This practically-oriented, all-inclusive guide covers all the major enabling techniques for current and next-generation cellular communications and wireless networking systems. Technologies covered include CDMA, OFDM, UWB, turbo and LDPC coding, smart antennas, wireless ad hoc and sensor networks, MIMO, and cognitive radios, providing readers with everything they need to master wireless systems design in a single volume. Uniquely, a detailed introduction to the properties, design, and selection of RF subsystems and antennas is provided, giving readers a clear overview of the whole wireless system. It is also the first textbook to include a complete introduction to speech coders and video coders used in wireless systems. Richly illustrated with over 400 figures, and with a unique emphasis on practical and state-of-the-art techniques in system design, rather than on the mathematical foundations, this book is ideal for graduate students and researchers in wireless communications, as well as for wireless and telecom engineers.
This book systematically studies the stochastic non-cooperative differential game theory of generalized linear Markov jump systems and its application in the field of finance and insurance. The book is an in-depth research book of the continuous time and discrete time linear quadratic stochastic differential game, in order to establish a relatively complete framework of dynamic non-cooperative differential game theory. It uses the method of dynamic programming principle and Riccati equation, and derives it into all kinds of existence conditions and calculating method of the equilibrium strategies of dynamic non-cooperative differential game. Based on the game theory method, this book studies the corresponding robust control problem, especially the existence condition and design method of the optimal robust control strategy. The book discusses the theoretical results and its applications in the risk control, option pricing, and the optimal investment problem in the field of finance and insurance, enriching the achievements of differential game research. This book can be used as a reference book for non-cooperative differential game study, for graduate students majored in economic management, science and engineering of institutions of higher learning.
ALGEBRAIC NUMBER THEORY provides concisely both the fundamental and profound theory, starting from the succinct ideal theory (Chapters 1-3), turning then to valuation theory and local completion field (Chapters 4-5) which is the base of modern approach. After specific discussions on class numbers, units, quadratic and cyclotomic fields, and analytical theory (Chapters 6-8), the important Class Field Theory (Chapter 9) is expounded, and algebraic function field (Chapter 10) is sketched. This book is based on the study and lectures of the author at several universities.
This book introduces in detail the theory of adaptive optics and its correction technology for light wave distortion in wireless optical communication. It discusses the adaptive control algorithm of wavefront distortion, proportional+integral control algorithm and iterative control algorithm, and double fuzzy adaptive PID control algorithm. It also covers the SPGD algorithm of adaptive optics correction, deformable mirrors eigenmode method of wavefront aberration correction, vortex beam wavefront detecting wavefront aberration correction, liquid crystal spatial light modulator wavefront correction, different wavelengths of Gaussian beam transmission wavefront differences in the atmospheric turbulence and correction and with wavefront tilt correction adaptive optics wavefront aberration correction. Various distortion correction methods are verified by experiments and the experimental results are analyzed. This book is suitable for engineering and technical personnel engaged in wireless optical communication, college teachers, graduate students and senior undergraduate students.
This book investigates observer-fault estimation techniques in detail, while also highlighting recent research and findings regarding fault estimation. Many practical control systems are subject to possible malfunctions, which may cause significant performance loss or even system instability. To improve the reliability, performance and safety of dynamical systems, fault diagnosis techniques are now receiving considerable attention, both in research and applications, and have been the subject of intensive investigations. Fault detection – the essential first step in fault diagnosis – is a binary decision-making process used to determine whether or not a fault has occurred. In turn, fault isolation is used to identify the location of the faulty component, while fault estimation is used to identify the size of the fault online. Compared with the problems involved in fault detection and isolation, fault estimation is considerably more challenging.
This book addresses the fundamental theory and key technologies of narrowband and broadband mobile communication systems specifically for railways. It describes novel relaying schemes that meet the different design criteria for railways and discusses the applications of signal classification techniques as well as offline resource scheduling as a way of advancing rail practice. Further, it introduces Novel Long Term Evolution for Railway (LTE-R) network architecture, the Quality of Service (QoS) requirement of LTE-R and its performance evaluation and discusses in detail security technologies for rail-dedicated mobile communication systems. The advanced research findings presented in the book are all based on high-speed railway measurement data, which offer insights into the propagation mechanisms and corresponding modeling theory and approaches in unique railway scenarios.It is a valuable resource for researchers, engineers and graduate students in the fields of rail traffic systems, telecommunication and information systems.
