Account
Orders
Advanced search
This book discusses the enhancement of efficiency in currently used solar cells. The authors have characterized different structures of the solar cell system to optimize system parameters, particularly the performance of the Copper-Tin-Sulphide solar cell using Solar...
This book investigates the effect of sintering temperature on willemite based glass-ceramic doped with different content of Er2O3. It is the first to report research on producing willemite by using waste materials and using trivalent erbium (Er3+) as a dopant....
This book describes Service-Oriented Architecture (SOA) and the significant factors which affect its adoption, such as governance, strategy, complexity, Return on Investment (ROI), business and IT alignment, culture and communication, costs, and security. The study on...
This book demonstrates the implementation of an automated measuring system for very efficient measurement of chromatic dispersion, which uses a modulation phase shift method over long haul of optical single mode fiber. The authors show how a new scheme for measuring...
This book provides detailed and accurate information on the history, structure, operation, benefits and advanced structures of silicon MESFET, along with modeling and analysis of the device. The authors explain the detailed physics that are important in modeling...
This book discusses analytical approaches and modeling of the breakdown voltage (BV) effects on graphene-based transistors. It presents semi-analytical models for lateral electric field, length of velocity saturation region (LVSR), ionization coefficient (a), and...
Audio Content Security: Attack Analysis onAudio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of...
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed...
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated...
This book focuses on the analysis and treatment of osteoporotic bone based on drug administration, tracking fatigue behavior and taking into consideration the mechanical interaction of implants with trabecular bone. Weak trabeculae are one of the most important clinical...
This brief analyzes the characteristics of a microring resonator (MRR) to perform communication using ultra-short soliton pulses. The raising of nonlinear refractive indices, coupling coefficients and radius of the single microring resonator leads to decrease in input...
This Brief highlights different approaches used to create stable cellulase and its use in different fields. Cellulase is an industrial enzyme with a broad range of significant applications in biofuel production and cellulosic waste management. Cellulase 7a from...
Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A...
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for...
The title explain new technique of secured and high capacity optical communication signals generation by using the micro and nano ring resonators.The pulses are known as soliton pulses which are more secured due to having the properties of chaotic and dark soliton...
Nonlinear behavior of light such as chaos can be observed during propagation of a laser beam inside the microring resonator (MRR) systems. This Brief highlights the design of a system of MRRs to generate a series of logic codes. An optical soliton is used to generate an...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers