Browse Results

Showing 2,626 through 2,650 of 18,757 results

Cloud Empires: How Digital Platforms Are Overtaking the State and How We Can Regain Control

by Vili Lehdonvirta

The rise of the platform economy into statelike dominance over the lives of entrepreneurs, users, and workers.The early Internet was a lawless place, populated by scam artists who made buying or selling anything online risky business. Then Amazon, eBay, Upwork, and Apple established secure digital platforms for selling physical goods, crowdsourcing labor, and downloading apps. These tech giants have gone on to rule the Internet like autocrats. How did this happen? How did users and workers become the hapless subjects of online economic empires? The Internet was supposed to liberate us from powerful institutions. In Cloud Empires, digital economy expert Vili Lehdonvirta explores the rise of the platform economy into statelike dominance over our lives and proposes a new way forward. Digital platforms create new marketplaces and prosperity on the Internet, Lehdonvirta explains, but they are ruled by Silicon Valley despots with little or no accountability. Neither workers nor users can &“vote with their feet&” and find another platform because in most cases there isn&’t one. And yet using antitrust law and decentralization to rein in the big tech companies has proven difficult. Lehdonvirta tells the stories of pioneers who helped create—or resist—the new social order established by digital platform companies. The protagonists include the usual suspects—Amazon founder Jeff Bezos, Travis Kalanick of Uber, and Bitcoin&’s inventor Satoshi Nakamoto—as well as Kristy Milland, labor organizer of Amazon&’s Mechanical Turk, and GoFundMe, a crowdfunding platform that has emerged as an ersatz stand-in for the welfare state. Only if we understand digital platforms for what they are—institutions as powerful as the state—can we begin the work of democratizing them.

Cloud Management and Security

by Imad M. Abbadi

Written by an expert with over 15 years’ experience in the field, this book establishes the foundations of Cloud computing, building an in-depth and diverse understanding of the technologies behind Cloud computing. In this book, the author begins with an introduction to Cloud computing, presenting fundamental concepts such as analyzing Cloud definitions, Cloud evolution, Cloud services, Cloud deployment types and highlighting the main challenges. Following on from the introduction, the book is divided into three parts: Cloud management, Cloud security, and practical examples. Part one presents the main components constituting the Cloud and federated Cloud infrastructure (e.g., interactions and deployment), discusses management platforms (resources and services), identifies and analyzes the main properties of the Cloud infrastructure, and presents Cloud automated management services: virtual and application resource management services. Part two analyzes the problem of establishing trustworthy Cloud, discusses foundation frameworks for addressing this problem – focusing on mechanisms for treating the security challenges, discusses foundation frameworks and mechanisms for remote attestation in Cloud and establishing Cloud trust anchors, and lastly provides a framework for establishing a trustworthy provenance system and describes its importance in addressing major security challenges such as forensic investigation, mitigating insider threats and operation management assurance. Finally, part three, based on practical examples, presents real-life commercial and open source examples of some of the concepts discussed, and includes a real-life case study to reinforce learning – especially focusing on Cloud security. Key Features • Covers in detail two main aspects of Cloud computing: Cloud management and Cloud security • Presents a high-level view (i.e., architecture framework) for Clouds and federated Clouds which is useful for professionals, decision makers, and students • Includes illustrations and real-life deployment scenarios to bridge the gap between theory and practice • Extracts, defines, and analyzes the desired properties and management services of Cloud computing and its associated challenges and disadvantages • Analyzes the risks associated with Cloud services and deployment types and what could be done to address the risk for establishing trustworthy Cloud computing • Provides a research roadmap to establish next-generation trustworthy Cloud computing • Includes exercises and solutions to problems as well as PowerPoint slides for instructors

Cloud Services, Networking, and Management

by Nelson L. da Fonseca Raouf Boutaba

Cloud Services, Networking and Management provides a comprehensive overview of the cloud infrastructure and services, as well as their underlying management mechanisms, including data center virtualization and networking, cloud security and reliability, big data analytics, scientific and commercial applications. Special features of the book include: State-of-the-art content Self-contained chapters for readers with specific interests Includes commercial applications on Cloud (video services and games)

