De Aller-Bedste Bøger - over 12 mio. danske og engelske bøger
Levering: 1 - 2 hverdage

Bøger i SpringerBriefs in Electrical and Computer Engineering serien

Filter
Filter
Sorter efterSorter Serie rækkefølge
  • - Methods for Bilinear, Linear-quadratic and Polynomial Mixtures
    af Yannick Deville
    577,95 kr.

    This book provides a detailed survey of the methods that were recently developed to handle advanced versions of the blind source separation problem, which involve several types of nonlinear mixtures.

  • - An Interdisciplinary, Easy and Practical Approach
    af Mitul Kumar Ahirwal
    723,95 kr.

    This book presents an interdisciplinary paradigms of computational intelligence techniques and biomedical signal processing. The computational intelligence techniques outlined in the book will help to develop various ways to enhance and utilize signal processing algorithms in the field of biomedical signal processing.

  • - A Geometric Approach
    af Claudia Califano
    605,95 kr.

    This brief focuses on the structural properties of nonlinear time-delay systems.

  • af Navneet Ghedia
    706,95 kr.

    The authors show how the proposed algorithm is able to detect and track 2D & 3D objects in monocular sequences for both indoor and outdoor surveillance environments and at the same time, also able to work satisfactorily in a dynamic background and with challenging constraints.

  • af Dietmar Kissinger
    563,95 kr.

    The book presents the analysis and design of integrated automotive radar receivers in Silicon-Germanium technology, for use in complex multi-channel radar transceiver front-ends in the 77GHz frequency band. The main emphasis of the work is the realization of high-linearity and low-power modular receiver channels as well as the investigation of millimeter-wave integrated test concepts for the receiver front-end.

  • af Jukka Suhonen
    560,95 kr.

    Wireless sensor network (WSN) is an ad-hoc network technology comprising even thousands of autonomic and self-organizing nodes that combine environmental sensing, data processing, and wireless networking. The applications for sensor networks range from home and industrial environments to military uses. Unlike the traditional computer networks, a WSN is application-oriented and deployed for a specific task. WSNs are data centric, which means that messages are not send to individual nodes but to geographical locations or regions based on the data content. A WSN node is typically battery powered and characterized by extremely small size and low cost. As a result, the processing power, memory, and energy resources of an individual sensor node are limited. However, the feasibility of a WSN lies on the collaboration between the nodes. A reference WSN node comprises a Micro-Controller Unit (MCU) having few Million Instructions Per Second (MIPS) processing speed, tens of kilobytes program memory, few kilobytes data memory. In addition, the node contains a short-range radio, and a set of sensors. Supply power is typically obtained with small batteries. Assuming a target lifetime of one year using AA-size batteries, the available power budget is around 1 mW. This book covers the low-power WSNs services ranging from hardware platforms and communication protocols to network deployment, and sensor data collection and actuation. The implications of resource constraints and expected performance in terms of throughput, reliability and latency are explained. As a case study, this book presents experiments with low-energy TUTWSN technology to illustrate the possibilities and limitations of WSN applications.

  • af Leandro Balby Marinho
    562,95 kr.

    Social Tagging Systems are web applications in which users upload resources (e.g., bookmarks, videos, photos, etc.) and annotate it with a list of freely chosen keywords called tags. This is a grassroots approach to organize a site and help users to find the resources they are interested in. Social tagging systems are open and inherently social; features that have been proven to encourage participation. However, with the large popularity of these systems and the increasing amount of user-contributed content, information overload rapidly becomes an issue. Recommender Systems are well known applications for increasing the level of relevant content over the "e;noise"e; that continuously grows as more and more content becomes available online. In social tagging systems, however, we face new challenges. While in classic recommender systems the mode of recommendation is basically the resource, in social tagging systems there are three possible modes of recommendation: users, resources, or tags. Therefore suitable methods that properly exploit the different dimensions of social tagging systems data are needed. In this book, we survey the most recent and state-of-the-art work about a whole new generation of recommender systems built to serve social tagging systems. The book is divided into self-contained chapters covering the background material on social tagging systems and recommender systems to the more advanced techniques like the ones based on tensor factorization and graph-based models.

  • af Mirjana Pavlovic
    566,95 kr.

    Stem cells are the building blocks for all other cells in an organism. The human body has about 200 different types of cells and any of those cells can be produced by a stem cell. This fact emphasizes the significance of stem cells in transplantational medicine, regenerative therapy and bioengineering. Whether embryonic or adult, these cells can be used for the successful treatment of a wide range of diseases that were not treatable before, such as osteogenesis imperfecta in children, different forms of leukemias, acute myocardial infarction, some neural damages and diseases, etc. Bioengineering, e.g. successful manipulation of these cells with multipotential capacity of differentiation toward appropriate patterns and precise quantity, are the prerequisites for successful outcome and treatment. By combining in vivo and in vitro techniques, it is now possible to manage the wide spectrum of tissue damages and organ diseases. Although the stem-cell therapy is not a response to all the questions, it provides more and more answers every day. Stem Cells and Tissue Engineering is a concise review on the functional, phenotypic, regenerative, transplantational and curative aspects of a stem cell's entity. It is critical and encouraging at the same time, providing truthful and appropriate samples from the practice and research that can lead toward optimal use of this immense source of adjuvant and curative therapy in human pathology. Written by a clinician and a researcher, who are currently teaching what they are doing, it is recommended as a teaching tool along with an original textbook.

  • af Nauman Khan
    560,95 kr.

    This book explores the challenges and presents best strategies for designing Through-Silicon Vias (TSVs) for 3D integrated circuits. It describes a novel technique to mitigate TSV-induced noise, the GND Plug, which is superior to others adapted from 2-D planar technologies, such as a backside ground plane and traditional substrate contacts. The book also investigates, in the form of a comparative study, the impact of TSV size and granularity, spacing of C4 connectors, off-chip power delivery network, shared and dedicated TSVs, and coaxial TSVs on the quality of power delivery in 3-D ICs. The authors provide detailed best design practices for designing 3-D power delivery networks. Since TSVs occupy silicon real-estate and impact device density, this book provides four iterative algorithms to minimize the number of TSVs in a power delivery network. Unlike other existing methods, these algorithms can be applied in early design stages when only functional block- level behaviors and a floorplan are available. Finally, the authors explore the use of Carbon Nanotubes for power grid design as a futuristic alternative to Copper.

  • af Aris Gkoulalas-Divanis
    559,95 kr.

    Anonymization of Electronic Medical Records to Support Clinical Analysis closely examines the privacy threats that may arise from medical data sharing, and surveys the state-of-the-art methods developed to safeguard data against these threats. To motivate the need for computational methods, the book first explores the main challenges facing the privacy-protection of medical data using the existing policies, practices and regulations. Then, it takes an in-depth look at the popular computational privacy-preserving methods that have been developed for demographic, clinical and genomic data sharing, and closely analyzes the privacy principles behind these methods, as well as the optimization and algorithmic strategies that they employ. Finally, through a series of in-depth case studies that highlight data from the US Census as well as the Vanderbilt University Medical Center, the book outlines a new, innovative class of privacy-preserving methods designed to ensure the integrity of transferred medical data for subsequent analysis, such as discovering or validating associations between clinical and genomic information. Anonymization of Electronic Medical Records to Support Clinical Analysis is intended for professionals as a reference guide for safeguarding the privacy and data integrity of sensitive medical records. Academics and other research scientists will also find the book invaluable.

  • af Katsuaki Suganuma
    807,95 kr.

    This book describes in detail modern technologies for printed electronics, explaining how nanotechnology and modern printing technology are merging to revolutionize electronics fabrication of thin, lightweight, large and inexpensive products. Readers will benefit from the explanations of materials, devices and circuits used to design and implement the latest applications of printed electronics, such as thin flexible OLED displays, organic solar cells, OLED lighting, smart wallpaper, sensors, logic, memory and more.

  • af Cam Nguyen
    564,95 kr.

