The book systematically introduces the design theory and method of multi-band RF filtering circuits for the modern wireless communication systems or radar systems, which are required to operate at multi-bands. These multi-band filtering RF circuits have drawn more and more attention from the engineers and scientists in the field of RF circuits design. The book proposes the detailed theoretical analysis and abundant experimental data of multi-mode resonators, multi-band bandpass filter with high selectivity, reflectionless multi-band bandpass filter, balanced filter with high suppression, slotline based multi-band balun filter, switchable filtering diplexer based on reused L-shape resonator and miniaturized 55-/95-GHz on-chip dual-band bandpass Filter. The book is intended for undergraduate and graduate students who are interested in filtering circuits design, researchers who are investigating RF & microwave systems, as well as design engineers who are working in the RF & microwave circuits field. Readers can get an in-depth understanding about the multi-band RF filtering circuits design theory and method.
BATTERY MANAGEMENT SYSTEM AND ITS APPLICATIONS Enables readers to understand basic concepts, design, and implementation of battery management systems Battery Management System and its Applications is an all-in-one guide to basic concepts, design, and applications of battery management systems (BMS), featuring industrially relevant case studies with detailed analysis, and providing clear, concise descriptions of performance testing, battery modeling, functions, and topologies of BMS. In Battery Management System and its Applications, readers can expect to find information on: Core and basic concepts of BMS, to help readers establish a foundation of relevant knowledge before more advanced concepts are introduced Performance testing and battery modeling, to help readers fully understand Lithium-ion batteries Basic functions and topologies of BMS, with the aim of guiding readers to design simple BMS themselves Some advanced functions of BMS, drawing from the research achievements of the authors, who have significant experience in cross-industry research Featuring detailed case studies and industrial applications, Battery Management System and its Applications is a must-have resource for researchers and professionals working in energy technologies and power electronics, along with advanced undergraduate/postgraduate students majoring in vehicle engineering, power electronics, and automatic control.
Based on the field investigation and the summary of the published research results of the April 20, 2013, Lushan, Sichuan, China, MS7.0 earthquake, having occurred along the same fault zone which accommodated the May 12, 2008, Wenchuan MS8.0 earthquake, this Brief tries to describe and discuss the special earthquake phenomenology associated with both the local geology and the changing society. Since the occurrence of this earthquake, there have been the scientific debates on (1) the seismo-tectonics of this earthquake which has no primary seismic fault discovered on the surface of the ground; (2) the relation between this earthquake and the Wenchuan earthquake (i.e., whether it can be considered as one of the aftershocks); and (3) how well have been accomplished in the reduction of earthquake disasters, 5 years after the Wenchuan earthquake. This Brief also tries to introduce the studies and practice of Chinese seismological agencies for the reduction of earthquake disasters. Due to language and cultural barriers, such an introduction makes sense not only for English readers but also for Chinese readers. For example, people (abroad) are always asking why there are so many Chinese seismologists working on earthquake prediction. In fact the Chinese wording 'earthquake prediction' has a much wider coverage than that in English. And actually the Chinese approach to (time-dependent) seismic hazard has no systematic difference from outside world in its methodology.
Parametric array loudspeakers (PALs) are capable of generating highly directional audio beams from nonlinear interactions of intense airborne ultrasound waves. This unique capability holds great potential in audio engineering. This book systematically introduces the physical principles of acoustics waves generated by PALs, along with the commonly used and the state-of-the-art numerical models, such as the Westervelt model, the convolution directivity model, the Gaussian beam expansion method, and the spherical wave expansion method. The properties of sound fields generated by PALs are analyzed. Also analyzed are various phenomena including the reflection of acoustics waves generated by PALs from a surface, transmission through a thin partition, scattering by a rigid sphere, and propagation in rooms. Furthermore, the steering and focusing of acoustics waves generated by PALs and potential applications of PALs in active sound control are investigated. Finally, the implementation issues of hardware, signal processing techniques, measurement, and safety are discussed. The book is tailored to meet the needs of researchers in this field, as well as audio practitioners and acoustics engineers.