Cloud Technologies and Services: Theoretical Concepts and Practical Applications (Textbooks in Telecommunication Engineering)

by M. Scott Kingsley

This textbook provides a thorough yet compact review of cloud technologies. It offers easy to understand explanations of the technical concepts underlying cloud services, platforms, and applications offered by Amazon Web Services (AWS), Microsoft Azure, and the Google Cloud Platform (GCP). It presents cloud concepts at a depth that can be understood and applied by both technical and non-technical readers. Once that is accomplished the learner can then easily move toward more advanced topics. Or, they can use the knowledge gained from this book to obtain industry certifications and be competitive in this exciting industry. Reader learning is enhanced with quizzes and exam questions and hands-on labs throughout the book with PowerPoint slides, instructor guide and additional labs online. All the tools needed for advancement to the level of cloud architect are found in this book. The author has verified the success of this approach in his own academic environment with much success. He teaches Cloud Engineering and Advanced Cloud Engineering at Southern Methodist University. Both courses were developed in partnership with the AWS Academy, the education arm of the Amazon Web Services cloud platform. Using this methodology his students routinely take and pass cloud certification exams and obtain lucrative employment positions in the rapidly expanding cloud industry.

Clown World: Four Years Inside Andrew Tate's Manosphere

by Jamie Tahsin Matt Shea

'This gripping book is destined to become THE book about Andrew Tate' Jon Ronson'A fascinating and disturbing investigation' Ian HislopThe behind-the-scenes story of a four-year investigation into Andrew Tate, exploring how a failed reality TV star turned accused organised criminal managed to become one of the most famous influencers in the world.In 2022, Andrew Tate went from a little-known kickboxer and failed reality TV star to a lifestyle icon for legions of men and boys, and a figure that would define a new era of misogyny. Tate started the year as a fringe internet celebrity, but by August he was the most googled man in the world. In that same month, Matt Shea and Jamie Tahsin gained access to his Bucharest compound and infamous War Room, making a documentary that would result in the first women coming forward to accuse him publicly of sexual and physical violence. Tate would end the year in a Romanian jail, facing charges of human trafficking, rape and being part of an organised crime group. But the investigations wouldn't stop there.Part Gonzo journalism, part masculinity rabbit hole, this book takes you on Shea and Tahsin's journey to reveal the dark secrets of Andrew Tate, the machine that brought him here, and the ideology he has unleashed on a generation of young men.'A sobering, strange and eye-opening look into the toxic manosphere. It should be required reading for anybody worried about the rise of incel culture and Andrew Tate' Zing Tsjeng'Rarely have I read anything so politically important that's also so gripping' Zoe Williams

Clown World: Four Years Inside Andrew Tate's Manosphere

by Jamie Tahsin Matt Shea

'This gripping book is destined to become THE book about Andrew Tate' Jon Ronson'A fascinating and disturbing investigation' Ian HislopThe behind-the-scenes story of a four-year investigation into Andrew Tate, exploring how a failed reality TV star turned accused organised criminal managed to become one of the most famous influencers in the world.In 2022, Andrew Tate went from a little-known kickboxer and failed reality TV star to a lifestyle icon for legions of men and boys, and a figure that would define a new era of misogyny. Tate started the year as a fringe internet celebrity, but by August he was the most googled man in the world. In that same month, Matt Shea and Jamie Tahsin gained access to his Bucharest compound and infamous War Room, making a documentary that would result in the first women coming forward to accuse him publicly of sexual and physical violence. Tate would end the year in a Romanian jail, facing charges of human trafficking, rape and being part of an organised crime group. But the investigations wouldn't stop there.Part Gonzo journalism, part masculinity rabbit hole, this book takes you on Shea and Tahsin's journey to reveal the dark secrets of Andrew Tate, the machine that brought him here, and the ideology he has unleashed on a generation of young men.'A sobering, strange and eye-opening look into the toxic manosphere. It should be required reading for anybody worried about the rise of incel culture and Andrew Tate' Zing Tsjeng'Rarely have I read anything so politically important that's also so gripping' Zoe Williams

