LEADER 01676oam 2200397 a 450 001 9910691962903321 005 20040113090649.0 035 $a(CKB)5470000002349784 035 $a(OCoLC)52210825 035 9 $aocm52210825 035 $a(OCoLC)995470000002349784 035 $a(EXLCZ)995470000002349784 100 $a20030509d2003 ua 0 101 0 $aeng 135 $auran|||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aBibliography on the distribution, properties, and uses of zeolites from sedimentary deposits, 1998-2002$b[electronic resource] /$fby Richard A. Sheppard 205 $aOn-line version. 210 1$a[Denver, Colo.] :$cU.S. Dept. of the Interior, U.S. Geological Survey,$d[2003] 225 1 $aOpen-file report ;$v03-074 300 $aTitle from title screen (viewed on Jan. 13, 2004). 330 $aAn alphabetical listing by author of about 1,500 publications and formal releases, including patents and selected abstracts, from the world literature. The bibliography was prepared on a MacintoshTM computer using EndNoteTM software. Computer searches of the bibliography can be made by author, year, title, journal, publisher, and keywords. 606 $aZeolites$vBibliography 608 $aBibliographies.$2lcgft 615 0$aZeolites 700 $aSheppard$b Richard A$01381550 712 02$aGeological Survey (U.S.) 801 0$bGIS 801 1$bGIS 801 2$bGPO 906 $aBOOK 912 $a9910691962903321 996 $aBibliography on the distribution, properties, and uses of zeolites from sedimentary deposits, 1998-2002$93424275 997 $aUNINA LEADER 04419nam 22004333 450 001 9911019855803321 005 20250610080337.0 010 $a1-394-21822-2 010 $a1-394-21820-6 035 $a(MiAaPQ)EBC32149388 035 $a(Au-PeEL)EBL32149388 035 $a(CKB)39203850600041 035 $a(OCoLC)1523372354 035 $a(EXLCZ)9939203850600041 100 $a20250610d2025 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 14$aThe Writing Revolution $eCuneiform to the Internet 205 $a2nd ed. 210 1$aNewark :$cJohn Wiley & Sons, Incorporated,$d2025. 210 4$d©2025. 215 $a1 online resource (407 pages) 225 1 $aThe Language Library 311 08$a1-394-21819-2 327 $aCover -- Title Page -- Copyright Page -- Contents -- List of Illustrations -- Preface -- Chapter 1 The First IT Revolution -- Writing and Language -- Designing a Writing System -- Transliteration -- Chapter 2 Cuneiform: Forgotten Legacy of a Forgotten People -- Proto-cuneiform -- Sumerian Cuneiform -- Akkadian Adaptation -- Spread Beyond Mesopotamia: Elamite, Hurrian, Urartian, and Hittite -- Redesigns: Old Perian, Ugaritic -- Decipherment -- Chapter 3 Egyptian Hieroglyphs and the Quest for Eternity -- Hieroglyphs -- Hieroglyphs in Art and Religion -- Hieratic -- Demotic -- Death of a Tradition -- Coptic -- Decipherment -- Chapter 4 Chinese: A Love of Paperwork -- Basics of Chinese Characters -- Writing in Ancient and Early Imperial China -- Classifying and Defining Characters -- The Unifying Effect of Written Chinese -- The Invention and Spread of Paper -- From Classical to Modern Chinese -- Characters in Modern Times -- Spread Beyond Han China -- Chapter 5 Maya Glyphs: Calendars and Kings -- The Calendar -- History of the Maya Hieroglyphic Script -- Decipherment -- Basics of Maya Glyphs -- Chapter 6 Linear B: The Clerks ofAgamemnon -- Discovery -- Three Cretan Scripts and a Cypriot Script -- Initial Decipherment Attempts -- Michael Ventris' Decipherment -- Loss of Cretan Writing -- Chapter 7 Japanese: Three Scripts Are Better than One -- Chinese Characters in Japan -- Man'ygana and Senmygaki -- The Two Kana Syllabaries -- Mixing Kanji and Kana -- Word Processing in Japanese -- Chapter 8 Cherokee: Sequoyah Reverse-Engineers -- Sequoyah's Story -- The Cherokee Syllabary -- Sequoyah's Legacy in North America, Asia, and Africa -- Chapter 9 The Semitic lep-Bt: Egypt to Manchuria in 3,500 Years -- Egyptian Origins -- Canaanite, Ugaritic, Old South Arabian, and Ethiopic -- Phoenician, Punic, Old Hebrew, and Samaritan -- Aramaic -- Square Hebrew. 