A practical handbook covering polarization measurement and control in optical communication and sensor systems In Polarization Measurement and Control in Optical Fiber Communication and Sensor Systems, the authors deliver a comprehensive exploration of polarization related phenomena, as well as the methodologies, techniques, and devices used to eliminate, mitigate, or compensate for polarization related problems and impairments. The book also discusses polarization-related parameter measurement and characterization technologies in optical fibers and fiber optic devices and the utilization of polarization to solve problems or enable new capabilities in communications, sensing, and measurement systems. The authors provide a practical and hands-on treatment of the information that engineers, scientists, and graduate students must grasp to be successful in their everyday work. In addition to coverage of topics ranging from the use of polarization analysis to obtain instantaneous spectral information on light sources to the design of novel fiber optic gyroscopes for rotation sensing, Polarization Measurement and Control in Optical Fiber Communication and Sensor Systems offers: A thorough introduction to polarization in optical fiber studies, including a history of polarization in optical fiber communication and sensor systems. Comprehensive discussions of the fundamentals of polarization, including the effects unique to optical fiber systems, as well as extensive coverage Jones and Mueller matrix calculus for polarization analysis. In-depth treatments of active polarization controlling devices for optical fiber systems, including polarization controllers, scramblers, emulators, switches and binary polarization state generators Fulsome explorations of passive polarization management devices, including polarizers, polarization beam splitters/displacers, wave-plates, Faraday rotators, and depolarizers. Extensive review of polarization measurement techniques and devices, including time-division, amplitude-division, and wave-front division Stokes polarimeters, as well as various Mueller matrix polarimeters for PMD, PDL and birefringence measurements. Premiere of binary polarization state analyzers and binary Mueller matrix polarimeters pioneered by the authors, including their applications for highly sensitive PMD, PDL, and birefringence measurements. Comprehensive discussion on distributed polarization analysis techniques developed by the authors, including their applications in solving real world problems. Detailed descriptions of high accuracy polarimetric fiber optic electric current and magnetic field sensors. Perfect for professional engineers, scientists, and graduate students studying fiber optics, Polarization Measurement and Control in Optical Fiber Communication and Sensor Systems enables one to quickly grasp extensive knowledge and latest development of polarization in optical fibers and will earn a place in the libraries of professors and teachers of photonics and related disciplines.
Integrating active control of both sound and vibration, this comprehensive two-volume set combines coverage of fundamental principles with the most recent theoretical and practical developments. The authors explain how to design and implement successful active control systems in practice and detail the pitfalls one must avoid to ensure a reliable and stable system. Extensively revised, updated, and expanded throughout, the second edition reflects the advances that have been made in algorithms, DSP hardware, and applications since the publication of the first edition.
This book focuses on the model and algorithm aspects of securing Unmanned Aerial Vehicle Networks (UAV). To equip readers with the essential knowledge required for conducting research in this field, it covers the foundational concepts of this topic as well. This book also offers a detailed insight into UAV networks from the physical layer security point of view. The authors discuss the appropriate channel models for characterizing various propagation environments that UAV networks are exposed. The state-of-the-art technologies, such as UAV trajectory design, cooperative jamming and reconfigurable intelligent surfaces are covered. The corresponding algorithms for significantly improving the security of UAV networks, along with practical case studies on topics such as energy-efficient and secure UAV networks, elevation angle-distance trade-off for securing UAV networks and securing UAV networks with the aid of reconfigurable intelligent surfaces are presented as well. Last, this book outlines the future challenges and research directions to facilitate further studies on secure UAV networks. This book is suitable reading for graduate students and researchers who are interested in the research areas of UAV networking and communications, IoT security, and physical layer security in wireless networks. Professionals working within these related fields will also benefit from this book.
The last decade has seen an unprecedented growth in the demand for wireless services. These services are fueled by applications that often require not only high data rates, but also very low latency to function as desired. However, as wireless networks grow and support increasingly large numbers of users, these control algorithms must also incur only low complexity in order to be implemented in practice. Therefore, there is a pressing need to develop wireless control algorithms that can achieve both high throughput and low delay, but with low-complexity operations. While these three performance metrics, i.e., throughput, delay, and complexity, are widely acknowledged as being among the most important for modern wireless networks, existing approaches often have had to sacrifice a subset of them in order to optimize the others, leading to wireless resource allocation algorithms that either suffer poor performance or are difficult to implement. In contrast, the recent results presented in this book demonstrate that, by cleverly taking advantage of multiple physical or virtual channels, one can develop new low-complexity algorithms that attain both provably high throughput and provably low delay. The book covers both the intra-cell and network-wide settings. In each case, after the pitfalls of existing approaches are examined, new systematic methodologies are provided to develop algorithms that perform provably well in all three dimensions.
Risk management is often complicated by situational uncertainties and the subjective preferences of decision makers. Fuzzy Hierarchical Model for Risk Assessment introduces a fuzzy-based hierarchical approach to solve risk management problems considering both qualitative and quantitative criteria to tackle imprecise information. This approach is illustrated through number of case studies using examples from the food, fashion and electronics sectors to cover a range of applications including supply chain management, green product design and green initiatives. These practical examples explore how this method can be adapted and fine tuned to fit other industries as well. Supported by an extensive literature review, Fuzzy Hierarchical Model for Risk Assessment comprehensively introduces a new method for project managers across all industries as well as researchers in risk management. this area.
