Based on components already in existence, this manual details a reference design for an interplanetary spacecraft that is simple, durable, fully reusable and comprised mostly of water. Using such an a
This book comprises four chapters that address some of the latest research in clouds robotics and sensor clouds.The first part of the book includes two chapters on cloud robotics. The first chapter in
This book provides readers with a state-of-the-art description of techniques to be used for ultra-low-power (ULP) and ultra-low-cost (ULC), short-range wireless receivers. Readers will learn what is r
?This book investigates how social identity relates to financial investment behavior of the German-Turkish diaspora. The author approaches this study using qualitative research and multiple semi-struc
This book on smart grid security is meant for a broad audience from managers to technical experts. It highlights security challenges that are faced in the smart grid as we widely deploy it across the
This textbook presents the mathematical theory and techniques necessary for analyzing and modeling high-performance global networks, such as the Internet. The three main building blocks of high-perfor
This book focuses on the development of circuit and system design techniques for millimeter wave wireless communication systems above 90GHz and fabricated in nanometer scale CMOS technologies. The aut
This brief examines a deterministic, ODE-based model for gene regulatory networks (GRN) that incorporates nonlinearities and time-delayed feedback. An introductory chapter provides some insights into
This book constitutes the refereed proceedings of the 18th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2015, held in Gaithersburg, MD, USA, in March/April 2015. The
This thesis transforms satellite precipitation estimation through the integration of a multi-sensor, multi-channel approach to current precipitation estimation algorithms, and provides more accurate r
This brief focuses on medium access control (MAC) in vehicular ad hoc networks (VANETs), and presents VeMAC, a novel MAC scheme based on distributed time division multiple access (TDMA) for VANETs. Th
This handbook delivers a complete and practice-oriented overview of the fundamentals of today's telecommunications networks and the future prospects for next generation networks (NGN). The very clear
Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the m
This Brief introduces the wireless spectrum market and discusses the current research for spectrum auctions. It covers the unique properties of spectrum auction, such as interference relationship, reu
Covering design techniques both at circuit block and system levels, this book enables readers to develop a complex short-range wireless communications system suitable for deployment in a healthcare co
This book brings to bear a body of logic synthesis techniques, in order to contribute to the analysis and control of Boolean Networks (BN) for modeling genetic diseases such as cancer. The authors pro
This book shows how networking research and quality engineering can be combined to successfully manage the transmission quality when speech and video telephony is delivered in heterogeneous wireless n
This book offers an approach for modeling and investigating economic and social systems using of agent-based simulations and other computational techniques, in order to analyze systems-level outcomes
This book introduces various signal processing approaches to enhance physical layer secrecy in multi-antenna wireless systems. Wireless physical layer secrecy has attracted much attention in recent ye
The transformation towards EPCglobal networks requires technical equipment for capturing event data and IT systems to store and exchange them with supply chain participants. For the very first time, s
This book discusses the design of wireless power transfer systems for medical applications, including challenges faced in developing a wirelessly powered implant: power transfer efficiency, power stab
This book provides a comprehensive conceptualization of perceived IT security risk in the Cloud Computing context that is based on six distinct risk dimensions grounded on a structured literature revi
In this book, hierarchical structures based on neural networks are investigated for automatic speech recognition. These structures are mainly evaluated within the phoneme recognition task under the Hy
Optical Interconnects in Future Data Center Networks covers optical networks and how they can be used to provide high bandwidth, energy efficient interconnects for future data centers with increased c
This book describes the design and implementation of an electronic subsystem called the frequency synthesizer, which is a very important building block for any wireless transceiver. The discussion inc
This book contains the revised selected papers of the Second Workshop on Real-Life Cryptographic Protocols and Standardization, RLCPS 2011, and the Second Workshop on Ethics in Computer Security Resea
Search and Classification Using Multiple Autonomous Vehicles provides a comprehensive study of decision-making strategies for domain search and object classification using multiple autonomous vehicles
This practical resource offers a thorough examination of RF transceiver design for MIMO communications. Offering a practical view on MIMO wireless systems, this book extends fundamental concepts on c
This book examines the discourse surrounding the wireless, created by the Anglo-Italian inventor Guglielmo Marconi. The wireless excited early twentieth-century audiences before it even became a viabl
The Book contains the Vision of the researchers of the European Network of Excellence NEWCOM++ (Network of Excellence on Wireless COMmunication) on the present and future status of Wireless Communica
As the theoretical foundations of multiple-antenna techniques evolve and as these multiple-input multiple-output (MIMO) techniques become essential for providing high data rates in wireless systems, t
This book is written around the central message that collectivist societies produce security, but destroy trust. In collectivist societies, people are connected through networks of strong personal tie
This book provides the foundations for understanding hardware security and trust, which have become major concerns for national security over the past decade. Coverage includes security and trust issu
Autonomous sensors transmit data and power their electronics without using cables. They can be found in e.g. wireless sensor networks (WSNs) or remote acquisition systems. Although primary batteries p
Molecular Logic Gates and Luminescent Sensors Based on Photoinduced Electron Transfer, by A. Prasanna de Silva and S. Uchiyama; Luminescent Chemical Sensing, Biosensing, and Screening Using Upconverti
Reflects a decade of leading-edge research on intelligence and security informatics. Dr Chen is researcher at the Artificial Intelligence Laboratory and the NSF COPLINK Center for Homeland Security In
In response to the growing importance of power system security and reliability, Transmission Grid Security proposes a systematic and probabilistic approach for transmission grid security analysis. The
Reconfigurable RF Power Amplifiers on Silicon for Wireless Handsets is intended to designers and researchers who have to tackle the efficiency/linearity trade-off in modern RF transmitters so as to ex
This book deals with new theoretical results for studying Cellular Neural Networks (CNNs) concerning its dynamical behavior. New aspects of CNNs' applications are developed for modelling of some famou
This book reflects up-to-date research, fundamental theories, and key techniques of of wireless localization technology and error-controlling techniques. It also presents and discusses the issue of lo