« Back | Print 
Concordia.ca   /   Library   /   About the library   /   News   /   Acquisitions

New books by subject

sort items by: 
 RSS

Electrical and Computer Engineering - Concordia University Libraries Recent Acquisitions

Titles in the call number range TK1-9971 (Electrical and Computer Engineering) that were added to the Concordia University Libraries collection in the last 60 days.


  • Transactions on large-scale data- and knowledge-centered systems XXXVI / Abdelkader Hameurlain, Josef Küng, Roland Wagner, Tran Khanh Dang, Nam Thoai (eds.)
    TK5105.59

  • Data analytics for renewable energy integration : informing the generation and distribution of renewable energy : 5th ECML PKDD Workshop, DARE 2017, Skopje, Macedonia, September 22, 2017, Revised selected papers / Wei Lee Woon, Zeyar Aung, Oliver Kramer, Stuart Madnick (eds.)
    TK3105

  • Decoupling Drupal a decoupled design approach for web applications / Deepali Mayekar
    TK5105.8885.D78

  • Troubleshooting SharePoint the complete guide to tools, best practices, PowerShell One-Liners, and scripts / Stacy Simpkins
    TK5105.875.I6

  • Anomaly detection principles and algorithms Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang
    TK5105.59

  • Network security metrics Lingyu Wang, Sushil Jajodia, Anoop Singhal
    TK5105.59

  • Digital transformation and global society : second International Conference, DTGS 2017, St. Petersburg, Russia, June 21-23, 2017, Revised selected papers / Daniel A. Alexandrov, Alexander V. Boukhanovsky, Andrei V. Chugunov, Yury Kabanov, Olessia Koltsova (eds.)
    TK5105.875.I57

  • The semantic web : ESWC 2017 Satellite Events : ESWC 2017 Satellite Events, Portorož, Slovenia, May 28-June 1, 2017, Revised selected papers / Eva Blomqvist, Katja Hose, Heiko Paulheim, Agnieszka Ławrynowicz, Fabio Ciravegna, Olaf Hartig (eds.)
    TK5105.88815

  • Web and big data : APWeb-WAIM 2017 International Workshops: MWDA, HotSpatial, GDMA, DDC, SDMA, MASS, Beijing, China, July 7-9, 2017, Revised selected papers / Shaoxu Song, Matthias Renz, Yang-Sae Moon (eds.)
    TK5105.875.I57

  • Guide to security in SDN and NFV challenges, opportunities, and applications / Shao Ying Zhu, Sandra Scott-Hayward, Ludovic Jacquin, Richard Hill, editors
    TK5105.5833

  • The definitive guide to Squarespace : learn to deliver custom, professional web experiences for yourself and your clients / Sarah Martin
    TK5105.8883

  • Multimedia communications, services and security : 9th International Conference, MCSS 2017, Kraków, Poland, November 16-17, 2017, proceedings / edited by Andrzej Dziech, Andrzej Czyżewski
    TK5105.15

  • Internet science : 4th International Conference, INSCI 2017, Thessaloniki, Greece, November 22-24, 2017, Proceedings / Ioannis Kompatsiaris, Jonathan Cave, Anna Satsiou, Georg Carle, Antonella Passani, Efstratios Kontopoulos, Sotiris Diplaris, Donald McMillan (eds.)
    TK5105.875.I57

  • E-Business and telecommunications : 13th International Joint Conference, ICETE 2016, Lisbon, Portugal, July 26-28, 2016, Revised selected papers / Mohammad S. Obaidat (eds.)
    TK5101.A1

  • On the move to meaningful internet systems : OTM 2017 Conferences : Confederated International Conferences: CoopIS, C&TC, and ODBASE 2017, Rhodes, Greece, October 23-27, 2017, Proceedings. Hervé Panetto, Christophe Debruyne, Walid Gaaloul, Mike Papazoglou, Adrian Paschke, Claudio Agostino Ardagna, Robert Meersman (eds.)
    TK5105.875.I57

  • Synchronized phasor measurements and their applications / Arun G. Phadke, James S. Thorp
    TK454

  • Trusted Communications with Physical Layer Security for 5G and Beyond / edited by Trung Q. Duong, Xiangyun Zhou and H. Vincent Poor
    TK 6570 M6 T78 2017eb

    Physical layer security is emerging as a promising means of ensuring secrecy in wireless communications. The key idea is to exploit the characteristics of wireless channels such as fading or noise to transmit a message from the source to the intended receiver while keeping this message confidential from eavesdroppers.

    Topics covered in Trusted Communications with Physical Layer Security for 5G and Beyond include secrecy metrics for physical layer security over fading channels; trusted wireless communications with spatial multiplexing; directional modulation enabled physical layer wireless security; secure waveform for 5G systems; confidential and energy efficient communications using physical layer security; secure data networks with channel uncertainty; antenna selection strategies for wiretap channels; physical layer security for massive MIMO systems, millimeter wave cellular networks, non-orthogonal multiple access, multiuser relay networks, cognitive radio networks, MIMOME-OFDM systems; wirelessly powered communication systems and D2D-enabled cellular networks; and security solutions and applications at the physical layer, including case studies of secret key generation and secrecy coding in communication nodes and terminals.


