Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
The concept of innovation is the result of human activities carried out to produce a new product, service or something new that creates value.
Mathematical Imaging is currently a rapidly growing field in applied mathematics, with an increasing need for theoretical mathematics. This book, the second of two volumes, emphasizes the role of mathematics as a rigorous basis for imaging sciences. It provides a comprehensive and convenient overview of the key mathematical concepts, notions, tools and frameworks involved in the various fields of gray-tone and binary image processing and analysis, by proposing a large, but coherent, set of symbols and notations, a complete list of subjects and a detailed bibliography. It establishes a bridge between the pure and applied mathematical disciplines, and the processing and analysis of gray-tone and binary images. It is accessible to readers who have neither extensive mathematical training, nor peer knowledge in Image Processing and Analysis. It is a self-contained book focusing on the mathematical notions, concepts, operations, structures, and frameworks that are beyond or involved in Image Processing and Analysis. The notations are simplified as far as possible in order to be more explicative and consistent throughout the book and the mathematical aspects are systematically discussed in the image processing and analysis context, through practical examples or concrete illustrations. Conversely, the discussed applicative issues allow the role of mathematics to be highlighted. Written for a broad audience - students, mathematicians, image processing and analysis specialists, as well as other scientists and practitioners - the author hopes that readers will find their own way of using the book, thus providing a mathematical companion that can help mathematicians become more familiar with image processing and analysis, and likewise, image processing and image analysis scientists, researchers and engineers gain a deeper understanding of mathematical notions and concepts.
LTE (Long Term Evolution) is commonly marketed as 4G. LTE and LTE Advanced have been recognized by ITU-R and ITU-T (International Telecommunications Union - Telecommunications) as the principal solution for the future mobile communication networks standards. They are thus the framework of what the marketing calls 4G and possibly also 5G. This book describes various aspects of LTE as well as the change of paradigm, which it is bringing to mobile communications, focusing on LTE standards and architecture, OFDMA, the Full IP Core Network and LTE security.
This book deals with the field of identification and sensors, more precisely the possibility of collecting information remotely with RF waves (RFID). The book introduces the technology of chipless RFID starting from classical RFID and barcode, and explores the field of identification and sensors without wire, without batteries, without chip, and with tags that can even be printed on paper. A technique for automatic design of UHF RFID tags is presented, aiming at making the tags as insensitive as possible to the environment (with the ability to increase the reading range reliability), or, conversely, making them sensitive in order to produce sensors, meanwhile keeping their unique ID. The RFID advantages are discussed, along with its numerous features, and comparisons with the barcode technology are presented. After that, the new chipless RFID technology is introduced on the basis of the previous conclusions. Original technological approaches are introduced and discussed in order to demonstrate the practical and economic potential of the chipless technology.
The design, implementation and validation of avionics and aeronautical systems have become extremely complex tasks due to the increase of functionalities that are deployed in current avionics systems and the need to be able certify them before putting them into production. This book proposes a methodology to enable the rapid prototyping of such a system by considering from the start the certification aspects of the solution produced. This method takes advantage of the model-based design approaches as well as the use of formal methods for the validation of these systems. Furthermore, the use of automatic software code generation tools using models makes it possible to reduce the development phase as well as the final solution testing. This book presents, firstly, an overview of the model-based design approaches such as those used in the field of aeronautical software engineering. Secondly, an original methodology that is perfectly adapted to the field of aeronautical embedded systems is introduced. Finally, the authors illustrate the use of this method using a case study for the design, implementation and testing of a new generation aeronautical router.
This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring.
This book presents a new fracturing technique that should be considered as a potential alternative, or a companion technique, to hydraulic fracturing of tight gas reservoirs and low permeability rock masses. As opposed to hydraulic fracturing which generates a few numbers of large cracks, electro-hydraulic fracturing induces diffuse micro-cracking and fragmentation of rocks. Laboratory tests demonstrate that increases of permeability by two orders of magnitude can be reached, without major cracking in tested specimens. This book discusses the principles of this new technique, reports experiments which have been developed is order to prove the concept and finally describes the numerical model from which the potentialities of this technique in representative reservoir conditions can be assessed.