Clown World: Four Years Inside Andrew Tate's Manosphere

by Jamie Tahsin Matt Shea

'This gripping book is destined to become THE book about Andrew Tate' Jon Ronson'A fascinating and disturbing investigation' Ian HislopThe behind-the-scenes story of a four-year investigation into Andrew Tate, exploring how a failed reality TV star turned accused organised criminal managed to become one of the most famous influencers in the world.In 2022, Andrew Tate went from a little-known kickboxer and failed reality TV star to a lifestyle icon for legions of men and boys, and a figure that would define a new era of misogyny. Tate started the year as a fringe internet celebrity, but by August he was the most googled man in the world. In that same month, Matt Shea and Jamie Tahsin gained access to his Bucharest compound and infamous War Room, making a documentary that would result in the first women coming forward to accuse him publicly of sexual and physical violence. Tate would end the year in a Romanian jail, facing charges of human trafficking, rape and being part of an organised crime group. But the investigations wouldn't stop there.Part Gonzo journalism, part masculinity rabbit hole, this book takes you on Shea and Tahsin's journey to reveal the dark secrets of Andrew Tate, the machine that brought him here, and the ideology he has unleashed on a generation of young men.'A sobering, strange and eye-opening look into the toxic manosphere. It should be required reading for anybody worried about the rise of incel culture and Andrew Tate' Zing Tsjeng'Rarely have I read anything so politically important that's also so gripping' Zoe Williams

Clustering Methods for Big Data Analytics: Techniques, Toolboxes and Applications (Unsupervised and Semi-Supervised Learning)

by Olfa Nasraoui Chiheb-Eddine Ben N'Cir

This book highlights the state of the art and recent advances in Big Data clustering methods and their innovative applications in contemporary AI-driven systems. The book chapters discuss Deep Learning for Clustering, Blockchain data clustering, Cybersecurity applications such as insider threat detection, scalable distributed clustering methods for massive volumes of data; clustering Big Data Streams such as streams generated by the confluence of Internet of Things, digital and mobile health, human-robot interaction, and social networks; Spark-based Big Data clustering using Particle Swarm Optimization; and Tensor-based clustering for Web graphs, sensor streams, and social networks. The chapters in the book include a balanced coverage of big data clustering theory, methods, tools, frameworks, applications, representation, visualization, and clustering validation.

Co-Creation in der Creator Economy: So können Content Creators ihre Community an ihre Inhalte binden (essentials)

by Markus H. Dahm Johannes Heydenreich

Dieses essential wirft einen Blick auf die zunehmende Bedeutung von gemeinschaftlicher Kreation in der aufstrebenden Creator Economy und gibt Content-Erstellern wertvolle Einblicke und konkrete Ratschläge, wie sie durch die Zusammenarbeit mit Fans und Followern nicht nur die Arbeitslast teilen, sondern auch eine unterstützende Gemeinschaft aufbauen können. Das Buch analysiert erfolgreiche Co-Creation-Modelle, bei denen Content-Verfasser Inhalte gemeinsam entwickeln und dabei von gemeinsamen Vermarktungsstrategien und Monetarisierungsansätzen profitieren.

