22 2.2 Common Centroid Design 22 2.2.1 Common Centroid Arrays 22 2.2.2 One-Axis Common Centroid Design 22 2.2.3 Two-Axis Common Centroid Design 23 2.3 Interdigitation Design 24 2.4 Common Centroid and Interdigitation Design 24 2.5 Passive Element Design 25 2.6 Resistor Element Design 25 2.6.1 Resistor Element Design: Dogbone Layout 25 2.6.2 Resistor Design: Analog Interdigitated Layout 26 2.6.3 Dummy Resistor Layout 26 2.6.4 Thermoelectric Cancellation Layout 27 2.6.5 Electrostatic Shield 28 2.6.6 Interdigitated Resistors and ESD Parasitics 28 2.7 Capacitor Element Design 29 2.8 Inductor Element Design 30 2.9 Diode Design 33 2.10 MOSFET Design 35 2.11 Bipolar Transistor Design 36 2.12 Closing Comments and Summary 36 References 37 3 Analog Design Circuits 39 3.1 Analog Circuits 39 3.2 Single-Ended Receivers 40 3.2.1 Single-Ended Receivers 40 3.2.2 Schmitt Trigger Receivers 41 3.3 Differential Receivers 41 3.4 Comparators 43 3.5 Current Sources 43 3.6 Current Mirrors 44 3.6.1 Widlar Current Mirror 44 3.6.2 Wilson Current Mirror 45 3.7 Voltage Regulators 46 3.7.1 Buck Converters 46 3.7.2 Boost Converters 46 3.7.3 Buck–Boost Converters 47 3.7.4 Cuk Converters 48 3.8 Voltage Reference Circuits 49 3.8.1 Brokaw Bandgap Voltage Reference 49 3.9 Converters 49 3.9.1 Analog-to-Digital Converter 50 3.9.2 Digital-to-Analog Converters 50 3.10 Oscillators 50 3.11 Phase Lock Loop 50 3.12 Delay Locked Loop 50 3.13 Closing Comments and Summary 52 References 52 4 Analog ESD Circuits 55 4.1 Analog ESD Devices and Circuits 55 4.2 ESD Diodes 55 4.2.1 Dual Diode and Series Diodes 55 4.2.2 Dual Diode–Resistor 56 4.2.3 Dual Diode–Resistor–Dual Diode 56 4.2.4 Dual Diode–Resistor–Grounded-Gate MOSFET 58 4.2.5 Back-to-Back Diode Strings 58 4.2.5.1 Back-to-Back Symmetric Diode String 59 4.2.5.2 Back-to-Back Asymmetric Diode String 59 4.3 ESD MOSFET Circuits 59 4.3.1 Grounded-Gate MOSFET 60 4.3.2 RC-Triggered MOSFET 61 4.4 ESD Silicon-Controlled Rectifier Circuits 62 4.4.1 Unidirectional SCR 62 4.4.2 Bidirectional SCR 62 4.4.3 Medium-Level Silicon-Controlled Rectifier 62 4.4.4 Low-Voltage-Triggered SCR 64 4.5 Laterally Diffused MOS Circuits 64 4.5.1 LOCOS-Defined LDMOS 65 4.5.2 STI-Defined LDMOS 66 4.5.3 STI-Defined Isolated LDMOS 66 4.6 DeMOS Circuits 68 4.6.1 DeNMOS 68 4.6.2 DeNMOS-SCR 69 4.7 Ultrahigh-Voltage LDMOS Circuits 69 4.7.1 Ultrahigh-Voltage LDMOS 70 4.7.2 Ultrahigh-Voltage LDMOS SCR 71 4.8 Closing Comments and Summary 72 References 72 5 Analog and ESD Design Synthesis 73 5.1 Early ESD Failures in Analog Design 73 5.2 Mixed-Voltage Interface: Voltage Regulator Failures 73 5.2.1 ESD Protection Solution for Voltage Regulator: GGNMOS ESD Bypass between Power Rails 75 5.2.2 ESD Protection Solution for Voltage Regulator: Series Diode String ESD Bypass 76 5.3 Separation of Analog Power from Digital Power AVDD to DVDD 76 5.4 ESD Failure in Phase Lock Loop (PLL) and System Clock 77 5.5 ESD Failure in Current Mirrors 77 5.6 ESD Failure in Schmitt Trigger Receivers 78 5.7 Isolated Digital and Analog Domains 82 5.8 ESD Protection Solution: Connectivity of AVDD to VDD 82 5.9 Connectivity of AVSS to DVSS 83 5.10 Digital and Analog Domain with ESD Power Clamps 84 5.11 Digital and Analog Domain with Master/Slave ESD Power Clamps 86 5.12 High-Voltage, Digital, and Analog Domain Floor Plan 87 5.13 Closing Comments and Summary 88 References 88 6 Analog-to-Digital ESD Design Synthesis 89 6.1 Digital and Analog 89 6.2 Interdomain Signal Line ESD Failures 90 6.2.1 Digital-to-Analog Signal Line Failures 90 6.3 Digital-to-Analog Core Spatial Isolation 92 6.4 Digital-to-Analog Core Ground Coupling 92 6.4.1 Digital-to-Analog Core Resistive Ground Coupling 93 6.4.2 Digital-to-Analog Core Diode Ground Coupling 93 6.5 Domain-to-Domain Signal Line ESD Networks 94 6.6 Domain-to-Domain Third-Party Coupling Networks 94 6.7 Domain-to-Domain Cross-Domain ESD Power Clamp 95 6.8 Digital-to-Analog Domain Moat 96 6.9 Digital-to-Analog Domain Moat with Through-Silicon Via 96 6.10 Domain-to-Domain ESD Design Rule Check and Verification Methods 97 6.11 Closing Comments and Summary 97 References 97 7 Analog-ESD Signal Pin Co-synthesis 101 7.1 Analog Signal Pin 101 7.2 Analog Signal Differential Receiver 102 7.2.1 Analog Signal CMOS Differential Receivers 102 7.2.2 Analog Signal Bipolar Differential Receivers 104 7.3 Analog CMOS Differential Receiver 108 7.3.1 Analog Differential Receiver Capacitance Loading 108 7.3.2 Analog Differential Receiver ESD Mismatch 109 7.4 Analog Differential Pair ESD Signal Pin Matching with Common Well Layout 110 7.5 Analog Differential Pair Common Centroid Design Layout: Signal Pin-to-Signal Pin and Parasitic ESD Elements 113 7.6 Closing Comments and Summary 115 References 116 8 Analog and ESD Circuit Integration 119 8.1 Analog and Power Technology and ESD Circuit Integration 119 8.1.1 Analog ESD: Isolated and Nonisolated Designs 119 8.1.2 Integrated Body Ties 119 8.1.3 Self-Protecting versus Non-Self-Protecting Designs 120 8.2 ESD Input Circuits 120 8.2.1 Analog Input Circuit Protection 120 8.2.2 High-Voltage Analog Input Circuit Protection 120 8.2.3 Analog Input High-Voltage Grounded-Gate NMOS (GGNMOS) 121 8.2.4 Two-Stage High-Voltage Analog Input Circuit Protection 122 8.3 Analog ESD Output Circuits 123 8.3.1 Analog ESD Output Networks and Distinctions 123 8.3.2 Analog Open-Drain ESD Output Networks 123 8.4 Analog ESD Ground-to-Ground Networks 124 8.4.1 Back-to-Back CMOS Diode String 125 8.4.2 HV GGNMOS Diode-Configured Ground-to-Ground Network 125 8.5 ESD Power Clamps 125 8.5.1 ESD Power Clamp Issues for the High-Voltage Domain 125 8.5.2 HV Domain ESD Protection and ABS MAX 126 8.5.3 HV Domain VIN or VCC Input 126 8.5.4 HV Grounded-Gate NMOS (GGNMOS) 126 8.5.5 HV Series Cascode ESD Network 127 8.5.6 ESD Power Clamp Bidirectionality and Return Diodes 128 8.5.7 Alternative Solutions: LDO Current Limits 128 8.5.8 Alternative Solutions: External EOS Diode 129 8.6 ESD Power Clamps for Low-Voltage Digital and Analog Domain 129 8.6.1 Classification of ESD Power Clamps 130 8.6.2 ESD Power Clamp: Key Design Parameters 131 8.6.3 Design Synthesis of ESD Power Clamps 132 8.6.4 Transient Response Frequency Trigger Element and the ESD Frequency Window 132 8.6.5 ESD Power Clamp Frequency Design Window 133 8.6.6 Design Synthesis of ESD Power Clamp: Voltage-Triggered ESD Trigger Elements 133 8.6.7 Design Synthesis of ESD Power Clamp: The ESD Power Clamp Shunting Element 135 8.6.8 ESD Power Clamp Trigger Condition versus Shunt Failure 136 8.6.9 ESD Clamp Element: Width Scaling 136 8.6.10 ESD Clamp Element: On-Resistance 136 8.6.11 ESD Clamp Element: Safe Operating Area 137 8.7 ESD Power Clamp Issues 137 8.7.1 Power-Up and Power-Down 137 8.7.2 False Triggering 137 8.7.3 Precharging 138 8.7.4 Postcharging 138 8.8 ESD Power Clamp Design 138 8.8.1 Native Power Supply RC-Triggered MOSFET ESD Power Clamp 138 8.8.2 Nonnative Power Supply RC-Triggered MOSFET ESD Power Clamp 139 8.8.3 ESD Power Clamp Networks with Improved Inverter Stage Feedback 140 8.8.4 Forward-Bias Triggered ESD Power Clamps 141 8.8.5 IEC 61000-4-2 Responsive ESD Power Clamps 142 8.8.6 Precharging and Postcharging Insensitive ESD Power Clamps 142 8.8.7 ESD Power Clamp Design Synthesis and Return Diode 143 8.9 Bipolar ESD Power Clamps 144 8.9.1 Bipolar ESD Power Clamps with Zener Breakdown Trigger Element 144 8.9.2 Bipolar ESD Power Clamps with Bipolar Transistor BVCEO Breakdown Trigger Element 145 8.10 Closing Comments and Summary 145 References 146 9 System-Level EOS Issues for Analog Design 147 9.1 EOS Protection Devices 147 9.1.1 EOS Protection Device: Voltage Suppression Devices 147 9.1.2 EOS Protection Device: Current-Limiting Devices 148 9.2 EOS Protection Device: Directionality 150 9.2.1 Classification: I–V Characteristic Type 150 9.2.2 Unidirectionality 150 9.2.3 Bidirectionality 150 9.3 System-Level Pulse Model 152 9.3.1 IEC 61000-4-2 System-Level Pulse Model 152 9.3.2 Human Metal Model (HMM) 152 9.3.3 IEC 61000-4-5 Surge Test 154 9.4 EOS Transient Voltage Suppression (TVS) 155 9.4.1 EOS Diodes 155 9.4.2 EOS Schottky Diodes 156 9.4.3 EOS Zener Diodes 156 9.4.4 EOS Thyristor Surge Protection 157 9.4.5 EOS Metal-Oxide Varistors (MOV) 157 9.4.6 EOS Gas Discharge Tubes (GDT) 159 9.5 EOS Current Suppression Devices 161 9.5.1 EOS PTC Device 161 9.5.2 EOS Conductive Polymer 162 9.5.3 EOS Fuses 163 9.5.3.1 Rated Current IN 164 9.5.3.2 Speed 164 9.5.3.3 I 2t Value 164 9.5.3.4 Breaking Capacity 164 9.5.3.5 Rated Voltage 164 9.5.3.6 Voltage Drop 164 9.5.3.7 Temperature Derating 164 9.5.4 EOS eFUSEs 165 9.5.5 Circuit Breakers 166 9.6 EOS and EMI Prevention: Printed Circuit Board Design 166 9.6.1 Printed Circuit Board Power Plane and Ground Design 167 9.6.2 Printed Circuit Board Design Guidelines: Component Selection and Placement 168 9.6.3 Printed Circuit Board Design Guidelines: Trace Routing and Planes 168 9.6.4 Printed Circuit Board Card Insertion Contacts 170 9.6.5 System-Level Printed Circuit Board: Ground Design 170 9.7 Closing Comments and Summary 171 References 171 10 Latchup Issues for Analog Design 173 10.1 Latchup in Analog Applications 173 10.2 I/O-to-I/O Latchup 173 10.3 I/O-to-I/O Latchup: N-Well to N-Well 175 10.4 I/O-to-I/O Latchup: N-Well to NFET 177 10.5 I/O-to-I/O Latchup: NFET to NFET 179 10.6 I/O-to-I/O Latchup: N-Well Guard Ring between Adjacent Cells 180 10.7 Latchup of Analog I/O to Adjacent Structures 181 10.7.1 Latchup in Core-Dominated Semiconductor Chips 181 10.7.2 Latchup and Grounded N-Wells 181 10.7.3 Latchup and Decoupling Capacitors 181 10.7.4 Adjacency Design Rule Checking and Verification 181 10.8 Analog I/O to Core 182 10.9 Core-to-Core Analog–Digital Floor Planning 182 10.9.1 Analog–Digital Moats and Guard Rings 183 10.10 High-Voltage Guard Rings 184 10.11 Through-Silicon Via (TSV) 185 10.12 Trench Guard Rings 186 10.13 Active Guard Rings 187 10.14 Closing Comments and Summary 190 References 191 11 Analog ESD Library and Documents 195 11.1 Analog Design Library 195 11.2 Analog Device Library: Passive Elements 195 11.2.1 Resistors 196 11.2.2 Capacitors 196 11.2.3 Inductors 197 11.3 Analog Device Library: Active Elements 197 11.4 Analog Design Library: Repository of Analog Circuits and Cores 198 11.4.1 Analog Design Library: Reuse Library 198 11.5 ESD Device Library 198 11.6 Cadence-Based Parameterized Cells (PCells) 199 11.6.1 ESD Hierarchical PCell Physical Layout Generation 200 11.6.2 ESD Hierarchical PCell Schematic Generation 201 11.6.3 ESD Design with Hierarchical Parameterized Cells 201 11.6.4 Hierarchical PCell Graphical Method 202 11.6.5 Hierarchical PCell Schematic Method 204 11.7 Analog ESD Documents 208 11.7.1 ESD Technology Design Manual Section 208 11.7.1.1 ESD Required Specifications 209 11.7.1.2 ESD Supported Standards 209 11.7.1.2.1 Human Body Model (HBM) 209 11.7.1.2.2 Machine Model (MM) 209 11.7.1.2.3 Charged Device Model (CDM) 209 11.7.1.2.4 IEC 61000-4-2 210 11.7.1.2.5 Human Metal Model (HMM) 210 11.7.1.2.6 Transmission Line Pulse (TLP) 210 11.7.1.2.7 Very Fast Transmission Line Pulse (VF-TLP) 210 11.7.1.3 ESD Supported Designs 210 11.7.1.4 ESD Design Rules 210 11.7.1.5 ESD Design Recommendations 211 11.7.1.6 ESD Guard Ring Rules 211 11.7.1.7 ESD Layout Design Practices 211 11.7.1.8 Do’s and Don’ts 211 11.8 ESD Cookbook 212 11.9 Electrical Overstress (EOS) Documents 213 11.9.1 EOS Design Release Process 214 11.9.2 Electrical Overstress (EOS) Cookbook 214 11.9.2.1 Table of Pin Types 216 11.9.3 Electrical Overstress Checklist 218 11.9.4 Electrical Overstress Design Reviews 220 11.10 Closing Comments and Summary 220 References 220 12 Analog ESD and Latchup Design Rule Checking and Verification 223 12.1 Electronic Design Automation 223 12.2 Electrical Overstress (EOS) and ESD Design Rule Checking 223 12.2.1 ESD Design Rule Checking 224 12.2.2 Electrostatic Discharge Layout-versus-Schematic Verification 225 12.2.3 ESD Electrical Rule Check (ERC) 226 12.3 Electrical Overstress (EOS) Electronic Design Automation 227 12.3.1 Electrical Overstress (EOS) Design Rule Checking 227 12.3.2 Electrical Overstress (EOS) Layout-versus-Schematic (LVS) Verification 228 12.3.3 Electrical Overstress (EOS) Electrical Rule Check (ERC) 229 12.3.4 Electrical Overstress Programmable Electrical Rule Check 230 12.4 Printed Circuit Board (PCB) Design Rule Checking and Verification 230 12.5 Electrical Overstress and Latchup Design Rule Checking (DRC) 232 12.5.1 Latchup Design Rule Checking 232 12.5.2 Latchup Electrical Rule Check (ERC) 237 12.5.2.1 N-Well Contact to P-Channel MOSFET Resistance 237 12.5.2.2 P-Well or P-Substrate Contact to N-Channel MOSFET Resistance 237 12.5.2.3 Guard Ring Resistance 237 12.6 Whole-Chip Checking and Verification Methods 240 12.7 Cross-Domain Signal Line Checking and Verification 241 12.7.1 Cross-Domain Signal Line Checking and Verification Flow System 241 12.7.2 Cross-Domain Analog Signal Line Checking and Verification Flow System 243 12.7.3 Cross-Domain Checking and Verification: Resistance Extraction Methodology 244 12.8 Closing Comments and Summary 246 References 246 Appendix: Standards 251 Appendix: Glossary of Terms 255 Index 261

