This SpringerBrief provides an overview of cognitive mobile virtual network operator’s (C-MVNO) decisions under investment flexibility, supply uncertainty, and market competition in cognitive radio networks. This is a new research area at the nexus of cognitive radio engineering and microeconomics. The authors focus on an operator’s joint spectrum investment and service pricing decisions. The readers will learn how to tradeoff the two flexible investment choices (dynamic spectrum leasing and spectrum sensing) under supply uncertainty. Furthermore, if there is more than one operator, we present analysis of the competition among operators in obtaining spectrum and pricing services to attract users. The brief is designed for professionals working with C-MVNOs. Succinct and practical, it will assist them in making optimal investments and pricing decisions. It will also be of interest to researchers.
This book is intended to attract the attention of practitioners and researchers from industry and academia interested in challenging paradigms of multimedia video coding, with an emphasis on recent technical developments, cross-disciplinary tools and implementations. Given its instructional purpose, the book also overviews recently published video coding standards such as H.264/AVC and SVC from a simulational standpoint. Novel rate control schemes and cross-disciplinary tools for the optimization of diverse aspects related to video coding are also addressed in detail, along with implementation architectures specially tailored for video processing and encoding. The book concludes by exposing new advances in semantic video coding. In summary: this book serves as a technically sounding start point for early-stage researchers and developers willing to join leading-edge research on video coding, processing and multimedia transmission.
This book examines the interaction between the technical and economic issues in database-assisted dynamic spectrum networks. It explains various business models for different network settings, analyzing the user behaviors and system equilibrium under each model. With the explosive growth of mobile devices and bandwidth-hungry applications, radio spectrum is becoming increasingly congested and scarce. Database-assisted dynamic spectrum sharing is a promising technology for solving the problem of spectrum scarcity and congestion by allowing unlicensed mobile devices to dynamically access the under-utilized licensed spectrum resources through the assistance of a database. Database-assisted spectrum sharing network architecture has received wide and enthusiastic support from spectrum regulators, standards bodies, and industrial organizations. This book serves as a resource for researchers in white space communications and networking, for regulators in the wireless industry, and for graduate students and senior undergraduate students taking a course on network economics.
Mechanical Behaviors of Carbon Nanotubes: Theoretical and Numerical Approaches presents various theoretical and numerical studies on mechanical behaviors of carbon nanotubes. The main theoretical aspects included in the book contain classical molecular dynamics simulation, atomistic-continuum theory, atomic finite element method, continuum plate, nonlocal continuum plate, and shell models. Detailed coverage is also given to structural and elastic properties, trace of large deformation, buckling and post-buckling behaviors, fracture, vibration characteristics, wave propagation, and the most promising engineering applications. This book not only illustrates the theoretical and numerical methods for analyzing the mechanical behavior of carbon nanotubes, but also contains computational results from experiments that have already taken place. Covers various theoretical and numerical studies, giving readers a greater understanding of the mechanical behavior of carbon nanotubes Includes multiscale methods that provide the advantages of atomistic and continuum approaches, helping readers solve complex, large-system engineering problems Allows engineers to create more efficient carbon nanotube structures and devices
This book presents a bio-inspired hierarchical control scheme step by step toward developing limbless robots capable of 3D locomotion, fast reflex response, as well as sophisticated reaction to environmental stimuli. This interdisciplinary book introduces how to combine biological concept with locomotion control of limbless robots. The special features of the book include limbless locomotion classification and control, design of biological locomotor and the integration of sensory information into the locomotor using artificial intelligence methods, and on-site demonstrations of limbless locomotion in different scenarios. The book is suitable for readers with engineering background, especially for researchers focused on bio-inspired robots.
This unique book explores the important issues in studying for active visual perception. The book’s eleven chapters draw on recent important work in robot vision over ten years, particularly in the use of new concepts. Implementation examples are provided with theoretical methods for testing in a real robot system. With these optimal sensor planning strategies, this book will give the robot vision system the adaptability needed in many practical applications.
This book introduces readers to the background and principles of mobile service computing. It discusses various aspects of service computing in mobile environments, including key methods and techniques for service selection, recommendation, composition, offloading, execution, deployment, and provision.
This book focuses on security science and technology, data and information security, and mobile and network security for space-air-ground integrated networks (SAGINs). SAGIN are expected to play an increasingly important role in providing real-time, flexible, and integrated communication and data transmission services in an efficient manner. Today, SAGINs have been widely developed for a range of applications in navigation, environmental monitoring, traffic management, counter-terrorism, etc. However, security becomes a major concern, since the satellites, spacecrafts, and aircrafts are susceptible to a variety of traditional/specific network-based attacks, including eavesdropping, session hijacking, and illegal access. In this book, we review the theoretical foundations of SAGIN security. We also address a range of related security threats and provide cutting-edge solutions in the aspect of ground network security, airborne network security, space network security, and provide future trends in SAGIN security. The book goes from an introduction to the topic’s background, to a description of the basic theory, and then to cutting-edge technologies, making it suitable for readers at all levels including professional researchers and beginners. To gain the most from the book, readers should have taken prior courses in information theory, cryptography, network security, etc.
