![]() |
![]() |
Your cart is empty |
||
Theory of Modeling and Simulation: Discrete Event & Iterative System Computational Foundations, Third Edition, continues the legacy of this authoritative and complete theoretical work. It is ideal for graduate and PhD students and working engineers interested in posing and solving problems using the tools of logico-mathematical modeling and computer simulation. Continuing its emphasis on the integration of discrete event and continuous modeling approaches, the work focuses light on DEVS and its potential to support the co-existence and interoperation of multiple formalisms in model components. New sections in this updated edition include discussions on important new extensions to theory, including chapter-length coverage of iterative system specification and DEVS and their fundamental importance, closure under coupling for iteratively specified systems, existence, uniqueness, non-deterministic conditions, and temporal progressiveness (legitimacy).
Fractional Order Systems: Optimization, Control, Circuit Realizations and Applications consists of 21 contributed chapters by subject experts. Chapters offer practical solutions and novel methods for recent research problems in the multidisciplinary applications of fractional order systems, such as FPGA, circuits, memristors, control algorithms, photovoltaic systems, robot manipulators, oscillators, etc. This book is ideal for researchers working in the modeling and applications of both continuous-time and discrete-time dynamics and chaotic systems. Researchers from academia and industry who are working in research areas such as control engineering, electrical engineering, mechanical engineering, computer science, and information technology will find the book most informative.
In the modern era each new innovation poses its own special ethical dilemma. How can human society adapt to these new forms of expression, commerce, government, citizenship, and learning while holding onto its ethical and moral principles? The Changing Scope of Technoethics in Contemporary Society is a critical scholarly resource that examines the existing intellectual platform within the field of technoethics. Featuring coverage on a broad range of topics such as ethical perspectives on internet safety, technoscience, and ethical hacking communication, this book is geared towards academicians, researchers, and students seeking current research on domains of technoethics.
Electric power systems have become much more complex in the past years, due to the integration of distributed generation including renewable energy sources and the challenges caused by intermittency of renewables. This complexity makes power systems potentially more vulnerable. However, use of computer-based protection methods (i.e., digital protection relays) supported by communication technology have helped in protecting electrical networks from faults to which they are subjected to. This second edition of the book covers a comprehensive introduction to the protection of electrical power systems using digital protective relays. The new edition offers a thorough revision and update, and comprehensive additional material. Chapters treat the mathematical background of protection algorithms including, sinusoidal-wave-based algorithms, Walsh function and S-Transform-based techniques, least squares and differential equation-based techniques, travelling wave-based protection, protection of transformers, digital line differential protection, a comparison between digital protection algorithms, and importantly, protection of networks with distributed generation including renewable energy resources. The book is written for researchers in electrical engineering and power engineering, in industry, utilities and universities, and for advanced students. The treatment is logically structured, covering mathematics and principles for the development and implementation of the major algorithms underlying different protection techniques. These techniques can be applied to protection of generator transformers, lines, switchgear and cable circuits: the main components of transmission and distribution systems with and without integrated distributed energy sources including renewables.
In the world of mathematics and computer science, technological advancements are constantly being researched and applied to ongoing issues. Setbacks in social networking, engineering, and automation are themes that affect everyday life, and researchers have been looking for new techniques in which to solve these challenges. Graph theory is a widely studied topic that is now being applied to real-life problems. Advanced Applications of Graph Theory in Modern Society is an essential reference source that discusses recent developments on graph theory, as well as its representation in social networks, artificial neural networks, and many complex networks. The book aims to study results that are useful in the fields of robotics and machine learning and will examine different engineering issues that are closely related to fuzzy graph theory. Featuring research on topics such as artificial neural systems and robotics, this book is ideally designed for mathematicians, research scholars, practitioners, professionals, engineers, and students seeking an innovative overview of graphic theory.
