LEADER 04450nam 2200553 450 001 9910822518003321 005 20230808192432.0 010 $a1-119-29221-2 010 $a1-119-29220-4 035 $a(CKB)3710000000635773 035 $a(EBL)4470735 035 $a(MiAaPQ)EBC4470735 035 $a(Au-PeEL)EBL4470735 035 $a(CaPaEBR)ebr11197604 035 $a(CaONFJC)MIL910399 035 $a(OCoLC)946105204 035 $a(EXLCZ)993710000000635773 100 $a20160218d2016 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aDesign constraints for NFC devices /$fDominique Paret 210 1$aHoboken, New Jersey :$cISTE Ltd/John Wiley and Sons Inc,$d2016. 215 $a1 online resource (226 p.) 225 1 $aWaves series 300 $aDescription based upon print version of record. 311 $a1-119-29219-0 311 $a1-84821-884-2 320 $aIncludes bibliographical references and index. 327 $aCover; Title Page; Copyright; Contents; Acknowledgements; Preface: Why and for Whom is this Book Written?; Why; For whom; Warning; Introduction; PART 1: Introduction to - and Reminders About - NFC; Introduction to Part 1; 1: Recap of the Principles Employed in NFC; 1.1. The physical fundaments of "contactless" and NFC; 1.1.1. Phenomenon of propagation and radiation; 1.1.2. Classification of fields and spatial regions; 1.1.3. Spatial regions; 1.1.4. Far field: r >> ?/2? (Fraunhofer zone); 1.1.5. Intermediary field: r approximately equal to ? (Fresnel zone) 327 $a1.1.6. Near field: r << ?/2? (Rayleigh zone) and the origin of NFC1.1.7. Remarks on contactless, RFID and NFC applications; 1.2. The concept of NFC; 1.2.1. Biot-Savart law; 1.2.2. Field H at a point on the axis of a circular antenna; 1.2.3. Decrease in the field H as a function of "d"; 1.2.4. Field H at a point on the axis of a rectangular antenna; 2: Normative Constraints of NFC; 2.1. Introduction; 2.1.1. Normative, regulatory and NFC market constraints; 2.1.2. A little bit of vocabulary; 2.1.3. Norm; 2.1.4. Standard; 2.2. Normative constraints; 2.2.1. Uplink from initiator to targets 327 $a2.2.1.1. Forward link - from the initiator to the target2.2.1.1.1. Supplied energy and the concept of supplying the target; 2.2.1.1.2. Remote-powered or batteryless targets; 2.2.1.1.3. Battery-assisted targets; 2.2.1.2. Return link: from target to initiator; 2.2.1.2.1. Active and passive targets; "Passive" targets; "Active" targets; 2.2.1.2.2. Return communication from targets to the initiator; Load modulation; Passive load modulation (PLM); Active load modulation (ALM); Active load modulation - ALM in NFC passive mode; Active load modulation - ALM in NFC active mode 327 $a2.2.2. "Contactless" normative constraints on NFC device antennae2.2.2.1. Uplink: initiator to target; 2.2.2.1.1. Bit encodings and the uplink; Modified-Miller (MM); No return to zero (NRZ); Manchester; Bit encoding-vicinity; Position encoding "1 of 256"; Position encoding "1 of 4"; 2.2.2.1.2. Bit rate; 2.2.2.1.3. Carrier modulation and uplink; Amplitude shift keying modulation; 100% ASK modulation; ASK modulation at 10%; ASK modulation at 10%-30%; 2.2.2.2. Downlink; 2.2.2.2.1. Bits encodings; Manchester coded sub-carrier (MSC); Binary phase shift keying (BPSK); Manchester 327 $a2.2.2.3. Summary of the consequences for antennae design2.3. Conclusion; 3: Regulatory Constraints and Recommendations; 3.1. Regulatory constraints specific to NFC and NFC antennas; 3.1.1. State of RF regulations; 3.1.2. Constraints pertaining to radiation and pollution by NFC; 3.1.3. The ERC 70 03 recommendation and the ETSI 300 330 norm; 3.1.3.1. ERC 70 03; 3.1.3.2. ETSI 300 330; 3.1.3.2.1. The template/spectrum mask; 3.1.3.2.2. Values; 3.2. Constraints due to recommendations; 3.2.1. Exposure of the human body to EM fields; 3.2.1.1. Specific absorption rate (SAR) 327 $a3.2.2. Societal constraints due to individual freedoms (privacy) 410 0$aWaves series. 606 $aNear-field communication 615 0$aNear-field communication. 