    This book presents the theory, analysis, and design of ultra-wideband (UWB) radar and sensor systems (in short, UWB systems) and their components. UWB systems find numerous applications in the military, security, civilian, commercial and medicine fields. This book addresses five main topics of UWB systems: System Analysis, Transmitter Design, Receiver Design, Antenna Design and System Integration and Test. The developments of a practical UWB system and its components using microwave integrated circuits, as well as various measurements, are included in detail to demonstrate the theory, analysis and design technique. Essentially, this book will enable the reader to design their own UWB systems and components.In the System Analysis chapter, the UWB principle of operation as well as the power budget analysis and range resolution analysis are presented. In the UWB Transmitter Design chapter, the design, fabrication and measurement of impulse and monocycle pulse generators are covered. The UWB Receiver Design chapter addresses the design and measurement of the strobe pulse generator, sampling mixer, low-noise amplifier and synchronous sampling receiver. Next, the UWB Antenna Design chapter details the design and measurement of to two UWB antennas: the microstrip quasi-horn antenna and the UWB uniplanar antenna. The System Integration and Test chapter covers the transmission-reception test, signal processing, system integration, and evaluation of the UWB sensor. The final chapter provides a summary and conclusion of the work.

  • af Fan Wu
    561,95 kr.

    This brief examines issues of spectrum allocation for the limited resources of radio spectrum. It uses a game-theoretic perspective, in which the nodes in the wireless network are rational and always pursue their own objectives. It provides a systematic study of the approaches that can guarantee the system's convergence at an equilibrium state, in which the system performance is optimal or sub-optimal. The author provides a short tutorial on game theory, explains game-theoretic channel allocation in clique and in multi-hop wireless networks and explores challenges in designing game-theoretic mechanisms for dynamic channel redistribution. Since designing a completely secure mechanism is extremely expensive or impossible in most of distributed autonomous systems, it is more beneficial to study misbehavior of the nodes and develop light-weighted game-theoretic channel allocation mechanisms. With a mix of theoretical and hands-on information, the brief traces the concepts of game theory, the current state of spectrum allocation in wireless networks and future competition for resources. Thorough yet accessible, the content is ideal for researchers and practitioners working on spectrum redistribution. It is also a helpful resource for researchers and advanced-level students interested in game theory and wireless communications.

  • af Haim Dahan
    484,95 kr.

    This book explores a proactive and domain-driven method to classification tasks. This novel proactive approach to data mining not only induces a model for predicting or explaining a phenomenon, but also utilizes specific problem/domain knowledge to suggest specific actions to achieve optimal changes in the value of the target attribute. In particular, the authors suggest a specific implementation of the domain-driven proactive approach for classification trees. The book centers on the core idea of moving observations from one branch of the tree to another. It introduces a novel splitting criterion for decision trees, termed maximal-utility, which maximizes the potential for enhancing profitability in the output tree. Two real-world case studies, one of a leading wireless operator and the other of a major security company, are also included and demonstrate how applying the proactive approach to classification tasks can solve business problems. Proactive Data Mining with Decision Trees is intended for researchers, practitioners and advanced-level students.

  • af Rao Mikkilineni
    558,95 kr.

    Designing a New Class of Distributed Systems closely examines the Distributed Intelligent Managed Element (DIME) Computing Model, a new model for distributed systems, and provides a guide to implementing Distributed Managed Workflows with High Reliability, Availability, Performance and Security. The book also explores the viability of self-optimizing, self-monitoring autonomous DIME-based computing systems. Designing a New Class of Distributed Systems is designed for practitioners as a reference guide for innovative distributed systems design. Researchers working in a related field will also find this book valuable.

  • af Touhid Bhuiyan
    417,95 kr.