327 $aPalmyrene, Syriac, Nabataean, and Mandaic -- Parthian, Sogdian, Pahlavi, and Avestan -- Turkic, Uighur, Mongolian, and Manchu -- Arabic -- Chapter 10 The Empire of Sanskrit -- Ancient Indian Writing -- Writing with Aksharas -- The Age of Sanskrit -- Diversification and Spread -- Written Vernaculars -- Attitudes to Language and Script -- Chapter 11 King Sejong's One-ManRenaissance -- Sejong's Mission -- Han'gl Basics -- Han'gl's Reception -- Chapter 12 Greek Serendipity -- How the Alphabet Was Made -- Greek Literacy -- Post-Classical Developments -- Etruscan -- Gothic, Coptic, Armenian, and Georgian -- Glagolitic and Cyrillic -- Chapter 13 The Age of Latin -- The Early Latin Alphabet -- Fall and Fragmentation of the Western Empire -- The Carolingian Renaissance -- Old English Literacy -- Chapter 14 The Alphabet Meets the Machine -- Paper Comes to Europe -- Growing Demand -- The Moveable-Type Printing Press -- A New Information Age -- Adapting the Roman Alphabet in Europe -- Spread of the Roman Alphabet Beyond Europe -- Further Mechanization -- The Typewriter -- Chapter 15 Writing Goes to Bits -- Louis Braille's Binary System -- Samuel Morse's Telegraph and Code -- Later Encodings and Unicode -- Word Processing -- The Digital Divide -- Old and New Styles and Genres -- Dangers of Digital Text -- Appendix -- Further Reading -- Index -- EULA. 410 4$aThe Language Library 676 $a411.09 700 $aGnanadesikan$b Amalia E$0998926 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911019855803321 996 $aThe writing revolution$94029571 997 $aUNINA LEADER 08122nam 2200745 a 450 001 9911019479303321 005 20200520144314.0 010 $a9786611319878 010 $a9781281319876 010 $a1281319872 010 $a9780470986424 010 $a0470986425 010 $a9780470986417 010 $a0470986417 024 7 $a10.1002/9780470986424 035 $a(CKB)1000000000376956 035 $a(EBL)351670 035 $a(SSID)ssj0000272652 035 $a(PQKBManifestationID)11215551 035 $a(PQKBTitleCode)TC0000272652 035 $a(PQKBWorkID)10304866 035 $a(PQKB)10918160 035 $a(MiAaPQ)EBC351670 035 $a(CaBNVSL)mat08040262 035 $a(IDAMS)0b00006485f0e921 035 $a(IEEE)8040262 035 $a(PPN)252910516 035 $a(OCoLC)212130319 035 $a(Perlego)2789522 035 $a(EXLCZ)991000000000376956 100 $a20070810d2008 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aWireless personal area networks $eperformance, interconnections and security with IEEE 802.15.4 /$fJelena Misic and Vojislav B. Misic 210 $aChichester, England ;$aHoboken, NJ $cWiley$dc2008 215 $a1 online resource (337 p.) 225 1 $aWiley series on wireless communications and mobile computing 300 $aDescription based upon print version of record. 311 08$a9780470518472 311 08$a0470518472 320 $aIncludes bibliographical references (p. [303]-309) and index. 327 $a-- About the Series Editors xi -- List of Figures xiii -- List of Tables xvii -- Preface xix -- Part I WPANS and 802.15.4 1 -- 1 Prologue: Wireless Personal Area Networks 3 -- 1.1 Wireless Ad Hoc Networks 3 -- 1.2 Design Goals for the MAC Protocol 4 -- 1.3 Classification of MAC Protocols for Ad Hoc Networks 6 -- 1.4 Contention-Based MAC Protocols 9 -- 1.5 New Kinds of Ad Hoc Networks 12 -- 1.6 Sensor Networks 12 -- 2 Operation of the IEEE 802.15.4 Network 17 -- 2.1 Physical Layer Characteristics 17 -- 2.2 Star Topology and Beacon Enabled Operation 20 -- 2.3 Slotted CSMA-CA Medium Access 22 -- 2.4 Acknowledging Successful Transmissions 24 -- 2.5 Downlink Communication in Beacon Enabled Mode 25 -- 2.6 Guaranteed Time Slots 28 -- 2.7 Peer-to-Peer Topology and Non-Beacon Enabled Operation 29 -- 2.8 Device Functionality and Cluster Formation 31 -- 2.9 Format of the PHY and MAC frames 35 -- Part II Single-Cluster Networks 39 -- 3 Cluster with Uplink Traffic 41 -- 3.1 The System Model / Preliminaries 41 -- 3.2 Superframe with an Active Period Only 44 -- 3.3 Superframe with Both Active and Inactive Periods 51 -- 3.4 Probability Distribution of the Packet Service Time 57 -- 3.5 Probability Distribution of the Queue Length 59 -- 3.6 Access Delay 61 -- 3.7 Performance Results 65 -- 4 Cluster with Uplink and Downlink Traffic 71 -- 4.1 The System Model 71 -- 4.2 Modeling the Behavior of the Medium 84 -- 4.3 Probability Distribution for the Packet Service Time 86 -- 4.4 Performance of the Cluster with Bidirectional Traffic 91 -- 5 MAC Layer Performance Limitations 95 -- 5.1 Congestion of Packets Deferred to the Next Superframe 95 -- 5.2 Congestion after the Inactive Period 98 -- 5.3 Congestion of Uplink Data Requests 99 -- 5.4 Blocking of Uplink Data and Data Requests 100 -- 5.5 Possible Remedies 102 -- 6 Activity Management through Bernoulli Scheduling 111 -- 6.1 The Need for Activity Management 111 -- 6.2 Analysis of Activity Management 112 -- 6.3 Analysis of the Impact of MAC and PHY Layers 116. 