    10 in stock

    £91.95

  • Integrated Circuit Design for Radiation

    John Wiley & Sons Inc Integrated Circuit Design for Radiation

    15 in stock

    Book SynopsisTable of ContentsAbout the Authors xiii Preface xix Acknowledgments xxiii Glossary of Terms xxv 1 Introduction and Historical Perspective 1 1.1 Introduction 1 1.2 Discovery of X-Rays, Radiation, and Subatomic Particles 2 1.3 The Nuclear Age 8 1.4 The Space Age 9 1.5 Semiconductors – Revolution, Evolution, and Scaling 15 1.6 Beginning of Ionizing Radiation Effects in Semiconductors 20 1.7 Beginning of Single-Event Effects in Semiconductors 22 1.8 Summary and Closing Comments 26 References 27 2 Radiation Environments 31 2.1 Introduction 31 2.2 X-Rays, Gamma Rays, and the Atom 31 2.2.1 X-Rays 31 2.2.2 X-Ray Absorption 34 2.2.3 Auger Electrons 36 2.2.4 Nuclear Structure and Binding Energy 36 2.2.4.1 Models of the Nucleus 38 2.2.5 Alpha and Beta Decay 50 2.2.5.1 Alpha Decay 51 2.2.5.2 Beta Decay 52 2.2.6 Gamma-Ray Emission or Gamma Decay 53 2.2.7 Other Types of Nuclear Radiation 54 2.3 Natural Radioactivity 55 2.3.1 Exponential Decay 55 2.3.2 Decay Series 56 2.4 The Space Environment 58 2.4.1 Solar Radiation 59 2.4.2 Trapped Radiation 62 2.4.3 Cosmic Rays 66 2.4.4 Atmospheric Neutrons 69 2.5 The Nuclear Reactor Environment 71 2.6 The Weapons Environment 75 2.7 The Environment in High-Energy Physics Facilities 78 2.8 Summary and Closing Comments 80 References 81 3 Radiation Effects in Semiconductor Materials 85 3.1 Introduction 85 3.2 Basic Effects 86 3.2.1 Heavy Charged Particles 86 3.2.1.1 Stopping Power 86 3.2.1.2 Electronic Stopping 87 3.2.1.3 Nuclear Stopping 92 3.2.2 Electrons 93 3.2.2.1 Electromagnetic Radiation 93 3.2.2.2 Stopping Power 96 3.2.3 Neutrons 101 3.2.3.1 Neutron Cross Section 102 3.2.3.2 Interactions with Matter 103 3.2.4 Photons (X-Rays, Gamma Rays) 106 3.2.4.1 Photoelectric Effect 107 3.2.4.2 Compton Scattering 108 3.2.4.3 Pair Production 109 3.2.4.4 Photonuclear Reactions 110 3.3 Charge Trapping in Silicon Dioxide 111 3.3.1 Charge Generation/Recombination 111 3.3.1.1 Geminate and Columnar Models 112 3.3.1.2 Geminate Recombination 113 3.3.1.3 Columnar Recombination 115 3.3.1.4 Numerical Methods 117 3.3.2 Hole Trapping and Transport 118 3.3.2.1 E′ Centers 120 3.3.2.2 Continuous-Time Random-Walk (CTRW) 122 3.3.3 The Silicon/Silicon Dioxide Interface 124 3.3.3.1 Interface Traps 125 3.3.3.2 Border Traps 127 3.3.3.3 Hydrogen 128 3.3.3.4 ELDRS 130 3.4 Bulk Damage 131 3.5 Summary and Closing Comments 133 References 135 4 Radiation-Induced Single Events 143 4.1 Introduction – Single-Events Effects (SEE) 143 4.1.1 Single-Event Upsets (SEU) 143 4.1.2 Multiple-Bit Upset (MBU) 143 4.1.3 Single-Event Transients (SET) 144 4.1.4 Single-Event Functional Interrupts (SEFIs) 144 4.1.5 Single-Event Disturb (SED) 145 4.1.6 Single-Event Snapback (SESB) 146 4.1.7 Single-Event Latchup (SEL) 146 4.1.8 Single-Event Burnout (SEB) 146 4.1.9 Single-Event Gate Rupture (SEGR) 147 4.1.10 Single-Event Hard Errors (SHE) 147 4.2 Single-Event Upset (SEU) 148 4.2.1 SEU – Memory 148 4.2.2 SEU in CMOS Memory 148 4.2.3 SEU in Bipolar Memory 148 4.2.4 SEU in CMOS SRAM 149 4.2.5 SEU in Future Technology – FINFETs 149 4.3 SEU – Particle Sources 149 4.3.1 SEU Source – Alpha Particles 150 4.3.2 SEU Source – Pions and Muons 152 4.3.3 SEU – Neutrons 153 4.3.4 SEU Source – Protons 153 4.3.5 SEU – Heavy Ions 154 4.4 Single-Event Gate Rupture (SEGR) 154 4.4.1 Definition SEGR 155 4.4.2 SEGR Source – Ion Track 155 4.4.3 SEGR Source – Failure Mechanism 156 4.4.4 SEGR – Modeling and Simulation 156 4.4.5 Power Transistors and SEGR 156 4.4.5.1 Lateral Power Transistors SEGR 156 4.4.5.2 Vertical MOS (VMOS) SEGR 157 4.4.5.3 Advanced Technologies – Planar MOSFET SEGR 157 4.5 Single-Event Transients (SETs) 158 4.5.1 SET Definition 158 4.5.2 SET Source 158 4.5.3 SET Source Failure Mechanisms 159 4.5.4 SET in Integrated Circuits 159 4.5.4.1 Digital Circuitry 159 4.5.4.2 Continuous Time Analog Circuitry 159 4.5.5 Prediction and Hardening 159 4.6 Single-Event Latchup (SEL) 159 4.6.1 SEL Definition 160 4.6.2 SEL Source 160 4.6.3 SEL Time Response 161 4.6.4 SEL Maximum Charge Collection Evaluation in a Parallelepiped Region 162 4.6.5 A SEL Design Practice 164 4.6.6 SEL Semiconductor Device Simulation 165 4.7 Summary and Closing Comments 165 References 166 5 Radiation Testing 173 5.1 Introduction 173 5.1.1 Radiation Units and Measurements 173 5.2 Radiation Testing and Sources 175 5.2.1 Total Ionizing Dose (TID) Testing 176 5.2.2 Total Ionizing Dose (TID) Sources 179 5.2.3 Single-Event Effects (SEE) Testing 182 5.2.4 Single-Event Effects (SEE) Sources and Facilities 187 5.2.5 Neutron Testing 192 5.2.6 Neutron Sources 193 5.2.7 Proton Testing 195 5.2.8 Proton Sources 196 5.2.9 Transient Gamma Testing 197 5.2.10 Transient Gamma Sources 198 5.3 Summary and Closing Comments 201 References 204 6 Device Modeling and Simulation Techniques 209 6.1 Introduction 209 6.2 Device Modeling 210 6.2.1 Circuit Simulators 211 6.2.2 Intrinsic Models 212 6.2.3 Composite Models and Inline Subcircuits 212 6.2.4 Analysis and Statistics Programs 214 6.3 Radiation Effects on Semiconductor Devices 215 6.3.1 MOS Capacitors and Transistors 215 6.3.1.1 MOS Capacitors 216 6.3.1.2 MOS Transistors 219 6.3.2 Diodes and Bipolar Transistors 224 6.3.2.1 Diodes 224 6.3.2.2 Bipolar Transistors 225 6.3.3 Power Devices 230 6.3.3.1 DMOS Composite Models 231 6.3.3.2 Operating Voltage 232 6.3.4 Other Devices 232 6.3.4.1 Junction Field Effect Transistors (JFETs) 232 6.3.4.2 Resistors 234 6.3.4.3 Capacitors 235 6.3.5 Some Modeling Challenges 235 6.4 Circuit Simulation 236 6.4.1 Corner Simulation 236 6.4.2 SEE Simulation 239 6.5 Summary and Closing Comments 242 References 244 7 Radiation Semiconductor Process and Layout Solutions 249 7.1 Introduction 249 7.2 Substrate Hardened Technologies 249 7.2.1 Silicon-on-Insulator (SOI) Technologies 250 7.2.1.1 Separation by Implanted Oxygen (SIMOX) 250 7.2.1.2 Silicon-Bonded (SIBOND) Technology 250 7.2.2 Silicon on Sapphire (SOS) 251 7.2.3 Silicon on Diamond (SOD) 252 7.2.4 Silicon on Nothing (SON) 252 7.3 Oxide Hardening Technologies 253 7.3.1 Oxide Growth and Fluorination of Oxide 253 7.3.2 MOSFET Gate Oxide Hardening 253 7.3.3 Recessed Oxide (ROX) Hardening 254 7.3.4 LOCOS Isolation Hardening 254 7.3.5 Shallow Trench Isolation (STI) Hardening 254 7.4 CMOS Latchup Process Solutions 255 7.5 CMOS Substrates – High-Resistance Substrates 255 7.5.1 50Ω-cm Substrate Resistance 259 7.6 Wells 260 7.6.1 Single Well – Diffused N-Well 261 7.6.2 Single Well – Retrograde N-Well 261 7.6.3 Dual-Well Technology 262 7.6.3.1 P-well and P++ Substrate 262 7.6.3.2 P-Well and P+ Connecting Implant 263 7.7 Triple-Well Technology 264 7.7.1 Triple Well – Full Separation of Wells 264 7.7.2 Triple Well – Merged Triple Well 265 7.7.3 Triple Well – Merged Triple Well with Blanket Implant 266 7.8 Sub-Collectors 266 7.8.1 Epitaxial Grown Sub-Collector 266 7.8.2 Implanted Sub-Collector 267 7.8.3 Sub-Collector – NPN and PNP Bipolar Current Gain 267 7.8.4 Sub-Collector – Beta Product 𝛽PNP𝛽NPN 267 7.9 Heavily Doped Buried Layers (HDBL) 268 7.9.1 Buried Implanted Layer for Lateral Isolation (BILLI) Process 268 7.9.2 Continuous HDBL Implant 268 7.9.3 Buried Guard Ring (BGR) 270 7.10 Isolation Concepts 270 7.10.1 LOCOS Isolation 270 7.10.2 Shallow Trench Isolation (STI) 270 7.10.3 Dual Depth Isolation 271 7.10.4 Trench Isolation (TI) 272 7.10.4.1 Trench Isolation (TI) and Sub-Collector 274 7.11 Deep Trench 277 7.11.1 Deep Trench (DT) within PNPN Structure 279 7.11.2 Deep Trench Structure and Sub-Collector 281 7.11.3 Deep Trench Structure and Merged Triple Well 283 7.12 Layout Solutions 284 7.12.1 Polysilicon Bound Structures 284 7.12.2 Parasitic Isolation Device (PID) 284 7.13 Summary and Closing Comments 286 References 287 8 Single-Event Upset Circuit Solutions 293 8.1 Introduction 293 8.2 CMOS DRAM SEU Circuit Solutions 293 8.2.1 CMOS DRAM Redundancy 294 8.2.2 CMOS DRAM with SRAM Error Correction 294 8.3 CMOS SRAM SEU Circuit Solution 296 8.3.1 CMOS SRAM Four-Device Cell 296 8.3.2 CMOS SRAM Six-Device Cell 297 8.3.3 CMOS SRAM 12-Device Cell 298 8.4 Bipolar SRAM 299 8.4.1 Bipolar SRAM Cell with Resistor Loads 300 8.4.2 Bipolar SRAM Cell with Resistor Loads and Schottky Clamps 300 8.4.3 Bipolar SRAM Cell with PNP Transistors 301 8.5 Bipolar SRAM Circuit Solutions 301 8.6 SEU in CMOS Logic Circuitry 302 8.7 Summary and Closing Comments 302 References 303 9 Latchup Circuit Solutions 305 9.1 Introduction 305 9.2 Power Supply Concepts 305 9.2.1 Power Supply Current Limit – Series Resistor 305 9.2.2 Power Supply Current Limit – Current Source 306 9.2.3 Power Supply Solutions – Voltage Regulator 307 9.2.4 Latchup Circuit Solutions – Power Supply Decoupling 308 9.3 Overshoot and Undershoot Clamp Networks 311 9.3.1 Passive Clamp Networks 312 9.3.2 Active Clamp Networks 313 9.3.3 Dynamic Threshold Triple Well Passive and Active Clamp Networks 316 9.4 Passive and Active Guard Rings 318 9.4.1 Passive Guard Ring Circuits and Structures 318 9.4.2 Active Guard Ring Circuits and Structures 319 9.5 Triple-Well Noise and Latchup Suppression Structures 326 9.6 System-Level Latchup Issues 326 9.7 Summary and Closing Comments 327 References 329 10 Emerging Effects and Future Technology 333 10.1 Introduction 333 10.2 Radiation Effects in Advanced Technologies 333 10.2.1 Moore’s Law, Scaling, and Radiation Effects 334 10.2.2 Technology Lifetime and Reliability 334 10.2.2.1 New Missions 335 10.2.2.2 Throwaway Mentality 335 10.2.2.3 New Space Entrants 335 10.2.3 Terrestrial Issues 335 10.2.4 Space Mission Issues 335 10.2.5 Server Farms 335 10.2.6 Automotive 336 10.2.7 Internet of Things (IoT) 336 10.2.8 More than Moore 336 10.3 Radiation Effects in Semiconductor Nanostructures 336 10.3.1 Planar MOSFETs in Sub-25 nm 337 10.3.2 Bulk FinFET 338 10.3.3 SOI FinFET 339 10.3.4 3-D Circuits 340 10.4 Radiation Effects and Advanced Packaging 340 10.4.1 Radiation Effects and 2.5-D Circuits and Technology 341 10.4.2 Radiation Effects and 3-D Circuits and Technology 341 10.4.3 More than Moore and 3-D Integration 342 10.5 Ruggedized Capability 342 10.5.1 Ruggedized Capability for Radiation 343 10.5.2 Ruggedized Capability for High Temperature 343 10.6 Radiation Models 343 10.7 A Nuclear World 344 10.8 Summary and Closing Comments 344 References 345 Index 347

    15 in stock

    £86.36

  • Color Appearance Models

    John Wiley & Sons Inc Color Appearance Models

    15 in stock

    Book SynopsisBuilding upon the success of previous editions, this volume continues to serve the needs of professionals who need to understand visual perception as well as produce, reproduce, and measure color appearance in such applications as imaging, entertainment, materials, design, architecture, and lighting.Table of ContentsSeries Preface xiii Preface xv Acknowledgments xviii Introduction xix 1 Human Color Vision 1 1.1 Optics of the Eye 2 1.2 The Retina 7 1.3 Visual Signal Processing 14 1.4 Mechanisms of Color Vision 19 1.5 Spatial and Temporal Properties of Color Vision 27 1.6 Color Vision Deficiencies 32 1.7 Key Features for Color Appearance Modeling 36 2 Psychophysics 38 2.1 Psychophysics Defined 39 2.2 Historical Context 40 2.3 Hierarchy of Scales 43 2.4 Threshold Techniques 45 2.5 Matching Techniques 49 2.6 One-Dimensional Scaling 50 2.7 Multidimensional Scaling 52 2.8 Design of Psychophysical Experiments 54 2.9 Importance in Color Appearance Modeling 55 3 Colorimetry 56 3.1 Basic and Advanced Colorimetry 57 3.2 Why is Color? 57 3.3 Light Sources and Illuminants 59 3.4 Colored Materials 63 3.5 The Human Visual Response 68 3.6 Tristimulus Values and Color Matching Functions 70 3.7 Chromaticity Diagrams 77 3.8 Cie Color Spaces 79 3.9 Color Difference Specification 81 3.10 The Next Step 83 4 Color Appearance Terminology 85 4.1 Importance of Definitions 85 4.2 Color 86 4.3 Hue 88 4.4 Brightness and Lightness 88 4.5 Colorfulness and Chroma 90 4.6 Saturation 91 4.7 Unrelated and Related Colors 91 4.8 Definitions in Equations 92 4.9 Brightness–Colorfulness Vs Lightness–Chroma 94 5 Color Order Systems 97 5.1 Overview and Requirements 98 5.2 The Munsell Book of Color 99 5.3 The Swedish Ncs 104 5.4 The Colorcurve System 106 5.5 Other Color Order Systems 107 5.6 Uses of Color Order Systems 109 5.7 Color Naming Systems 112 6 Color Appearance Phenomena 115 6.1 What are Color Appearance Phenomena? 115 6.2 Simultaneous Contrast, Crispening, and Spreading 116 6.3 Bezold–Brücke Hue Shift (Hue Changes with Luminance) 120 6.4 Abney Effect (Hue Changes with Colorimetric Purity) 121 6.5 Helmholtz–Kohlrausch Effect (Brightness Depends On Luminance and Chromaticity) 123 6.6 Hunt Effect (Colorfulness Increases with Luminance) 125 6.7 Stevens Effect (Contrast Increases with Luminance) 127 6.8 Helson–Judd Effect (Hue of Non-Selective Samples) 129 6.9 Bartleson–Breneman Equations (Image Contrast Changes with Surround) 131 6.10 Discounting-the-Illuminant 132 6.11 Other Context, Structural, and Psychological Effects 133 6.12 Color Constancy? 140 7 Viewing Conditions 142 7.1 Configuration of the Viewing Field 142 7.2 Colorimetric Specification of the Viewing Field 146 7.3 Modes of Viewing 149 7.4 Unrelated and Related Colors Revisited 154 8 Chromatic Adaptation 156 8.1 Light, Dark, and Chromatic Adaptation 157 8.2 Physiology 159 8.3 Sensory and Cognitive Mechanisms 170 8.4 Corresponding Colors Data 174 8.5 Models 177 8.6 Color Inconstancy Index 178 8.7 Computational Color Constancy 179 9 Chromatic Adaptation Models 181 9.1 Von Kries Model 182 9.2 Retinex Theory 186 9.3 Nayatani et al. Model 187 9.4 Guth’s Model 190 9.5 Fairchild’s 1990 Model 192 9.6 Herding Cats 196 9.7 Cat02 197 10 Color Appearance Models 199 10.1 Definition of Color Appearance Models 199 10.2 Construction of Color Appearance Models 200 10.3 Cielab 201 10.4 Why Not Use Just Cielab? 210 10.5 What About Cieluv? 210 11 The Nayatani et al. Model 213 11.1 Objectives and Approach 213 11.2 Input Data 214 11.3 Adaptation Model 215 11.4 Opponent Color Dimensions 217 11.5 Brightness 218 11.6 Lightness 219 11.7 Hue 219 11.8 Saturation 220 11.9 Chroma 221 11.10 Colorfulness 221 11.11 Inverse Model 222 11.12 Phenomena Predicted 222 11.13 Why Not Use Just the Nayatani et al. Model? 223 12 The Hunt Model 225 12.1 Objectives and Approach 225 12.2 Input Data 226 12.3 Adaptation Model 228 12.4 Opponent Color Dimensions 233 12.5 Hue 234 12.6 Saturation 235 12.7 Brightness 236 12.8 Lightness 238 12.9 Chroma 238 12.10 Colorfulness 238 12.11 Inverse Model 239 12.12 Phenomena Predicted 241 12.13 Why Not Use Just the Hunt Model? 242 13 The Rlab Model 243 13.1 Objectives and Approach 243 13.2 Input Data 245 13.3 Adaptation Model 246 13.4 Opponent Color Dimensions 248 13.5 Lightness 250 13.6 Hue 250 13.7 Chroma 252 13.8 Saturation 252 13.9 Inverse Model 252 13.10 Phenomena Predicted 254 13.11 Why Not Use Just the Rlab Model? 254 14 Other Models 256 14.1 Overview 256 14.2 Atd Model 257 14.3 Llab Model 264 14.4 Ipt Color Space 271 15 The Cie Color Appearance Model (1997), Ciecam97s 273 15.1 Historical Development, Objectives, and Approach 273 15.2 Input Data 276 15.3 Adaptation Model 277 15.4 Appearance Correlates 279 15.5 Inverse Model 280 15.6 Phenomena Predicted 281 15.7 The Zlab Color Appearance Model 282 15.8 Why Not Use Just Ciecam97s? 285 16 Ciecam02 287 16.1 Objectives and Approach 287 16.2 Input Data 288 16.3 Adaptation Model 290 16.4 Opponent Color Dimensions 294 16.5 Hue 294 16.6 Lightness 295 16.7 Brightness 295 16.8 Chroma 295 16.9 Colorfulness 296 contents xi 16.10 Saturation 296 16.11 Cartesian Coordinates 296 16.12 Inverse Model 297 16.13 Implementation Guidelines 297 16.14 Phenomena Predicted 298 16.15 Computational Issues 298 16.16 Cam02-Ucs 300 16.17 Why Not Use Just Ciecam02? 301 16.18 Outlook 301 17 Testing Color Appearance Models 303 17.1 Overview 303 17.2 Qualitative Tests 304 17.3 Corresponding-Colors Data 308 17.4 Magnitude Estimation Experiments 310 17.5 Direct Model Tests 312 17.6 Colorfulness in Projected Images 316 17.7 Munsell in Color Appearance Spaces 317 17.8 Cie Activities 318 17.9 A Pictorial Review of Color Appearance Models 323 18 Traditional Colorimetric Applications 328 18.1 Color Rendering 328 18.2 Color Differences 333 18.3 Indices of Metamerism 335 18.4 A General System of Colorimetry? 337 18.5 What About Observer Metamerism? 338 19 Device-Independent Color Imaging 341 19.1 The Problem 342 19.2 Levels of Color Reproduction 343 19.3 A Revised Set of Objectives 345 19.4 General Solution 348 19.5 Device Calibration and Characterization 349 19.6 The Need for Color Appearance Models 354 19.7 Definition of Viewing Conditions 355 19.8 Viewing-Conditions-Independent Color Space 357 19.9 Gamut Mapping 357 19.10 Color Preferences 361 19.11 Inverse Process 362 19.12 Example System 363 19.13 Icc Implementation 364 20 I mage Appearance Modeling and the Future 369 20.1 From Color Appearance to Image Appearance 370 20.2 S-Cielab 375 20.3 The icam Framework 376 20.4 A Modular Image Difference Model 382 20.5 Image Appearance and Rendering Applications 385 20.6 Image Difference and Quality Applications 391 20.7 icam06 392 20.8 Orthogonal Color Space 393 20.9 Future Directions 396 21 High-Dynamic-Range Color Space 399 21.1 Luminance Dynamic Range 400 21.2 The Hdr Photographic Survey 401 21.3 Lightness–Brightness Beyond Diffuse White 403 21.4 hdr-Cielab 404 21.5 hdr-Ipt 406 21.6 Evans, G0, and Brilliance 407 21.7 The Nayatani Theoretical Color Space 409 21.8 A New Kind of Appearance Space 409 21.9 Future Directions 416 References 418 Index 440