    Recommender systems are one of the recent inventions to deal with the ever-growing information overload in relation to the selection of goods and services in a global economy. Collaborative Filtering (CF) is one of the most popular techniques in recommender systems. The CF recommends items to a target user based on the preferences of a set of similar users known as the neighbors, generated from a database made up of the preferences of past users. In the absence of these ratings, trust between the users could be used to choose the neighbor for recommendation making. Better recommendations can be achieved using an inferred trust network which mimics the real world "friend of a friend" recommendations. To extend the boundaries of the neighbor, an effective trust inference technique is required. This book proposes a trust interference technique called Directed Series Parallel Graph (DSPG) that has empirically outperformed other popular trust inference algorithms, such as TidalTrust and MoleTrust. For times when reliable explicit trust data is not available, this book outlines a new method called SimTrust for developing trust networks based on a user's interest similarity. To identify the interest similarity, a user's personalized tagging information is used. However, particular emphasis is given in what resources the user chooses to tag, rather than the text of the tag applied. The commonalities of the resources being tagged by the users can be used to form the neighbors used in the automated recommender system. Through a series of case studies and empirical results, this book highlights the effectiveness of this tag-similarity based method over the traditional collaborative filtering approach, which typically uses rating data. Trust for Intelligent Recommendation is intended for practitioners as a reference guide for developing improved, trust-based recommender systems. Researchers in a related field will also find this book valuable.

  • af Nor Aziah Alias
    410,95 kr.

    ICT Development for Social and Rural Connectedness provides an introduction to the concept of 'connectedness', and explores how this socio-psychological term has evolved during the age of the Internet. The book surveys the principles of ICT for development (ICTD), and closely examines how ICT has played a pivotal role in the rural community development of various countries. To highlight the continued benefits of ICT in these regions, the book presents an in-depth case study that analyzes the connectedness within the rural internet centers of Malaysia. The book is intended primarily for researchers and practitioners as a reference guide to ICTD in rural environments.

  • af Saleh Faruque
    561,95 kr.

    This book introduces Radio Frequency Propagation to a broad audience.  The author blends theory and practice to bring readers up-to-date in key concepts, underlying principles and practical applications of wireless communications.  The presentation is designed to be easily accessible, minimizing mathematics and maximizing visuals.

  • af Yi Song & Jiang Xie
    484,95 kr.

    This SpringerBrief investigates the special challenges of broadcast design in cognitive radio (CR) ad hoc networks. It introduces two broadcast protocols in CR ad hoc networks: a quality-of-service based broadcast protocol under blind information and a fully-distributed broadcast protocol with collision avoidance. A novel unified analytical model is also presented to analyze the performance of the broadcast protocols. This is the first book dedicated to the unique broadcast design challenges in CR ad hoc networks. The authors also discuss the recent research on the performance analysis of broadcast protocols.Broadcast Design In Cognitive Radio Ad Hoc Networks is designed for professionals and researchers working in the wireless networks industry. Advanced-level students in electrical engineering and computer science, especially those focused on wireless networks will find this information very valuable.

  • af Chunsheng Xin & Min Song
    558,95 kr.

    This SpringerBrief presents intelligent spectrum sharing technologies for future wireless communication systems. It explains the widely used opportunistic spectrum access and TV white space sharing, which has been approved by the FCC. Four new technologies to significantly increase the efficiency of spectrum sharing are also introduced. The four technologies presented are Dynamic Spectrum Co-Access, Incentivized Cooperative Spectrum Sharing, On-Demand Spectrum Sharing and Licensed Shared Spectrum Access. These technologies shed light on future wireless communication systems and pave the way for innovative spectrum sharing with increased spectrum utilization. Increased utilization will allow networks to meet the demand for radio spectrum and promote the growth of wireless industry and national economy. Spectrum Sharing is a valuable resource for researchers and professionals working in wireless communications. Advanced-level students in electrical engineering and computer science will also find this content helpful as a study guide.

  • af Jiuyong Li, Lin Liu & Thuc Duy Le
    559,95 kr.