  • Access, fronthaul and backhaul networks for 5G & beyond / edited by Muhammad Ali Imran, Syed Ali Raza Zaidi, Muhammad Zeeshan Shair
    TK 5103.2 A23 2017eb

    The widespread use of mobile internet and smart applications has led to an explosive growth in mobile data traffic, which will continue due to the emerging need of connecting people, machines, and applications in an ubiquitous manner through the mobile infrastructure. The efficient and satisfactory operation of all these densely deployed networks hinges on a suitable backhaul and fronthaul provisioning. The research community is working to provide innovative technologies with extensive performance evaluation metrics along with the required standardisation milestones, hardware and components for a fully deployed network by 2020 and beyond.

    Access, Fronthaul and Backhaul Networks for 5G & Beyond provides an overview from both academic and industrial stakeholders of innovative backhaul/fronthaul solutions. Covering a wide spectrum of underlying themes ranging from the recent thrust in edge caching for backhaul relaxation to mmWave-based fronthauling for radio access networks, this book is essential reading for engineers, researchers, designers, architects, technicians, students and service providers in the field of networking, mobile and wireless and computing technologies working towards the deployment of 5G networks.


  • Understanding telecommunications networks / Andy Valdar
    TK 5101 V35 2017eb

    A telecommunications network is an electronic system of links, nodes and the controls that govern their operations to allow voice and data transfer among users and devices. Examples of telecommunications networks are the telephone networks, computer networks and the Internet. Understanding Telecommunications Networks provides a comprehensive explanation of how various systems and technologies link together to construct fixed and mobile telecommunications networks and provide services. It uses straightforward language supported by block-schematic diagrams so that non-engineers and engineers alike can learn about the principles.

    This fully revised, updated and expanded second edition covers all aspects of today's networks, including how they are planned, formed and operated. After an introductory chapter on telephony, the book describes all of today's networks and considers how they link. Individual chapters then consider the principles, technologies and network structures relating to network components; transmission systems and networks; circuit switching systems and networks; signalling and control; data (packet) switching and routeing; and mobile systems and networks. The book concludes with a chapter designed to pull everything together, considering architecture, quality of service and performance, operations, network evolution and next generation networks. This is a companion volume to Understanding Telecommunications Business authored by Andy Valdar & Ian Morfett (ISBN: 9781849197458).


  • Iris and periocular biometric recognition edited by Christian Rathgeb and Christoph Busch
    TK 7882 B56 I75 2017eb

    Iris recognition technologies for identity management are already deployed globally in several large-scale nationwide biometric projects and are currently entering the mobile market. More recently, periocular recognition has been employed to augment the biometric performance of the iris in unconstrained environments where only the ocular region is present in the image.

    Iris and Periocular Biometric Recognition provides an overview of scientific fundamentals and principles of iris and periocular biometric recognition over six broad areas: an introduction to iris and periocular recognition; a selective overview of issues and challenges; soft biometric classification; security aspects; privacy protection and forensics; and future trends. With contributions from experts in industry and academia, this book is essential reading for researchers, graduate students and practitioners in biometrics and related fields.


  • Fault diagnosis of induction motors / Jawad Faiz, Vahid Ghorbanian and Gojko Joksimović
    TK 2785 F35 2017eb

    Induction motors are still among the most reliable and important electrical machines. The wide range of their use involves various electrical, magnetic, thermal and mechanical stresses which results in the need for fault diagnosis as part of the maintenance. A yet unreached goal is the development of a generalized, practical approach enabling industry to accurately diagnose different potential induction motor faults.

    Fault Diagnosis of Induction Motors aims to fill this gap by focusing on theoretical, experimental and computer aided processes for fault diagnosis, building a comprehensive, structural approach allowing users to select the proper diagnosis strategy. Topics covered include condition monitoring and fault diagnosis of induction motors; the theory of line-start and inverter-fed induction motors; induction motor faults basics, developments and laboratory-scale implementation; magneto-motive force waves in healthy three-phase induction motors; multiple coupled circuit model of induction motors; finite element implementation of induction motors in healthy and faulty conditions; signal processing techniques utilized in fault diagnosis procedures; diagnosis of broken bars fault in induction motors; diagnosis of eccentricity fault in induction motors; and diagnosis of inter-turn short circuit fault in induction motors.

    This work is essential reading for researchers and technicians involved with motor-drive applications and their related maintenance procedures or dealing with applications of signal processing techniques.