    15 in stock

    £85.46

  • Reconfigurable Radio Systems

    John Wiley & Sons Inc Reconfigurable Radio Systems

    1 in stock

    Book SynopsisThis timely work provides a standards-based view of the development, evolution, and techniques for the deployment of reconfigurable radio systems.Table of ContentsPreface ix Acknowledgements xiii List of Abbreviations xv 1 The Multiradio Access Network 1 1.1 Introduction 1 1.2 Radiomobile Networks 3 1.2.1 GSM/GPRS/EDGE Network Architecture 4 1.2.2 GSM/GPRS/EDGE Access Network 6 1.2.3 UMTS/HSPA/HSPA+ Network Architecture 17 1.2.4 UMTS/HSPA/HSPA+ Access Network 21 1.2.5 LTE Network Architecture 30 1.2.6 LTE Access Network 33 1.2.7 LTE Advanced 48 1.3 Wireless Networks 50 1.3.1 Wireless LAN 50 1.3.2 Wireless MAN 58 1.3.3 Wireless PAN 61 References 66 2 Cognitive Radio: Concept and Capabilities 69 2.1 Cognitive Systems 69 2.2 Spectrum Sensing Cognitive Radio 70 2.2.1 Spectrum Sensing Cognitive Features 72 2.3 Introduction to the Full Cognitive Radio 101 References 102 3 Self-Organizing Network Features in the 3GPP Standard 105 3.1 Self-Organizing Networks 105 3.1.1 Alarming 107 3.1.2 Operational Support System Automation 108 3.1.3 Energy Saving 109 3.2 LTE Overview 111 3.3 LTE Home eNB 116 3.4 LTE and Self-Organizing Networks 119 3.4.1 Self-Establishment of a New eNB 121 3.4.2 Automatic Neighbour Relation Management 123 3.4.3 eNB Self-Optimization 127 3.4.4 Energy Saving Management 136 3.4.5 Self-Healing 138 References 142 4 IEEE 802.22: The First Standard Based on Cognitive Radio 145 4.1 White Spaces 145 4.1.1 FCC Regulation 146 4.1.2 ECC Regulation 148 4.2 IEEE 802.22 151 4.2.1 IEEE 802.22 Architecture 154 4.3 IEEE 802.22.1 179 References 181 5 ETSI Standards on Reconfigurable Radio Systems 183 5.1 Introduction 183 5.2 ETSI Reconfigurable Radio Systems 184 5.2.1 Reconfigurable Radio Base Station Architecture 186 5.2.2 Reconfigurable Radio Device Architecture 190 5.2.3 Cognitive Pilot Channel (CPC) 200 5.2.4 ETSI RRS Functional Architecture 211 5.3 Summary 220 References 220 6 IEEE 1900.4 223 6.1 Introduction 223 6.2 IEEE Dynamic Spectrum Access Networks Standards Committee (DySPAN-SC) 224 6.3 IEEE 1900.4 Functional Architecture 225 6.3.1 Operator Spectrum Manager Entity 228 6.3.2 Network Reconfiguration Manager Entity 229 6.3.3 RAN Reconfiguration Controller and RAN Measurement Collector Entities 231 6.3.4 Terminal Equipment Entities 232 6.3.5 IEEE 1900.4 and ETSI RRS Functional Architecture Comparison 232 6.3.6 Use Cases for the IEEE 1900.4 Functional Architecture 235 6.4 IEEE 1900.4a Functional Architecture 241 6.4.1 White Space Manager Entity 243 6.4.2 Cognitive Base Station 244 6.4.3 Terminal Equipment Entities 245 6.4.4 Use Cases for the IEEE 1900.4a Functional Architecture 246 6.5 Summary 249 References 249 7 Regulatory Challenges of Reconfigurable Radio Systems 251 7.1 Introduction 251 7.2 Spectrum Management 251 7.2.1 Dynamic Spectrum Access 254 7.2.2 Market-Based Approach in Spectrum Management 259 7.3 Impacts of Reconfigurable Radio Systems to Spectrum Governance 262 7.4 Summary 266 References 266 Index 269

    1 in stock

    £84.56

  • Harnessing Green It

    John Wiley and Sons Ltd Harnessing Green It

    15 in stock

    Book SynopsisUltimately, this is a remarkable book, a practical testimonial, and a comprehensive bibliography rolled into one. It is a single, bright sword cut across the various murky green IT topics. And if my mistakes and lessons learned through the green IT journey are any indication, this book will be used every day by folks interested in greening IT. Simon Y. Liu, Ph.D. & Ed.D., Editor-in-Chief,IT ProfessionalMagazine, IEEE Computer Society, Director, U.S. National Agricultural Library This book presents a holistic perspective on Green IT by discussing its various facets and showing how to strategically embrace it Harnessing Green IT: Principles and Practicesexamines various ways of making computing and information systems greener environmentally sustainable -, as well as several means of using Information Technology (IT) as a tool and an enabler to improve the environmental sustainability. The book focuses on both greening of IT and greeninTrade Review"This book will be an excellent resource for IT Professionals, academics, students, researchers, project leaders/managers, IT business executives, CIOs, CTOs and anyone interested in Green IT and harnessing it to enhance our environment.” (Computer Science of India (CSI) enewsletter), 1 February 2013) Table of ContentsAbout the Editors xix About the Authors xxi Foreword xxix Preface xxxi Acknowledgements xxxv 1 Green IT: An Overview 1 San Murugesan and G.R. Gangadharan Key Points 1 1.1 Introduction 1 1.2 Environmental Concerns and Sustainable Development 2 1.2.1 The Inconvenient Truth 3 1.2.2 Sustainable Development 4 1.2.3 Why Should You Go Green? 4 1.3 Environmental Impacts of IT 4 1.4 Green IT 5 1.4.1 OCED Green IT Framework 6 1.4.2 Green IT 1.0 and 2.0 7 1.5 Holistic Approach to Greening IT 7 1.5.1 Greening Computer’s Entire Life Cycle 8 1.5.2 The Three Rs of Green IT 9 1.6 Greening IT 10 1.6.1 Green PCs, Notebooks and Servers 10 1.6.2 Green Data Centres 10 1.6.3 Green Cloud Computing 12 1.6.4 Green Data Storage 12 1.6.5 Green Software 13 1.6.6 Green Networking and Communications 13 1.7 Applying IT for Enhancing Environmental Sustainability 14 1.8 Green IT Standards and Eco-Labelling of IT 15 1.9 Enterprise Green IT Strategy 15 1.9.1 Green Washing 17 1.10 Green IT: Burden or Opportunity? 17 1.11 Conclusion 18 Review Questions 19 Discussion Questions 19 References 19 Further Reading and Useful Web Sites 20 2 Green Devices and Hardware 23 Ashok Pon Kumar and Sateesh S. Kannegala Key Points 23 2.1 Introduction 23 2.2 Life Cycle of a Device or Hardware 24 2.2.1 Design 25 2.2.2 Manufacturing 26 2.2.3 Packaging and Transportation 28 2.2.4 Use 29 2.3 Reuse, Recycle and Dispose 34 2.4 Conclusions 36 Review Questions 37 Discussion Questions 37 References 37 3 Green Software 39 Bob Steigerwald and Abhishek Agrawal Key Points 39 3.1 Introduction 39 3.1.1 Processor Power States 40 3.2 Energy-Saving Software Techniques 41 3.2.1 Computational Efficiency 42 3.2.2 Data Efficiency 45 3.2.3 Context Awareness 49 3.2.4 Idle Efficiency 52 3.3 Evaluating and Measuring Software Impact to Platform Power 55 3.3.1 Fluke NetDAQ® (Networked Data Acquisition Unit) 55 3.3.2 Software Tools 57 3.4 Summary 59 Acknowledgements 60 Review Questions 61 Discussion Questions 61 References 61 Further Reading 62 4 Sustainable Software Development 63 Felipe Albertao Key Points 63 4.1 Introduction 63 4.2 Current Practices 64 4.3 Sustainable Software 65 4.4 Software Sustainability Attributes 66 4.5 Software Sustainability Metrics 68 4.5.1 Modifiability and Reusability 68 4.5.2 Portability 70 4.5.3 Supportability 71 4.5.4 Performance 71 4.5.5 Dependability 71 4.5.6 Usability 71 4.5.7 Accessibility 72 4.5.8 Predictability 72 4.5.9 Efficiency 73 4.5.10 Project’s Carbon Footprint 73 4.6 Sustainable Software Methodology 73 4.6.1 Collecting Metrics 73 4.6.2 Code Metrics Tools 74 4.6.3 Simplified Usability Study 75 4.6.4 Platform Analysis 76 4.6.5 Existing Project Statistics 77 4.7 Defining Actions 77 4.8 Case Study 78 4.8.1 Modifiability and Reusability 78 4.8.2 Portability 78 4.8.3 Supportability 79 4.8.4 Performance 79 4.8.5 Dependability 79 4.8.6 Usability 79 4.8.7 Accessibility 79 4.8.8 Predictability 81 4.8.9 Efficiency 81 4.8.10 Project’s Footprint 81 4.8.11 Results and Actions 81 4.9 Conclusions 82 Review Questions 82 Discussion Questions 82 References 83 5 Green Data Centres 85 Charles G. Sheridan, Keith A. Ellis, Enrique G. Castro-Leon and Christopher P. Fowler Key Points 85 5.1 Data Centres and Associated Energy Challenges 85 5.2 Data Centre IT Infrastructure 87 5.2.1 Servers 87 5.2.2 Networking 89 5.2.3 Storage 89 5.2.4 IT Platform Innovation 90 5.3 Data Centre Facility Infrastructure: Implications for Energy Efficiency 92 5.3.1 Power System 92 5.3.2 Cooling 95 5.3.3 Facilities Infrastructure Management 97 5.4 IT Infrastructure Management 98 5.4.1 Server Power 98 5.4.2 Consolidation 101 5.4.3 Virtualization 104 5.5 Green Data Centre Metrics 106 5.5.1 PUE and DCiE 106 5.5.2 Power versus Energy Consumption 107 5.6 Data Centre Management Strategies: A Case Study 108 5.6.1 Challenges 108 5.6.2 Tested Solution 108 5.6.3 Impact 108 5.6.4 A Thorough Evaluation 109 5.7 Conclusions 110 Review Questions 111 Discussion Questions 111 References 111 Further Reading and Useful Web Sites 112 6 Green Data Storage 113 Pin Zhou and Nagapramod Mandagere Key Points 113 6.1 Introduction 113 6.2 Storage Media Power Characteristics 115 6.2.1 Hard Disks 115 6.2.2 Magnetic Tapes 117 6.2.3 Solid-State Drives (SSDs) 117 6.3 Energy Management Techniques for Hard Disks 118 6.3.1 State Transitioning 118 6.3.2 Caching 118 6.3.3 Dynamic RPM 119 6.4 System-Level Energy Management 119 6.4.1 RAID with Power Awareness 120 6.4.2 Power-Aware Data Layout 120 6.4.3 Hierarchical Storage Management 121 6.4.4 Storage Virtualization 122 6.4.5 Cloud Storage 123 6.5 Summary and Research Areas 124 Review Questions 124 Discussion Questions 124 References 124 7 Green Networks and Communications 127 Cathryn Peoples, Gerard Parr, Sally McClean and Philip Morrow Key Points 127 7.1 Introduction 127 7.1.1 Green Network Communications and Management: Background 128 7.1.2 The Challenge of Next-Generation Networks 129 7.1.3 Benefits of Energy-Efficient Networks 130 7.1.4 Objectives of Green Networking 131 7.1.5 Core Components in Green-Networking Technology 132 7.2 Objectives of Green Network Protocols 132 7.2.1 Energy-Optimizing Protocol Design 133 7.2.2 Bit Costs Associated with Network Communication Protocols 135 7.2.3 Objectives of Green Network Protocols 138 7.3 Green Network Protocols and Standards 140 7.3.1 Strategies to Reduce Carbon Emissions 140 7.3.2 Contributions from the EMAN Working Group 140 7.3.3 Contributions from Standardization Bodies 142 7.3.4 Context Detail to Drive Energy Efficiency 142 7.4 Conclusions 145 Acknowledgements 145 Review Questions 145 Discussion Questions 146 References 146 Further Reading and Useful Web Sites 148 8 Enterprise Green IT Strategy 149 Bhuvan Unhelkar Key Points 149 8.1 Introduction 149 8.2 Approaching Green IT Strategies 151 8.3 Business Drivers of Green IT Strategy 153 8.3.1 Cost Reduction 153 8.3.2 Demands from Legal and Regulatory Requirements 154 8.3.3 Sociocultural and Political Pressure 155 8.3.4 Enlightened Self-Interest 155 8.3.5 Collaborative Business Ecosystem 155 8.3.6 New Market Opportunities 156 8.4 Business Dimensions for Green IT Transformation 156 8.4.1 Economy 157 8.4.2 Technology 157 8.4.3 Process 158 8.4.4 People 158 8.5 Organizational Considerations in a Green IT Strategy 160 8.6 Steps in Developing a Green IT Strategy 161 8.7 Metrics and Measurements in Green Strategies 163 8.8 Conclusions 164 Review Questions 164 Discussion Questions 164 References 164 9 Sustainable Information Systems and Green Metrics 167 Edward Curry and Brian Donnellan Key Points 167 9.1 Introduction 167 9.2 Multilevel Sustainable Information 168 9.3 Sustainability Hierarchy Models 170 9.3.1 Sustainability Frameworks 170 9.3.2 Sustainability Principles 172 9.3.3 Tools for Sustainability 172 9.4 Product Level Information 173 9.4.1 Life-Cycle Assessment 173 9.4.2 The Four Stages of LCA 173 9.4.3 CRT Monitors versus LCD Monitors: Life Cycle Assessment 174 9.5 Individual Level Information 174 9.6 Functional Level Information 176 9.6.1 Data Centre Energy Efficiency 176 9.6.2 Data Centre Power Metrics 176 9.6.3 Emerging Data Centre Metrics 177 9.7 Organizational Level Information 178 9.7.1 Reporting Greenhouse Gas Emissions 178 9.8 Regional/City Level Information 181 9.8.1 Developing a City Sustainability Plan: A Case Study 181 9.9 Measuring the Maturity of Sustainable ICT 182 9.9.1 A Capability Maturity Framework for SICT 182 9.9.2 Defining the Scope and Goal 185 9.9.3 Capability Maturity Levels 185 9.9.4 SICT Capability Building Blocks 186 9.9.5 Assessing and Managing SICT Progress 188 9.10 Conclusions 189 Appendix: Sustainability Tools and Standards 190 Acknowledgements 195 Review Questions 195 Discussion Questions 196 References 196 Further Reading and Useful Web Sites 197 Tools and Carbon Calculators 198 10 Enterprise Green IT Readiness 199 Alemayehu Molla and Vanessa Cooper Key Points 199 10.1 Introduction 199 10.2 Background: Readiness and Capability 201 10.3 Development of the G-Readiness Framework 202 10.3.1 Green IT Attitude 203 10.3.2 Green IT Policy 204 10.3.3 Green IT Governance 204 10.3.4 Green IT Practice 205 10.3.5 Green IT Technology 205 10.4 Measuring an Organization’s G-Readiness 206 10.4.1 G-Readiness Consultancy Services 206 10.4.2 Calculating the G-Readiness Index via a Survey Instrument 207 10.5 Conclusions 207 Review Questions 208 Discussion Questions 209 References 209 11 Sustainable IT Services: Creating a Framework for Service Innovation 211 Robert R. Harmon and Haluk Demirkan Key Points 211 11.1 Introduction 211 11.2 Factors Driving the Development of Sustainable IT 213 11.2.1 The Sustainability Dimensions of IT 213 11.2.2 Corporate Sustainability, Social Responsibility and IT 216 11.3 Sustainable IT Services (SITS) 219 11.3.1 Developing a Service-Dominant Logic 219 11.3.2 Business Value, Customer Value and Societal Value 220 11.3.3 SITS as Service Science 222 11.4 SITS Strategic Framework 224 11.4.1 The SITS Value Curve 224 11.4.2 Integrating Sustainable IT and Business Strategy 227 11.5 Sustainable IT Roadmap 229 11.5.1 Time Horizon 229 11.5.2 Market Segments 229 11.5.3 Products, Services and Technologies 229 11.5.4 Compliance, Regulations, Standards and Reporting 231 11.5.5 SITS Standards and Reporting 232 11.5.6 Organizational Changes 232 11.5.7 Value Goals 232 11.6 SITS Leadership and Best Practices 233 11.6.1 IBM 233 11.6.2 Cisco Systems, Inc. 233 11.6.3 Siemens AG 235 11.6.4 HP 235 11.6.5 Intel Corporation 235 11.6.6 Microsoft Corporation 235 11.6.7 Oracle 236 11.6.8 Google 236 11.6.9 Apple 236 11.6.10 Samsung 236 11.6.11 Pachube 236 11.6.12 SeeClickFix 237 11.7 Conclusions 237 11.8 Summary 237 Review Questions 238 Discussion Questions 238 References 238 Useful Web Sites 242 12 Green Enterprises and the Role of IT 243 Joseph Sarkis Key Points 243 12.1 Introduction 243 12.2 Organizational and Enterprise Greening 244 12.2.1 The Green Enterprise: A Value Chain Perspective 245 12.3 Information Systems in Greening Enterprises 248 12.3.1 Environmental Management Information Systems 250 12.3.2 Software and Databases 250 12.3.3 ERP EMISs 250 12.3.4 ERP Challenges and Deficiencies with Respect to EMIS 254 12.3.5 Integrating Environmental and LCA Information with ERP 254 12.3.6 Electronic Environmental and Sustainability Reporting 255 12.4 Greening the Enterprise: IT Usage and Hardware 255 12.4.1 Environmental Information Technology Standards 256 12.4.2 Green Management of Data Centres 256 12.5 Inter-organizational Enterprise Activities and Green Issues 256 12.5.1 Electronic Commerce and Greening the Extended Enterprise 257 12.5.2 Demanufacturing and Reverse Logistics 258 12.5.3 Eco-Industrial Parks and Information Systems 259 12.6 Enablers and Making the Case for IT and the Green Enterprise 261 12.7 Conclusions 262 Review Questions 262 Discussion Questions 262 References 263 13 Environmentally Aware Business Process Improvement in the Enterprise Context 265 Konstantin Hoesch-Klohe and Aditya Ghose Key Points 265 13.1 Introduction 265 13.2 Identifying the Environmental Impact of an Activity or Process 266 13.2.1 Educated Guess by an Expert 266 13.2.2 Derivation from a Resource Model 267 13.2.3 Carbon-Dioxide Accumulation 267 13.2.4 Activity-Based Costing 267 13.3 A Decision Support Tool for Environmentally Aware Business Process Improvement 268 13.3.1 Some Preliminaries 268 13.3.2 The Business Process Improvement System 269 13.4 Process Improvement in the Enterprise Context 270 13.4.1 The Enterprise Ecosystem 271 13.4.2 Enterprise Ecosystem Equilibrium 272 13.5 Impact and Change Propagation Analysis 272 13.5.1 Identifying the Consequences of a Business Process Change 272 13.5.2 Re-Establishing a State of Equilibrium 273 13.6 Trade-Off Analysis 275 13.6.1 Cost to Bring about the Change 275 13.6.2 Environmental Operating Costs 276 13.7 An Example 276 13.7.1 As-Is Scenario 276 13.7.2 Improvement Scenarios 277 13.7.3 Assessing Scenarios 278 13.8 Conclusions 280 Review Questions 280 Discussion Questions 280 References 280 14 Managing Green IT 283 Linda R. Wilbanks Key Points 283 14.1 Introduction 283 14.2 Strategizing Green Initiatives 284 14.2.1 Strategic Thinking 284 14.2.2 Strategic Planning 285 14.2.3 Strategic Implementation 286 14.2.4 Enterprise Architecture Planning 286 14.3 Implementation of Green IT 288 14.3.1 Return on Investment 289 14.3.2 Metrics 290 14.3.3 The Goal–Question–Metric (GQM) Paradigm 291 14.4 Information Assurance 292 14.4.1 Risk Management 292 14.5 Communication and Social Media 294 14.6 Case Study 295 14.7 Summary 296 Review Questions 296 Discussion Questions 296 References 296 15 Regulating Green IT: Laws, Standards and Protocols 297 Tom Butler Key Points 297 15.1 Introduction 297 15.2 The Regulatory Environment and IT Manufacturers 299 15.2.1 RoHS 300 15.2.2 REACh 301 15.2.3 WEEE 302 15.2.4 Legislating for GHG Emissions and Energy Use of IT Equipment 303 15.3 Nonregulatory Government Initiatives 303 15.4 Industry Associations and Standards Bodies 305 15.5 Green Building Standards 306 15.6 Green Data Centres 306 15.7 Social Movements and Greenpeace 308 15.8 Conclusions 311 Review Questions 312 Discussion Questions 313 References 313 Further Reading 314 16 Green Cloud Computing and Environmental Sustainability 315 Saurabh Kumar Garg and Rajkumar Buyya Key Points 315 16.1 Introduction 315 16.2 What is Cloud Computing? 318 16.2.1 Cloud Computing Characteristics 318 16.2.2 Components of Cloud Computing 319 16.2.3 Cloud Computing Deployment Models 321 16.3 Cloud Computing and Energy Usage Model: A Typical Example 322 16.3.1 User and Cloud Software Applications 323 16.3.2 Cloud Software Stack for the SaaS, PaaS and IaaS Levels 323 16.3.3 Network Devices 324 16.3.4 Data Centres 325 16.4 Features of Clouds Enabling Green Computing 325 16.5 Towards Energy Efficiency of Cloud Computing 327 16.5.1 Applications 327 16.5.2 Cloud Software Stack: Virtualization and Provisioning 327 16.5.3 Data Centre Level: Cooling, Hardware, Network and Storage 329 16.5.4 Monitoring and Metering 330 16.5.5 Network Infrastructure 331 16.6 Green Cloud Architecture 332 16.7 Case Study: IaaS Provider 334 16.8 Conclusions and Future Directions 336 Acknowledgements 337 Review Questions 337 Discussion Questions 337 References 337 17 Harnessing Semantic Web Technologies for the Environmental Sustainability of Production Systems 341 Chris Davis, Igor Nikolic and Gerard Dijkema Key Points 341 17.1 Introduction 341 17.2 Information Management for Environmental Sustainability 344 17.2.1 Invisible Coordination 344 17.2.2 Sustainability and Networks 344 17.2.3 Need for Information Management Techniques 345 17.3 Ecosystem of Software Tools 346 17.3.1 MediaWiki 346 17.3.2 Semantic MediaWiki 348 17.3.3 SparqlExtension 350 17.3.4 Semantic Web 351 17.4 Examples of Managing Data 353 17.4.1 Pages for Commodities 353 17.4.2 Pages for Processes 354 17.4.3 Pages for Overviews and Information Management 356 17.4.4 Reuse of Data across Multiple Levels and Points of View 358 17.5 Challenges and Guiding Principles 358 17.5.1 Challenges 358 17.5.2 Guiding Principles 359 17.6 Conclusions 360 Review Questions 361 Discussion Questions 361 References 361 Further Reading and Useful Web Sites 363 18 Green IT: An Outlook 365 San Murugesan and G.R. Gangadharan Key Points 365 18.1 Introduction 365 18.2 Awareness to Implementation 366 18.2.1 Green IT Trends 366 18.2.2 Green Engineering 367 18.3 Greening by IT 368 18.3.1 Using RFID for Environmental Sustainability 368 18.3.2 Smart Grids 369 18.3.3 Smart Buildings and Homes 371 18.3.4 Green Supply Chain and Logistics 371 18.3.5 Enterprise-Wide Environmental Sustainability 372 18.4 Green IT: A Megatrend? 373 18.4.1 Outsourcing and Environmental Attributes 374 18.4.2 Green Audit 375 18.5 A Seven-Step Approach to Creating Green IT Strategy 375 18.5.1 Balancing the Costs and Benefits of Going Green 376 18.6 Research and Development Directions 376 18.7 Prospects 377 Review Questions 378 Discussion Questions 378 References 378 Glossary 381 Index 389