Annotation The three volume set LNCS 3610, LNCS 3611, and LNCS 3612 constitutes the refereed proceedings of the First International Conference on Natural Computation, ICNC 2005, held in Changsha, China, in August 2005 jointly with the Second International Conference on Fuzzy Systems and Knowledge Discovery FSKD 2005 (LNAI volumes 3613 and 3614). The program committee selected 313 carefully revised full papers and 189 short papers for presentation in three volumes from 1887 submissions. The first volume includes all the contributions related to learning algorithms and architectures in neural networks, neurodynamics, statistical neural network models and support vector machines, and other topics in neural network models; cognitive science, neuroscience informatics, bioinformatics, and bio-medical engineering, and neural network applications as communications and computer networks, expert system and informatics, and financial engineering. The second volume concentrates on neural network applications such as pattern recognition and diagnostics, robotics and intelligent control, signal processing and multi-media, and other neural network applications; evolutionary learning, artificial immune systems, evolutionary theory, membrane, molecular, DNA computing, and ant colony systems. The third volume deals with evolutionary methodology, quantum computing, swarm intelligence and intelligent agents; natural computation applications as bioinformatics and bio-medical engineering, robotics and intelligent control, and other applications of natural computation; hardware implementations of natural computation, and fuzzy neural systems as well as soft computing.
This book is based on the teaching experience of the authors, and therefore some of the topics are presented in a new form. For instance, the multi-valued properties of the argument function are discussed in detail so that the beginner may readily grasp the elementary multi-valued analytic functions. The residue theorem is extended to the case where poles of analytic functions considered may occur on the boundary of a region ? which is very useful in applications but not seen in textbooks written in English.
Due to the increasing security and reliability demand of actual industrial process control systems, the study on fault diagnosis and fault tolerant control of dynamic systems has received considerable attention. Fault accommodation (FA) is one of effective methods that can be used to enhance system stability and reliability, so it has been widely and in-depth investigated and become a hot topic in recent years. Fault detection is used to monitor whether a fault occurs, which is the first step in FA. On the basis of fault detection, fault estimation (FE) is utilized to determine online the magnitude of the fault, which is a very important step because the additional controller is designed using the fault estimate. Compared with fault detection, the design difficulties of FE would increase a lot, so research on FE and accommodation is very challenging. Although there have been advancements reported on FE and accommodation for dynamic systems, the common methods at the present stage have design difficulties, which limit applications of respective design approaches. Therefore, the problems of FE and accommodation are needed to be further studied. This book considers the theory and technology of FE and accommodation for dynamic systems, and establishes a systemic and comprehensive framework of FE and accommodation for continuous/discrete-time systems.
This book is based on the teaching experience of the authors, and therefore some of the topics are presented in a new form. For instance, the multi-valued properties of the argument function are discussed in detail so that the beginner may readily grasp the elementary multi-valued analytic functions. The residue theorem is extended to the case where poles of analytic functions considered may occur on the boundary of a region — which is very useful in applications but not seen in textbooks written in English.
This book presents advanced research in a relatively new field of scholarly inquiry that is usually referred to as dynamic network user equilibrium, now almost universally abbreviated as DUE. It provides the first synthesis of results obtained over the last decade from applying the differential variational inequality (DVI) formalism to study the DUE problem. In particular, it explores the intimately related problem of dynamic network loading, which determines the arc flows and effective travel delays (or generalized travel costs) arising from the expression of departure rates at the origins of commuter trips between the workplace and home. In particular, the authors show that dynamic network loading with spillback of queues into upstream arcs may be formulated as a differential algebraic equation system. They demonstrate how the dynamic network loading problem and the dynamic traffic user equilibrium problem may be solved simultaneously rather than sequentially, as well as how the first-in-first-out queue discipline may be maintained for each when Lighthill-Whitham-Richardson traffic flow theory is used. A number of recent and new extensions of the DVI-based theory of DUE and corresponding examples are presented and discussed. Relevant mathematical background material is provided to make the book as accessible as possible.
The Internet-of-Things (IoT) revolution has triggered the need of massive connectivity for billions of devices requiring a system capacity which is far beyond the current network designs that can be supported. This emerging requirement has reshaped the society and industry in pursuing efficient communication paradigm. In particular, massive machine-type communications (mMTC) will be a prime driver for enabling the vision of scalable IoT with heterogeneous applications, where the massive access is of paramount importance. This book discusses important massive IoT scenarios and the key technical requirements of the corresponding massive access. We review the state-of-the-art IoT standards and mMTC solutions, and summarize the limitations of the existing schemes from the perspectives of the network architecture, random access procedure, and multiple access techniques. Here, we specify the massive access challenges and reveal that the facilitation of MTC invokes a dramatically different access scheme from current ones mainly designed for human-centric communications. Moreover, we propose several promising massive access solutions to overcome the limitations, where sufficient theoretical model and algorithm design guidance are provided. Besides, detailed simulation and engineering implementation methods are also included.
This book introduces readers to the application of orbital data on space objects in the contexts of conjunction assessment and space situation analysis, including theories and methodologies. It addresses the main topics involved in space object conjunction assessment, such as: orbital error analysis of space objects; close approach analysis; the calculation, analysis and application of collision probability; and the comprehensive assessment of collision risk. In addition, selected topics on space situation analysis are also presented, including orbital anomaly and space event analysis, and so on. The book offers a valuable guide for researchers and engineers in the fields of astrodynamics, space telemetry, tracking and command (TT&C), space surveillance, space situational awareness, and space debris, as well as for graduates majoring in flight vehicle design and related fields.