  • Enhanced Living Environments : From models to technologies / edited by Rossitza Ivanova Goleva, Ivan Ganchev, Ciprian Dobre, Nuna Garcia and Carlos Valderrama
    TK 5105.55 E54 2017eb

    Enhanced living environments employ information and communications technologies to support true ambient assisted living for adults and people with disabilities. This book provides an overview of today's architectures, techniques, protocols, components, and cloud-based solutions related to ambient assisted living and enhanced living environments. Topics covered include: an introduction to enhanced living environments; pervasive sensing for social connectedness; ethics in information and communication technologies; service scenarios in smart personal environments; technological support to stress level monitoring; big data systems to improve healthcare information searching over the Internet; sensors for wireless body area networks; linear wireless sensor networks and protocols in next generation networks; model-compilation challenges for cyber-physical systems; health monitoring using wireless body area networks; wearable health care; and intelligent systems for after-stroke home rehabilitation.


  • Introduction to digital wireless communications / Hong-Chuan Yang
    TK 5103.2 Y36 2017eb

    This book provides an efficient introduction to fundamental and advanced digital transmission technologies in current and future wireless communication systems. The objective is to help students and engineers quickly grasp the operating principles and design trade-offs of various wireless transmission technologies, which will enable them to carry out product development or perform academic research in the field.

    With sufficient theoretical depth, the book covers large-scale channel effects; multipath fading; digital transmission over flat fading; fading mitigation through diversity combining; transmission over frequency selective fading; spread spectrum transmission; channel capacity and coding; channel adaptive transmission; MIMO transmission; and advanced topics including multiuser diversity transmission, cooperative relay transmission and multiuser MIMO transmission.

    The material is presented without assuming an extensive digital communications background from the readers. The design principles of these technologies are manifested with over 100 carefully designed illustration and over 60 problem-solving examples. The readers can also check their own understanding with extra practice problems at the end of each chapter. Special emphasis is placed on the important trade-off analysis of performance versus complexity.


  • Linux® hardening in hostile networks : server security from TLS to TOR / Kyle Rankin
    TK 5105.59 R36 2018
    Implement Industrial-Strength Security on Any Linux Server

    In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker's toolkit, you can't rely on outdated security methods-especially if you're responsible for Internet-facing services. In Linux#65533; Hardening in Hostile Networks, Kyle Rankin helps you to implement modern safeguards that provide maximum impact with minimum effort and to strip away old techniques that are no longer worth your time.

    Rankin provides clear, concise guidance on modern workstation, server, and network hardening, and explains how to harden specific services, such as web servers, email, DNS, and databases. Along the way, he demystifies technologies once viewed as too complex or mysterious but now essential to mainstream Linux security. He also includes a full chapter on effective incident response that both DevOps and SecOps can use to write their own incident response plan.

    Each chapter begins with techniques any sysadmin can use quickly to protect against entry-level hackers and presents intermediate and advanced techniques to safeguard against sophisticated and knowledgeable attackers, perhaps even state actors. Throughout, you learn what each technique does, how it works, what it does and doesn't protect against, and whether it would be useful in your environment.

    Apply core security techniques including 2FA and strong passwords Protect admin workstations via lock screens, disk encryption, BIOS passwords, and other methods Use the security-focused Tails distribution as a quick path to a hardened workstation Compartmentalize workstation tasks into VMs with varying levels of trust Harden servers with SSH, use apparmor and sudo to limit the damage attackers can do, and set up remote syslog servers to track their actions Establish secure VPNs with OpenVPN, and leverage SSH to tunnel traffic when VPNs can't be used Configure a software load balancer to terminate SSL/TLS connections and initiate new ones downstream Set up standalone Tor services and hidden Tor services and relays Secure Apache and Nginx web servers, and take full advantage of HTTPS Perform advanced web server hardening with HTTPS forward secrecy and ModSecurity web application firewalls Strengthen email security with SMTP relay authentication, SMTPS, SPF records, DKIM, and DMARC Harden DNS servers, deter their use in DDoS attacks, and fully implement DNSSEC Systematically protect databases via network access control, TLS traffic encryption, and encrypted data storage Respond to a compromised server, collect evidence, and prevent future attacks

    Register your product at informit.com/register for convenient access to downloads, updates, and corrections as they become available.


  • Security and privacy in cyber-physical systems : foundations, principles, and applications / edited by Houbing Song, Glenn A. Fink, Sabina Jeschke
    TK 5105.59 S43923 2018eb

    Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area.

    Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability far in excess of what today's simple embedded systems can provide. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the years ahead, smart CPS will drive innovation and competition across industry sectors, from agriculture, energy, and transportation, to architecture, healthcare, and manufacturing. A priceless source of practical information and inspiration, Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications is certain to have a profound impact on ongoing R&D and education at the confluence of security, privacy, and CPS.