Real-time systems are used in a wide range of applications, including control, sensing, multimedia, etc. Scheduling is a central problem for these computing/communication systems since responsible of software execution in a timely manner. This book provides state of knowledge in this domain with special emphasis on the key results obtained within the last decade. This book addresses foundations as well as the latest advances and findings in Real-Time Scheduling, giving all references to important papers. But nevertheless the chapters will be short and not overloaded with confusing details. Coverage includes scheduling approaches for mono-core as well as multi-core platforms, dependent tasks, networks, and notably very tremendous recent advances in scheduling of energy constrained embedded systems. Other sophisticated issues such as feedback control scheduling and timing analysis of critical applications are also addressed. This volume can serve as a textbook for courses on the topic in bachelor and in more advanced master programs. It also provides a reference for computer scientists and engineers involved in the design or the development of Cyber-Physical Systems which require up-to-date real-time scheduling solutions.
This title concerns the use of a particle filter framework to track objects defined in high-dimensional state-spaces using high-dimensional observation spaces. Current tracking applications require us to consider complex models for objects (articulated objects, multiple objects, multiple fragments, etc.) as well as multiple kinds of information (multiple cameras, multiple modalities, etc.). This book presents some recent research that considers the main bottleneck of particle filtering frameworks (high dimensional state spaces) for tracking in such difficult conditions.
Discourse analysis and rhetoric are very much developed in communication, linguistics, cognitive science and artificial intelligence. Besides theoretical investigations, discourse analysis is central in a number of application areas such as dialogue and negotiation, the semantic web, question answering or authoring systems. Music is also a natural language, more abstract and mathematical, which follows very strict construction principles. However, there is very limited and no recent literature on Music Discourse analysis using computational principles. This book aims at developing a central issue in musical discourse: modeling rhetoric and argumentation. It also contributes to the development of high-level multimedia annotation schemes for non-verbal communication.
This book - a continuation of the previous publications 'Flows and chemical reactions', 'Flows and chemical reactions in homogeneous mixtures' and 'Flows and chemical reactions in heterogeneous mixtures' - is devoted to flows with chemical reactions in the electromagnetic field.
"A continuation of two previous publications [by the author], respectively dealing with 'Flows and chemical reactions' and 'Flows and chemical reactions in homogeneous mixtures'"--Preface.
Under certain scenarios on the subject of CO2 emissions, by the end of the century the atmospheric concentration could triple its pre-industrial level. The very large numerical models intended to anticipate the corresponding climate evolutions are designed and quantified from the laws of physics. However, little is generally known about these: genesis of clouds, terms of the greenhouse effect, solar activity intervention, etc. This book deals with the issue of climate modeling in a different way: using proven techniques for identifying black box-type models. Taking climate observations from throughout the millennia, the global models obtained are validated statistically and confirmed by the resulting simulations. This book thus brings constructive elements that can be reproduced by anyone adept at numerical simulation, whether an expert climatologist or not. It is accessible to any reader interested in the issues of climate change.
This book provides a novel method based on advantages of mobility model of Low Earth Orbit Mobile Satellite System LEO MSS which allows the evaluation of instant of subsequent handover of a MS even if its location is unknown.
A presentation of advances in the field of digital holography, detailing advances related to fundamentals of digital holography, in-line holography applied to fluid mechanics, digital color holography, digital holographic microscopy, infrared holography, special techniques in full field vibrometry and inverse problems in digital holography.
Random SALOHA and CSMA protocols that are used to access MAC in ad hoc networks are very small compared to the multiple and spontaneous use of the transmission channel. So they have low immunity to the problems of packet collisions. Indeed, the transmission time is the critical factor in the operation of such networks. The simulations demonstrate the positive impact of erasure codes on the throughput of the transmission in ad hoc networks. However, the network still suffers from the intermittency and volatility of its efficiency throughout its operation, and it switches quickly to the saturation zone. In this context, game theory has demonstrated his ability to lead the network to a more efficient equilibrium. This, we were led to propose our model code set that formalizes the behavior of nodes during transmission within SALOHA networks and CSMA respectively.
Acclaimed by various content platforms (books, music, movies) and auction sites online, recommendation systems are key elements of digital strategies.
Revision of: Mechanical vibration and shock analysis / Christian Lalanne. Second edition. London: ISTE Ltd; Hoboken, NJ: John Wiley & Sons, Inc., 2009.
Everything engineers need to know about mechanical vibration and shock. in one authoritative reference work! This fully updated and revised 3rd edition addresses the entire field of mechanical vibration and shock as one of the most important types of load and stress applied to structures, machines and components in the real world.