As environmental issues remain at the forefront of energy research, renewable energy is now an all-important field of study. And as smart technology continues to grow and be refined, its applications broaden and increase in their potential to revolutionize sustainability studies. This potential can only be fully realized with a thorough understanding of the most recent breakthroughs in the field. Research Advancements in Smart Technology, Optimization, and Renewable Energy is a collection of innovative research that explores the recent steps forward for smart applications in sustainability. Featuring coverage on a wide range of topics including energy assessment, neural fuzzy control, and biogeography, this book is ideally designed for advocates, policymakers, engineers, software developers, academicians, researchers, and students.
Steganography is the art of secret writing. The purpose of steganography is to hide the presence of a message from the intruder by using state-of-the-art methods, algorithms, architectures, models, and methodologies in the domains of cloud, internet of things (IoT), and the Android platform. Though security controls in cloud computing, IoT, and Android platforms are not much different than security controls in an IT environment, they might still present different types of risks to an organization than the classic IT solutions. Therefore, a detailed discussion is needed in case there is a breach in security. It is important to review the security aspects of cloud, IoT, and Android platforms related to steganography to determine how this new technology is being utilized and improved continuously to protect information digitally. The benefits and challenges, along with the current and potential developments for the future, are important keystones in this critical area of security research. Multidisciplinary Approach to Modern Digital Steganography reviews the security aspects of cloud, IoT, and Android platforms related to steganography and addresses emerging security concerns, new algorithms, and case studies in the field. Furthermore, the book presents a new approach to secure data storage on cloud infrastructure and IoT along with including discussions on optimization models and security controls that could be implemented. Other important topics include data transmission, deep learning techniques, machine learning, and both image and text stenography. This book is essential for forensic engineers, forensic analysts, cybersecurity analysts, cyber forensic examiners, security engineers, cybersecurity network analysts, cyber network defense analysts, and digital forensic examiners along with practitioners, researchers, academicians, and students interested in the latest techniques and state-of-the-art methods in digital steganography.
A significant revision of a best-selling text for the introductory digital signal processing course. This book presents the fundamentals of discrete-time signals, systems, and modern digital processing and applications for students in electrical engineering, computer engineering, and computer science.The book is suitable for either a one-semester or a two-semester undergraduate level course in discrete systems and digital signal processing. It is also intended for use in a one-semester first-year graduate-level course in digital signal processing.
Sega Arcade: Pop-Up History presents six of the most iconic Sega Taiken 'body sensation' videogame cabinets - Hang-On, Space Harrier, Out Run, After Burner, Thunder Blade and Power Drift - in an innovative form: as dazzling pop-up paper sculptures. Sega Arcade: Pop-Up History is a unique book object, a delight for Sega fans and a love letter to the once-vibrant arcade game scene of the 1980s. Accompanying the 3D model showcase is a written history from Guardian games writer and best-selling novelist, Keith Stuart, punctuated by specially restored production artwork and beautifully reproduced in-game screens. The book features contributions from arcade game innovator Yu Suzuki, who offers first-hand insight into the development of these ground-breaking games and the birth of the Taiken cabinet phenomenon.