  • Transactions on computational science XXX : special issue on cyberworlds and cybersecurity / Marina L. Gavrilova, C.J. Kenneth Tan, Alexei Sourin (eds.)
    TK5105.875.I57

  • Service-oriented computing -- ICSOC 2016 workshops : ASOCA, ISyCC, BSCI, and Satellite Events, Banff, AB, Canada, October 10-13, 2016, Revised selected papers / Khalil Drira, Hongbing Wang, Qi Yu, Yan Wang, Yuhong Yan, François Charoy, Jan Mendling, Mohamed Mohamed, Zhongjie Wang, Sami Bhiri (eds.)
    TK5105.5828

  • Windows networking troubleshooting / Mike Halsey, Joli Ballew
    TK5105.8.C57

  • Beginning Django : web application development and deployment with Python / Daniel Rubio
    TK5105.8885.D54

  • On the move to meaningful internet systems : OTM 2017 Conferences : Confederated International Conferences: CoopIS, C&TC, and ODBASE 2017, Rhodes, Greece, October 23-27, 2017, Proceedings. Hervé Panetto, Christophe Debruyne, Walid Gaaloul, Mike Papazoglou, Adrian Paschke, Claudio Agostino Ardagna, Robert Meersman (eds.)
    TK5105.875.I57

  • Intelligent, secure, and dependable systems in distributed and cloud environments : first International Conference, ISDDC 2017, Vancouver, BC, Canada, October 26-28, 2017, proceedings / Issa Traore, Isaac Woungang, Ahmed Awad (eds.)
    TK5105.59

  • Light emitting diodes for agriculture : smart lighting / S. Dutta Gupta, editor
    TK7871.89.L53

  • Internet video data streaming energy-saving and cost-aware methods / Ye Tian, Min Zhao, Xinming Zhang
    TK5105.55

  • Embedded systems architecture for agile development : a layers-based model / Mohsen Mirtalebi
    TK7895.E42

  • SCION : a secure internet architecture / Adrian Perrig, Pawel Szalachowski, Raphael M. Reischuk, Laurent Chuat
    TK5105.5

  • The semantic web -- ISWC 2017 : 16th International Semantic Web Conference, Vienna, Austria, October 21-25, 2017, Proceedings. Claudia d'Amato, Miriam Fernandez, Valentina Tamma, Freddy Lecue, Philippe Cudré-Mauroux, Juan Sequeda, Christoph Lange, Jeff Heflin (eds.)
    TK5105.88815

  • The semantic web -- ISWC 2017 : 16th International Semantic Web Conference, Vienna, Austria, October 21-25, 2017, Proceedings. Claudia d'Amato, Miriam Fernandez, Valentina Tamma, Freddy Lecue, Philippe Cudré-Mauroux, Juan Sequeda, Christoph Lange, Jeff Heflin (eds.)
    TK5105.88815

  • Visual content indexing and retrieval with psycho-visual models Jenny Benois-Pineau, Patrick Le Callet, editors
    TK7882.P3

  • Information, communication and computing technology : second International Conference, ICICCT 2017, New Delhi, India, May 13, 2017, Revised selected papers / edited by Saroj Kaushik, Daya Gupta, Latika Kharb, Deepak Chahal
    TK5105.5

  • The analysis of nuclear materials and their environments / Claude André Degueldre
    TK9185

  • The cool stuff in Premiere Pro learn advanced editing techniques to dramatically speed up your workflow / Jarle Leirpoll, Dylan Osborn, Paul Murphy, Andy Edwards
    TK6680.5

  • Spin physics in semiconductors / Mikhail I. Dyakonov, editor
    TK7871.85

  • Web information systems engineering -- WISE 2017 : 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings. Athman Bouguettaya, Yunjun Gao, Andrey Klimenko, Lu Chen, Xiangliang Zhang, Fedor Dzerzhinskiy, Weijia Jia, Stanislav V. Klimenko, Qing Li (eds.)
    TK5105.88813

  • Mobile, secure, and programmable networking : third International Conference, MSPN 2017, Paris, France, June 29-30, 2017, Revised selected papers / Samia Bouzefrane, Soumya Banerjee, Françoise Sailhan, Selma Boumerdassi, Eric Renault (eds.)
    TK5105.5

  • Web information systems engineering -- WISE 2017 : 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings. Athman Bouguettaya, Yunjun Gao, Andrey Klimenko, Lu Chen, Xiangliang Zhang, Fedor Dzerzhinskiy, Weijia Jia, Stanislav V. Klimenko, Qing Li (eds.)
    TK5105.88813

  • Growth of high permittivity dielectrics by high pressure sputtering from metallic targets María Ángela Pampillón Arce
    TK7871.99.M44

  • Millimeter-wave power amplifiers Jaco du Preez, Saurabh Sinha
    TK7871.58.P6

  • Computational signal processing with wavelets Anthony Teolis
    TK5102.9

  • Network performance and fault analytics for LTE wireless service providers Deepak Kakadia, Jin Yang, Alexander Gilgur
    TK5103.48325

  • The internet in China from infrastructure to a Nascent civil society / Gianluigi Negro
    TK5105.875.I57

  • Streaming, sharing, stealing big data and the future of entertainment / Michael D. Smith and Rahul Telang
    TK105.386