This is the first book on secure quantum network coding, which integrates quantum cryptography into quantum communication. It summarizes the main research findings on quantum network coding, while also systematically introducing readers to secure quantum network coding schemes. With regard to coding methods, coding models and coding security, the book subsequently provides a series of quantum network coding schemes based on the integration of quantum cryptography into quantum communication. Furthermore, it describes the general security analysis method for quantum cryptographic protocols. Accordingly, the book equips readers with effective tools for researching and applying quantum network coding.
This book addresses the hazard of gas explosions in sealed underground coal mines, and how the risk of explosion can be assessed, modeled, and mitigated. With this text, coal mine operators and managers will be able to identify the risks that lead to underground mine gas explosions, and implement practical strategies to optimize mining safety for workers. In six chapters, the book offers a framework for understanding the sealed coal mine atmosphere, the safety characteristics that are currently in place, and the guidelines to be followed by engineers to improve upon these characteristics. The first part of the book describes the importance and characteristics of underground gas mine explosions in a historical context with data showing the high number of fatalities from explosion incidents, and how risk has been mitigated in the past. Chapters also detail mathematical models and explosibility diagrams for determining and understanding the risk factors involved in mine explosions. Readers will also learn about safety operations, and assessments for the sealed mine atmosphere. With descriptions of chapter case studies, mining engineers and researchers will learn how to apply safety measures in underground coal mines to improve mining atmospheres and save lives.
Over the past several decades of reform and opening up to the outside world, remarkable economic growth has been achieved in China and has drawn considerable world attention. The question of how to explain that phenomenon and the road China has taken towards its modernization have been the focus of attention from worldwide economists and experts. This book attempts to explore China's economy from the perspective of government foresighted leading which gives full play to government functions, particularly those of regional governments. On the one hand, government foresighted leading enables government to exercise foresighted leading by means of foundations, mechanisms and regulations of market economy. On the other hand, it could reduce government malfunction and minimize the cost of remedying defects. Government foresighted leading theory is an important innovation and contribution to the theoretical configuration of economics. It not only offers an explanation of China's continuous economic growth, but further classifies economics into microeconomics, macroeconomics and mezzoeconomics which includes regional economics, industrial economics or structural economics, supplementing the traditional microeconomics and macroeconomics system.
In the last decades robots are expected to be of increasing intelligence to deal with a large range of tasks. Especially, robots are supposed to be able to learn manipulation skills from humans. To this end, a number of learning algorithms and techniques have been developed and successfully implemented for various robotic tasks. Among these methods, learning from demonstrations (LfD) enables robots to effectively and efficiently acquire skills by learning from human demonstrators, such that a robot can be quickly programmed to perform a new task. This book introduces recent results on the development of advanced LfD-based learning and control approaches to improve the robot dexterous manipulation. First, there's an introduction to the simulation tools and robot platforms used in the authors' research. In order to enable a robot learning of human-like adaptive skills, the book explains how to transfer a human user’s arm variable stiffness to the robot, based on the online estimation from the muscle electromyography (EMG). Next, the motion and impedance profiles can be both modelled by dynamical movement primitives such that both of them can be planned and generalized for new tasks. Furthermore, the book introduces how to learn the correlation between signals collected from demonstration, i.e., motion trajectory, stiffness profile estimated from EMG and interaction force, using statistical models such as hidden semi-Markov model and Gaussian Mixture Regression. Several widely used human-robot interaction interfaces (such as motion capture-based teleoperation) are presented, which allow a human user to interact with a robot and transfer movements to it in both simulation and real-word environments. Finally, improved performance of robot manipulation resulted from neural network enhanced control strategies is presented. A large number of examples of simulation and experiments of daily life tasks are included in this book to facilitate better understanding of the readers.
Over the past decade, the transient gene expression (TGE) technology platform has been actively pursued to produce a wide range of therapeutic proteins, monoclonal antibodies, and vaccines for mainly preclinical assessment, due to its short development times and low overall cost. This book updates the latest advances in the field, with focusing on systematic description of the technology from cell lines, cell culture conditions, vector construction, expression strategy, current protocols, optimisation of the procedure, and potential for clinical application. As a conclusion, the author foresees that therapeutic biopharmaceutics will be manufactured for clinical development using TGE technology in the near future because of its fast development time, good protein expression, acceptable quality of product and due to the progress which has been made in analytical methodology and process quality control. The objectives of this book are to summarise current TGE protocols, to describe optimisation of the technology through the latest advances, and to explore clinical applications of the technology. It gives the reader a good insight into the latest development and future application of the technology platform, including: The current protocols from small to large scale for different cells. Optimisation methods in construction designing, transfection procedures, and cell culture conditions. Overall quality of the product from the transient gene expression. Future clinical application of the technology platform.