Co-simulations of Microwave Circuits and High-Frequency Electromagnetic Fields

by Mei Song Tong Xiao Yu Li

This book aims to provide many advanced application topics for microwave circuits and high-frequency electromagnetic (EM) fields by using advanced design system (ADS) and high-frequency structure simulator (HFSS) as simulation platforms. In particular, it contains the latest multidisciplinary co-simulation guidance on the design of relevant components and devices. Currently, the circuit/field design and performance analysis and optimization strongly rely on various kinds of robust electronic design automation (EDA) software. RF/microwave engineers must grasp two or more types of related simulation design software. ADS by Keysight and HFSS by Ansys are the representative for circuit simulations and for field and structural simulations of microwave devices, respectively. At present, these two types of software are widely used in enterprises, universities, and research institutions. The main purpose of this book is to enable readers, who are interested in microwave engineering and applied electromagnetics, to master the applications of these two tools. It also helps readers expand their knowledge boundaries behind those types of software and deepen their understanding of developing interdisciplinary technologies by co-simulations. The book is divided into three parts. The first part introduces the two latest versions of ADS and HFSS and helps readers better understand the basic principles and latest functions better. It also advises how to choose appropriate simulation tools for different problems. The second part mainly describes co-simulations for high-frequency EM fields, microwave circuits, antenna designs, EM compatibility (EMC), and thermal and structural analyses. It provides guides and advices on performing co-simulations by ADS and HFSS incorporated with other types of software, respectively. The last part narrates the automation interfaces and script programming methods for co-simulations. It primarily deals with the Advanced Extension Language (AEL), Python Data Link (PDL), and MATLAB interface in ADS. For HFSS, it discusses VBScript, IronPython scripting, and Application Programming Interface (APIs) based on MATLAB. Each topic contains practical examples to help readers understand so that they can gain a solid knowledge and skills regarding automated interfaces and scripting methods based on these kinds of software. Concisely written in combination with practical examples, this book is very suitable as a textbook in introductory courses on microwave circuit and EM simulations and also as a supplementary textbook in many courses on electronics, microwave engineering, communication engineering, and related fields. As well, it can serve as a reference book for microwave engineers and researchers.

Coaching Parents of Young Children with Autism: Promoting Connection, Communication, and Learning

by Geraldine Dawson Sally J. Rogers Laurie A. Vismara

A growing body of evidence supports the benefits of high-quality parent interventions for building social and communication skills in 0- to 5-year-olds with autism spectrum disorder (ASD). How can clinicians coach parents to effectively incorporate learning opportunities into daily routines at home? From preeminent experts, this practical book explores the role of the coach and reviews the "whats," "whys," and "how-tos" of successful collaboration with parents. Topics include structuring coaching sessions, identifying children's needs, facilitating playful engagement, and deepening parents' understanding of how they can boost skills development during everyday activities. Seventeen reproducible handouts and forms include the multipage P-ESDM Infant–Toddler Curriculum Checklist, ideal for use in telehealth assessments. Purchasers get access to a webpage where they can download and print the reproducible materials in a convenient 8 1/2" x 11" size.

Coaching de oratória

by Miguel D'Addario

Um livro ideal para quem procura uma transformação face aos seus medos, aplicando o Coaching em práticas de oratória, conseguindo o impulso individual, a superação do objetivo, e sentindo-se incentivado a confrontar de cada vez que tem de se dirigir a um auditório; tanto para os profissionais, como para estudantes, advogados, docentes, funcionários, académicos, ou simplesmente para quem pretende aprender a desenvolver-se sem medos face a um público determinado.

Coaching for High Performance

by Vivette Payne

Coach employees to ensure maximum performance, motivation and retention. Following a seven-step coaching process, Coaching for High Performance gives managers the tools to help their people excel at their jobs and meet competitive challenges with confidence. This book teaches managers how to communicate performance expectations, assess employee skill levels, establish the purpose of coaching, and agree on a coaching contract. Managers will learn the critical skills needed to conduct coaching conversations, adapt one’s coaching style to fit changing situations, and create a coaching plan. Readers will learn how to: • Establish the mission and role as a coach • Deliver feedback in any situation • Use coaching skills to motivate and retain employees • Coach employees across generations and throughout the employment life cycle • Enhance team performance and channel conflict constructively • Handle difficult coaching situations with insight and skill

Coalescent Argumentation

by Michael A. Gilbert

Coalescent Argumentation is based on the concept that arguments can function from agreement, rather than disagreement. To prove this idea, Gilbert first discusses how several components--emotional, visceral (physical) and kisceral (intuitive) are utilized in an argumentative setting by people everyday. These components, also characterized as "modes," are vital to argumentative communication because they affect both the argument and the resulting outcome. In addition to the components/modes, this book also stresses the goals in argumentation as a means for understanding one's own and one's opposer's positions. Gilbert argues that by viewing positions as complex human events involving a variety of communicative modes, we are better able to find commonalities across positions, and, therefore, move from conflict to resolution. By focusing on agreement and shared goals in all modes, arguers can coalesce diverse positions and more easily distinguish between minor or unrelated differences and core disagreements. This permits much greater latitude for locating shared beliefs, values, and attitudes that will lead to conflict resolution.

Code Appreciation: Reshaping Knowledge

by Anna Ursyn

Like art appreciation and music appreciation, this code appreciation book invites the readers to look relaxedly into major programming concepts used in many disciplines through short stories set in alphabetical order. Some students fear technology with programming behind it, and shy away from the word "coding." Coding has become common and needed, and these stories are set to help non-coders lose their inhibition. It also might help with prompt writing. Many employers seek employees with experience in visual communication, technology, and storytelling skills. Most tasks are created through group efforts, so a better grasp of what other co-workers are doing speeds up the process.The book offers a new approach to storytelling by weaving coding into stories. Playfully, it encourages the readers to see computing as easier to understand and present in most disciplines. The book might benefit high school and middle school students, faculty, advisors, chancellors, and those seeking majors or passions. People interested in computer graphics, arts, graphic design, computer science, and others may gain a general understanding of how technology affects various disciplines and how everything is connected.This book is a part of the “Knowledge Through the Arts” series, consisting of:Dance Code — Dance Steps as a CodeNew Storytelling — Learning Through MetaphorsCode Appreciation — Reshaping KnowledgeNature Appreciation — Knowledge as Art

Code Breaking in the Pacific

by Peter Donovan John Mack

This book reveals the historical context and the evolution of the technically complex Allied Signals Intelligence (Sigint) activity against Japan from 1920 to 1945. It traces the all-important genesis and development of the cryptanalytic techniques used to break the main Japanese Navy code (JN-25) and the Japanese Army's Water Transport Code during WWII. This is the first book to describe, explain and analyze the code breaking techniques developed and used to provide this intelligence, thus closing the sole remaining gap in the published accounts of the Pacific War. The authors also explore the organization of cryptographic teams and issues of security, censorship, and leaks. Correcting gaps in previous research, this book illustrates how Sigint remained crucial to Allied planning throughout the war. It helped direct the advance to the Philippines from New Guinea, the sea battles and the submarine onslaught on merchant shipping. Written by well-known authorities on the history of cryptography and mathematics, Code Breaking in the Pacific is designed for cryptologists, mathematicians and researchers working in communications security. Advanced-level students interested in cryptology, the history of the Pacific War, mathematics or the history of computing will also find this book a valuable resource.

Code Switching: How to Talk So Men Will Listen

by Audrey Nelson Claire Damken Brown

Mars and Venus head to work... Day-to-day, face-to-face workplace communication between men and women is often dysfunctional because each gender employs different speech pat­terns. When careers and paychecks are on the line, clear communication is crucial-from the mailroom to the boardroom. Code Switching explains what to say, how to say it, how to be taken seriously, and how to act while speaking with the opposite sex for maximum effectiveness in the workplace. Included are: How men and women manage conversation, and the value of "chitchat" prior to a meeting. How men use language to impart information and women use language to build or indicate rela­tionship. How men use e-mail to emphasize control while women use it to share and build rapport. How women can use language to build their credibility. How humor is used as a power play, to build ter­ritory, or to exclude others. How gender talk creates and shapes work rela­tionships.