    "[The authors explain] gently yet firmly exactly how the internet threatens established ways and what can and cannot be done about it. Their book should be required for anyone who wishes to believe that nothing much has changed." -- The Wall Street Journal

    "Packed with examples, from the nimble-footed who reacted quickly to adapt their businesses, to laggards who lost empires." -- Financial Times

    Traditional network television programming has always followed the same script: executives approve a pilot, order a trial number of episodes, and broadcast them, expecting viewers to watch a given show on their television sets at the same time every week. But then came Netflix's House of Cards . Netflix gauged the show's potential from data it had gathered about subscribers' preferences, ordered two seasons without seeing a pilot, and uploaded the first thirteen episodes all at once for viewers to watch whenever they wanted on the devices of their choice.

    In this book, Michael Smith and Rahul Telang, experts on entertainment analytics, show how the success of House of Cards upended the film and TV industries -- and how companies like Amazon and Apple are changing the rules in other entertainment industries, notably publishing and music. We're living through a period of unprecedented technological disruption in the entertainment industries. Just about everything is affected: pricing, production, distribution, piracy. Smith and Telang discuss niche products and the long tail, product differentiation, price discrimination, and incentives for users not to steal content. To survive and succeed, businesses have to adapt rapidly and creatively. Smith and Telang explain how.

    How can companies discover who their customers are, what they want, and how much they are willing to pay for it? Data. The entertainment industries, must learn to play a little "moneyball." The bottom line: follow the data.


  • How not to network a nation : the uneasy history of the Soviet internet / Benjamin Peters
    TK 5102.3 S68P48 2016eb

  • The age of electroacoustics : transforming science and sound / Roland Wittje
    TK 5981 W574 2016eb

    The transformation of acoustics into electro-acoustics, a field at the intersection of science and technology, guided by electrical engineering, industry, and the military.

    At the end of the nineteenth century, acoustics was a science of musical sounds; the musically trained ear was the ultimate reference. Just a few decades into the twentieth century, acoustics had undergone a transformation from a scientific field based on the understanding of classical music to one guided by electrical engineering, with industrial and military applications. In this book, Roland Wittje traces this transition, from the late nineteenth-century work of Hermann Helmholtz to the militarized research of World War I and media technology in the 1930s.

    Wittje shows that physics in the early twentieth century was not only about relativity and atomic structure but encompassed a range of experimental, applied, and industrial research fields. The emergence of technical acoustics and electroacoustics illustrates a scientific field at the intersection of science and technology. Wittje starts with Helmholtz's and Rayleigh's work and its intersection with telegraphy and early wireless, and continues with the industrialization of acoustics during World War I, when sound measurement was automated and electrical engineering and radio took over the concept of noise. Researchers no longer appealed to the musically trained ear to understand sound but to the thinking and practices of electrical engineering. Finally, Wittje covers the demilitarization of acoustics during the Weimar Republic and its remilitarization at the beginning of the Third Reich. He shows how technical acoustics fit well with the Nazi dismissal of pure science, representing everything that "German Physics" under National Socialism should be: experimental, applied, and relevant to the military.


  • From internet of things to smart cities : enabling technologies / edited by Hongjian Sun, Chao Wang, Bashar I. Ahmad
    TK 5105.8857 F76 2018

    From Internet of Things to Smart Cities: Enabling Technologies explores the information and communication technologies (ICT) needed to enable real-time responses to current environmental, technological, societal, and economic challenges. ICT technologies can be utilized to help with reducing carbon emissions, improving resource utilization efficiency, promoting active engagement of citizens, and more.

    This book aims to introduce the latest ICT technologies and to promote international collaborations across the scientific community, and eventually, the general public. It consists of three tightly coupled parts. The first part explores the involvement of enabling technologies from basic machine-to-machine communications to Internet of Things technologies. The second part of the book focuses on state of the art data analytics and security techniques, and the last part of the book discusses the design of human-machine interfaces, including smart home and cities.

    Features

    Provides an extended literature review of relevant technologies, in addition to detailed comparison diagrams, making new readers be easier to grasp fundamental and wide knowledge Contains the most recent research results in the field of communications, signal processing and computing sciences for facilitating smart homes, buildings, and cities Includes future research directions in Internet of Things, smart homes, smart buildings, smart grid, and smart cities Presents real examples of applying these enabling technologies to smart homes, transportation systems and cities

    With contributions from leading experts, the book follows an easy structure that not only presents timely research topics in-depth, but also integrates them into real world applications to help readers to better understand them.


  • Wind farm noise : measurement, assessment and control / Colin H. Hansen, Con J. Doolan, Kristy L. Hansen
    TK 1541 H26 2017

    A comprehensive guide to wind farm noise prediction, measurement, assessment, control and effects on people

    Wind Farm Noise covers all aspects associated with the generation, measurement, propagation, regulation and adverse health effects of noise produced by large horizontal-axis wind turbines of the type used in wind farms.