This book focuses linear estimation theory, which is essential for effective signal processing. The first section offers a comprehensive overview of key methods like reduced-rank signal processing and Krylov subspace methods of numerical mathematics. Also, the relationship between statistical signal processing and numerical mathematics is presented. In the second part, the theory is applied to iterative multiuser detection receivers (Turbo equalization) which are typically desired in wireless communications systems.
This book deals with boundary value problems for analytic functions with applications to singular integral equations. New and simpler proofs of certain classical results such as the Plemelj formula, the Privalov theorem and the Poincaré-Bertrand formula are given. Nearly one third of this book contains the author's original works, most of which have not been published in English before and, hence, were previously unknown to most readers in the world.It consists of 7 chapters together with an appendix: Chapter I describes the basic knowledge on Cauchy-type integrals and Cauchy principal value integrals; Chapters II and III study, respectively, fundamental boundary value problems and their applications to singular integral equations for closed contours; Chapters IV and V discuss the same problems for curves with nodes (including open arcs); Chaper VI deals with similar problems for systems of functions; Chapter VII is concerned with some miscellaneous problems and the Appendix contains some basic results on Fredholm integral equations. In most sections, there are carefully selected sets of exercises, some of which supplement the text of the sections; answers/hints are also given for some of these exercises.For graduate students or seniors, all the 7 chapters can be used for a full year course, while the first 3 chapters may be used for a one-semester course.
Originally published in 1995, Beyond Capital Labor is a comprehensive empirical study about how and how much technology and regional contextual factors may influence company production and productivity growth. The book constitutes a conceptually consistent and empirically efficient study and provides a consolidated model and an analytical framework to examine the contributions of technology and regional factors to company production and productivity growth. This work goes beyond the current state and brings many scattered theoretical components together to establish an integrated model.
This book provides a broad yet detailed introduction to neural networks and machine learning in a statistical framework. A single, comprehensive resource for study and further research, it explores the major popular neural network models and statistical learning approaches with examples and exercises and allows readers to gain a practical working understanding of the content. This updated new edition presents recently published results and includes six new chapters that correspond to the recent advances in computational learning theory, sparse coding, deep learning, big data and cloud computing. Each chapter features state-of-the-art descriptions and significant research findings. The topics covered include: • multilayer perceptron; • the Hopfield network; • associative memory models;• clustering models and algorithms; • t he radial basis function network; • recurrent neural networks; • nonnegative matrix factorization; • independent component analysis; •probabilistic and Bayesian networks; and • fuzzy sets and logic. Focusing on the prominent accomplishments and their practical aspects, this book provides academic and technical staff, as well as graduate students and researchers with a solid foundation and comprehensive reference on the fields of neural networks, pattern recognition, signal processing, and machine learning.
This book introduces some recent developments in Bayesian real-time system identification. It contains two different perspectives on data processing for system identification, namely centralized and distributed. A centralized Bayesian identification framework is presented to address challenging problems of real-time parameter estimation, which covers outlier detection, system, and noise parameters tracking. Besides, real-time Bayesian model class selection is introduced to tackle model misspecification problem. On the other hand, a distributed Bayesian identification framework is presented to handle asynchronous data and multiple outlier corrupted data. This book provides sufficient background to follow Bayesian methods for solving real-time system identification problems in civil and other engineering disciplines. The illustrative examples allow the readers to quickly understand the algorithms and associated applications. This book is intended for graduate students and researchers in civil and mechanical engineering. Practitioners can also find useful reference guide for solving engineering problems.
The massive volume of data generated in modern applications can overwhelm our ability to conveniently transmit, store, and index it. For many scenarios, building a compact summary of a dataset that is vastly smaller enables flexibility and efficiency in a range of queries over the data, in exchange for some approximation. This comprehensive introduction to data summarization, aimed at practitioners and students, showcases the algorithms, their behavior, and the mathematical underpinnings of their operation. The coverage starts with simple sums and approximate counts, building to more advanced probabilistic structures such as the Bloom Filter, distinct value summaries, sketches, and quantile summaries. Summaries are described for specific types of data, such as geometric data, graphs, and vectors and matrices. The authors offer detailed descriptions of and pseudocode for key algorithms that have been incorporated in systems from companies such as Google, Apple, Microsoft, Netflix and Twitter.
With China becoming a major force in steel research and development, this book highlights the work of a group from the Chinese Academy of Sciences, led by the first four authors. This group has the ideal knowledge base for writing this updated book on heat-resistant steels. The fifth author, Sha, based in the UK, has been collaborating with the Chinese group since 2009 and is the lead or sole author of four research books, all published in English. The last book, “Steels: from materials science to structural engineering,” was published by Springer in 2013. Within two months of its publication, researchers at the University of Science and Technology Liaoning had requested translation of the book into Chinese. Springer obliged, and the Chinese version was published by the Metallurgical Industry Press, Beijing, in August 2014. Sha has organized and completed the writing of the proposed book, though the main research was done in China.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.