    15 in stock

    £72.86

  • LTE SelfOrganizing Networks SON

    John Wiley & Sons Inc LTE SelfOrganizing Networks SON

    10 in stock

    Book SynopsisThis book focuses on the key functional areas of LTE Self-Organizing Networks (SON), first introducing LTE network scenarios, technologies, and general SON concepts, and on to the latest status of 3GPP standardization.Table of ContentsForeword xiii Preface xv List of Contributors xix Acknowledgements xxi List of Abbreviations xxiii 1. Introduction 1 1.1 Self-Organising Networks (SON) 3 1.2 The Transition from Conventional Network Operation to SON 6 1.2.1 Automation of the Network Rollout 9 1.2.2 Automation of Network Optimisation and Troubleshooting 10 1.2.3 SON Characteristics and Challenges 11 References 12 2. LTE Overview 13 2.1 Introduction to LTE and SAE 13 2.1.1 3GPP Structure, Timeline and LTE Specifications 14 2.1.2 LTE Requirements 16 2.1.3 System Architecture Overview 16 2.1.4 Evolved UTRAN 18 2.1.5 E-UTRAN Functional Elements 19 2.1.6 Evolved Packet Core 21 2.1.7 Voice over LTE (VoLTE) 24 2.1.8 LTE-Advanced 24 2.1.9 Network Management 30 2.2 LTE Radio Access Network Scenarios and Their Evolution 33 2.2.1 LTE Radio Coverage Scenario 33 2.2.2 LTE for Capacity Enhancement in Existing GERAN/UTRAN 34 2.2.3 Enhancing LTE Capacity, the Multi-Layer LTE 34 2.2.4 Data Offloading, LIPA-SIPTO 35 2.2.5 Multi-Radio Access Network Scenarios or non-GPP 36 References 37 3. Self-Organising Networks (SON) 39 3.1 Vision 39 3.2 NGMN Operator Use Cases and 3GPP SON Use Cases 42 3.2.1 Operational Use Cases 42 3.2.2 NGMN SON Use Cases and Requirements 47 3.2.3 SON Use Cases in 3GPP 50 3.3 Foundations for SON 52 3.3.1 Control Engineering: Feedback Loops 53 3.3.2 Autonomic Computing and Autonomic Management 55 3.3.3 SON Research Projects 57 3.4 Architecture 60 3.4.1 Use-Case Related Criteria 62 3.4.2 System-Level Criteria 64 3.5 Business Value 65 3.5.1 The Economics of eNB Sites 65 3.5.2 General Mode of Operation of SON 68 3.5.3 Installation and Planning 71 3.5.4 Network Optimisation 72 3.5.5 Fault Management 73 3.5.6 Conclusions 74 3.6 SON Operational and Technical Challenges 75 3.6.1 Transition of Operational Processes to SON 75 3.6.2 Technical (Engineering) Challenges 78 References 80 4. Self-Configuration (‘Plug-and-Play’) 81 4.1 Auto-Connectivity and -Commissioning 82 4.1.1 Preparation 85 4.1.2 Connectivity Setup, Site-Identification and Auto-Commissioning 87 4.1.3 LTE-A Relay Auto-Connectivity 93 4.1.4 Conclusions 100 4.2 Dynamic Radio Configuration 100 4.2.1 Generation of Initial Transmission Parameters 106 4.2.2 Physical Cell-ID Allocation 111 4.2.3 Automatic Neighbour Relationship Setup (ANR) 118 4.2.4 DRC Architecture 130 4.2.5 Conclusions 132 References 133 5. Self-Optimisation 135 5.1 Mobility Robustness Optimisation 136 5.1.1 Goals of MRO 136 5.1.2 Cell Changes and Interference Challenges 137 5.1.3 MRO Relevant Parameters 140 5.1.4 Causes for Mobility Problems 144 5.1.5 MRO Solutions 146 5.1.6 MRO Time Scales 151 5.1.7 MRO Performance 152 5.2 Mobility Load Balancing and Traffic Steering 157 5.2.1 Introduction to Traffic Steering 157 5.2.2 SON Policies for Mobility Load Balancing 159 5.2.3 A Theoretical View of Load Balancing 160 5.2.4 Standardised Features and Procedures to Direct UEs to the Desired Layer 166 5.2.5 Exemplary Results of MLB 182 5.2.6 Uplink Load Balancing 189 5.2.7 Interactions Between TS/MLB and MRO 190 5.3 Energy Saving 193 5.3.1 Introduction 193 5.3.2 Requirements 195 5.3.3 Energy Saving Management 195 5.3.4 eNB Overlaid Scenario 196 5.3.5 Capacity-Limited Network 198 5.3.6 Equipment/Local ES 200 5.3.7 Example Scenarios and Expected Gains 201 5.3.8 Summary 204 5.4 Coverage and Capacity Optimisation 204 5.4.1 CCO with Adaptive Antennas 205 5.4.2 Performance Analysis for Antenna Parameter Optimisation Based CCO 208 5.4.3 CCO with TX Power 216 5.5 RACH Optimisation 217 5.5.1 General 217 5.5.2 PRACH Configuration 218 5.5.3 RACH Configuration 219 5.5.4 RACH/PRACH Configuration Example 221 5.5.5 RA Performance 222 5.5.6 Self-Optimisation Framework 223 5.5.7 UE Reporting 223 5.5.8 Inter-eNB Communication 225 5.6 RRM and SON (Interference Coordination, P0 Optimisation) 226 5.6.1 Interference Coordination 226 5.6.2 P0 Optimisation 230 References 232 6. Self-Healing 235 6.1 Introduction 236 6.1.1 3GPP Use Cases 236 6.1.2 3GPP Self-Healing Process and its Management 237 6.1.3 Cell Degradation Management 238 6.2 Cell Degradation Detection 242 6.3 Cell Degradation Diagnosis and Prediction 248 6.3.1 Rule Based Systems 250 6.3.2 Bayesian Networks 251 6.3.3 Case Based Reasoning 253 6.3.4 Neural Networks 255 6.3.5 Active Measurements 256 6.3.6 Prediction 257 6.4 Cell Outage Compensation 259 6.4.1 Activation of Cell Outage Compensation 260 6.4.2 Means of Cell Outage Compensation 260 6.4.3 Interaction between Cell Outage Compensation and Self-Configuration Functions 263 References 264 7. Supporting Function: Minimisation of Drive Tests (MDT) 267 7.1 Introduction 267 7.1.1 General 267 7.1.2 History and Background 269 7.2 Relation to SON 272 7.3 Requirements 273 7.4 Use Cases 275 7.4.1 Operator Scenarios 276 7.4.2 Coverage Optimisation 277 7.4.3 Mobility Optimisation 281 7.4.4 Capacity Optimisation 281 7.4.5 Parameterisation for Common Channels 282 7.4.6 QoS Verification 282 7.5 Overall Architecture 283 7.6 Managing MDT 285 7.6.1 Subscriber and Equipment Trace 285 7.6.2 MDT Configuration Parameters 285 7.6.3 Subscription Based MDT 287 7.6.4 Area Based MDT 292 7.6.5 Supporting Functionality in the Management System 293 7.6.6 MDT Reporting 293 7.7 MDT Radio Interface Procedures 295 7.7.1 Immediate MDT 296 7.7.2 Logged MDT 298 7.7.3 RLF Reporting 303 7.7.4 Measurement Parameters 305 7.7.5 Location Information 308 7.8 Conclusion 309 References 310 8. SON for Core Networks 311 8.1 Introduction 311 8.2 SON for Packet Core Networks 311 8.2.1 Packet Core Element Auto-Configuration 311 8.2.2 Automatic Neighbour Relation 313 8.2.3 S1 Flex (MME Pooling) 314 8.2.4 Signalling Optimisation 315 8.2.5 Latency Optimisation 317 8.2.6 Fast Gateway Convergence with Bidirectional Forward Detection 318 8.2.7 Dynamic IP Pool Allocation 318 8.2.8 Energy Saving 319 8.3 SON for Voice Core Networks 319 8.3.1 Voice Over IP Quality Monitoring and Management 319 8.3.2 Resource Optimisation in Voice Core Network 320 References 321 9. SON Operation 322 9.1 SON Function Interactions 323 9.1.1 Spatial Characteristic 324 9.1.2 Temporal Characteristic 324 9.1.3 Categories of SON Conflicts 326 9.1.4 Network Parameters Related to SON Functions 329 9.1.5 Examples for Conflicts between SON Functions 330 9.2 Coordination of SON Functions 334 9.2.1 Basic Options for SON Coordination 334 9.2.2 Goals of SON Function Coordination 338 9.2.3 SON Coordination Function Concept 340 9.2.4 Coordination Schemes 346 9.2.5 Related Work 352 9.2.6 SON Function Coordination Example 352 9.3 Conclusions 355 References 356 10. SON for Heterogeneous Networks (HetNet) 357 10.1 Introduction 357 10.2 Standardisation and Network Architecture 359 10.2.1 Network Architecture for HetNet 361 10.3 Self-Configuration 362 10.3.1 Auto-Connectivity and -Commissioning 363 10.3.2 Automatic Site Identification and Hardware-to-Site Mapping 364 10.3.3 Automatic Neighbour Relations (ANR) 365 10.4 Self-Optimisation: Interference Management 365 10.4.1 Interference Characteristics in HetNet Scenarios 365 10.4.2 Basic Interference Management Techniques 366 10.4.3 Scenarios with Macro eNBs and Micro/Pico eNBs 369 10.4.4 Enhanced Time-Domain Interference Management: eICIC 370 10.4.5 Outlook on Further Interference Management Innovations 374 10.5 Self-Optimisation: Mobility Aspects; MRO and Traffic Steering 375 10.5.1 Mobility Robustness Optimisation 375 10.5.2 Multi-Layer Traffic Steering and Load Balancing 377 10.5.3 IEEE 802.11 (WiFi) Integration 378 References 378 11. Future Research Topics 379 11.1 Future Mobile Network Scenarios 379 11.1.1 Heterogeneous Networks 379 11.1.2 Cloud RAN 380 11.1.3 Requirements for Future OAM Systems 381 11.2 Cognitive Radio Networks (CRN) 381 11.2.1 From SON to CRN 381 11.2.2 Definitions 382 11.2.3 Framework 383 11.2.4 Artificial Intelligence 385 11.3 Applications 387 11.3.1 Self-Configuration 387 11.3.2 Self-Optimisation 387 11.3.3 Self-Healing 388 11.3.4 Operation 388 11.4 Conclusion 389 References 389 Index 391