This book sheds light on state-of-the-art theories for more challenging outfit compatibility modeling scenarios. In particular, this book presents several cutting-edge graph learning techniques that can be used for outfit compatibility modeling. Due to its remarkable economic value, fashion compatibility modeling has gained increasing research attention in recent years. Although great efforts have been dedicated to this research area, previous studies mainly focused on fashion compatibility modeling for outfits that only involved two items and overlooked the fact that each outfit may be composed of a variable number of items. This book develops a series of graph-learning based outfit compatibility modeling schemes, all of which have been proven to be effective over several public real-world datasets. This systematic approach benefits readers by introducing the techniques for compatibility modeling of outfits that involve a variable number of composing items. To deal with the challenging task of outfit compatibility modeling, this book provides comprehensive solutions, including correlation-oriented graph learning, modality-oriented graph learning, unsupervised disentangled graph learning, partially supervised disentangled graph learning, and metapath-guided heterogeneous graph learning. Moreover, this book sheds light on research frontiers that can inspire future research directions for scientists and researchers.
Written by award-winning engineers whose research has been sponsored by the U.S. National Science Foundation (NSF), IBM, and Cisco's University Research Program, Wireless Sensor Networks: Principles and Practice addresses everything product developers and technicians need to know to navigate the field. It provides an all-inclusive examina
The geometry of real submanifolds in complex manifolds and the analysis of their mappings belong to the most advanced streams of contemporary Mathematics. In this area converge the techniques of various and sophisticated mathematical fields such as P.D.E.s, boundary value problems, induced equations, analytic discs in symplectic spaces, complex dynamics. For the variety of themes and the surprisingly good interplaying of different research tools, these problems attracted the attention of some among the best mathematicians of these latest two decades. They also entered as a refined content of an advanced education. In this sense the five lectures of this volume provide an excellent cultural background while giving very deep insights of current research activity.
While the processes of founding a new state or constructing a new political order after a transition have been well-studied, there has been much less attention to how regimes that survive major political crises purposefully reinvent a postcrisis state to respond to updated concepts, new circumstances, changed social demands, and a realigned elite consensus. In Engineering Stability, Yan Xiaojun examines the Chinese Communist Party’s efforts to reassert control and restore order on university campuses in the post-Tiananmen era. Since prominent national universities serve the nation-state as training grounds for the country’s future political, economic, and cultural elites, public life on university campuses has immediate political relevance. Drawing on rich materials gathered from in-depth field research in China during the Xi Jinping era, Engineering Stability invites scholars of comparative politics, state theory, contentious politics, and political development to rethink and reimagine how what Yan calls “a compromised autocratic state” is rebuilt within and from itself after overcoming a traumatic moment of vulnerability. The book further details the four types of infrastructure — institutional, significative, regulatory, and incentivizing — that state rebuilders need to overhaul, and looks into the campaign of state rebuilding in post-Tiananmen Chinese universities and its implications for our understanding of politics in general.
Focused on the United States, this book summarizes the secondary impacts of COVID-19 due to the increased use of technology. Establishing the global response of social distancing, mandates for non-essential business, and working from home, the book centers on the disparate guidance provided domestically at the state and local levels. Marginalized populations are highlighted to identify areas where technology facilitated access and reach or contributed to difficulties catapulted by digital literacy or digital access issues. To explain how people may have been empowered or left behind due to a new and unique reliance on technology, this book is structured based on the social determinants of health domains. Specifically, this book explains how technology was an umbrella domain that impacted every aspect of life during the pandemic including access, use, adoption, digital literacy, and digital equity, as well as privacy and security concerns. Given this book’s focus on the impacts to marginalized populations, there is a thread throughout the book related to the use of technology to perpetuate hate, discrimination, racism, and xenophobic behaviors that emerged as a twin pandemic during COVID-19. Part I explains the defining differences between primary and secondary impacts, as well as the unique guidelines adopted in each state. Part II of the book is focused on specific domains, where each chapter is dedicated to topics including economic stability through employment, education, healthcare, and the social/community context through access to services. Part III focuses on unique technological considerations related to COVID-19, such as mobile health-related apps and privacy or security issues that may have posed barriers to the adoption and use of technology. Finally, the book ends with a conclusion chapter, which explicitly explains the advantages and disadvantages of technology adoption during COVID-19. These exposed benefits and challenges will have implications for policies, disaster management practices, and interdisciplinary research.
BATTERY MANAGEMENT SYSTEM AND ITS APPLICATIONS Enables readers to understand basic concepts, design, and implementation of battery management systems Battery Management System and its Applications is an all-in-one guide to basic concepts, design, and applications of battery management systems (BMS), featuring industrially relevant case studies with detailed analysis, and providing clear, concise descriptions of performance testing, battery modeling, functions, and topologies of BMS. In Battery Management System and its Applications, readers can expect to find information on: Core and basic concepts of BMS, to help readers establish a foundation of relevant knowledge before more advanced concepts are introduced Performance testing and battery modeling, to help readers fully understand Lithium-ion batteries Basic functions and topologies of BMS, with the aim of guiding readers to design simple BMS themselves Some advanced functions of BMS, drawing from the research achievements of the authors, who have significant experience in cross-industry research Featuring detailed case studies and industrial applications, Battery Management System and its Applications is a must-have resource for researchers and professionals working in energy technologies and power electronics, along with advanced undergraduate/postgraduate students majoring in vehicle engineering, power electronics, and automatic control.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.