This book covers the major problems of turbulence and turbulent processes, including physical phenomena, their modeling and their simulation. After a general introduction in Chapter 1 illustrating many aspects dealing with turbulent flows, averaged equations and kinetic energy budgets are provided in Chapter 2. The concept of turbulent viscosity as a closure of the Reynolds stress is also i…
This book provides a single-source reference to the state-of-the art in tunneling field effect transistors (TFETs). Readers will learn the TFETs physics from advanced atomistic simulations, the TFETs fabrication process and the important roles that TFETs will play in enabling integrated circuit designs for power efficiency.
This book presents original findings on tunable microwave metamaterial structures, and describes the theoretical and practical issues involved in the design of metamaterial devices. Special emphasis is given to tunable elements and their advantages in terms of feeding network simplification. Different biasing schemes and feeding network topologies are presented, together with extensive prototyp…
This book constitutes the refereed proceedings of the International Standard Conference on Trustworthy Computing and Services, ISCTCS 2014, held in Beijing, China, in November 2014. The 51 revised full papers presented were carefully reviewed and selected from 279 submissions. The topics covered are architecture for trusted computing systems; trusted computing platform; trusted system building;…
Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchan…
This book describes the state-of-the-art in trusted computing for embedded systems. It shows how a variety of security and trusted computing problems are addressed currently and what solutions are expected to emerge in the coming years. The discussion focuses on attacks aimed at hardware and software for embedded systems, and the authors describe specific solutions to create security features. …
This book breaks new ground, however, and provides an excellent opportunity for the reader to gain a more integrated understanding of the role of networks in the economy. The Economics of Interfirm Networks will be of special interest to economists and practitioners seeking empirical and quantitative knowledge on interfirm and firm–bank networks.
Most computer users have an incorrect, but useful, cognitive metaphor for computers in which the user says (or types or clicks) something and a mystical, almost intelligent or magical, behavior happens. It is not a stretch to describe computer users as believing computers follow the laws of magic, where some magic incantation is entered, and the computer responds with an expected, but magical, …
Complex diseases including diabetes, neurological disorders and cancer are results from a combination of genetic, environmental and lifestyle factors, and development of new prognostic tools for the treatment of such diseases requires a deep understanding of the mechanisms underlying cell functions. With the advances in high throughput technologies, biological components of cells can be measure…
This book focus on Long Term Evolution (LTE) and beyond. The chapters describe different aspects of research and development in LTE, LTE-Advanced (4G systems) and LTE-450 MHz such as telecommunications regulatory framework, voice over LTE, link adaptation, power control, interference mitigation mechanisms, performance evaluation for different types of antennas, cognitive mesh network, integrati…