327 $a6.4 Controlling the Event Sensing Reliability 121 -- 6.5 Activity Management Policy 123 -- 7 Admission Control Issues 131 -- 7.1 The Need for Admission Control 131 -- 7.2 Performance under Asymmetric Packet Arrival Rates 133 -- 7.3 Calculating the Admission Condition 135 -- 7.4 Performance of Admission Control 139 -- Part II Summary and Further Reading 143 -- Part IIIMulti-cluster Networks 145 -- 8 Cluster Interconnection with Master-Slave Bridges 147 -- 8.1 Analysis of Bridge Operation 149 -- 8.2 Markov Chain Model for a Single Node 158 -- 8.3 Performance of the Network 165 -- 8.4 Network with a Single Source Cluster/Bridge 166 -- 8.5 Network with Two Source Clusters/Bridges 173 -- 8.6 Modeling the Transmission Medium and Packet Service Times 179 -- 9 Equalization of Cluster Lifetimes 187 -- 9.1 Modeling the Clusters 187 -- 9.2 Distributed Activity Management 190 -- 9.3 Energy Consumption in Interconnected Clusters 194 -- 9.4 Performance of Activity Management 198 -- 10 Cluster Interconnection with Slave-Slave Bridges 203 -- 10.1 Operation of the SS Bridge 205 -- 10.2 Markov Chain Model for the SS Bridge 217 -- 10.3 Markov Chain for Non-Bridge Nodes 224 -- 10.4 Performance Evaluation 230 -- 10.5 To Acknowledge or Not To Acknowledge: The CSMA-CA Bridge 231 -- 10.6 Thou Shalt Not Acknowledge: The GTS Bridge 234 -- 10.7 Modeling the Transmission Medium and Packet Service Times 240 -- Part III Summary and Further Reading 251 -- Part IV Security 253 -- 11 Security in 802.15.4 Specification 255 -- 11.1 Security Services 256 -- 11.2 Auxiliary Security Header 257 -- 11.3 Securing and Unsecuring Frames 258 -- 11.4 Attacks 260 -- 12 The Cost of Secure and Reliable Sensing 265 -- 12.1 Analytical Model of a Generic Key Update Algorithm 267 -- 12.2 Analysis of the Node Buffer 273 -- 12.3 Success Probabilities 276 -- 12.4 Key Update in a Multi-Cluster Network 278 -- 12.5 Cluster Lifetime 280 -- 12.6 Evaluation of Lifetimes and Populations 283 -- Part IV Summary and Further Reading 287. 327 $aAppendices 289 -- Appendix A An Overview of ZigBee 291 -- A.1 ZigBee Functionality 291 -- A.2 Device Roles 292 -- A.3 Network Topologies and Routing 293 -- A.4 Security 295 -- Appendix B Probability Generating Functions and Laplace Transforms 301 -- Bibliography 302 -- Index 311. 330 $aWireless Personal Area Networks provides an in-depth analysis of the recent IEEE 802.15.4 standard for low data rate wireless personal area networks (LR-WPANs), including suggestions to improve performance and comparisons with the related 802.15.1 (Bluetooth) standard. It assesses the suitability of the standard for the development and deployment of wireless sensor networks as well as providing guidance and insight into the relative advantages and disadvantages of various performance solutions. Wireless Personal Area Networks: . Provides a comprehensive, in-depth look at the issues surrounding WPAN network operation and performance.. Investigates multi-cluster networks and compares how they can be implemented.. Analyzes the performance of a single cluster under different traffic and power management regimes including uplink vs. downlink traffic, acknowledged vs. unacknowledged traffic, saturation vs. non-saturation, and the like.. Discusses security issues in WPANs such as different security threats, their impact on performance, standard security mechanisms, and security policies.. Compares the IEEE 802.15.4 standard with the related Bluetooth IEEE 802.15.1 standard in terms of suitability for implementing wireless sensor networks. This reference is a valuable tool for developers and researchers getting acquainted with various aspects of IEEE 802.15.4 technology. Graduate students studying courses such as Performance Evaluation, Wireless Sensor Networks and Queuing Theory will also find this book very insightful. 410 0$aWiley series on wireless communications and mobile computing. 606 $aPersonal communication service systems$xStandards 606 $aWireless LANs 606 $aBluetooth technology 615 0$aPersonal communication service systems$xStandards. 615 0$aWireless LANs. 615 0$aBluetooth technology. 676 $a621.384 700 $aMisic$b Jelena$0751768 701 $aMisic$b Vojislav B$0751769 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911019479303321 996 $aWireless personal area networks$94419507 997 $aUNINA