LEADER 04731nam 22005894a 450 001 9910143417303321 005 20170814180204.0 010 $a1-280-46841-6 010 $a9786610468416 010 $a0-470-04104-8 010 $a0-470-04103-X 035 $a(CKB)1000000000354639 035 $a(EBL)261338 035 $a(OCoLC)77345959 035 $a(SSID)ssj0000144970 035 $a(PQKBManifestationID)11142416 035 $a(PQKBTitleCode)TC0000144970 035 $a(PQKBWorkID)10147859 035 $a(PQKB)10559913 035 $a(MiAaPQ)EBC261338 035 $a(EXLCZ)991000000000354639 100 $a20051223d2006 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aElectrically small, superdirective, and superconducting antennas$b[electronic resource] /$fR.C. Hansen 210 $aHoboken, N.J. $cWiley-Interscience$dc2006 215 $a1 online resource (182 p.) 300 $aDescription based upon print version of record. 311 $a0-471-78255-6 320 $aIncludes bibliographical references and indexes. 327 $aElectrically Small, Superdirective, and Superconducting Antennas; Contents; Preface; 1. Electrically Small Antennas; 1.1 Introduction; 1.2 Fundamental Limitations; 1.2.1 Wheeler-Chu-McLean; 1.2.2 Foster's Reactance Theorem Versus Smith Chart; 1.2.3 Fano's Matching Limitations; 1.3 Electrically Small Antennas: Canonical Types; 1.3.1 Dipole Basic Characteristics; 1.3.1.1 Resistive and Reactive Loading; 1.3.1.2 Other Loading Configurations; 1.3.2 Patch and Partial Sleeve; 1.3.2.1 Titanate or Metaferrite Substrate; 1.3.2.2 Partial Sleeve; 1.3.3 Loop Basic Characteristics; 1.3.3.1 Air Core Loop 327 $a1.3.3.2 Multiturn Air Loop1.3.3.3 Magnetic Core Loop; 1.3.3.4 Receiving Loops; 1.3.3.5 Vector Sensor; 1.3.4 Dielectric Resonator Antenna; 1.4 Clever Physics, but Bad Numbers; 1.4.1 Contrawound Toroidal Helix Antenna; 1.4.2 Transmission Line Antennas; 1.4.3 Halo, Hula Hoop, and DDRR Antennas; 1.4.4 Dielectric Loaded Antennas; 1.4.5 Meanderline Antennas; 1.4.6 Cage Monopole; 1.5 Pathological Antennas; 1.5.1 Crossed-Field Antenna; 1.5.2 Snyder Dipole; 1.5.3 Loop-Coupled Loop; 1.5.4 Multiarm Dipole; 1.5.5 Complementary Pair Antenna; 1.5.6 Integrated Antenna; 1.5.7 Antenna in a NIM Shell 327 $a1.5.8 Fractal Antennas1.5.9 Antenna on a Chip; 1.5.10 Random Segment Antennas; 1.5.11 Multiple Multipoles; 1.5.12 Switched Loop Antennas; 1.6 ESA Summary; References; Author Index; 2. Superdirective Antennas; 2.1 History and Motivation; 2.2 Maximum Directivity; 2.2.1 Apertures; 2.2.2 Arrays; 2.2.2.1 Broadside Arrays of Fixed Spacing; 2.2.2.2 Endfire Arrays; 2.3 Constrained Superdirectivity; 2.3.1 Dolph-Chebyshev Superdirectivity; 2.3.2 Superdirective Ratio Constraint; 2.3.3 Bandwidth or Q Constraint; 2.3.4 Phase or Position Adjustment; 2.3.5 Tolerance Constraint 327 $a2.4 Bandwidth, Efficiency, and Tolerances2.4.1 Bandwidth; 2.4.2 Efficiency; 2.4.3 Tolerances; 2.5 Miscellaneous Superdirectivity; 2.6 Matching Circuit Loss Magnification; 2.7 Non-Foster Matching Circuits; 2.8 SD Antenna Summary; References; Author Index; 3. Superconducting Antennas; 3.1 Introduction; 3.2 Superconductivity Concepts for Antenna Engineers; 3.3 Dipole, Loop, and Patch Antennas; 3.3.1 Loop and Dipole Antennas; 3.3.2 Microstrip Antennas; 3.3.3 Array Antennas; 3.3.4 Millimeter Wave Antennas; 3.3.4.1 Waveguide Flat Plane Array; 3.3.4.2 Microstrip Planar Array 327 $a3.3.5 Submillimeter Antennas3.3.6 Low-Temperature Superconductor Antennas; 3.4 Phasers and Delay Lines; 3.5 SC Antenna Summary; References; Author Index; Subject Index 330 $aA seminal reference to electrically small antennas for today's wireless and Wi-Fi worldThis book is dedicated to the challenges posed by electrically small antennas and their solutions. Electrically small antennas have characteristics that limit performance: low radiation resistance, high reactance, low efficiency, narrow bandwidth, and increased loss in the matching network. Most of these limitations are shared by two other classes of antennas: superdirective and superconducting antennas. All three classes of antennas are thoroughly treated in three interrelated parts:* Part O 606 $aAntennas (Electronics) 608 $aElectronic books. 