    10 in stock

    £85.45

  • Techniques for Noise Robustness in Automatic

    John Wiley & Sons Inc Techniques for Noise Robustness in Automatic

    1 in stock

    Book SynopsisWith the growing use of automatic speech recognition (ASR) in everyday life, the ability to solve problems in recorded speech is critical for engineers and researchers developing ASR technologies. The only resource of its kind, this book presents a comprehensive survey of state-of-the-art techniques used to improve the robustness of ASR systems.Table of ContentsList of Contributors xv Acknowledgments xvii 1 Introduction 1 Tuomas Virtanen, Rita Singh, Bhiksha Raj 1.1 Scope of the Book 1 1.2 Outline 2 1.3 Notation 4 Part One FOUNDATIONS 2 The Basics of Automatic Speech Recognition 9 Rita Singh, Bhiksha Raj, Tuomas Virtanen 2.1 Introduction 9 2.2 Speech Recognition Viewed as Bayes Classification 10 2.3 Hidden Markov Models 11 2.3.1 Computing Probabilities with HMMs 12 2.3.2 Determining the State Sequence 17 2.3.3 Learning HMM Parameters 19 2.3.4 Additional Issues Relating to Speech Recognition Systems 20 2.4 HMM-Based Speech Recognition 24 2.4.1 Representing the Signal 24 2.4.2 The HMM for a Word Sequence 25 2.4.3 Searching through all Word Sequences 26 References 29 3 The Problem of Robustness in Automatic Speech Recognition 31 Bhiksha Raj, Tuomas Virtanen, Rita Singh 3.1 Errors in Bayes Classification 31 3.1.1 Type 1 Condition: Mismatch Error 33 3.1.2 Type 2 Condition: Increased Bayes Error 34 3.2 Bayes Classification and ASR 35 3.2.1 All We Have is a Model: A Type 1 Condition 35 3.2.2 Intrinsic Interferences—Signal Components that are Unrelated to the Message: A Type 2 Condition 36 3.2.3 External Interferences—The Data are Noisy: Type 1 and Type 2 Conditions 36 3.3 External Influences on Speech Recordings 36 3.3.1 Signal Capture 37 3.3.2 Additive Corruptions 41 3.3.3 Reverberation 42 3.3.4 A Simplified Model of Signal Capture 43 3.4 The Effect of External Influences on Recognition 44 3.5 Improving Recognition under Adverse Conditions 46 3.5.1 Handling the Model Mismatch Error 46 3.5.2 Dealing with Intrinsic Variations in the Data 47 3.5.3 Dealing with Extrinsic Variations 47 References 50 Part Two SIGNAL ENHANCEMENT 4 Voice Activity Detection, Noise Estimation, and Adaptive Filters for Acoustic Signal Enhancement 53 Rainer Martin, Dorothea Kolossa 4.1 Introduction 53 4.2 Signal Analysis and Synthesis 55 4.2.1 DFT-Based Analysis Synthesis with Perfect Reconstruction 55 4.2.2 Probability Distributions for Speech and Noise DFT Coefficients 57 4.3 Voice Activity Detection 58 4.3.1 VAD Design Principles 58 4.3.2 Evaluation of VAD Performance 62 4.3.3 Evaluation in the Context of ASR 62 4.4 Noise Power Spectrum Estimation 65 4.4.1 Smoothing Techniques 65 4.4.2 Histogram and GMM Noise Estimation Methods 67 4.4.3 Minimum Statistics Noise Power Estimation 67 4.4.4 MMSE Noise Power Estimation 68 4.4.5 Estimation of the A Priori Signal-to-Noise Ratio 69 4.5 Adaptive Filters for Signal Enhancement 71 4.5.1 Spectral Subtraction 71 4.5.2 Nonlinear Spectral Subtraction 73 4.5.3 Wiener Filtering 74 4.5.4 The ETSI Advanced Front End 75 4.5.5 Nonlinear MMSE Estimators 75 4.6 ASR Performance 80 4.7 Conclusions 81 References 82 5 Extraction of Speech from Mixture Signals 87 Paris Smaragdis 5.1 The Problem with Mixtures 87 5.2 Multichannel Mixtures 88 5.2.1 Basic Problem Formulation 88 5.2.2 Convolutive Mixtures 92 5.3 Single-Channel Mixtures 98 5.3.1 Problem Formulation 98 5.3.2 Learning Sound Models 100 5.3.3 Separation by Spectrogram Factorization 101 5.3.4 Dealing with Unknown Sounds 105 5.4 Variations and Extensions 107 5.5 Conclusions 107 References 107 6 Microphone Arrays 109 John McDonough, Kenichi Kumatani 6.1 Speaker Tracking 110 6.2 Conventional Microphone Arrays 113 6.3 Conventional Adaptive Beamforming Algorithms 120 6.3.1 Minimum Variance Distortionless Response Beamformer 120 6.3.2 Noise Field Models 122 6.3.3 Subband Analysis and Synthesis 123 6.3.4 Beamforming Performance Criteria 126 6.3.5 Generalized Sidelobe Canceller Implementation 129 6.3.6 Recursive Implementation of the GSC 130 6.3.7 Other Conventional GSC Beamformers 131 6.3.8 Beamforming based on Higher Order Statistics 132 6.3.9 Online Implementation 136 6.3.10 Speech-Recognition Experiments 140 6.4 Spherical Microphone Arrays 142 6.5 Spherical Adaptive Algorithms 148 6.6 Comparative Studies 149 6.7 Comparison of Linear and Spherical Arrays for DSR 152 6.8 Conclusions and Further Reading 154 References 155 Part Three FEATURE ENHANCEMENT 7 From Signals to Speech Features by Digital Signal Processing 161 Matthias W¨olfel 7.1 Introduction 161 7.1.1 About this Chapter 162 7.2 The Speech Signal 162 7.3 Spectral Processing 163 7.3.1 Windowing 163 7.3.2 Power Spectrum 165 7.3.3 Spectral Envelopes 166 7.3.4 LP Envelope 166 7.3.5 MVDR Envelope 169 7.3.6 Warping the Frequency Axis 171 7.3.7 Warped LP Envelope 175 7.3.8 Warped MVDR Envelope 176 7.3.9 Comparison of Spectral Estimates 177 7.3.10 The Spectrogram 179 7.4 Cepstral Processing 179 7.4.1 Definition and Calculation of Cepstral Coefficients 180 7.4.2 Characteristics of Cepstral Sequences 181 7.5 Influence of Distortions on Different Speech Features 182 7.5.1 Objective Functions 182 7.5.2 Robustness against Noise 185 7.5.3 Robustness against Echo and Reverberation 187 7.5.4 Robustness against Changes in Fundamental Frequency 189 7.6 Summary and Further Reading 191 References 191 8 Features Based on Auditory Physiology and Perception 193 Richard M. Stern, Nelson Morgan 8.1 Introduction 193 8.2 Some Attributes of Auditory Physiology and Perception 194 8.2.1 Peripheral Processing 194 8.2.2 Processing at more Central Levels 200 8.2.3 Psychoacoustical Correlates of Physiological Observations 202 8.2.4 The Impact of Auditory Processing on Conventional Feature Extraction 206 8.2.5 Summary 208 8.3 “Classic” Auditory Representations 208 8.4 Current Trends in Auditory Feature Analysis 213 8.5 Summary 221 Acknowledgments 222 References 222 9 Feature Compensation 229 Jasha Droppo 9.1 Life in an Ideal World 229 9.1.1 Noise Robustness Tasks 229 9.1.2 Probabilistic Feature Enhancement 230 9.1.3 Gaussian Mixture Models 231 9.2 MMSE-SPLICE 232 9.2.1 Parameter Estimation 233 9.2.2 Results 236 9.3 Discriminative SPLICE 237 9.3.1 The MMI Objective Function 238 9.3.2 Training the Front-End Parameters 239 9.3.3 The Rprop Algorithm 240 9.3.4 Results 241 9.4 Model-Based Feature Enhancement 242 9.4.1 The Additive Noise-Mixing Equation 243 9.4.2 The Joint Probability Model 244 9.4.3 Vector Taylor Series Approximation 246 9.4.4 Estimating Clean Speech 247 9.4.5 Results 247 9.5 Switching Linear Dynamic System 248 9.6 Conclusion 249 References 249 10 Reverberant Speech Recognition 251 Reinhold Haeb-Umbach, Alexander Krueger 10.1 Introduction 251 10.2 The Effect of Reverberation 252 10.2.1 What is Reverberation? 252 10.2.2 The Relationship between Clean and Reverberant Speech Features 254 10.2.3 The Effect of Reverberation on ASR Performance 258 10.3 Approaches to Reverberant Speech Recognition 258 10.3.1 Signal-Based Techniques 259 10.3.2 Front-End Techniques 260 10.3.3 Back-End Techniques 262 10.3.4 Concluding Remarks 265 10.4 Feature Domain Model of the Acoustic Impulse Response 265 10.5 Bayesian Feature Enhancement 267 10.5.1 Basic Approach 268 10.5.2 Measurement Update 269 10.5.3 Time Update 270 10.5.4 Inference 271 10.6 Experimental Results 272 10.6.1 Databases 272 10.6.2 Overview of the Tested Methods 273 10.6.3 Recognition Results on Reverberant Speech 274 10.6.4 Recognition Results on Noisy Reverberant Speech 276 10.7 Conclusions 277 Acknowledgment 278 References 278 Part Four MODEL ENHANCEMENT 11 Adaptation and Discriminative Training of Acoustic Models 285 Yannick Est`eve, Paul Del´eglise 11.1 Introduction 285 11.1.1 Acoustic Models 286 11.1.2 Maximum Likelihood Estimation 287 11.2 Acoustic Model Adaptation and Noise Robustness 288 11.2.1 Static (or Offline) Adaptation 289 11.2.2 Dynamic (or Online) Adaptation 289 11.3 Maximum A Posteriori Reestimation 290 11.4 Maximum Likelihood Linear Regression 293 11.4.1 Class Regression Tree 294 11.4.2 Constrained Maximum Likelihood Linear Regression 297 11.4.3 CMLLR Implementation 297 11.4.4 Speaker Adaptive Training 298 11.5 Discriminative Training 299 11.5.1 MMI Discriminative Training Criterion 301 11.5.2 MPE Discriminative Training Criterion 302 11.5.3 I-smoothing 303 11.5.4 MPE Implementation 304 11.6 Conclusion 307 References 308 12 Factorial Models for Noise Robust Speech Recognition 311 John R. Hershey, Steven J. Rennie, Jonathan Le Roux 12.1 Introduction 311 12.2 The Model-Based Approach 313 12.3 Signal Feature Domains 314 12.4 Interaction Models 317 12.4.1 Exact Interaction Model 318 12.4.2 Max Model 320 12.4.3 Log-Sum Model 321 12.4.4 Mel Interaction Model 321 12.5 Inference Methods 322 12.5.1 Max Model Inference 322 12.5.2 Parallel Model Combination 324 12.5.3 Vector Taylor Series Approaches 326 12.5.4 SNR-Dependent Approaches 331 12.6 Efficient Likelihood Evaluation in Factorial Models 332 12.6.1 Efficient Inference using the Max Model 332 12.6.2 Efficient Vector-Taylor Series Approaches 334 12.6.3 Band Quantization 335 12.7 Current Directions 337 12.7.1 Dynamic Noise Models for Robust ASR 338 12.7.2 Multi-Talker Speech Recognition using Graphical Models 339 12.7.3 Noise Robust ASR using Non-Negative Basis Representations 340 References 341 13 Acoustic Model Training for Robust Speech Recognition 347 Michael L. Seltzer 13.1 Introduction 347 13.2 Traditional Training Methods for Robust Speech Recognition 348 13.3 A Brief Overview of Speaker Adaptive Training 349 13.4 Feature-Space Noise Adaptive Training 351 13.4.1 Experiments using fNAT 352 13.5 Model-Space Noise Adaptive Training 353 13.6 Noise Adaptive Training using VTS Adaptation 355 13.6.1 Vector Taylor Series HMM Adaptation 355 13.6.2 Updating the Acoustic Model Parameters 357 13.6.3 Updating the Environmental Parameters 360 13.6.4 Implementation Details 360 13.6.5 Experiments using NAT 361 13.7 Discussion 364 13.7.1 Comparison of Training Algorithms 364 13.7.2 Comparison to Speaker Adaptive Training 364 13.7.3 Related Adaptive Training Methods 365 13.8 Conclusion 366 References 366 Part Five COMPENSATION FOR INFORMATION LOSS 14 Missing-Data Techniques: Recognition with Incomplete Spectrograms 371 Jon Barker 14.1 Introduction 371 14.2 Classification with Incomplete Data 373 14.2.1 A Simple Missing Data Scenario 374 14.2.2 Missing Data Theory 376 14.2.3 Validity of the MAR Assumption 378 14.2.4 Marginalising Acoustic Models 379 14.3 Energetic Masking 381 14.3.1 The Max Approximation 381 14.3.2 Bounded Marginalisation 382 14.3.3 Missing Data ASR in the Cepstral Domain 384 14.3.4 Missing Data ASR with Dynamic Features 386 14.4 Meta-Missing Data: Dealing with Mask Uncertainty 388 14.4.1 Missing Data with Soft Masks 388 14.4.2 Sub-band Combination Approaches 391 14.4.3 Speech Fragment Decoding 393 14.5 Some Perspectives on Performance 395 References 396 15 Missing-Data Techniques: Feature Reconstruction 399 Jort Florent Gemmeke, Ulpu Remes 15.1 Introduction 399 15.2 Missing-Data Techniques 401 15.3 Correlation-Based Imputation 402 15.3.1 Fundamentals 402 15.3.2 Implementation 404 15.4 Cluster-Based Imputation 406 15.4.1 Fundamentals 406 15.4.2 Implementation 408 15.4.3 Advances 409 15.5 Class-Conditioned Imputation 411 15.5.1 Fundamentals 411 15.5.2 Implementation 412 15.5.3 Advances 413 15.6 Sparse Imputation 414 15.6.1 Fundamentals 414 15.6.2 Implementation 416 15.6.3 Advances 418 15.7 Other Feature-Reconstruction Methods 420 15.7.1 Parametric Approaches 420 15.7.2 Nonparametric Approaches 421 15.8 Experimental Results 421 15.8.1 Feature-Reconstruction Methods 422 15.8.2 Comparison with Other Methods 424 15.8.3 Advances 426 15.8.4 Combination with Other Methods 427 15.9 Discussion and Conclusion 428 Acknowledgments 429 References 430 16 Computational Auditory Scene Analysis and Automatic Speech Recognition 433 Arun Narayanan, DeLiang Wang 16.1 Introduction 433 16.2 Auditory Scene Analysis 434 16.3 Computational Auditory Scene Analysis 435 16.3.1 Ideal Binary Mask 435 16.3.2 Typical CASA Architecture 438 16.4 CASA Strategies 440 16.4.1 IBM Estimation Based on Local SNR Estimates 440 16.4.2 IBM Estimation using ASA Cues 442 16.4.3 IBM Estimation as Binary Classification 448 16.4.4 Binaural Mask Estimation Strategies 451 16.5 Integrating CASA with ASR 452 16.5.1 Uncertainty Transform Model 454 16.6 Concluding Remarks 458 Acknowledgment 458 References 458 17 Uncertainty Decoding 463 Hank Liao 17.1 Introduction 463 17.2 Observation Uncertainty 465 17.3 Uncertainty Decoding 466 17.4 Feature-Based Uncertainty Decoding 468 17.4.1 SPLICE with Uncertainty 470 17.4.2 Front-End Joint Uncertainty Decoding 471 17.4.3 Issues with Feature-Based Uncertainty Decoding 472 17.5 Model-Based Joint Uncertainty Decoding 473 17.5.1 Parameter Estimation 475 17.5.2 Comparisons with Other Methods 476 17.6 Noisy CMLLR 477 17.7 Uncertainty and Adaptive Training 480 17.7.1 Gradient-Based Methods 481 17.7.2 Factor Analysis Approaches 482 17.8 In Combination with Other Techniques 483 17.9 Conclusions 484 References 485 Index 487

