Covers theoretical and practical aspects related to the behavioral modelling and predistortion of wireless transmitters and power amplifiers. It includes simulation software that enables the users to ...apply the theory presented in the book. In the first section, the reader is given the general background of nonlinear dynamic systems along with their behavioral modelling from all its aspects. In the second part, a comprehensive compilation of behavioral models formulations and structures is provided including memory polynomial based models, box oriented models such as Hammerstein-based and Wiener-based models, and neural networks-based models. The book will be a valuable resource for design engineers, industrial engineers, applications engineers, postgraduate students, and researchers working on power amplifiers modelling, linearization, and design.
This volume describes the fundamentals and techniques necessary for Lamb-wave-based damage identification. This damage assessment method offers efficient structural failure detection which lowers ...maintenance costs and increases safety benefits.
Csiszár and Körner's book is widely regarded as a classic in the field of information theory, providing deep insights and expert treatment of the key theoretical issues. It includes in-depth coverage ...of the mathematics of reliable information transmission, both in two-terminal and multi-terminal network scenarios. Updated and considerably expanded, this new edition presents unique discussions of information theoretic secrecy and of zero-error information theory, including the deep connections of the latter with extremal combinatorics. The presentations of all core subjects are self contained, even the advanced topics, which helps readers to understand the important connections between seemingly different problems. Finally, 320 end-of-chapter problems, together with helpful solving hints, allow readers to develop a full command of the mathematical techniques. It is an ideal resource for graduate students and researchers in electrical and electronic engineering, computer science and applied mathematics.
The book tries to briefly introduce the diverse literatures in the field of fractional order signal processing which is becoming an emerging topic among an interdisciplinary community of researchers. ...This book is aimed at postgraduate and beginning level research scholars who would like to work in the field of Fractional Order Signal processing (FOSP). The readers should have preliminary knowledge about basic signal processing techniques. Prerequisite knowledge of fractional calculus is not essential and is exposited at relevant places in connection to the appropriate signal processing topics. Basic signal processing techniques like filtering, estimation, system identification, etc. in the light of fractional order calculus are presented along with relevant application areas. The readers can easily extend these concepts to varied disciplines like image or speech processing, pattern recognition, time series forecasting, financial data analysis and modeling, traffic modeling in communication channels, optics, biomedical signal processing, electrochemical applications and many more. Adequate references are provided in each category so that the researchers can delve deeper into each area and broaden their horizon of understanding. Available MATLAB tools to simulate FOSP theories are also introduced so that the readers can apply the theoretical concepts right-away and gain practical insight in the specific domain.
This book is an updated version of the information theory classic, first published in 1990. About one-third of the book is devoted to Shannon source and channel coding theorems, the remainder ...addresses sources, channels, and codes and on information and distortion measures and their properties. New in this edition: Expanded treatment of stationary or sliding-block codes and their relations to traditional block codesExpanded discussion of results from ergodic theory relevant to information theoryExpanded treatment of B-processes -- processes formed by stationary coding memoryless sourcesNew material on trading off information and distortion, including the Marton inequality. New material on the properties of optimal and asymptotically optimal source codesNew material on the relationships of source coding and rate-constrained simulation or modeling of random processesSignificant material not covered in other information theory texts includes stationary/sliding-block codes, a geometric view of information theory provided by process distance measures, and general Shannon coding theorems for asymptotic mean stationary sources, which may be neither ergodic nor stationary, and d-bar continuous channels.
Radar data have already proven to be compressible with no significant losses for most of the applications in which it is used. In the framework of information theory, the compressibility of a signal ...implies that it can be decomposed onto a reduced set of basic elements. Since the same quantity of information is carried by the original signal and its decomposition, it can be deduced that a certain degree of redundancy exists in the explicit representation. According to the theory of compressive sensing (CS), due to this redundancy, it is possible to infer an accurate representation of an unknown compressible signal through a highly incomplete set of measurements. Based on this assumption, this paper proposes a novel method for the focusing of raw data in the framework of radar imaging. The technique presented is introduced as an alternative option to the traditional matched filtering, and it suggests that the new modes of acquisition of data are more efficient in orbital configurations. In this paper, this method is first tested on 1-D simulated signals, and results are discussed. An experiment with synthetic aperture radar (SAR) raw data is also described. Its purpose is to show the potential of CS applied to SAR systems. In particular, we show that an image can be reconstructed, without the loss of resolution, after dropping a large percentage of the received pulses, which would allow the implementation of wide-swath modes without reducing the azimuth resolution.
The basic operating principles of the most common types of protection relays have not changed for more than half a century. However, the calculations used to measure power system fault signals ...continue to cause problems with relay performance. As a result, there is a need for developing a next generation of protection relays which are more accurate, more reliable and faster than the conventional relays. Protective Relaying of Power Systems Using Mathematical Morphology discusses the development of novel protective relaying algorithms using Mathematical Morphology (MM). MM is a nonlinear signal processing technique derived from set theory and geometry. It analyses signals in terms of shape by retrieving the features of the signals using a pre-defined structuring element. The book introduces the fundamental principles, and brings together the applications of MM to develop new protective relaying algorithms for the protection of a variety of power system components (including transmission lines, bus, and power transformers), as well as for the distorted waveform detection and compensation which are required for the operation of many conventional relays. Protective Relaying of Power Systems Using Mathematical Morphology is an ideal source of information for researchers or postgraduates in the fields of power and engineering, as well as for power engineers.
Compressed sensing is an exciting, rapidly growing field, attracting considerable attention in electrical engineering, applied mathematics, statistics and computer science. This book provides the ...first detailed introduction to the subject, highlighting recent theoretical advances and a range of applications, as well as outlining numerous remaining research challenges. After a thorough review of the basic theory, many cutting-edge techniques are presented, including advanced signal modeling, sub-Nyquist sampling of analog signals, non-asymptotic analysis of random matrices, adaptive sensing, greedy algorithms and use of graphical models. All chapters are written by leading researchers in the field, and consistent style and notation are utilized throughout. Key background information and clear definitions make this an ideal resource for researchers, graduate students and practitioners wanting to join this exciting research area. It can also serve as a supplementary textbook for courses on computer vision, coding theory, signal processing, image processing and algorithms for efficient data processing.