    The book begins with a brief history of wind turbine development and the regulation of their noise at sensitive receivers. Also included is an introductory chapter on the fundamentals of acoustics relevant to wind turbine noise so that readers are well prepared for understanding later chapters on noise measurements, noise generation mechanisms, noise propagation modelling and the assessment of the noise at surrounding residences.

    Key features:

    Potential adverse health effects of wind farm noise are discussed in an objective way. Means for calculating the noise at residences due to a wind farm prior to construction are covered in detail along with uncertainty estimates. The effects of meteorological conditions and other influences, such as obstacles, ground cover and atmospheric absorption, on noise levels at residences are explained. Quantities that should be measured as well as how to best measure them in order to properly characterise wind farm noise are discussed in detail. Noise generation mechanisms and possible means for their control are discussed as well as aspects of wind farm noise that still require further research to be properly understood.

    The book provides comprehensive coverage of the topic, containing both introductory and advanced level material.


  • Spacer engineered FinFET architectures : high-performance digital circuit applications / Brajesh Kumar Kaushik, Sudeb Dasgupta, Pankaj Kumar Pal
    TK 7871.95 K38 2017

    This book focusses on the spacer engineering aspects of novel MOS-based device#65533;circuit co-design in sub-20nm technology node, its process complexity, variability, and reliability issues. It comprehensively explores the FinFET/tri-gate architectures with their circuit/SRAM suitability and tolerance to random statistical variations.


  • Smart electricity distribution networks / Chengshan Wang, Jianzhong Wu, Janaka Ekanayake and Nick Jenkins
    TK 3105 S48575 2017

    Smart distribution networks are one of the key research topics of countries looking to modernise electric power networks. Smart Electricity Distributions Networks aims to provide a basic discussion of the smart distribution concept and new technologies related to it, including distributed energy resources (DERs), demand side integration, microgrids, CELL and virtual power plants.

    #65533;

    With writing from leading contributors in the field of smart distribution networks, this volume discusses different concepts within the field as well as the best methods to analyse smart distribution systems to provide a cohesive overview of issues relating to Smart Grid and related technologies.

    #65533;

    This book will be valuable to those with an interest in understanding the technologies and performance of smart distribution networks as well as engaging with the wider debate over the future Smart Grid.


  • Semiconductor devices in harsh conditions / edited by Kirsten Weide-Zaage and Malgorzata Chrzanowska-Jeske ; managing editor Krzysztof Iniewski
    TK 7871.85 S449 2017

    This book introduces the reader to a number of challenges for the operation of electronic devices in various harsh environmental conditions. While some chapters focus on measuring and understanding the effects of these environments on electronic components, many also propose design solutions, whether in choice of material, innovative structures, or strategies for amelioration and repair. Many applications need electronics designed to operate in harsh environments. Readers will find, in this collection of topics, tools and ideas useful in their own pursuits and of interest to their intellectual curiosity.

    With a focus on radiation, operating conditions, sensor systems, package, and system design, the book is divided into three parts. The first part deals with sensing devices designed for operating in the presence of radiation, commercials of the shelf (COTS) products for space computing, and influences of single event upset. The second covers system and package design for harsh operating conditions. The third presents devices for biomedical applications under moisture and temperature loads in the frame of sensor systems and operating conditions.


  • Power system load frequency control : classical and adaptive fuzzy approaches / Hassan A. Yousef, Department of Electrical andComputer Engineering, Sultan Qaboos Universirty, Muscat, Oman
    TK 1007 Y68 2017

    This title presents a balanced blend between classical and intelligent load frequency control techniques, which is detrminant for continous supply of power loads. The classical control techniques introduced in this book include PID, pole placement, observer-based state feedback, static and dynamic output feedback controllers while the intelligent control techniques explained here are of adaptive fuzzy control types. This book will analyze and design different decentralized LF controllers in order to maintain the frequency deviations of each power area within the limits and keep the tie-line power flow between different power areas at the scheduled levels.


  • Power supplies for LED driving / Steve Winder
    TK 7871.89 L53 W56 2017

    Power Supplies for LED Driving, Second Edition explores the wide use of light-emitting diodes due to their efficient use of power. The applications for power LEDs include traffic lights, street lamps, automotive lighting, architectural lights, theatre lighting, household light replacements, signage lighting (replacing neon strip lights and fluorescent tubes), LCD display backlighting, and many more.

    Powering (driving) these LED's is not always simple. Linear driving is inefficient and generates far too much heat. With a switching supply, the main issues are EMI, efficiency, and of course cost. This book covers the design trade-offs involved in LED driving applications, from low-power, to UB-LEDs and beyond.