676 $a621.4 700 $aParet$b Dominique$0629896 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910822518003321 996 $aDesign constraints for NFC devices$94086292 997 $aUNINA LEADER 04652nam 22006975 450 001 9910254816003321 005 20230810190918.0 010 $a3-319-50131-3 024 7 $a10.1007/978-3-319-50131-4 035 $a(CKB)4340000000062218 035 $a(DE-He213)978-3-319-50131-4 035 $a(MiAaPQ)EBC6311816 035 $a(MiAaPQ)EBC5596350 035 $a(Au-PeEL)EBL5596350 035 $a(OCoLC)1076234070 035 $a(PPN)202991423 035 $a(EXLCZ)994340000000062218 100 $a20170629d2017 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aIntroduction to Computational Social Science $ePrinciples and Applications /$fby Claudio Cioffi-Revilla 205 $a2nd ed. 2017. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2017. 215 $a1 online resource (XXXVI, 607 p. 59 illus., 21 illus. in color.) 225 1 $aTexts in Computer Science,$x1868-095X 311 $a3-319-50130-5 327 $aIntroduction -- Computation and Social Science -- Automated Information Extraction -- Social Networks -- Social Complexity I: Origins and Measurement -- Social Complexity II: Laws -- Social Complexity III: Theories -- Simulations I: Methodology -- Simulations II: Variable-Oriented Models -- Simulations III: Object-Oriented Models. 330 $aThis indispensable textbook/reference provides a comprehensive and reader-friendly introduction to the emerging field of computational social science (CSS). Presenting a unified treatment, the text examines in detail the four key methodological approaches of automated social information extraction, social network analysis, social complexity theory, and social simulation modeling. This updated and expanded new edition has been enhanced with numerous review questions and exercises to test what has been learned, deepen understanding through problem-solving, and to practice writing code to implement ideas and further explore the concepts. Topics and features: Contains more than a thousand problem questions and exercises, together with a list of acronyms and a glossary of terms Presents an introduction to the main areas, core concepts, and historical development of CSS, providing examples of a range of CSS investigations Examines the key similarities and differences between computers and social systems, from an information-processing perspective Presents a focus on automated information extraction, beginning with its roots in linguistics Introduces the fundamental elements of social network analysis, and computational approaches to analyzing social complexity Discusses the measurement, scientific laws, and generative theories of social complexity in CSS Reviews the methodology of social simulations, covering in detail both variable-oriented and object-oriented models This unique, clearly-written textbook is essential reading for graduate and advanced undergraduate students planning on embarking on a course on computational social science, or wishing to refresh their knowledge of the fundamental aspects of this exciting field. Dr. Claudio Cioffi-Revilla is University Professor and Professor of Computational Social Science, founding and former Chair of the Department of Computational Social Science, and founding and current Director of the Center for Social Complexity at George Mason University, VA, USA. 410 0$aTexts in Computer Science,$x1868-095X 606 $aSocial sciences$xData processing 606 $aSociology$xMethodology 606 $aData mining 606 $aGraph theory 606 $aComputer simulation 606 $aComputer Application in Social and Behavioral Sciences 606 $aSociological Methods 606 $aData Mining and Knowledge Discovery 606 $aGraph Theory 606 $aComputer Modelling 615 0$aSocial sciences$xData processing. 615 0$aSociology$xMethodology. 615 0$aData mining. 615 0$aGraph theory. 615 0$aComputer simulation. 615 14$aComputer Application in Social and Behavioral Sciences. 615 24$aSociological Methods. 615 24$aData Mining and Knowledge Discovery. 615 24$aGraph Theory. 615 24$aComputer Modelling. 676 $a300.113 700 $aCioffi-Revilla$b Claudio$4aut$4http://id.loc.gov/vocabulary/relators/aut$0959443 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910254816003321 996 $aIntroduction to Computational Social Science$92174070 997 $aUNINA