Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Malicious Attack Propagation and Source Identification (Advances in Information Security)
Malicious Attack Propagation and Source Identification (Advances in Information Security)

This book covers and makes four major contributions:

1) analyzing and surveying the pros and cons of current approaches for identifying rumor sources on complex networks;

2) proposing a novel approach to identify rumor sources in time-varying networks;

3) developing a fast approach to identify...

Wireless Networking Technology: From Principles to Successful Implementation
Wireless Networking Technology: From Principles to Successful Implementation
As the demand for higher bandwidth has lead to the development of increasingly complex wireless technologies, an understanding of both wireless networking technologies and radio frequency (RF) principles is essential for implementing high performance and cost effective wireless networks.

Wireless Networking Technology
...
The Thermophysics of Porous Media
The Thermophysics of Porous Media

Models for the mechanical behavior of porous media introduced more than 50 years ago are still relied upon today, but more recent work shows that, in some cases, they may violate the laws of thermodynamics. In The Thermophysics of Porous Media, the author shows that physical consistency requires a unique description of dynamic processes that...

The Essence of Dielectric Waveguides
The Essence of Dielectric Waveguides

The Essence of Dielectric Waveguides provides an overview of the fundamental behavior of guided waves, essential to finding and interpreting the results of electromagnetic waveguide problems. Clearly and concisely written as well as brilliantly organized, this volume includes a detailed description of the fundamentals of electromagnetics, as...

Interference Analysis and Reduction for Wireless Systems
Interference Analysis and Reduction for Wireless Systems
The subject of interference in communications systems is as old as communications itself. Agamemnon, the King of Mycenes, who captured Troy more than 800 miles away, to get back his niece, the beautiful Eleni, and wanted to notify his wife Clytaemistra about this happy event, used the most sophisticated communication techniques of that time to...
Stochastic Systems: Uncertainty Quantification and Propagation (Springer Series in Reliability Engineering)
Stochastic Systems: Uncertainty Quantification and Propagation (Springer Series in Reliability Engineering)

Uncertainty is an inherent feature of both properties of physical systems and the inputs to these systems that needs to be quantified for cost effective and reliable designs. The states of these systems satisfy equations with random entries, referred to as stochastic equations, so that they are random functions of time and/or space. The...

Negative Refraction Metamaterials: Fundamental Principles and Applications
Negative Refraction Metamaterials: Fundamental Principles and Applications
Learn about the revolutionary new technology of negative-refraction metamaterials

Negative-Refraction Metamaterials: Fundamental Principles and Applications introduces artificial materials that support the unusual electromagnetic property of negative refraction. Readers will discover several classes of negative-refraction materials along with...

Model and Design of Improved Current Mode Logic Gates: Differential and Single-ended
Model and Design of Improved Current Mode Logic Gates: Differential and Single-ended

This book presents MOSFET-based current mode logic (CML) topologies, which increase the speed, and lower the transistor count, supply voltage and power consumption. The improved topologies modify the conventional PDN, load, and the current source sections of the basic CML gates.

Electronic system implementation involves...

Cabling: The Complete Guide to Network Wiring, 3rd Edition
Cabling: The Complete Guide to Network Wiring, 3rd Edition

The physical linkages responsible for carrying a company's data continue to be the most neglected components of the typical network—to the extent that nearly 700f all network-related problems result from poor cabling.

In this third edition of a widely acclaimed resource, three networking experts
...

Engineering Optics With Matlab
Engineering Optics With Matlab

This invaluable textbook serves two purposes. The first is to introduce some traditional topics such as matrix formalism of geometrical optics, wave propagation and diffraction, and some fundamental background on fourier optics. The second is to present the essentials of acousto-optics and electro-optics, and provide the students with...

Radio System Design for Telecommunication (Wiley Series in Telecommunications and Signal Processing)
Radio System Design for Telecommunication (Wiley Series in Telecommunications and Signal Processing)

Step-by-step tutorial to master current design techniques for wireless communication systems

The Third Edition of Radio System Design for Telecommunications brings this highly acclaimed book fully up to date with the latest technological advances and new applications. At the same time, the hallmarks of the previous...

Principles of Constraint Programming
Principles of Constraint Programming

This book is about constraint programming, an alternative approach to programming which relies on a combination of techniques that deal with reasoning and computing. It has been successfully applied in a number of fields including molecular biology, electrical engineering, operations research and numerical analysis. The central notion is that...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy