The purpose of the book is to distinguish the single-de-source multilevel inverter topologies and to teach their control, switching and voltage balancing. It will include new information on voltage balancing and contr...
ISBN:
(数字)9783030152536
ISBN:
(纸本)9783030152529
The purpose of the book is to distinguish the single-de-source multilevel inverter topologies and to teach their control, switching and voltage balancing. It will include new information on voltage balancing and control of multilevel inverters. The book will answer some important questions about the revolution of power electronics converters: 1- Why multilevel inverter are better than 2-level ones? 2- Why single-de-source multilevel inverters are a matter of interest? 3- What are the redundant switching states and what do they do? 4- How to use redundant switching states in control and voltage balancing? 5- What are the applications of single-de-source multilevel inverters?
This book describes Service-Oriented Architecture (SOA) and the significant factors which affect its adoption, such as governance, strategy, complexity, Return on Investment (ROI), business and IT alignment, culture a...
ISBN:
(数字)9783030121006
ISBN:
(纸本)9783030120993
This book describes Service-Oriented Architecture (SOA) and the significant factors which affect its adoption, such as governance, strategy, complexity, Return on Investment (ROI), business and IT alignment, culture and communication, costs, and security. The study on which this book is based, involved a quantitative analysis to investigate the influential factors for adopting SOA, paving the way to further research in the field.
Each year, the Annual BCI Research Award recognizes the top new projects in brain-computer interface (BCI) research. This book contains summaries of these projects from the 2017 BCI Research Award. Each chapter is wri...
ISBN:
(数字)9783030056681
ISBN:
(纸本)9783030056674
Each year, the Annual BCI Research Award recognizes the top new projects in brain-computer interface (BCI) research. This book contains summaries of these projects from the 2017 BCI Research Award. Each chapter is written by the group that submitted the BCI project that was nominated, and introduction and discussion chapters provide supporting information and explore trends that are reflected in the annual awards each year. One of the prominent trends in recent years has been BCIs for new patient groups, and many chapters in this book present emerging research directions that might become more prevalent in the near future.
This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing....
详细信息
ISBN:
(数字)9789811325236
ISBN:
(纸本)9789811325229
This book gives a comprehensive and systematic review of secure compressive sensing (CS) for applications in various fields such as image processing, pattern recognition, Internet of things (IoT), and cloud computing. It will help readers grasp the knowledge of secure CS and its applications, and stimulate more readers to work on the research and development of secure CS. It discusses how CS becomes a cryptosystem, followed by the corresponding designs and analyses. The application of CS in multimedia data encryption is presented, in which the general design framework is given together with several particular frameworks including parallel CS, involvement of image processing techniques, and double protection mechanism. It also describes the applications of CS in cloud computing security and IoT security, i.e., privacy-preserving reconstruction in cloud computing and secure low-cost sampling in IoT, respectively.
This book focuses on one of the most important aspects of electrical propulsion systems the creation of highly reliable safety-critical traction electrical drives. It discusses the methods and models for analysis and ...
ISBN:
(数字)9783319899695
ISBN:
(纸本)9783319899688
This book focuses on one of the most important aspects of electrical propulsion systems the creation of highly reliable safety-critical traction electrical drives. It discusses the methods and models for analysis and optimization of reliability and fault tolerance indices, based on which, it proposes and assesses methods for improving the availability, fault tolerance and performance of traction electric drives.
This SpringerBrief provides a comprehensive study of the uniquesecurity threats to cognitive radio (CR) networks and a systematicinvestigation of the state-of-the-art in the corresponding adversarydetection problems. ...
ISBN:
(数字)9783319758688
ISBN:
(纸本)9783319758671
This SpringerBrief provides a comprehensive study of the uniquesecurity threats to cognitive radio (CR) networks and a systematicinvestigation of the state-of-the-art in the corresponding adversarydetection problems. In addition, detailed discussions of the underlyingfundamental analytical tools and engineering methodologies of theseadversary detection techniques are provided, considering that many ofthem are quite general and have been widely employed in many otherrelated fields. The exposition of this book starts from a brief introduction ofthe CR technology and spectrum sensing in Chapter 1. This is followed by anoverview of the relevant security vulnerabilities and a detailed discussionof two security threats unique to CR networks, namely, the primary useremulation (PUE) attack and the Byzantine attack. To better prepare the reader for the discussions in later chapters, preliminaries of analytic toolsrelated to adversary detection are introduced in Chapter 2. In Chapter 3, asuite of cutting-edge adversary detection techniques tailor-designed against the PUE and the Byzantine attacks are reviewed to provide a clearoverview of existing research in this field. More detailed case studies are presented in Chapters 4 6. Specifically, a physical-layer based PUE attack detection scheme is presented in Chapter 4, while Chapters 5 and 6 are devoted to the illustration of two novel detection techniquesagainst the Byzantine attack. Concluding remarks and outlooks for future research areprovided in Chapter 7. The primary audience for this SpringerBrief include network engineers interested inaddressing adversary detection issues in cognitive radio networks, researchers interested in the state-of-the-art on unique security threats tocognitive radio networks and the corresponding detection mechanisms. Also, graduate and undergraduate students interested in obtaining comprehensive information on adversary detection in cognitive radionetworks and applying the underlying technique
暂无评论