    1 in stock

    £91.76

  • Near Field Communication

    John Wiley & Sons Inc Near Field Communication

    15 in stock

    Book SynopsisThis book provides the technical essentials, state-of-the-art knowledge, business ecosystem and standards of Near Field Communication (NFC)by NFC Lab Istanbul research centre which conducts intense research on NFC technology. In this book, the authors present the contemporary research on all aspects of NFC, addressing related security aspects as well as information on various business models. In addition, the book provides comprehensive information a designer needs to design an NFC project, an analyzer needs to analyze requirements of a new NFC based system, and a programmer needs to implement an application. Furthermore, the authors introduce the technical and administrative issues related to NFC technology, standards, and global stakeholders. It also offers comprehensive information as well as use case studies for each NFC operating mode to give the usage idea behind each operating mode thoroughly. Examples of NFC application development are provided using Java technologyTrade Review“While NFC is a very specific and limited protocol, the fact that this book covers all aspects of NFC and how it relates to many other communication methods makes the book very useful to a wide audience and an interesting read.” (IEEE Microwave Magazine, 1 September 2013) Table of ContentsPreface xv Acknowledgments xxiii List of Acronyms xxv 1 Executive Summary 1 1.1 Towards NFC Era 2 1.1.1 Ubiquitous Computing 2 1.1.2 Mobile Phones 3 1.1.3 Technological Motivation of NFC 4 1.1.4 Wireless Communication, RFID, and NFC 4 1.2 Evolution of NFC 4 1.2.1 Earlier Form of RFID: Barcode Technology 4 1.2.2 RFID Technology 5 1.2.3 Earlier Form of Smart Cards: Magnetic Stripe Cards 6 1.2.4 Smart Card Technology 6 1.2.5 NFC as a New Technology 7 1.3 NFC Essentials 7 1.3.1 Smart NFC Devices 8 1.3.2 Standardization of NFC Enabled Mobile Phones 8 1.3.3 General Architecture of NFC Enabled Mobile Phones 10 1.3.4 Near Field Communication Interface and Protocol (NFCIP) 11 1.4 NFC Operating Modes and Essentials 11 1.4.1 NFC Operating Modes 11 1.4.2 Reader/Writer Mode Essentials 12 1.4.3 Peer-to-Peer Mode Essentials 13 1.4.4 Card Emulation Mode Essentials 13 1.4.5 Case Studies 13 1.5 SE and Its Management 14 1.5.1 Over-the-Air Technology 15 1.5.2 GlobalPlatform Card Specification 15 1.5.3 Trusted Service Manager 16 1.5.4 UICC Management Models 16 1.5.5 Multiple SE Environments 16 1.6 NFC Application Development 17 1.6.1 JSR 257 18 1.6.2 JSR 177 18 1.7 NFC Security and Privacy 19 1.7.1 Why is Security Important? 19 1.7.2 Primary Goals of Security Measures 20 1.7.3 Vulnerability, Threat, Attack, and Risk 21 1.7.4 Security Tools and Mechanisms 21 1.7.5 NFC Security 22 1.7.6 Privacy, Legal, and Ethical Aspects 24 1.8 NFC Business Ecosystem 25 1.8.1 Stakeholders in NFC Ecosystem 27 1.8.2 Understanding NFC Business Models 28 1.8.3 Business Model Approaches 30 1.9 Usability in NFC 30 1.10 Benefits of NFC Applications 31 1.10.1 Future Scenarios on NFC 32 1.11 NFC Throughout the World 33 1.11.1 NFC Cities 33 1.11.2 NFC Trials and Projects 34 1.12 Status of Academic Research on NFC Literature 36 1.13 Chapter Summary 39 References 39 2 Towards NFC Era 41 2.1 Ubiquitous Computing and NFC 41 2.1.1 Ubiquitous Computing 41 2.1.2 New Communication Interface Alternative for Mobile Phones: NFC Technology 42 2.2 Mobile Phones 43 2.2.1 Features of a Mobile Phone 44 2.2.2 Mobile Phone Network 45 2.2.3 Mobile Phone Architecture 46 2.3 Wireless Communication as a Communication Media for NFC Technology 47 2.3.1 Wireless, Mobile, and Nomadic Communication 48 2.3.2 Wireless and Mobile Communication Technologies 48 2.4 RFID Technology 50 2.4.1 Earlier Form of RFID: Barcode Technology 51 2.4.2 Barcodes vs. RFID Tags 53 2.4.3 Essentials of RFID Technology 53 2.4.4 RFID Tags as Transponders 54 2.4.5 RFID Readers 55 2.4.6 Frequency Ranges 55 2.4.7 Operating Principles of RFID Technology 55 2.4.8 Near Field vs. Far Field Transmission 57 2.4.9 Common RFID Applications Throughout the World 58 2.5 Smart Card Technology 58 2.5.1 Earlier Form of Smart Card: Magnetic Stripe Cards 59 2.5.2 Evolution of Smart Cards 60 2.5.3 Types of Smart Cards: Capability Based Classification 60 2.5.4 Smart Card Operating System (SCOS) 61 2.5.5 Types of Smart Cards: Mechanism Based Classification 63 2.5.6 Smart Card Applications 67 2.6 Comparison between RFID Tags and Contactless Smart Cards 67 2.7 More on NFC 68 2.7.1 Inherent Security and Pairing Capability of NFC 70 2.8 Chapter Summary 70 Chapter Questions 71 References 71 3 NFC Essentials 73 3.1 Introduction to NFC 73 3.2 Standardization and Development Efforts of NFC Enabled Mobile Phones 76 3.2.1 NFC Forum 76 3.2.2 GlobalPlatform 79 3.2.3 GSM Association (GSMA) 80 3.2.4 International Organization for Standardization (ISO)/International Electrotechnical Commission (IEC) 80 3.2.5 ECMA International 81 3.2.6 ETSI and ETSI Smart Card Platform (ETSI SCP) 81 3.2.7 Java Community Process (JCP) 81 3.2.8 Open Mobile Alliance (OMA) 81 3.2.9 3rd Generation Partnership Project (3GPP) 82 3.2.10 EMVCo 82 3.3 General Architecture of NFC Enabled Mobile Phones 82 3.3.1 Secure Element 83 3.3.2 NFC Interface 86 3.3.3 Interface between SE and NFC Controller 86 3.3.4 Host Controller and HCI 89 3.4 Physical Layer of NFC 92 3.4.1 ISO/IEC 14443 – Proximity Contactless Smart Card Standard 92 3.4.2 Near Field Communication Interface and Protocol (NFCIP) 94 3.4.3 Data Transmission on RF Layer 96 3.5 Reader/Writer Operating Mode Essentials 99 3.5.1 Protocol Stack Architecture of Reader/Writer Mode 100 3.5.2 NFC Forum Mandated Tag Types 101 3.5.3 NDEF 102 3.6 Peer-to-Peer Operating Mode Essentials 108 3.6.1 Protocol Stack Architecture of Peer-to-Peer Mode 108 3.6.2 LLCP 109 3.7 Card Emulation Operating Mode Essentials 111 3.7.1 Protocol Stack Architecture of Card Emulation Mode 111 3.8 Chapter Summary 112 Chapter Questions 113 References 113 4 NFC Operating Modes 115 4.1 Mobile Interaction Techniques 115 4.1.1 NFC Technology Interaction Technique 117 4.2 Classification of NFC Devices 118 4.2.1 Active vs. Passive Devices 118 4.2.2 Initiator vs. Target Devices 119 4.3 Reader/Writer Mode 119 4.3.1 Smart Poster 120 4.3.2 Generic Usage Model 121 4.3.3 Leading Applications 123 4.3.4 Use Cases on Reader/Writer Mode 125 4.3.5 Underlying Application Benefits 127 4.4 Peer-to-Peer Mode 128 4.4.1 Generic Usage Model 129 4.4.2 Leading Applications 129 4.4.3 Use Cases on Peer-to-Peer Mode 130 4.4.4 Underlying Application Benefits 131 4.5 Card Emulation Mode 131 4.5.1 Generic Usage Model 132 4.5.2 Leading Applications 133 4.5.3 Use Cases on Card Emulation Mode 134 4.5.4 Underlying Application Benefits 135 4.6 Overview on Benefits of Operating Modes 135 4.7 Case Studies 136 4.7.1 Reader/Writer Mode Case Study: NFC Shopping 137 4.7.2 Peer-to-Peer Mode Case Study: NFC Gossiping 141 4.7.3 Card Emulation Mode Case Study: NFC Ticketing 142 4.8 Chapter Summary 148 Chapter Questions 148 References 148 5 Developing NFC Applications 151 5.1 Initial Steps in NFC Application Development 151 5.2 Why Java? 152 5.2.1 Why did we Choose Java? 152 5.2.2 Why is Java the Favorite? 153 5.3 Setting up the Environment for Java ME and NFC Programming 155 5.4 Introduction to Mobile Programing 158 5.4.1 Java ME Building Blocks 160 5.4.2 MIDlets 161 5.4.3 Package javax.microedition.lcdui 164 5.4.4 Creating a New MIDlet Project 165 5.4.5 Inside a MIDlet Suite (MIDlet Packaging) 168 5.4.6 A More Detailed User Interface MIDlet 171 5.4.7 Push Registry 177 5.5 NFC Application Development 179 5.6 Reader/Writer Mode Programing 179 5.6.1 Package javax.microedition.contactless 181 5.6.2 Package javax.microedition.contactless.ndef 183 5.6.3 Package javax.microedition.contactless.rf 185 5.6.4 Package javax.microedition.contactless.sc 185 5.6.5 A Reader/Writer Mode Application 185 5.6.6 NFC Push Registry 199 5.7 Peer-to-Peer Mode Programing 200 5.7.1 Package com.nokia.nfc.p2p 200 5.7.2 Package com.nokia.nfc.llcp 201 5.7.3 A Peer-to-Peer Mode Application 204 5.8 Card Emulation Mode Programing 211 5.8.1 Accessing Secure Element Using JSR 257 212 5.8.2 Accessing Secure Element Using JSR 177 212 5.9 Reader/Writer Mode Case Study: NFC Shopping 215 5.10 Peer-to-Peer Mode Case Study: NFC Gossiping 223 5.11 Chapter Summary 236 Chapter Questions 238 References 239 6 NFC Security and Privacy 241 6.1 Security in General 241 6.1.1 Why is Security Important? 242 6.1.2 Primary Goals of Security Measures 243 6.1.3 Vulnerability, Threat, Attack, and Risk 248 6.1.4 Principles of Security 253 6.2 Security Tools and Mechanisms 257 6.2.1 Cryptography 257 6.2.2 Symmetric Cryptography 258 6.2.3 Asymmetric Cryptography 259 6.2.4 Hashing 261 6.2.5 Message Authentication Code (MAC) and HMAC 261 6.2.6 Digital Signature and Mobile Signature 261 6.2.7 Comparing Security Mechanisms 262 6.2.8 Digital Certificates and Certificate Authority 263 6.2.9 Do Not Keep Cryptographic Algorithms Secret 263 6.2.10 Key Types: Symmetric Key, Private Key, Public Key, Master Key, and Session Key 264 6.2.11 Key Management and its Importance 264 6.2.12 WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) 264 6.2.13 Other Security Components 264 6.3 NFC Security Framework 265 6.3.1 Security Issues on NFC Tag 266 6.3.2 Security Issues on NFC Reader 268 6.3.3 Security Issues on Smart Card 269 6.3.4 Security Issues on Communication 270 6.3.5 Middleware and Backend System Security 272 6.3.6 Standardized NFC Security Protocols 272 6.4 Privacy, Legal, and Ethical Aspects 277 6.4.1 It is a Different World 278 6.4.2 Some Examples on Privacy Issues 279 6.4.3 Summary on Privacy and Countermeasures 280 6.4.4 Some Proposals for Providing Privacy on Tags 280 6.4.5 What to do for Protecting Privacy 281 6.5 Chapter Summary 281 Chapter Questions 282 References 282 7 NFC Business Ecosystem 283 7.1 Business Ecosystem 283 7.1.1 Generic Features of a Business Ecosystem 285 7.1.2 Business Ecosystem of NFC 286 7.2 Stakeholders in NFC Ecosystem 286 7.2.1 Standardization Bodies and Other Contributors 287 7.2.2 NFC Chip Set Manufacturers and Suppliers 288 7.2.3 Secure Element Manufacturers and Suppliers 288 7.2.4 Mobile Handset Manufacturers and Suppliers 290 7.2.5 Reader Manufacturers and Suppliers 290 7.2.6 Mobile Network Operators 290 7.2.7 Trusted Service Managers 290 7.2.8 Service Providers 292 7.2.9 Merchants/Retailers 293 7.2.10 Customers 293 7.3 Business Models 293 7.3.1 Key Indicators in NFC Business Models 295 7.3.2 Business Model Alternatives 297 7.3.3 General Revenue/Expenditure Flow Model 300 7.4 Case Study: NFC Ticketing 301 7.5 Additional Reading: Pay-Buy-Mobile Project by GSMA 304 7.6 Chapter Summary 308 Chapter Questions 309 References 309 8 Secure Element Management 311 8.1 Introduction to OTA Technology 311 8.1.1 OTA Technology and Mobile Device Management 312 8.1.2 OTA Technology and UICC Based SEs 313 8.2 GlobalPlatform Specifications 314 8.2.1 GlobalPlatform Card Specification 314 8.2.2 GlobalPlatform Messaging Specification 316 8.3 Life Cycle Management of SEs 316 8.3.1 TSM in NFC Environment 317 8.3.2 Actors and Their Functional Roles in GlobalPlatform 318 8.3.3 UICC Based SE: Security Domains and Hierarchy 320 8.3.4 UICC Management Models 320 8.4 Multiple SE Environments 325 8.4.1 Architecture without Aggregation 325 8.4.2 Architecture with Aggregation 326 8.5 Alternative TSM Based OTA Management Model 326 8.6 Chapter Summary 328 Chapter Questions 329 References 329 9 NFC Cities and Trials 331 9.1 NFC Cities 331 9.1.1 City of Oulu 331 9.1.2 City of Nice 337 9.1.3 Smart Urban Spaces 339 9.2 NFC Trials and Projects 341 9.2.1 Contactless Payment Trials 341 9.2.2 Transport and Other Ticketing Trials 345 9.2.3 Other Trials 347 9.3 Chapter Summary 349 References 349 Index 351

    15 in stock

    £80.96

  • Optical and Microwave Technologies for

    John Wiley & Sons Inc Optical and Microwave Technologies for

    2 in stock

    Book SynopsisThis is a self-contained book on the foundations and applications of optical and microwave technologies to telecommunication networks application, with an emphasis on access, local, road, indoor and in-car data transmission.Table of ContentsPreface xi 1 Introduction 1 2 Optical and Microwave Fundamentals 11 2.1 Free Space Propagation of Electromagnetic Waves 11 2.2 Interference 16 2.3 Coherence 17 2.4 Polarization 21 2.5 Refraction and Reflection 27 2.6 Diffraction 31 3 Optical Fibers 35 3.1 Attenuation in Glass Fibers 47 3.1.1 Attenuation Mechanisms in Glass Fibers 48 3.1.2 Attenuation Measurement Techniques 51 3.2 Dispersions in Fibers 55 3.2.1 Dispersion Mechanisms in Fibers 56 3.2.2 Polarization Mode Dispersion in Single-Mode Fibers 63 3.2.3 Joint Action of Dispersion Mechanisms 65 3.2.4 Dispersion Measurement Techniques 68 3.2.5 Partial Dispersion Suppression by Soliton Transmission in Single-Mode Fibers 70 4 Fiber Manufacturing, Cabling and Coupling 75 4.1 Fiber Manufacturing 75 4.1.1 Preparation of a Preform 75 4.1.2 Fiber Drawing 82 4.1.3 Mechanical Properties of Optical Fibers 83 4.1.4 Alternative Fiber Manufacturing Processes 85 4.2 Fiber Cabling 86 4.2.1 Fibers for Telecom and Data Networks 86 4.2.2 Cables: Applications, Operating Conditions and Requirements 94 4.2.3 Fiber Protection and Identification in Cables 100 4.2.4 Indoor Cables 108 4.2.5 Duct Cables 111 4.2.6 Aerial Cables 116 4.2.7 Optical Ground Wires 117 4.2.8 Fiber Cabling Summary 119 4.3 Coupling Elements for Fiber-Optic Systems 119 4.3.1 Light Source-to-Fiber Coupling 120 4.3.2 Fiber-to-Fiber Coupling 126 4.3.3 Fiber-Optic Splices 130 4.3.4 Fiber-Optic Connectors 131 4.3.5 Fiber-Optic Couplers 133 4.3.6 Fiber-Optic Switches 137 4.3.7 Fiber-to-Detector Coupling 137 5 Integrated-Optic Components 139 5.1 Integrated-Optic Waveguides 140 5.2 Integrated-Optic Modulators 141 5.3 Integrated-Optic Polarizers 145 5.4 Integrated-Optic Filters 146 5.5 Losses in Integrated-Optic Devices 148 6 Optical Light Sources and Drains 149 6.1 Semiconductor Light Sources 154 6.1.1 Light Emitting Diodes 156 6.1.2 Semiconductor Lasers 160 6.1.3 Organic Lasers 185 6.2 Semiconductor Light Drains 185 6.2.1 Types of Photodiodes 188 7 Optical Transmitter and Receiver Circuit Design 197 7.1 Optical Transmitter Circuit Design 197 7.2 Optical Receiver Circuit Design 199 7.2.1 Receiver Circuit Concepts 201 7.2.2 Noise in Optical Receivers 206 8 Fiber-Optic Amplifiers 209 8.1 Erbium Doped Fiber Amplifiers 209 8.2 Fiber Raman Amplifiers 211 9 Fiber- and Wireless-Optic Data Transmission 215 9.1 Direct Transmission Systems as Point-to-Point Connections 217 9.1.1 Unidirectional, Bidirectional and Multichannel Systems 225 9.2 Orthogonal Frequency Division Multiplex (OFDM) Systems 227 9.2.1 Approaches to Increase Channel Capacity 227 9.2.2 Fundamentals of OFDM 229 9.2.3 Implementation Options for Coherent Optical OFDM 230 9.2.4 Nyquist Pulse Shaping as an Alternative to OFDM Systems 232 9.3 Optical Satellite Communications 233 9.3.1 Applications of Optical Satellite Communications 234 9.3.2 Channel Characteristics and Technical Issues 236 9.4 Coherent Transmission Systems 241 9.4.1 Main Principle of Coherent Transmission 241 9.4.2 System Components 245 9.4.3 Modulation Methods for Coherent Transmission Systems 247 9.4.4 Detection and Demodulation Methods for Coherent Transmission Systems 248 9.5 Top Results on Fiber-Optic Transmission Capacity for High-Speed Long Distance 251 9.6 Optical Fibers in Automation Technology 255 9.6.1 Optical Fiber Cables 255 9.6.2 Connectors 257 9.6.3 Network and Network Components 257 10 Last Mile Systems, In-House-Networks, LAN- and MAN-Applications 263 10.1 Last Mile Systems 269 10.1.1 Special Case of Access Network 270 10.1.2 Fiber Access Networks 271 10.1.3 FTTB Networks 275 10.1.4 Point-to-Point FTTH Networks 277 10.1.5 Passive Optical Networks (PON) 280 10.1.6 WDM-PON Networks 285 10.1.7 Upgrade and Migration Issues in FTTH Networks 286 10.1.8 Passive Fiber Plant 288 10.1.9 Development and standardization of FTTH technologies 297 10.1.10 Active Equipment 300 10.1.11 Conclusions 305 10.2 Polymer Optical Fibers, POF 306 10.2.1 Basics of POF 306 10.2.2 Techniques for Data Transmission over POF 312 10.2.3 In-House Communications 319 10.2.4 Communications in Transportation Systems: From Automotive to Spatial 321 10.2.5 Standardization Activities 325 10.3 Radio over Fiber (RoF) Systems 328 10.3.1 Key Enabling Technologies 331 10.3.2 RoF Land Network Design 337 10.3.3 Case Study of the Proposed Design Framework 344 10.3.4 Conclusions 349 10.4 Free Space Optical Communications 349 10.4.1 FSO under Turbulence Conditions 352 10.4.2 System Set-up 356 10.4.3 System Performance under Weak Turbulence 358 10.4.4 FSO Link Evaluation 361 10.4.5 Relation to Outdoor FSO Link 363 10.4.6 FSO under Fog Conditions 364 10.4.7 Characterization of Fog and Smoke Attenuation in a Laboratory Chamber 366 10.4.8 Fog and Smoke Channel – Experiment Set-up 367 10.4.9 Results and Discussion 369 10.4.10 Conclusions 376 10.5 WLAN Systems and Fiber Networks 377 10.5.1 A Historical Perspective on IEEE 802.11 WLANs 380 10.5.2 Relevant Operating Principles of WLAN Systems 386 10.5.3 Hybrid Fiber-Wireless Network Architectures: Wi-Fi-based FiWi Architectures 392 10.6 Energy Efficiency Aspects in Optical Access and Core Networks 399 10.6.1 Energy Efficiency in Current and Next Generation Optical Access Networks 399 10.6.2 Energy Efficient Time Division Multiplexed Passive Optical Networks 400 10.6.3 Energy Efficient Time and Wavelength Division Multiplexed Passive Optical Networks 406 10.6.4 Spectral and Energy Efficiency Considerations in Single Rate WDM Networks with Signal Quality Guarantee 413 10.6.5 Spectral versus Energy Efficiency in Mixed-Line Rate WDM Systems with Signal Quality Guarantee 420 10.6.6 Results and Discussion 423 11 Optical Data-Bus and Microwave Systems for Automotive Application in Vehicles, Airplanes and Ships 427 11.1 Communication in Transportation Systems 427 11.1.1 Communication Needs in Transportation Systems 428 11.1.2 Communication with Transportation Systems 433 11.1.3 Hybrid Networks for use in Transportation Systems 435 11.2 Radar for Transportation Systems 438 11.2.1 ARVS Main Features 441 11.2.2 Features of ARVS Equipment Construction 446 11.2.3 Main Tasks and Processing Methods of Radar Data in the ARVS 455 11.2.4 Main Problems and Tasks of ARVS Development 460 11.2.5 Conclusions 461 References 463 Index 497