615 0$aAntennas (Electronics) 676 $a621.3824 676 $a621.384135 700 $aHansen$b Robert C$027095 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910143417303321 996 $aElectrically small, superdirective, and superconducting antennas$91226108 997 $aUNINA LEADER 04652nam 22008655 450 001 9910484158503321 005 20251226202308.0 010 $a3-642-03459-4 024 7 $a10.1007/978-3-642-03459-6 035 $a(CKB)1000000000772872 035 $a(SSID)ssj0000317745 035 $a(PQKBManifestationID)11248524 035 $a(PQKBTitleCode)TC0000317745 035 $a(PQKBWorkID)10293997 035 $a(PQKB)10267463 035 $a(DE-He213)978-3-642-03459-6 035 $a(MiAaPQ)EBC3064539 035 $a(PPN)13995497X 035 $a(EXLCZ)991000000000772872 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFoundations and Applications of Security Analysis $eJoint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, York, UK, March 28-29, 2009, Revised Selected Papers /$fedited by Pierpaolo Degano, Luca Vigaṇ 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (X, 223 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v5511 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-642-03458-6 320 $aIncludes bibliographical references and index. 327 $aA Policy Model for Secure Information Flow -- A General Framework for Nondeterministic, Probabilistic, and Stochastic Noninterference -- Validating Security Protocols under the General Attacker -- Usage Automata -- Static Detection of Logic Flaws in Service-Oriented Applications -- Improving the Semantics of Imperfect Security -- Analysing PKCS#11 Key Management APIs with Unbounded Fresh Data -- Transformations between Cryptographic Protocols -- Formal Validation of OFEPSP+ with AVISPA -- On the Automated Correction of Protocols with Improper Message Encoding -- Finite Models in FOL-Based Crypto-Protocol Verification -- Towards a Type System for Security APIs -- Separating Trace Mapping and Reactive Simulatability Soundness: The Case of Adaptive Corruption -- How Many Election Officials Does It Take to Change an Election?. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, ARSPA-WITS 2009, held in York, UK, in March 2009, in association with ETAPS 2009. The 12 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 27 submissions. The papers feature topics including formal specification, analysis and design of security protocols and their applications, the formal definition of various aspects of security such as access control mechanisms, mobile code security and denial-of-service attacks, the modeling of information flow and its application to confidentiality policies, system composition and covert channel analysis. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v5511 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData structures (Computer science) 606 $aInformation theory 606 $aCoding theory 606 $aComputer networks 606 $aAlgorithms 606 $aComputer engineering 606 $aCryptology 606 $aData Structures and Information Theory 606 $aCoding and Information Theory 606 $aComputer Communication Networks 606 $aAlgorithms 606 $aComputer Engineering and Networks 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData structures (Computer science). 615 0$aInformation theory. 615 0$aCoding theory. 615 0$aComputer networks. 615 0$aAlgorithms. 615 0$aComputer engineering. 615 14$aCryptology. 615 24$aData Structures and Information Theory. 615 24$aCoding and Information Theory. 615 24$aComputer Communication Networks. 615 24$aAlgorithms. 615 24$aComputer Engineering and Networks. 676 $a005.8 701 $aDegano$b Pierpaolo$f1950-$01750376 701 $aVigano?$b Luca$0622598 712 12$aJoint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910484158503321 996 $aFoundations and applications of security analysis$94192051 997 $aUNINA