Over the past 20 years, software architectures have significantly contributed to the development of complex and distributed systems. Nowadays, it is recognized that one of the critical problems in the design and development of any complex software system is its architecture, i.e. the organization of its architectural elements. Software Architecture presents the software architecture paradigms based on objects, components, services and models, as well as the various architectural techniques and methods, the analysis of architectural qualities, models of representation of architectural templates and styles, their formalization, validation and testing and finally the engineering approach in which these consistent and autonomous elements can be tackled.
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare.
Since Lord Rayleigh introduced the idea of viscous damping in his classic work "The Theory of Sound" in 1877, it has become standard practice to use this approach in dynamics, covering a wide range of applications from aerospace to civil engineering.
Constrained optimization is a challenging branch of operations research that aims to create a model which has a wide range of applications in the supply chain, telecommunications and medical fields. As the problem structure is split into two main components, the objective is to accomplish the feasible set framed by the system constraints. The aim of this book is expose optimization problems that can be expressed as graphs, by detailing, for each studied problem, the set of nodes and the set of edges. This graph modeling is an incentive for designing a platform that integrates all optimization components in order to output the best solution regarding the parameters' tuning. The authors propose in their analysis, for optimization problems, to provide their graphical modeling and mathematical formulation and expose some of their variants. As a solution approaches, an optimizer can be the most promising direction for limited-size instances. For large problem instances, approximate algorithms are the most appropriate way for generating high quality solutions. The authors thus propose, for each studied problem, a greedy algorithm as a problem-specific heuristic and a genetic algorithm as a metaheuristic.
"From the Seas and Oceans Set coordinated by Andrae Mariotti and Jean-Charles Pomerol."
The vulnerability of socio-ecosystem combines the probability of exposure to natural or anthropogenic pressure, sensitivity and resilience. This book presents a systemic view of the diversity of pressures and impacts produced by climate change and human actions. Erosion of biodiversity by changing ocean chemistry, the intensification of global change raises the problem of the adaptation of living resources.
This volume provides various examples and dimensions, chemical, biological, climatic, or related to extreme (hazards). It describes, by reciprocity, the vulnerability of ecosystems, resources, heritage, human health and, consequently, economic and social sectors. it considers climate scenarios and socio-economic status indicators research, design strategies and patterns of adaptation, development of innovative monitoring systems, analysis of perceptions of major hazards and valuation of ecosystem services.
This book presents a systemic view of the diversity of pressures and impacts produced by climate change and human actions. Erosion of biodiversity by changing ocean chemistry, the intensification of global change raises the problem of the adaptation of living resources. Land uses induce ecological imbalances leading to asphyxiation true coastal ecosystems. More than a billion tons of solid waste must be assimilated by the marine environment and food webs. Radioactive discharges emitted into the atmosphere or into the aquatic environment, raise the question of their future. Sea and Ocean series offers a transversal approach of the ocean system that leads to governance, sustainable resource management and adaptation of societies.
Complexity is an intrinsic property of natural systems. In the oceanic system, it is linked to many interactions with the atmosphere, geosphere and biosphere with which it exchanges energy and matter. Complexity of the ocean system has, at different spatial and temporal scales, hydrodynamic mechanisms of these exchanges and dynamics of elements and compounds, they are involved in biogeochemical cycles or used as tracers. By its pedagogical approach, it defines the terms, methods, techniques and analytical tools used. Then, it analyzes the consequences of climate change, future projections, human impact and the concept introduced with planktonic pelagic ecosystem component.
This book presents an algorithm for the detection of an orthogonal frequency division multiplexing (OFDM) signal in a cognitive radio context by means of a joint and iterative channel and noise estimation technique. Based on the minimum mean square criterion, it performs an accurate detection of a user in a frequency band, by achieving a quasi-optimal channel and noise variance estimation if the signal is present, and by estimating the noise level in the band if the signal is absent. Organized into three chapters, the first chapter provides the background against which the system model is presented, as well as some basics concerning the channel statistics and the transmission of an OFDM signal over a multipath channel. In Chapter 2, the proposed iterative algorithm for the noise variance and the channel estimation is detailed, and in Chapter 3, an application of the algorithm for the free-band detection is proposed. In both Chapters 2 and 3, the principle of the algorithm is presented in a simple way, and more elaborate developments are also provided. The different assumptions and assertions in the developments and the performance of the proposed method are validated through simulations, and compared to methods of the scientific literature.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.