This book argues that groundwater pollution risk assessment is the essential foundation of groundwater pollution prevention and control. It is on this basis that economic leverage is used to make new breakthroughs in groundwater protection and governance. Presenting a case study on the Jilin Section of the Songhua River, the book applies the overlay index method to assess the shallow groundwater pollution risk and identify high-risk areas and major pollution sources in an effort to identify the mechanism of interaction between industrial structures and groundwater pollution. Further, it proposes concrete measures for preventing and controlling groundwater pollution from an industrial economics perspective. As such, the book offers a valuable resource for all graduate students, lecturers and researchers who are interested in learning about resources and environmental economics.
This book addresses the applications of Fourier transform to smile modeling. Smile effect is used generically by ?nancial engineers and risk managers to refer to the inconsistences of quoted implied volatilities in ?nancial markets, or more mat- matically, to the leptokurtic distributions of ?nancial assets and indices. Therefore, a sound modeling of smile effect is the central challenge in quantitative ?nance. Since more than one decade, Fourier transform has triggered a technical revolution in option pricing theory. Almost all new developed option pricing models, es- cially in connection with stochastic volatility and random jump, have extensively applied Fourier transform and the corresponding inverse transform to express - tion pricing formulas. The large accommodation of the Fourier transform allows for a very convenient modeling with a general class of stochastic processes and d- tributions. This book is then intended to present a comprehensive treatment of the Fourier transform in the option valuation, covering the most stochastic factors such as stochastic volatilities and interest rates, Poisson and Levy ́ jumps, including some asset classes such as equity, FX and interest rates, and providing numerical ex- ples and prototype programming codes. I hope that readers will bene?t from this book not only by gaining an overview of the advanced theory and the vast large l- erature on these topics, but also by gaining a ?rst-hand feedback from the practice on the applications and implementations of the theory.
Rapid advances have been made during the past few decades in earthquake response modification technologies for structures, most notably in base isolation and energy dissipation systems. Many practical applications of various dampers can be found worldwide and, in the United States, damper design has been included in building codes. The current desi
This brief presents research results on social cognitive radio networks, a transformational and innovative networking paradigm that promotes the nexus between social interactions and cognitive radio networks. Along with a review of the research literature, the text examines the key motivation and challenges of social cognitive radio network design. Three socially inspired distributed spectrum sharing mechanisms are introduced: adaptive channel recommendation mechanism, imitation-based social spectrum sharing mechanism, and evolutionarily stable spectrum access mechanism. The brief concludes with a discussion of future research directions which ascertains that exploiting social interactions for distributed spectrum sharing will advance the state-of-the-art of cognitive radio network design, spur a new line of thinking for future wireless networks, and enable novel wireless service and applications.
This SpringerBrief provides an overview of cognitive mobile virtual network operator’s (C-MVNO) decisions under investment flexibility, supply uncertainty, and market competition in cognitive radio networks. This is a new research area at the nexus of cognitive radio engineering and microeconomics. The authors focus on an operator’s joint spectrum investment and service pricing decisions. The readers will learn how to tradeoff the two flexible investment choices (dynamic spectrum leasing and spectrum sensing) under supply uncertainty. Furthermore, if there is more than one operator, we present analysis of the competition among operators in obtaining spectrum and pricing services to attract users. The brief is designed for professionals working with C-MVNOs. Succinct and practical, it will assist them in making optimal investments and pricing decisions. It will also be of interest to researchers.
Today's wireless communications and networking practices are tightly coupled with economic considerations, to the extent that it is almost impossible to make a sound technology choice without understanding the corresponding economic implications. This book aims at providing a foundational introduction on how microeconomics, and pricing theory in particular, can help us to understand and build better wireless networks. The book can be used as lecture notes for a course in the field of network economics, or a reference book for wireless engineers and applied economists to understand how pricing mechanisms influence the fast growing modern wireless industry. This book first covers the basics of wireless communication technologies and microeconomics, before going in-depth about several pricing models and their wireless applications. The pricing models include social optimal pricing, monopoly pricing, price differentiation, oligopoly pricing, and network externalities, supported by introductory discussions of convex optimization and game theory. The wireless applications include wireless video streaming, service provider competitions, cellular usage-based pricing, network partial price differentiation, wireless spectrum leasing, distributed power control, and cellular technology upgrade. More information related to the book (including references, slides, and videos) can be found at ncel.ie.cuhk.edu.hk/content/wireless-network-pricing.
This SpringerBrief offers two concrete design examples for traffic offloading. The first is an optimal resource allocation for small-cell based traffic offloading that aims at minimizing mobile users’ data cost. The second is an optimal resource allocation for device-to-device assisted traffic offloading that also minimizes the total energy consumption and cellular link usage (while providing an overview of the challenging issues). Both examples illustrate the importance of proper resource allocation to the success of traffic offloading, show the consequent performance advantages of executing optimal resource allocation, and present the methodologies to achieve the corresponding optimal offloading solution for traffic offloading in heterogeneous cellular networks. The authors also include an overview of heterogeneous cellular networks and explain different traffic offloading paradigms ranging from uplink traffic offloading through small cells to downlink traffic offloading via mobile device-to-device cooperation. This brief is an excellent resource for postgraduate students studying advanced-level topics in wireless communications and networking. Researchers, engineers and professionals working in related fields will also find this brief a valuable resource tool.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.