    Provides a practical, hands-on approach to power supply design for LED drivers Contains detailed examples of what works throughout the design process Presents commentary on how the calculated component value compares with the actual value used, including a description of why the choice was made

  • Novel design and the applications of smart-M3 platforms in the internet of things : emerging research and opportunities / Dmitry Korzun, Alexey Kashevnik, Sergey Balandin
    TK 5105.8857 K67 2018
    The Internet of Things has become a major influence on the development of new technologies and innovations. When combined with smart services, the end-user experience can be significantly enhanced.

    Novel Design and the Applications of Smart-M3 Platforms in the Internet of Things: Emerging Research and Opportunities provides an innovative outlook on the development of open source technology for the creation of smart spaces and services. Including a range of relevant topics such as interoperability, system architecture, and information processing, this book is an ideal reference source for academics, researchers, graduate students, and practitioners interested in the latest advancements in the Internet of things.

  • Modeling and design of electromagnetic compatibility for high-speed printed circuit boards and packaging / Xing-Chang Wei
    TK 7868 P7 W44 2017

    Modeling and Design of Electromagnetic Compatibility for High-Speed Printed Circuit Boards and Packaging presents the electromagnetic modelling and design of three major electromagnetic compatibility (EMC) issues related to the high-speed printed circuit board (PCB) and electronic packages: signal integrity (SI), power integrity (PI), and electromagnetic interference (EMI). The emphasis is put on two essential passive components of PCBs and packages: the power distribution network and the signal distribution network. This book includes two parts. Part one talks about the field-circuit hybrid methods used for the EMC modeling, including the modal method, the integral equation method, the cylindrical wave expansion method and the de-embedding method. Part two illustrates EMC design methods and explores the applications of novel metamaterials and two-dimensional materials on traditional EMC problems.

    This book is designed to enhance worthwhile electromagnetic theory and mathematical methods for practical engineers and to train students with advanced EMC applications.


  • Virtual reality headsets : a theoretical and pragmatic approach / Philippe Fuchs, Ecole des Mines, ParisTech, Paris, France, co-authors:, Judith Guez, Olivier Hugues, Jean-Franc̦ois Jégo, Andras Kemeny & Daniel Mestre
    TK 7882 T47 F8313 2017

    The purpose of virtual reality is to make possible a sensorimotor and cognitive activity for a user in a digitally created artificial world. Recent advances in computer technology have led to a new generation of VR devices such as VR headsets. Accordingly, virtual reality poses many new scientific challenges for researchers and professionals.

    The aim of this book, a manual meant for both designers and users of virtual reality, is to present the current state of knowledge on the use of VR headsets in the most complete way possible. The book is divided into 13 chapters. The objective of the first chapter is to give an introduction to VR and clarify its scope. The next chapter presents a theoretical approach to virtual reality through our Immersion and Interaction methodology also known as "3I#65533; model''. Then, a chapter about human senses is necessary to understand the sensorimotor immersion, especially vision. These chapters are followed by several chapters which present the different visual interfaces and the VR headsets currently available on the market. These devices can impart comfort and health problems due to sensorimotor discrepancies. A chapter is devoted to these problems, followed by a chapter that gives a detailed discussion of methods and 32 solutions to dispel, or at least to decrease, VR sickness. The following three chapters present different VR applications that use VR headsets (behavioural sciences, industrial uses and Digital Art) and the final chapter provides conclusions and discusses future VR challenges.


  • Rugged embedded systems : computing in harsh environments / Augusto Vega, Pradip Bose, Alper Buyuktosunoglu
    TK 7895 E42 V44 2017

    Rugged Embedded Systems: Computing in Harsh Environments describes how to design reliable embedded systems for harsh environments, including architectural approaches, cross-stack hardware/software techniques, and emerging challenges and opportunities.

    A "harsh environment" presents inherent characteristics, such as extreme temperature and radiation levels, very low power and energy budgets, strict fault tolerance and security constraints, etc. that challenge the computer system in its design and operation. To guarantee proper execution (correct, safe, and low-power) in such scenarios, this contributed work discusses multiple layers that involve firmware, operating systems, and applications, as well as power management units and communication interfaces. This book also incorporates use cases in the domains of unmanned vehicles (advanced cars and micro aerial robots) and space exploration as examples of computing designs for harsh environments.



    Provides a deep understanding of embedded systems for harsh environments by experts involved in state-of-the-art autonomous vehicle-related projects Covers the most important challenges (fault tolerance, power efficiency, and cost effectiveness) faced when developing rugged embedded systems Includes case studies exploring embedded computing for autonomous vehicle systems (advanced cars and micro aerial robots) and space exploration

  • Real-time digital signal processing from MATLAB to C with the TMS320C6x DSPs / Thad B. Welch, Boise State University, Boise, ID, USA, Cameron H.G. Wright, University of Wyoming, Laramie, WY, USA, Michael G. Morrow, University of Wisconsin, Madison, USA,
    TK 5102.9 W44 2017

    This updated edition gives readers hands-on experience in real-time DSP using a practical, step-by-step framework that also incorporates demonstrations, exercises, and problems, coupled with brief overviews of applicable theory and MATLAB applications. Organized in three sections that cover enduring fundamentals and present practical projects and invaluable appendices, this new edition provides support for the most recent and powerful of the inexpensive DSP development boards currently available from Texas Instruments: the OMAP-L138 LCDK. It includes two new real-time DSP projects, as well as three new appendices: an introduction to the Code Generation tools available with MATLAB, a guide on how to turn the LCDK into a portable battery-operated device, and a comparison of the three DSP boards directly supported by this edition.