Codebreaking: A Practical Guide

by Klaus Schmeh Elonka Dunin

If you liked Dan Brown&’s Da Vinci Code—or want to solve similarly baffling cyphers yourself—this is the book for you! A thrilling exploration of history&’s most vexing codes and ciphers that uses hands-on exercises to teach you the most popular historical encryption schemes and techniques for breaking them.Solve history&’s most hidden secrets alongside expert codebreakers Elonka Dunin and Klaus Schmeh, as they guide you through the world of encrypted texts. With a focus on cracking real-world document encryptions—including some crime-based coded mysteries that remain unsolved—you&’ll be introduced to the free computer software that professional cryptographers use, helping you build your skills with state-of-the art tools. You&’ll also be inspired by thrilling success stories, like how the first three parts of Kryptos were broken. Each chapter introduces you to a specific cryptanalysis technique, and presents factual examples of text encrypted using that scheme—from modern postcards to 19-century newspaper ads, war-time telegrams, notes smuggled into prisons, and even entire books written in code. Along the way, you&’ll work on NSA-developed challenges, detect and break a Caesar cipher, crack an encrypted journal from the movie The Prestige, and much more.You&’ll learn: How to crack simple substitution, polyalphabetic, and transposition ciphers How to use free online cryptanalysis software, like CrypTool 2, to aid your analysisHow to identify clues and patterns to figure out what encryption scheme is being usedHow to encrypt your own emails and secret messagesCodebreaking is the most up-to-date resource on cryptanalysis published since World War II—essential for modern forensic codebreakers, and designed to help amateurs unlock some of history&’s greatest mysteries.

Codes, Ciphers and Spies: Tales of Military Intelligence in World War I

by John F. Dooley

When the United States declared war on Germany in April 1917, it was woefully unprepared to wage a modern war. Whereas their European counterparts already had three years of experience in using code and cipher systems in the war, American cryptologists had to help in the building of a military intelligence unit from scratch. This book relates the personal experiences of one such character, providing a uniquely American perspective on the Great War. It is a story of spies, coded letters, plots to blow up ships and munitions plants, secret inks, arms smuggling, treason, and desperate battlefield messages. Yet it all begins with a college English professor and Chaucer scholar named John Mathews Manly. In 1927, John Manly wrote a series of articles on his service in the Code and Cipher Section (MI-8) of the U. S. Army's Military Intelligence Division (MID) during World War I. Published here for the first time, enhanced with references and annotations for additional context, these articles form the basis of an exciting exploration of American military intelligence and counter-espionage in 1917-1918. Illustrating the thoughts of prisoners of war, draftees, German spies, and ordinary Americans with secrets to hide, the messages deciphered by Manly provide a fascinating insight into the state of mind of a nation at war.

Coding Faster: Getting More Productive with Microsoft® Visual Studio®

by Sara Ford Zain Naboulsi

Expert advice to help you work smarter and increase your productivity with Visual Studio. Take a detailed look into Visual Studio--and learn practical techniques to help you work more efficiently. This fully revised and expanded version of Visual Studio Tips: 251 Ways to Improve Your Productivity includes a comprehensive collection of tips and shortcuts for working with the code editor, visual designers, searches, debugger, and other features in Visual Studio 2005, 2008, and 2010. You'll gain valuable insights for using this IDE--no matter what your experience level. Discover how to: Change development settings and keyboard mappings to optimize your efficiency Save time initiating a new project by creating custom templates Uncover secrets for working with the toolbox, commands, and window layouts Work with files in more practical ways, such as using the File Tab Channel Use the Editor more effectively with tips on selecting and manipulating code Apply techniques to help reduce the time you spend debugging code Create Visual Studio extensions to increase your development productivity

Coding Literacy: How Computer Programming Is Changing Writing (Software Studies)

