Two of the major developments reshaping the telecommunications landscape are mobile wireless connectivity and the migration of voice telephone services to IP technology. Those two ideas come together in networks that carry voice services over a wireless LAN (VoWLAN). The purpose of this text is to provide network professionals with the technical background and practical guidance needed to deploy these networks successfully.
上传时间: 2020-06-01
上传用户:shancjb
Digital radios have undergone an astonishing evolution in the last century. Born as a set of simple and power-hungry electrical and electromechanical devices for low data rate transmission of telegraph data in the Marconi age, they have transformed, thanks to substantial advances in electronic technology, into a set of small, reliable and sophisticated integrated devices supporting broadband multimedia communications. This, however, would not have been possible unless significant progress had been made in recent decades in the field of signal processing algorithms for baseband and passband signals. In fact, the core of any modern digital radio consists of a set of algorithms running over programmable electronic hardware. This book stems from the research and teaching activities of its co-authors in the field of algorithmic techniques for wireless communications. A huge body of technical literature has accumulated in the last four decades in this area, and an extensive coverage of all its important aspects in a single textbook is impossible. For this reason, we have selected a few important topics and, for ease of reading, organized them into two parts.
标签: Communications Algorithmic Techniques Wireless
上传时间: 2020-06-01
上传用户:shancjb
This chapter provides extensive coverage of existing mobile wireless technologies. Much of the emphasis is on the highly anticipated 3G cellular networks and widely deployed wireless local area networks (LANs), as the next-generation smart phones are likely to offer at least these two types of connectivity. Other wireless technologies that either have already been commercialized or are undergoing active research and standardization are introduced as well. Because standardization plays a crucial role in developing a new technology and a market, throughout the discussion standards organizations and industry forums or consortiums of some technologies are introduced. In addition, the last section of this chapter presents a list of standards in the wireless arena.
标签: Networking Wireless Complete
上传时间: 2020-06-01
上传用户:shancjb
Electrostatic discharge (ESD) phenomena have been known to mankind since Thales of Miletus in approximately 600 B.C.E. noticed the attraction of strands of hay to amber. Two thousand six hundred years have passed and the quest to obtain a better under- standing of electrostatics and ESD phenomenon continues. Today, the manufacturing of microelectronics has continued the interest in the field of electrostatic phenomenon spanning factory issues, tooling, materials, and the microelectronic industry
上传时间: 2020-06-05
上传用户:shancjb
This book is intended for researchers, teachers, and students willing to ex- plore conceptual bridges between the fields of Automatic Control and Power Electronics. The need to bring the two disciplines closer has been felt, for many years, both by Power Electronics specialists and by Automatic Control theorists, as a means of fruitful interaction between the two scientific com- munities. There have, certainly, been many steps given in that direction in the last decade as evidenced by the number of research articles in journals, special sessions in conferences, and summer courses throughout the world.
标签: Techniques Control Design
上传时间: 2020-06-07
上传用户:shancjb
This book is written for engineers involved in the operation, control, and planning of electric power systems. In addition, the book provides information and tools for researchers working in the fields of power system security and stability. The book consists of two volumes. The first volume provides traditional techniques for the stability analysis of large scale power systems. In addition, an overview of the main drivers and requirements for modernization of the traditional methods for online applications are discussed. The second volume provides techniques for online security assessment and corrective action studies. In addition, the impact of variable generation on the security of power systems is considered in the second volume. The first volume may be considered as a background builder while the second volume is intended for the coverage of edge techniques and methods for online dynamic security studies.
上传时间: 2020-06-07
上传用户:shancjb
The first edition as well as its forerunner of Kuffel and Abdullah published in 1970 and their translations into Japanese and Chinese languages have enjoyed wide international acceptance as basic textbooks in teaching senior under- graduate and postgraduate courses in High-Voltage Engineering. Both texts have also been extensively used by practising engineers engaged in the design and operation of high-voltage equipment. Over the years the authors have received numerous comments from the text’s users with helpful suggestions for improvements. These have been incorporated in the present edition. Major revisions and expansion of several chapters have been made to update the continued progress and developments in high-voltage engineering over the past two decades.
标签: Engineering Voltage High
上传时间: 2020-06-07
上传用户:shancjb
December 2007, San Jose, California: It seems a long time ago. I walked into a big networking company to head their small Power over Ethernet (PoE) applications team. Surprisingly, I hardly knew anything about PoE prior to that day, having been a switching-power conversion engineer almost all my life. But it seemed a great opportunity to widen my horizons. As you can see, one notable outcome of that seemingly illogical career choice five years ago is the book you hold in your hands today. I hope this small body of work goes on to prove worthy of your expectations and also of all the effort that went into it. Because, behind the scenes, there is a rather interesting story to relate—about its backdrop, intertwined with a small slice of modern PoE history, punctuated by a rather res- tive search for our roots and our true heroes, one that takes us back almost two centuries
上传时间: 2020-06-07
上传用户:shancjb
Thepredecessorvolumeofthisbookwaspublishedin1996.Intheyears since then, some things have changed and some have not. Two of the things that have not changed are the desire for better models and faster simulations. I performed the original simulations on my “hyperfast” 133-MHz computer! At the time, I thought if I could just getafastercomputer,allofourSPICEproblemswouldbehistory,right? TodayIamsimulatingonacomputerthathasa2.6-GHzprocessorwith 512 MB of RAM, and I would still say that simulations run too slow. The computer technology has evolved, but so have the models. In 1996 wewereperformingsimulationson100-kHzpowerconverters,whereas today I routinely see 1- and 2-MHz power converters.
标签: Switch-Mode Simulation Supply Power
上传时间: 2020-06-07
上传用户:shancjb
Sensors are points ofcontact betweenthe material world ofatoms, mass, andenergy and the seemingly immaterial world of information, computation, and cognition. Linking these two domains more tightly yields all sorts of practical benefits, such as improvedinputdevicesforcomputers,moreeffectivemedicaldevices(implantedor worn), more precise agricultural operations, better monitored buildings or bridges, more secure payment systems, and more reliable sensor–actuator control systems. There are many settings in which tighter coupling between digital and physical planes can enhance safety, security, performance, and reliability.
标签: Computational RFID
上传时间: 2020-06-08
上传用户:shancjb