There is a tremendous need for computer scientists, data scientists, and software developers to learn how to develop Socratic problem-solving applications. While the amount of data and information processing has been accelerating, our ability to learn and problem-solve with that data has fallen behind. Meanwhile, problems have become too complex to solve in the workplace without a concerted effort to follow a problem-solving process. This problem-solving process must be able to deal with big and disparate data. Furthermore, it must solve problems that do not have a "rule" to apply in solving them. Moreover, it must deal with ambiguity and help humans use informed judgment to build on previous steps and create new understanding. Computer-based Socratic problem-solving systems answer this need for a problem-solving process using big and disparate data. Furthermore, computer scientists, data scientists, and software developers need the knowledge to develop these systems. Socrates Digital (TM) for Learning and Problem Solving presents the rationale for developing a Socratic problem-solving application. It describes how a computer-based Socratic problem-solving system called Socrates DigitalTM can keep problem-solvers on track, document the outcome of a problem-solving session, and share those results with problem-solvers and larger audiences. In addition, Socrates DigitalTM assists problem-solvers to combine evidence about their quality of reasoning for individual problem-solving steps and their overall confidence in the solution. Socrates DigitalTM also captures, manages, and distributes this knowledge across organizations to improve problem-solving. This book also presents how to build a Socrates DigitalTM system by detailing the four phases of design and development: Understand, Explore, Materialize, and Realize. The details include flow charts and pseudo-code for readers to implement Socrates DigitalTM in a general-purpose programming language. The completion of the design and development process results in a Socrates DigitalTM system that leverages artificial intelligence services from providers that include Apple, Microsoft, Google, IBM, and Amazon. In addition, an appendix provides a demonstration of a no-code implementation of Socrates DigitalTM in Microsoft Power Virtual Agent.
Keep track of your online passwords in this gorgeous, alphabetically tabbed notebook featuring a modern floral design. In this 4 × 5.75–inch, 128-page hardcover notebook with removable cover band, record the necessarily complex passwords and user login names required to thwart hackers. You’ll find: Internet password safety and naming tips A to Z tabbed pages with space to list website, username, and five passwords for each Dedicated pages to record software license information, with spaces for license number, purchase date, renewal date, and monthly fee Dedicated pages to record network settings and passwords, including for modem, router, WAN, LAN, and wireless A notes section with blank lined pages Just say “no” to piles of sticky notes and scraps of paper with your passwords and logins! This internet password logbook provides an easy way to keep track of website addresses, usernames, and passwords in one discreet and convenient location.
For courses in Logic and Computer design. Understanding Logic and Computer Design for All Audiences Logic and Computer Design Fundamentals is a thoroughly up-to-date text that makes logic design, digital system design, and computer design available to students of all levels. The Fifth Edition brings this widely recognised source to modern standards by ensuring that all information is relevant and contemporary. The material focuses on industry trends and successfully bridges the gap between the much higher levels of abstraction students in the field must work with today than in the past. Broadly covering logic and computer design, Logic and Computer Design Fundamentals is a flexibly organised source material that allows instructors to tailor its use to a wide range of student audiences.
Business approaches in today's society have become technologically-driven and highly-applicable within various professional fields. These business practices have transcended traditional boundaries with the implementation of internet technology, making it challenging for professionals outside of the business world to understand these advancements. Interdisciplinary research on business technology is required to better comprehend its innovations. The Handbook of Research on Interdisciplinary Approaches to Digital Transformation and Innovation provides emerging research exploring the complex interconnections of technological business practices within society. This book will explore the practical and theoretical aspects of e-business technology within the fields of engineering, health, and social sciences. Featuring coverage on a broad range of topics such as data monetization, mobile commerce, and digital marketing, this book is ideally designed for researchers, managers, students, engineers, computer scientists, economists, technology designers, information specialists, and administrators seeking current research on the application of e-business technologies within multiple fields. |
![]() ![]() You may like...
Libraries and Librarianship in Korea
Pongsoon Lee, Young Ai Um
Hardcover
R2,117
Discovery Miles 21 170
Apache HTTP Server Documentation Version…
Apache Software Foundation
Hardcover
R1,795
Discovery Miles 17 950
Artificial Intelligence in Design 1994
John S. Gero, Fay Sudweeks
Hardcover
R2,645
Discovery Miles 26 450
Advances in Cognitive Informatics and…
Yingxu Wang, Du Zhang, …
Hardcover
R4,396
Discovery Miles 43 960
Smart Technology Trends in Industrial…
Dagmar Caganova, Michal Balog, …
Hardcover
R5,180
Discovery Miles 51 800
The Larger Illustrated Guide Sasol Birds…
Ian Sinclair, Phil Hockey
Paperback
|