    2 in stock

    £82.76

  • Generalizations of Cyclostationary Signal

    John Wiley & Sons Inc Generalizations of Cyclostationary Signal

    10 in stock

    Book SynopsisThe relative motion between the transmitter and the receiver modifies the nonstationarity properties of the transmitted signal. In particular, the almost-cyclostationarity property exhibited by almost all modulated signals adopted in communications, radar, sonar, and telemetry can be transformed into more general kinds of nonstationarity. A proper statistical characterization of the received signal allows for the design of signal processing algorithms for detection, estimation, and classification that significantly outperform algorithms based on classical descriptions of signals.Generalizations of Cyclostationary Signal Processingaddresses these issues and includes the following key features: Presents the underlying theoretical framework, accompanied by details of their practical application, for the mathematical models of generalized almost-cyclostationary processes and spectrally correlated processes; two classes of signals finding growing importance in areas sTrade Review“This book is written both for advanced readers with the background of graduate students in engineering and for specialists (e.g., mathematicians).” (Zentralblatt MATH, 1 May 2013) Table of ContentsDedication iii Acknowledgements xiii Introduction xv 1 Background 1 1.1 Second-Order Characterization of Stochastic Processes 1 1.1.1 Time-Domain Characterization 1 1.1.2 Spectral-Domain Characterization 2 1.1.3 Time-Frequency Characterization 4 1.1.4 Wide-Sense Stationary Processes 5 1.1.5 Evolutionary Spectral Analysis 5 1.1.6 Discrete-Time Processes 7 1.1.7 Linear Time-Variant Transformations 8 1.2 Almost-Periodic Functions 10 1.2.1 Uniformly Almost-Periodic Functions 11 1.2.2 AP Functions in the Sense of Stepanov,Weyl, and Besicovitch 12 1.2.3 Weakly AP Functions in the Sense of Eberlein 13 1.2.4 Pseudo AP Functions 14 1.2.5 AP Functions in the Sense of Hartman and Ryll-Nardzewski 15 1.2.6 AP Functions Defined on Groups and with Values in Banach and Hilbert Spaces 16 1.2.7 AP Functions in Probability 16 1.2.8 AP Sequences 17 1.2.9 AP Sequences in Probability 18 1.3 Almost-Cyclostationary Processes 18 1.3.1 Second-OrderWide-Sense Statistical Characterization 18 1.3.2 Jointly ACS Signals 20 1.3.3 LAPTV Systems 24 1.3.4 Products of ACS Signals 27 1.3.5 Cyclic Statistics of Communications Signals 29 1.3.6 Higher-Order Statistics 30 1.3.7 Cyclic Statistic Estimators 32 1.3.8 Discrete-Time ACS Signals 32 1.3.9 Sampling of ACS Signals 33 1.3.10 Multirate Processing of Discrete-Time ACS Signals 37 1.3.11 Applications 37 1.4 Some Properties of Cumulants 38 1.4.1 Cumulants and Statistical Independence 38 1.4.2 Cumulants of Complex Random Variables and Joint Complex Normality 392 Generalized Almost-Cyclostationary Processes 43 2.1 Introduction 43 2.2 Characterization of GACS Stochastic Processes 47 2.2.1 Strict-Sense Statistical Characterization 48 2.2.2 Second-OrderWide-Sense Statistical Characterization 49 2.2.3 Second-Order Spectral Characterization 59 2.2.4 Higher-Order Statistics 61 2.2.5 Processes with Almost-Periodic Covariance 65 2.2.6 Motivations and Examples 66 2.3 Linear Time-Variant Filtering of GACS Processes 70 2.4 Estimation of the Cyclic Cross-Correlation Function 72 2.4.1 The Cyclic Cross-Correlogram 72 2.4.2 Mean-Square Consistency of the Cyclic Cross-Correlogram 76 2.4.3 Asymptotic Normality of the Cyclic Cross-Correlogram 80 2.5 Sampling of GACS Processes 84 2.6 Discrete-Time Estimator of the Cyclic Cross-Correlation Function 87 2.6.1 Discrete-Time Cyclic Cross-Correlogram 87 2.6.2 Asymptotic Results 91 2.6.3 Asymptotic Results 95 2.6.4 Concluding Remarks 102 2.7 Numerical Results 104 2.7.1 Aliasing in Cycle-Frequency Domain 105 2.7.2 Simulation Setup 105 2.7.3 Cyclic Correlogram Analysis with Varying N 105 2.7.4 Cyclic Correlogram Analysis with Varying N and T 106 2.7.5 Discussion 111 2.7.6 Conjecturing the Nonstationarity Type of the Continuous-Time Signal 114 2.7.7 LTI Filtering of GACS Signals 116 2.8 Summary 116 3 Complements and Proofs on Generalized Almost-Cyclostationary Processes 123 3.1 Proofs for Section 2.2.2 “Second-OrderWide-Sense Statistical Characterization” 123 3.2 Proofs for Section 2.2.3 “Second-Order Spectral Characterization” 125 3.3 Proofs for Section 2.3 “Linear Time-Variant Filtering of GACS Processes” 129 3.4 Proofs for Section 2.4.1 “The Cyclic Cross-Correlogram” 131 3.5 Proofs for Section 2.4.2 “Mean-Square Consistency of the Cyclic Cross-Correlogram” 136 3.6 Proofs for Section 2.4.3 “Asymptotic Normality of the Cyclic Cross-Correlogram” 147 3.7 Conjugate Covariance 150 3.8 Proofs for Section 2.5 “Sampling of GACS Processes” 151 3.9 Proofs for Section 2.6.1 “Discrete-Time Cyclic Cross-Correlogram” 152 3.10 Proofs for Section 2.6.2 “Asymptotic Results as 158 3.11 Proofs for Section 2.6.3 “Asymptotic Results as 168 3.12 Proofs for Section 2.6.4 “Concluding Remarks” 176 3.13 Discrete-Time and Hybrid Conjugate Covariance 177 4 Spectrally Correlated Processes 181 4.1 Introduction 182 4.2 Characterization of SC Stochastic Processes 186 4.2.1 Second-Order Characterization 186 4.2.2 Relationship among ACS, GACS, and SC Processes 194 4.2.3 Higher-Order Statistics 195 4.2.4 Motivating Examples 200 4.3 Linear Time-Variant Filtering of SC Processes 205 4.3.1 FOT-Deterministic Linear Systems 205 4.3.2 SC Signals and FOT-Deterministic Systems 207 4.4 The Bifrequency Cross-Periodogram 208 4.5 Measurement of Spectral Correlation – Unknown Support Curves 215 4.6 The Frequency-Smoothed Cross-Periodogram 222 4.7 Measurement of Spectral Correlation – Known Support Curves 225 4.7.1 Mean-Square Consistency of the Frequency-Smoothed Cross-Periodogram 225 4.7.2 Asymptotic Normality of the Frequency-Smoothed Cross-Periodogram 229 4.7.3 Final Remarks 231 4.8 Discrete-Time SC Processes 233 4.9 Sampling of SC Processes 236 4.9.1 Band-Limitedness Property 237 4.9.2 Sampling Theorems 239 4.9.3 Illustrative Examples 243 4.10 Multirate Processing of Discrete-Time Jointly SC Processes 256 4.10.1 Expansion 257 4.10.2 Sampling 260 4.10.3 Decimation 262 4.10.4 Expansion and Decimation 265 4.10.5 Strictly Band-Limited SC Processes 267 4.10.6 Interpolation Filters 268 4.10.7 Decimation Filters 270 4.10.8 Fractional Sampling Rate Converters 271 4.11 Discrete-Time Estimators of the Spectral Cross-Correlation Density 272 4.12 Numerical Results 273 4.12.1 Simulation Setup 273 4.12.2 Unknown Support Curves 273 4.12.3 Known Support Curves 274 4.13 Spectral Analysis with Nonuniform Frequency Resolution 281 4.14 Summary 2865 Complements and Proofs on Spectrally Correlated Processes 291 5.1 Proofs for Section 4.2 “Spectrally Correlated Stochastic Processes” 291 5.2 Proofs for Section 4.4 “The Bifrequency Cross-Periodogram” 292 5.3 Proofs for Section 4.5 “Measurement of Spectral Correlation – Unknown Support Curves” 298 5.4 Proofs for Section 4.6 “The Frequency-Smoothed Cross-Periodogram” 306 5.5 Proofs for Section 4.7.1 “Mean-Square Consistency of the Frequency-Smoothed Cross-Periodogram” 309 5.6 Proofs for Section 4.7.2 “Asymptotic Normality of the Frequency-Smoothed Cross-Periodogram” 325 5.7 Alternative Bounds 333 5.8 Conjugate Covariance 334 5.9 Proofs for Section 4.8 “Discrete-Time SC Processes” 337 5.10 Proofs for Section 4.9 “Sampling of SC Processes” 339 5.11 Proofs for Section 4.10 “Multirate Processing of Discrete-Time Jointly SC Processes” 3426 Functional Approach for Signal Analysis 355 6.1 Introduction 355 6.2 Relative Measurability 356 6.2.1 Relative Measure of Sets 356 6.2.2 Relatively Measurable Functions 357 6.2.3 Jointly Relatively Measurable Functions 358 6.2.4 Conditional Relative Measurability and Independence 360 6.2.5 Examples 361 6.3 Almost-Periodically Time-Variant Model 361 6.3.1 Almost-Periodic Component Extraction Operator 361 6.3.2 Second-Order Statistical Characterization 363 6.3.3 Spectral Line Regeneration 365 6.3.4 Spectral Correlation 366 6.3.5 Statistical Function Estimators 367 6.3.6 Sampling, Aliasing, and Cyclic Leakage 369 6.3.7 FOT-Deterministic Systems 371 6.3.8 FOT-Deterministic Linear Systems 372 6.4 Nonstationarity Classification in the Functional Approach 374 6.5 Proofs of FOT Counterparts of Some Results on ACS and GACS Signals 3757 Applications to Mobile Communications and Radar/Sonar 381 7.1 Physical Model for the Wireless Channel 381 7.1.1 Assumptions on the Propagation Channel 381 7.1.2 Stationary TX, Stationary RX 382 7.1.3 Moving TX, Moving RX 383 7.1.4 Stationary TX, Moving RX 387 7.1.5 Moving TX, Stationary RX 388 7.1.6 Reflection on Point Scatterer 388 7.1.7 Stationary TX, Reflection on Point Moving Scatterer, Stationary RX (Stationary Bistatic Radar) 390 7.1.8 (Stationary)Monostatic Radar 391 7.1.9 Moving TX, Reflection on a Stationary Scatterer, Moving RX 392 7.2 Constant Velocity Vector 393 7.2.1 Stationary TX, Moving RX 393 7.2.2 Moving TX, Stationary RX 394 7.3 Constant Relative Radial Speed 395 7.3.1 Moving TX, Moving RX 395 7.3.2 Stationary TX, Moving RX 398 7.3.3 Moving TX, Stationary RX 401 7.3.4 Stationary TX, Reflection on a Moving Scatterer, Stationary RX (Stationary Bistatic Radar) 404 7.3.5 (Stationary)Monostatic Radar 406 7.3.6 Moving TX, Reflection on a Stationary Scatterer, Moving RX 406 7.3.7 Non synchronized TX and RX oscillators 407 7.4 Constant Relative Radial Acceleration 407 7.4.1 Stationary TX, Moving RX 408 7.4.2 Moving TX, Stationary RX 408 7.5 Transmitted Signal: Narrow-Band Condition 409 7.5.1 Constant Relative Radial Speed 411 7.5.2 Constant Relative Radial Acceleration 414 7.6 Multipath Doppler Channel 416 7.6.1 Constant Relative Radial Speeds – Discrete Scatterers 416 7.6.2 Continuous Scatterer 416 7.7 Spectral Analysis of Doppler-Stretched Signals – Constant Radial Speed 417 7.7.1 Second-Order Statistics (Continuous-Time) 417 7.7.2 Multipath Doppler Channel 422 7.7.3 Doppler-Stretched Signal (Discrete-Time) 427 7.7.4 Simulation of Discrete-Time Doppler-Stretched Signals 430 7.7.5 Second-Order Statistics (Discrete-Time) 432 7.7.6 Illustrative Examples 437 7.7.7 Concluding Remarks 443 7.8 Spectral Analysis of Doppler-Stretched Signals – Constant Relative Radial Acceleration 448 7.8.1 Second-Order Statistics (Continuous-Time) 449 7.9 Other Models of Time-Varying Delays 452 7.9.1 Taylor Series Expansion of Range and Delay 452 7.9.2 Periodically Time-Variant Delay 454 7.9.3 Periodically Time-Variant Carrier Frequency 454 7.10 Proofs 4558 Bibliographic Notes 463 8.1 Almost-Periodic Functions 463 8.2 Cyclostationary Signals 463 8.3 Generalizations of Cyclostationarity 464 8.4 Other Nonstationary Signals 464 8.5 Functional Approach and Generalized Harmonic Analysis 464 8.6 Linear Time-Variant Processing 465 8.7 Sampling 465 8.8 Complex Random Variables, Signals, and Systems 465 8.9 Stochastic Processes 465 8.10 Mathematics 466 8.11 Signal Processing and Communications 466 References 467 List of Abbreviations 475