by Annette Vee

How the theoretical tools of literacy help us understand programming in its historical, social and conceptual contexts.The message from educators, the tech community, and even politicians is clear: everyone should learn to code. To emphasize the universality and importance of computer programming, promoters of coding for everyone often invoke the concept of “literacy,” drawing parallels between reading and writing code and reading and writing text. In this book, Annette Vee examines the coding-as-literacy analogy and argues that it can be an apt rhetorical frame. The theoretical tools of literacy help us understand programming beyond a technical level, and in its historical, social, and conceptual contexts. Viewing programming from the perspective of literacy and literacy from the perspective of programming, she argues, shifts our understandings of both. Computer programming becomes part of an array of communication skills important in everyday life, and literacy, augmented by programming, becomes more capacious.Vee examines the ways that programming is linked with literacy in coding literacy campaigns, considering the ideologies that accompany this coupling, and she looks at how both writing and programming encode and distribute information. She explores historical parallels between writing and programming, using the evolution of mass textual literacy to shed light on the trajectory of code from military and government infrastructure to large-scale businesses to personal use. Writing and coding were institutionalized, domesticated, and then established as a basis for literacy. Just as societies demonstrated a “literate mentality” regardless of the literate status of individuals, Vee argues, a “computational mentality” is now emerging even though coding is still a specialized skill.

Coding Strategies in Vertebrate Acoustic Communication (Animal Signals and Communication #7)

by Thierry Aubin Nicolas Mathevon

Information is a core concept in animal communication: individuals routinely produce, acquire, process and store information, which provides the basis for their social life. This book focuses on how animal acoustic signals code information and how this coding can be shaped by various environmental and social constraints. Taking birds and mammals, including humans, as models, the authors explore such topics as communication strategies for “public” and “private” signaling, static and dynamic signaling, the diversity of coded information and the way information is decoded by the receiver. The book appeals to a wide audience, ranging from bioacousticians, ethologists and ecologists to evolutionary biologists. Intended for students and researchers alike, it promotes the idea that Shannon and Weaver’s Mathematical Theory of Communication still represents a strong framework for understanding all aspects of the communication process, including its dynamic dimensions.

Coding Theory in Optical Wireless Communication Systems: Volume I (Optical Wireless Communication Theory and Technology)

by Xizheng Ke

This book focuses on optical-wireless communication systems. It summarizes the author's optical-wireless communication coding work while carrying out pertinent scientific research programs. The primary topics covered in the book are channel coding, coding modulation, error control (channel coding), and channel equalization. The author's mathematical analysis and experimental studies on the key theoretical issues are discussed in the book. One of the book's outstanding aspects is its thorough and methodical discussion of practical optical-wireless communication challenges. This makes the book especially appealing to readers who are eager to learn about applicable solutions in this area. Researchers, engineers, and graduate students in the subject of telecommunications can all profit from the book. It is appropriate for senior undergraduates, lecturers at colleges and universities, graduate students, and engineering and technical workers involved in optical communication.

Coding Theory in Optical Wireless Communication Systems: Volume II (Optical Wireless Communication Theory and Technology)

by Xizheng Ke

This book focuses on optical-wireless communication systems. It summarizes the author's optical-wireless communication coding work while carrying out pertinent scientific research programs. The primary topics covered in the book are channel coding, coding modulation, error control (channel coding), and channel equalization. The author's mathematical analysis and experimental studies on the key theoretical issues are discussed in the book. One of the book's outstanding aspects is its thorough and methodical discussion of practical optical-wireless communication challenges. This makes the book especially appealing to readers who are eager to learn about applicable solutions in this area. Researchers, engineers, and graduate students in the subject of telecommunications can all profit from the book. It is appropriate for senior undergraduates, lecturers at colleges and universities, graduate students, and engineering and technical workers involved in optical communication.

Coding for Optical Channels

by William Ryan Ivan Djordjevic Bane Vasic

In order to adapt to the ever-increasing demands of telecommunication needs, today's network operators are implementing 100 Gb/s per dense wavelength division multiplexing (DWDM) channel transmission. At those data rates, the performance of fiberoptic communication systems is degraded significantly due to intra- and inter-channel fiber nonlinearities, polarization-mode dispersion (PMD), and chromatic dispersion. In order to deal with those channel impairments, novel advanced techniques in modulation and detection, coding and signal processing are needed. This unique book represents a coherent and comprehensive introduction to the fundamentals of optical communications, signal processing and coding for optical channels. It is the first to integrate the fundamentals of coding theory with the fundamentals of optical communication.

Refine Search

Showing 2,626 through 2,650 of 18,757 results