    This brief presents four practical methods to effectively explore causal relationships, which are often used for explanation, prediction and decision making in medicine, epidemiology, biology, economics, physics and social sciences. The first two methods apply conditional independence tests for causal discovery. The last two methods employ association rule mining for efficient causal hypothesis generation, and a partial association test and retrospective cohort study for validating the hypotheses. All four methods are innovative and effective in identifying potential causal relationships around a given target, and each has its own strength and weakness. For each method, a software tool is provided along with examples demonstrating its use. Practical Approaches to Causal Relationship Exploration is designed for researchers and practitioners working in the areas of artificial intelligence, machine learning, data mining, and biomedical research. The material also benefits advanced students interested in causal relationship discovery.

  • af Jianhua Lu, Xiaoming Tao & Ning Ge
    562,95 kr.

    This brief presents an alternative viewpoint on processing technology for wireless communications based on recent research advances. As a lever in emerging processing technology, the structure perspective addresses the complexity and uncertainty issues found in current wireless applications. Likewise, this brief aims at providing a new prospective to the development of communication technology and information science, while stimulating new theories and technologies for wireless systems with ever-increasing complexity. Readers of this brief may range from graduate students to researchers in related fields.

  • af Lei Lei, Chuang Lin & Zhangdui Zhong
    561,95 kr.

    This SpringerBrief presents research in the application of Stochastic Petri Nets (SPN) to the performance evaluation of wireless networks under bursty traffic. It covers typical Quality-of-Service performance metrics such as mean throughput, average delay and packet dropping probability. Along with an introduction of SPN basics, the authors introduce the key motivation and challenges of using SPN to analyze the resource sharing performance in wireless networks. The authors explain two powerful modeling techniques that treat the well-known state space explosion problem: model decomposition and iteration, and model aggregation using stochastic high-level petri nets. The first technique assists in performance analysis of opportunistic scheduling, Device-to-Device communications with full frequency reuse and partial frequency reuse. The second technique is used to formulate a wireless channel mode for cross-layer performance analysis in OFDM system. Stochastic Petri Nets for Wireless Networks reveals useful insights for the design of radio resource management algorithms and a new line of thinking for the performance evaluation of future wireless networks. This material is valuable as a reference for researchers and professionals working in wireless networks and for advanced-level students studying wireless technologies in electrical engineering or computer science.

  • af Lei Yang, Junshan Zhang, Xiaowen Gong & mfl.
    557,95 kr.

    This SpringerBrief explains how to leverage mobile users' social relationships to improve the interactions of mobile devices in mobile networks. It develops a social group utility maximization (SGUM) framework that captures diverse social ties of mobile users and diverse physical coupling of mobile devices. Key topics include random access control, power control, spectrum access, and location privacy.This brief also investigates SGUM-based power control game and random access control game, for which it establishes the socially-aware Nash equilibrium (SNE). It then examines the critical SGUM-based spectrum access game, and pseudonym change game for personalized location privacy. The authors propose future work on extending the SGUM framework to negative social ties, to demonstrate relevance to security applications and span the continuum between zero-sum game (ZSG) and non-cooperative game (NCG). Social Group Utility Maximization targets researchers and professionals working on mobile networks and social networks. Advanced-level students in electrical engineering and computer science will also find this material useful for their related courses.

  • af Xu Chen & Jianwei Huang
    560,95 kr.

    This brief presents research results on social cognitive radio networks, a transformational and innovative networking paradigm that promotes the nexus between social interactions and cognitive radio networks. Along with a review of the research literature, the text examines the key motivation and challenges of social cognitive radio network design. Three socially inspired distributed spectrum sharing mechanisms are introduced: adaptive channel recommendation mechanism, imitation-based social spectrum sharing mechanism, and evolutionarily stable spectrum access mechanism. The brief concludes with a discussion of future research directions which ascertains that exploiting social interactions for distributed spectrum sharing will advance the state-of-the-art of cognitive radio network design, spur a new line of thinking for future wireless networks, and enable novel wireless service and applications.

  • af Panagiotis Symeonidis, Dimitrios Ntempos & Yannis Manolopoulos
    561,95 kr.

  • af Naser Pour Aryan, Hans Kaim & Albrecht Rothermel
    561,95 kr.

  • af Luciano Pandolfi
    566,95 kr.