    10 in stock

    £107.95

  • VscFactsHvdc

    John Wiley & Sons Inc VscFactsHvdc

    15 in stock

    Book SynopsisThis book contains the most up-to-date research on Flexible Alternating Current Transmission Systems (FACTS) and discusses its technological convergence with the long-standing application of High Voltage Direct Current (HVDC) using Voltage Source Converters (VSC).Table of ContentsPreface xiii About the Book xvii Acknowledgements xxi About the Companion Website xxiii 1 Flexible Electrical Energy Systems 1 1.1 Introduction 1 1.2 Classification of Flexible Transmission System Equipment 5 1.2.1 SVC 6 1.2.2 STATCOM 7 1.2.3 SSSC 9 1.2.4 Compound VSC Equipment for AC Applications 10 1.2.5 CSC-HVDC Links 12 1.2.6 VSC-HVDC 13 1.3 Flexible Systems Vs Conventional Systems 15 1.3.1 Transmission 16 1.3.1.1 HVAC Vs HVDC Power Transmission for Increased Power Throughputs 16 1.3.1.2 VAR Compensation 19 1.3.1.3 Frequency Compensation 24 1.3.2 Generation 27 1.3.2.1 Wind Power Generation 28 1.3.2.2 Solar Power Generation 30 1.3.3 Distribution 33 1.3.3.1 Load Compensation 35 1.3.3.2 Dynamic Voltage Support 35 1.3.3.3 Flexible Reconfigurations 36 1.3.3.4 AC-DC Distribution Systems 37 1.3.3.5 DC Power Grids with Multiple Voltage Levels 40 1.3.3.6 Smart Grids 40 1.4 Phasor Measurement Units 43 1.5 Future Developments and Challenges 46 1.5.1 Generation 46 1.5.2 Transmission 47 1.5.3 Distribution 48 References 49 2 Power Electronics for VSC-Based Bridges 53 2.1 Introduction 53 2.2 Power Semiconductor Switches 53 2.2.1 The Diode 55 2.2.2 The Thyristor 56 2.2.3 The Bipolar Junction Transistor 57 2.2.4 The Metal-Oxide-Semiconductor Field-Effect Transistor 59 2.2.5 The Insulated-Gate Bipolar Transistor 59 2.2.6 The Gate Turn-Off Thyristor 59 2.2.7 The MOS-Controlled Thyristor 60 2.2.8 Considerations for the Switch Selection Process 61 2.3 Voltage Source Converters 61 2.3.1 Basic Concepts of PulseWidth Modulated-Output Schemes and Half-Bridge VSC 62 2.3.2 Single-Phase Full-Bridge VSC 66 2.3.2.1 PWM with Bipolar Switching 67 2.3.2.2 PWM with Unipolar Switching 69 2.3.2.3 Square-Wave Mode 69 2.3.2.4 Phase-Shift Control Operation 69 2.3.3 Three-Phase VSC 72 2.3.4 Three-Phase Multilevel VSC 74 2.3.4.1 The Multilevel NPC VSC 76 2.3.4.2 The Multilevel FC VSC 80 2.3.4.3 The Cascaded H-Bridge VSC 81 2.3.4.4 PWM Techniques for Multilevel VSCs 85 2.3.4.5 An Alternative Multilevel Converter Topology 85 2.4 HVDC Systems Based on VSC 88 2.5 Conclusions 94 References 95 3 Power Flows 99 3.1 Introduction 99 3.2 Power Network Modelling 100 3.2.1 Transmission Lines Modelling 100 3.2.2 Conventional Transformers Modelling 100 3.2.3 LTC Transformers Modelling 101 3.2.4 Phase-Shifting Transformers Modelling 101 3.2.5 Compound Transformers Modelling 102 3.2.6 Series and Shunt Compensation Modelling 102 3.2.7 Load Modelling 102 3.2.8 Network Nodal Admittance 102 3.3 Peculiarities of the Power Flow Formulation 103 3.4 The Nodal Power Flow Equations 105 3.5 The Newton-Raphson Method in Rectangular Coordinates 106 3.5.1 The Linearized Equations 107 3.5.2 Convergence Characteristics of the Newton-Raphson Method 108 3.5.3 Initialization of Newton-Raphson Power Flow Solutions 109 3.5.4 Incorporation of PMU Information in Newton-Raphson Power Flow Solutions 111 3.6 The Voltage Source Converter Model 112 3.6.1 VSC Nodal Admittance Matrix Representation 113 3.6.2 Full VSC Station Model 115 3.6.3 VSC Nodal Power Equations 117 3.6.4 VSC Linearized System of Equations 117 3.6.5 Non-Regulated Power Flow Solutions 119 3.6.6 Practical Implementations 120 3.6.6.1 Control Strategy 120 3.6.6.2 Initial Parameters and Limits 120 3.6.7 VSC Numerical Examples 121 3.7 The STATCOM Model 125 3.7.1 STATCOM Numerical Examples 127 3.8 VSC-HVDC Systems Modelling 129 3.8.1 VSC-HVDC Nodal Power Equations 131 3.8.2 VSC-HVDC Linearized Equations 133 3.8.3 Back-to-Back VSC-HVDC Systems Modelling 135 3.8.4 VSC-HVDC Numerical Examples 135 3.9 Three-Terminal VSC-HVDC System Model 139 3.9.1 VSC Types 142 3.9.2 Power Mismatches 142 3.9.3 Linearized System of Equations 143 3.10 Multi-Terminal VSC-HVDC System Model 146 3.10.1 Multi-Terminal VSC-HVDC System with Common DC Bus Model 147 3.10.2 Unified Solutions of AC-DC Networks 148 3.10.3 Unified vs Quasi-Unified Power Flow Solutions 148 3.10.4 Test Case 9 150 3.11 Conclusions 153 References 153 3.A Appendix 154 3.B Appendix 156 4 Optimal Power Flows 159 4.1 Introduction 159 4.2 Power Flows in Polar Coordinates 160 4.3 Optimal Power Flow Formulation 161 4.4 The Lagrangian Methods 162 4.4.1 Necessary Optimality Conditions (Karush-Kuhn-Tucker Conditions) 163 4.5 AC OPF Formulation 164 4.5.1 Objective Function 165 4.5.2 Linearized System of Equations 165 4.5.3 Augmented Lagrangian Function 167 4.5.4 Selecting the OPF Solution Algorithm 168 4.5.5 Control Enforcement in the OPF Algorithm 168 4.5.6 Handling Limits of State Variables 169 4.5.7 Handling Limits of Functions 169 4.5.8 A Simple Network Model 170 4.5.8.1 Step One – Identifying State and Control Variables 170 4.5.8.2 Step Two – Identifying Constraints 170 4.5.8.3 StepThree – Forming the Lagrangian Function 171 4.5.8.4 Step Four – Linearized System of Equations 172 4.5.8.5 Step Five – Implementation of the Augmented Lagrangian 172 4.5.9 Recent Extensions in the OPF Problem 173 4.5.10 Test Case: IEEE 30-Bus System 173 4.5.10.1 Test System 173 4.5.10.2 Problem Formulation 173 4.5.10.3 OPF Test Cases 174 4.5.10.4 Benchmark Test Case (With No Voltage Control) 175 4.5.10.5 Test Case with Voltage Control Using Variable Transformers Taps (Case I) 176 4.5.10.6 Test Case with Nodal Voltage Regulation (Case II) 176 4.5.10.7 Test Case with Nodal Voltage Regulation (Case III) 177 4.5.10.8 A Summary of Results 177 4.6 Generalization of the OPF Formulation for AC-DC Networks 179 4.7 Inclusion of the VSC Model in OPF 181 4.7.1 VSC Power Balance Equations 181 4.7.2 VSC Control Considerations 183 4.7.3 VSC Linearized System of Equations 184 4.8 The Point-to-Point and Back-to-Back VSC-HVDC Links Models in OPF 184 4.8.1 VSC-HVDC Link Power Balance Formulation 185 4.8.2 VSC-HVDC Link Control 187 4.8.3 VSC-HVDC Full Set of Equality Constraints 188 4.8.4 Linearized System of Equations 189 4.9 Multi-Terminal VSC-HVDC Systems in OPF 191 4.9.1 The Expanded, General Formulation 192 4.9.2 Multi-Terminal VSC-HVDC Test Case 193 4.9.2.1 DC Network 193 4.9.2.2 AC Network 194 4.9.2.3 Objective Function 194 4.9.2.4 Summary of OPF Results 195 DC Network 196 4.9.2.5 Converter Outputs – No Converter Losses 196 4.9.2.6 Converter Outputs –With Converter Losses 197 AC Network 199 4.9.2.7 Power Flows in AC Transmission Lines –With No Converter Losses 199 4.9.2.8 Power Flows in AC Transmission Lines –With Converter Losses 200 4.10 Conclusion 200 References 201 5 State Estimation 203 5.1 Introduction 203 5.2 State Estimation of Electrical Networks 204 5.3 Network Model and Measurement System 206 5.3.1 Topological Processing 206 5.3.2 Network Model 206 5.3.3 The Measurements System Model 208 5.4 Calculation of the Estimated State 210 5.4.1 Solution by the Normal Equations 210 5.4.2 Equality-Constrained WLS 212 5.4.3 Observability Analysis and Reference Phase 213 5.4.4 Weighted Least Squares State Estimator (WLS-SE) Using Matlab Code 215 5.5 Bad Data Identification 217 5.5.1 Bad Data 217 5.5.2 The Largest Normalized Residual Test 218 5.5.3 Bad Data Identification Using WLS-SE 219 5.6 FACTS Device State Estimation Modelling in Electrical Power Grids 220 5.6.1 Incorporation of New Models in State Estimation 220 5.6.2 Voltage Source Converters 221 5.6.3 STATCOM 224 5.6.4 STATCOM Model in WLS-SE 225 5.6.5 Unified Power Flow Controller 227 5.6.6 The UPFC Model in WLS-SE 228 5.6.7 High Voltage Direct Current Based on Voltage Source Converters 230 5.6.8 VSC-HVDC Model in WLS-SE 231 5.6.9 Multi-terminal HVDC 233 5.6.10 MT-VSC-HVDC Model in WLS-SE 235 5.7 Incorporation of Measurements Furnished by PMUs 236 5.7.1 Incorporation of Synchrophasors in State Estimation 236 5.7.2 Synchrophasors Formulations 237 5.7.3 Phase Reference 239 5.7.4 PMU Outputs in WLS-SE 239 5.A Appendix 240 5.A.1 Input Data and Output Results in WLS-SE 240 5.A.1.1 Input Data 240 5.A.1.2 Network Data 240 5.A.1.3 Measurements Data 242 5.A.1.4 State Estimator Configuration 243 5.A.2 Output Results 243 References 244 6 Dynamic Simulations of Power Systems 247 6.1 Introduction 247 6.2 Modelling of Conventional Power System Components 248 6.2.1 Modelling of Synchronous Generators 248 6.2.2 Synchronous Generator Controllers 250 6.2.2.1 Speed Governors 250 6.2.2.2 Steam Turbine and Hydro Turbine 251 6.2.2.3 Automatic Voltage Regulator 252 6.2.2.4 Transmission Line Model 253 6.2.2.5 Load Model 253 6.3 Time Domain Solution Philosophy 254 6.3.1 Numerical Solution Technique 254 6.3.2 Benchmark Numerical Example 257 6.4 Modelling of the STATCOM for Dynamic Simulations 261 6.4.1 Discretization and Linearization of the STATCOM Differential Equations 264 6.4.2 Numerical Example with STATCOMs 266 6.5 Modelling of VSC-HVDC Links for Dynamic Simulations 272 6.5.1 Discretization and Linearization of the Differential Equations of the VSC-HVDC 276 6.5.2 Validation of the VSC-HVDC Link Model 280 6.5.3 Numerical Example with an Embedded VSC-HVDC Link 283 6.5.4 Dynamic Model of the VSC-HVDC Link with Frequency Regulation Capabilities 289 6.5.4.1 Linearization of the Equations of the VSC-HVDC Model with Frequency Regulation Capabilities 291 6.5.4.2 Validation of the VSC-HVDC LinkModel Providing Frequency Support 292 6.5.4.3 Numerical Example with a VSC-HVDC Link Model Providing Frequency Support 294 6.6 Modelling of Multi-terminal VSC-HVDC Systems for Dynamic Simulations 298 6.6.1 Three-terminal VSC-HVDC Dynamic Model 299 6.6.2 Validation of the Three-Terminal VSC-HVDC Dynamic Model 307 6.6.3 Multi-Terminal VSC-HVDC Dynamic Model 310 6.6.4 Numerical Example with a Six-Terminal VSC-HVDC Link Forming a DC Ring 314 6.6.4.1 Disconnection of a DC Transmission Line 314 6.6.4.2 Three-Phase Fault Applied to AC3 314 6.7 Conclusion 317 References 318 7 Electromagnetic Transient Studies and Simulation of FACTS-HVDC-VSC Equipment 321 7.1 Introduction 321 7.2 The STATCOM Case 322 7.3 STATCOM Based on Multilevel VSC 336 7.4 Example of HVDC based on Multilevel FC Converter 347 7.5 Example of a Multi-Terminal HVDC System Using Multilevel FC Converters 358 7.6 Conclusions 375 References 375 Index 377

    15 in stock

    £89.06

  • Measuring Colour

    John Wiley & Sons Inc Measuring Colour

    15 in stock

    Book SynopsisThis resource provides the basic facts needed to measure color. The coverage focuses on guiding principles, rather than particular instruments likely to become quickly outdated. Because color primarily occurs through individual perception, the authors present the material in the context of the properties of color vision of the human observer.Table of ContentsAbout the Authors xv Series Preface xvii Preface xix Acknowledgements xxi 1 Colour Vision 1 1.1 Introduction 1 1.2 The spectrum 1 1.3 Construction of the eye 3 1.4 The retinal receptors 4 1.5 Spectral sensitivities of the retinal receptors 5 1.6 Visual signal transmission 8 1.7 Basic perceptual attributes of colour 9 1.8 Colour constancy 10 1.9 Relative perceptual attributes of colours 11 1.10 Defective colour vision 13 1.11 Colour pseudo-stereopsis 15 2 Spectral Weighting Functions 19 2.1 Introduction 19 2.2 Scotopic spectral luminous efficiency 19 2.3 Photopic spectral luminous efficiency 21 2.4 Colour-matching functions 26 2.5 Transformation from R, G, B to X, Y, Z 32 2.6 CIE colour-matching functions 33 2.7 Metamerism 38 2.8 Spectral luminous efficiency functions for photopic vision 39 3 Relations between Colour Stimuli 41 3.1 Introduction 41 3.2 The Y tristimulus value 41 3.3 Chromaticity 42 3.4 Dominant wavelength and excitation purity 44 3.5 Colour mixtures on chromaticity diagrams 46 3.6 Uniform chromaticity diagrams 48 3.7 CIE 1976 hue-angle and saturation 51 3.8 CIE 1976 lightness, L 52 3.9 Uniform colour spaces 53 3.10 CIE 1976 colour difference formulae 57 3.11 CMC, CIE94, and CIEDE2000 color difference formulae 61 3.12 An alternative form of the CIEDE2000 colour-difference equation 64 3.13 Summary of measures and their perceptual correlates 64 3.14 Allowing for chromatic adaptation 65 3.15 The evaluation of whiteness 66 3.16 Colorimetric purity 67 3.17 Identifying stimuli of equal brightness 67 3.18 CIEDE2000 worked example 69 4 Light Sources 73 4.1 Introduction 73 4.2 Methods of producing light 74 4.3 Gas discharges 74 4.4 Sodium lamps 75 4.5 Mercury lamps 76 4.6 Fluorescent lamps 78 4.7 Xenon lamps 81 4.8 Incandescent light sources 82 4.9 Tungsten lamps 86 4.10 Tungsten halogen lamps 87 4.11 Light emitting diodes 88 4.12 Daylight 89 4.13 Standard illuminants and sources 91 4.14 CIE standard illuminant A 91 4.15 CIE illuminants B and C 92 4.16 CIE sources 93 4.17 CIE illuminants D 94 4.18 CIE indoor daylight 94 4.19 Comparison of commonly used sources 96 5 Obtaining Spectral Data and Tristimulus Values 99 5.1 Introduction 99 5.2 Radiometry and photometry 99 5.3 Spectroradiometry 100 5.4 Tele-spectroradiometry 100 5.5 Spectroradiometry of self-luminous colours 101 5.6 Spectrophotometry of non-self-luminous colours 101 5.7 Reference whites and working standards 102 5.8 Geometries of illumination and viewing 103 5.9 CIE Geometries of illumination and measurement 104 5.10 Spectroradiometers and spectrophotometers 108 5.11 Choice of illuminant 110 5.12 Calculation of tristimulus values from spectral data 111 5.13 Colorimeters using filtered photo-detectors 114 6 Metamerism and Colour Constancy 117 6.1 Introduction 117 6.2 The cause of metamerism 117 6.3 The definition of metamerism 118 6.4 Examples of metamerism in practice 119 6.5 Degree of metamerism 121 6.6 Index of metamerism for change of illuminant 122 6.7 Index of metamerism for change of observer 122 6.8 Index of metamerism for change of field size 124 6.9 Colour matches and geometry of illumination and measurement 124 6.10 Correcting for inequalities of tristimulus values 125 6.11 Terms used in connection with metamerism 126 6.12 Colour inconstancy 127 6.13 Chromatic adaptation transforms 129 6.14 The Von Kries transform 130 6.15 The CAT02 transform 131 6.16 A colour inconstancy index 134 6.17 Worked examples 135 7 Colour Rendering by Light Sources 143 7.1 Introduction 143 7.2 The meaning of colour rendering 144 7.3 CIE colour rendering indices 145 7.4 Spectral band methods 147 7.5 Other methods for assessing the colour rendering of light sources 150 7.6 Comparison of commonly used sources 151 8 Colour Order Systems 155 8.1 Introduction 155 8.2 Variables 155 8.3 Optimal colours 157 8.4 TheMunsell System 159 8.5 TheMunsell Book of Color 164 8.6 Unique hues and colour opponency 168 8.7 The Natural Colour System (NCS) 170 8.8 Natural Colour System Atlas 172 8.9 The DIN System 179 8.10 The Coloroid System 182 8.11 The Optical Society of America (OSA) System 183 8.12 The Hunter Lab System 187 8.13 The Tintometer 190 8.14 The Pantone System 191 8.15 The RAL System 191 8.16 Advantages of colour order systems 192 8.17 Disadvantages of colour order systems 192 9 Precision and Accuracy in Colorimetry 197 9.1 Introduction 197 9.2 Sample preparation 198 9.3 Thermochromism 199 9.4 Geometry of illumination and measurement 199 9.5 Reference white calibration 200 9.6 Polarisation 200 9.7 Wavelength calibration 202 9.8 Stray light 202 9.9 Zero level and linearity 202 9.10 Use of secondary standards 203 9.11 Bandwidth 203 9.12 Correcting for errors in the spectral data 204 9.13 Calculations 207 9.14 Precautions to be taken in practice 214 10 Fluorescent Colours 219 10.1 Introduction 219 10.2 Terminology 219 10.3 Use of double monochromators 220 10.4 Illumination with white light 221 10.5 Correcting for differences between an actual and the desired source 222 10.6 Two-monochromator method 224 10.7 Two-mode method 225 10.8 Filter-reduction method 226 10.9 Luminescence-weakening method 226 10.10 Practical considerations 227 11 RGB Colorimetry 231 11.1 Introduction 231 11.2 Choice and specification of matching stimuli 231 11.3 Choice of units 233 11.4 Chromaticity diagrams using r and g 233 11.5 Colour-matching functions in RGB systems 234 11.6 Derivation of XYZ from RGB tristimulus values 35 11.7 Using television and computer displays 239 12 Colorimetry with Digital Cameras 241 12.1 Introduction 241 12.2 Camera characterisation 242 12.3 Metamerism 244 12.4 Characterisation methods 244 12.5 Practical considerations in digital camera characterisation 249 12.6 Practical example 251 12.7 Discussion 254 13 Colorant Mixtures 257 13.1 Introduction 257 13.2 Non-diffusing colorants in a transmitting layer 257 13.3 Non-diffusing colorants in a layer in optical contact with a diffusing surface 259 13.4 Layers containing colorants which diffuse and absorb light 262 13.5 The use of multi-spectral analysis to reduce metamerism in art restoration 264 14 Factors Affecting the Appearance of Coloured Objects 267 14.1 Introduction 267 14.2 Measuring optical properties 267 14.3 Colour 268 14.4 Gloss 271 14.5 Translucency 279 14.6 Surface texture 281 14.7 Conclusions 289 15 The CIE Colour Appearance Model CIECAM02 293 15.1 Introduction 293 15.2 Visual areas in the observing field 294 15.3 Chromatic adaptation in CIECAM02 294 15.4 Spectral sensitivities of the cones in CIECAM02 295 15.5 Cone dynamic response functions in CIECAM02 297 15.6 Luminance adaptation in CIECAM02 297 15.7 Criteria for achromacy and for constant hue in CIECAM02 299 15.8 Effects of luminance adaptation in CIECAM02 300 15.9 Criteria for unique hues in CIECAM02 303 15.10 Redness-greenness, a, and yellowness-blueness, b, in CIECAM02 303 15.11 Hue angle, h, in CIECAM02 305 15.12 Eccentricity factor, e, in CIECAM02 305 15.13 Hue quadrature, H, and hue composition, Hc, in CIECAM02 306 15.14 The achromatic response, A, in CIECAM02 308 15.15 Correlate of lightness, J, in CIECAM02 308 15.16 Correlate of brightness, Q, in CIECAM02 309 15.17 Correlate of chroma, C, in CIECAM02 310 15.18 Correlate of colourfulness, M, in CIECAM02 311 15.19 Correlate of saturation, s, in CIECAM02 311 15.20 Comparison of CIECAM02 with the natural colour system 311 15.21 Testing model CIECAM02 312 15.22 Filtration of projected slides and CIECAM02 314 15.23 Comparison of CIECAM02 with CIECAM97s 315 15.24 Uniform colour space based on CIECAM02 315 15.25 Some problems with CIECAM02 316 15.26 Steps for using the CIECAM02 model 316 15.27 Steps for using the CIECAM02 model in reverse mode 319 15.28 Worked example for the model CIECAM02 321 16 Models of Colour Appearance for Stimuli of Different Sizes 325 16.1 Introduction 325 16.2 Stimuli of different sizes 325 16.3 Room colours 325 16.4 A model for predicting room colours 326 16.5 Steps in using the model for predicting room colours 327 17 Model of Colour Appearance for Unrelated Colours in Photopic and Mesopic Illuminances 329 17.1 Introduction 329 17.2 A model for predicting unrelated colours 330 17.3 Input data required for the model 331 17.4 Steps in using the model for unrelated colours 332 17.5 Worked example in the model for predicting unrelated colours 333 Appendices 335 Appendix 1 Radiometric and Photometric Terms and Units 337 A1.1 Introduction 337 A1.2 Physical detectors 337 A1.3 Photometric units and terms 338 A1.4 Radiant and quantum units and terms 340 A1.5 Radiation sources 340 A1.6 Terms for measures of reflection and transmission 341 A1.7 Other spectral luminous efficiency functions 343 A1.8 Mesopic photometry 343 Reference 344 Appendix 2 Spectral Luminous Efficiency Functions 345 Appendix 3 CIE Colour-Matching Functions 347 Appendix 4 CIE Spectral Chromaticity Co-Ordinates 351 Appendix 5 Relative Spectral Power Distributions of Illuminants 355 A5.1 Introduction 355 A5.2 CIE illuminants 355 A5.3 Representative fluorescent lamps 359 A5.4 Planckian radiators 368 A5.5 Gas discharge lamps 371 A5.6 Method of calculating D illuminant distributions 374 Appendix 6 Colorimetric Formulae 379 A6.1 Chromaticity relationships 379 A6.2 CIELUV, CIELAB, and U*V*W* relationships 379 Appendix 7 Calculation of the CIE Colour Rendering Indices 383 A7.1 Spectral radiance factors of test colours 383 A7.2 Worked example of the CIE colour rendering indices 388 Appendix 8 Illuminant-Observer Weights for Calculating Tristimulus Values 393 Appendix 9 Glossary of Terms 431 Reference 453 Index 455

    15 in stock

    £79.16

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account