  • Hacking wireless access points : cracking, tracking, and signal jacking / Jennifer Ann Kurtz ; Richard Kaczmarek, technical editor
    TK 5105.78 K87 2017

    Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically.

    The book demonstrates a variety of ways that these vulnerabilities can be-and have been-exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology.



    Explains how the wireless access points in common, everyday devices can expose us to hacks and threats Teaches how wireless access points can be hacked, also providing the techniques necessary to protect and defend data Presents concrete examples and real-world guidance on how to protect against wireless access point attacks

  • Displays : fundamentals & applications / Rolf R. Hainich, Oliver Bimber ; foreword by Henry Fuchs
    TK 7882 I6 H35 2017

    In the extensive fields of optics, holography and virtual reality, technology continues to evolve. Displays: Fundamentals and Applications, Second Edition addressesthese updates and discusses how real-time computer graphics and vision enable the application and displays of graphical 2D and 3D content.

    This book explores in detail these technological developments, as well as the shifting techniques behind projection displays, projector-camera systems, stereoscopic and autostereoscopic displays. This new edition contains many updates and additions reflecting the changes in fast developing areas such as holography and near-eye displays for Augmented and Virtual reality applications.

    Perfect for the student looking to sharpen their developing skill or the master refining their technique, Rolf Hainich and Oliver Bimber help the reader understand the basics of optics, light modulation, visual perception, display technologies, and computer-generated holography. With almost 500 illustrations Displays will help the reader see the field of augmentation and virtual reality display with new eyes.


  • Web services & SOA : principles and technology / Michael P. Papazoglou
    TK 5105.88813 P37 2012

    Web services allow new and improved ways for enterprise applications to communicate and integrate with each other over the Web and, as such, are having a profound effect on both the worlds of business and of software development.

    The new edition of this bestselling book offers a comprehensive and up to date treatment of web services and Service Oriented Architecture (SOA), giving you all you need to know to gain a solid foundation in this area. Building upon the clear, accessible approach of the first edition, it provides a complete introduction to the concepts, principles, technology and standards of web services.nbsp;The booknbsp;also provides an in depth examination of good design and development practises for SOA applications in organisations.

    Key features

    A spiral approach to instruction helpsnbsp;readers build on and reinforce basic knowledge as the topics become more advanced. Numerous examples which demonstrate the practical application of the theory are included. Self-test questions, hints, tips and discussion topics feature throughout the book to support self-directed learning.

    New to this edition

    Two new chapters have been added on SOA modelling and Cloud Computing technology. A comprehensive real-life case study containing numerous practical examples has been integrated and referenced throughout the entire book to give readers 'hands-on' insight into applying theory to practice, and enhance understanding of the key concepts. Business Process Modelling Notation (BPMN), which is rapidly becoming an industry standard, is used throughout the book. Discussion of software engineering issues related to implementing sound SOA applications is included. Description of new standards, such as BPEL v2.0 is discussed. A Companion Website ( www.pearsoned.co.uk/papazoglou ) offers detailed coding solutions available to download.

  • Web engineering : 5th international conference, ICWE 2005, Sydney, Australia, July 27-29, 2005 : proceedings / David Lowe, Martin Gaedke (eds.)
    TK 5105.888 I28 2005
    Over the last few years Web Engineering has begun to gain mainstream acc- tance within the software engineering, IT and related disciplines. In particular, both researchers and practitioners are increasingly recognizing the unique c- racteristics of Web systems, and what these characteristicsimply in terms of the approaches we take to Web systems development and deployment in practice. A scan of the publications in related conference proceedings and journals highlights the diversity of the discipline areas which contribute to both the ri- ness and the complexity of Web Engineering. The 5th International Conference on Web Engineering (ICWE2005), held in Sydney, Australia, extends the traditions established by the earlier conferences in the series: ICWE2004 in Munich, Germany; ICWE2003 in Oviedo, Spain; ICWE2002 in Santa Fe, Argentina; and ICWE2001 in Caceres, #65533; Spain. Not only have these conferences helped disseminate cutting edge research within the ?eld of Web Engineering, but they have also helped de?ne and shape the discipline itself.TheprogramwehaveputtogetherforICWE2005continuesthisevolution. Indeed, we can now begin to see the maturing of the ?eld. For possibly the ?rst time, there was very little debate within the Program Committee about which papers were in and out of scope, and much more debate as to the each papers contributions to the ?eld.
page last updated on: Monday 22 January 2018
Back to top Back to top