Since the middle of the 20th Century yield design approaches have been identified with the lower and upper bound theorem of limit analysis theory - a theory associated with perfect plasticity. This theory is very restrictive regarding the applicability of yield design approaches, which have been used for centuries for the stability of civil engineering structures. This book presents a theory of yield design within the original -equilibrium/resistance- framework rather than referring to the theories of plasticity or limit analysis; expressing the compatibility between the equilibrium...
Since the middle of the 20th Century yield design approaches have been identified with the lower and upper bound theorem of limit analysis theory -...
This book offers the reader the keys for a successful understanding, integration and usage of satellite systems in addition to next generation terrestrial networks. The DVB-S2/RCS system is used to illustrate the integration challenges. The presentation uses a system approach, i.e. it tackles the terrestrial and satellite telecommunication systems' complexity with a high level approach, focusing on the systems' components and on their interactions. Several scenarios present the different paths that can be followed for the integration of satellite systems in terrestrial networks. Quality of...
This book offers the reader the keys for a successful understanding, integration and usage of satellite systems in addition to next generation terr...
Fault-tolerant control theory is a well-studied topic but the use of the sets in detection, isolation and/or reconfiguration is rather tangential. The authors of this book propose a systematic analysis of the set-theoretic elements and devise approaches which exploit advanced elements within the field. The main idea is to translate fault detection and isolation conditions into those conditions involving sets. Furthermore, these are to be computed efficiently using positive invariance and reachability notions. Constraints imposed by exact fault control are used to define feasible...
Fault-tolerant control theory is a well-studied topic but the use of the sets in detection, isolation and/or reconfiguration is rather tangential.<...
This book is focused on the theoretical and practical design of reinforced concrete beams, columns and frame structures. It is based on an analytical approach of designing normal reinforced concrete structural elements that are compatible with most international design rules, including for instance the European design rules - Eurocode 2 - for reinforced concrete structures. The book tries to distinguish between what belongs to the structural design philosophy of such structural elements (related to strength of materials arguments) and what belongs to the design rule aspects associated with...
This book is focused on the theoretical and practical design of reinforced concrete beams, columns and frame structures. It is based on an analytic...
With recent outbreaks of multiple large-scale financial crises, amplified by interconnected risk sources, a new paradigm of fund management has emerged. This new paradigm leverages -embedded- quantitative processes and methods to provide more transparent, adaptive, reliable and easily implemented -risk assessment-based- practices. This book surveys the most widely used factor models employed within the field of financial asset pricing. Through the concrete application of evaluating risks in the hedge fund industry, the authors demonstrate that signal processing techniques are an...
With recent outbreaks of multiple large-scale financial crises, amplified by interconnected risk sources, a new paradigm of fund management has eme...
The purpose of this book is to present the main metaheuristics and approximate and stochastic methods for optimization of complex systems in Engineering Sciences. It has been written within the framework of the European Union project ERRIC (Empowering Romanian Research on Intelligent Information Technologies), which is funded by the EU's FP7 Research Potential program and has been developed in co-operation between French and Romanian teaching researchers. Through the principles of various proposed algorithms (with additional references) this book allows the reader to explore various...
The purpose of this book is to present the main metaheuristics and approximate and stochastic methods for optimization of complex systems in Engine...
Voice over LTE (Long Term Evolution) presents the mechanisms put in place in 4G mobile networks for the transportation of IP packets containing voice data and telephone signaling, as well as the technologies used to provide a telephone service in the IMS (IP Multimedia Sub-system) network. Despite the difficulty connected to the handover of the 4G network to the 2G/3G network, a telephone communication will not be established on the 4G network. This book analyzes the technologies that have been put in place, such as CSFB (Circuit Service FallBack), an interim solution that enables a...
Voice over LTE (Long Term Evolution) presents the mechanisms put in place in 4G mobile networks for the transportation of IP packets containing voi...
Wireless telecommunication systems generate a huge amount of interest. In the last two decades, these systems have experienced at least three major technological leaps, and it has become impossible to imagine how society was organized without them. In this book, we propose a macroscopic approach on wireless systems, and aim at answering key questions about power, data rates, multiple access, cellular engineering and access networks architectures. We present a series of solved problems, whose objective is to establish the main elements of a global link budget in several...
Wireless telecommunication systems generate a huge amount of interest. In the last two decades, these systems have experienced at least three major...
An overview of the methods used for risk analysis in a variety of industrial sectors, with a particular focus on the consideration of human aspects, this book provides a definition of all the fundamental notions associated with risks and risk management, as well as clearly placing the discipline of risk analysis within the broader context of risk management processes. The author begins by presenting a certain number of basic concepts, followed by the general principle of risk analysis. He then moves on to examine the ISO31000 standard, which provides a specification for the...
An overview of the methods used for risk analysis in a variety of industrial sectors, with a particular focus on the consideration of human aspects...
Markov chains are a fundamental class of stochastic processes. They are widely used to solve problems in a large number of domains such as operational research, computer science, communication networks and manufacturing systems. The success of Markov chains is mainly due to their simplicity of use, the large number of available theoretical results and the quality of algorithms developed for the numerical evaluation of many metrics of interest. The author presents the theory of both discrete-time and continuous-time homogeneous Markov chains. He carefully examines the explosion...
Markov chains are a fundamental class of stochastic processes. They are widely used to solve problems in a large number of domains such as operatio...