![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Professional & Technical > Electronics & communications engineering > Electronics engineering > Automatic control engineering > General
This MATLAB exercise book accompanies the textbook Control Engineering, providing a platform for students to practice problem solving in the analysis and design of continuous and discrete control problems reflected in the main textbook. The book starts off with a brief introduction to MATLAB, control toolbox and Simulink. Subsequent chapters include a short theoretical summary of the topic followed by exercises on solving complex problems using MATLAB commands. These exercises are ideal for students in computer laboratory classes.
In the last decade, both scholars and practitioners have sought novel ways to address the problem of cybersecurity. Innovative outcomes have included applications such as blockchain as well as creative methods for cyber forensics, software development, and intrusion prevention. Accompanying these technological advancements, discussion on cyber matters at national and international levels has focused primarily on the topics of law, policy, and strategy. The objective of these efforts is typically to promote security by establishing agreements among stakeholders on regulatory activities. Varying levels of investment in cyberspace, however, comes with varying levels of risk; in some ways, this can translate directly to the degree of emphasis for pushing substantial change. At the very foundation or root of cyberspace systems and processes are tenets and rules governed by principles in mathematics. Topics such as encrypting or decrypting file transmissions, modeling networks, performing data analysis, quantifying uncertainty, measuring risk, and weighing decisions or adversarial courses of action represent a very small subset of activities highlighted by mathematics. To facilitate education and a greater awareness of the role of mathematics in cyber systems and processes, a description of research in this area is needed. Mathematics in Cyber Research aims to familiarize educators and young researchers with the breadth of mathematics in cyber-related research. Each chapter introduces a mathematical sub-field, describes relevant work in this field associated with the cyber domain, provides methods and tools, as well as details cyber research examples or case studies. Features One of the only books to bring together such a diverse and comprehensive range of topics within mathematics and apply them to cyber research. Suitable for college undergraduate students or educators that are either interested in learning about cyber-related mathematics or intend to perform research within the cyber domain. The book may also appeal to practitioners within the commercial or government industry sectors. Most national and international venues for collaboration and discussion on cyber matters have focused primarily on the topics of law, policy, strategy, and technology. This book is among the first to address the underpinning mathematics.
This book is for anyone who wants to gain an understanding of Blockchain technology and its potential. The book is research-oriented and covers different verticals of Blockchain technology. It discusses the characteristics and features of Blockchain, includes techniques, challenges, and future trends, along with case studies for deeper understanding. Blockchain Technology: Exploring Opportunities, Challenges, and Applications covers the core concepts related to Blockchain technology starting from scratch. The algorithms, concepts, and application areas are discussed according to current market trends and industry needs. It presents different application areas of industry and academia and discusses the characteristics and features of this technology. It also explores the challenges and future trends and provides an understanding of new opportunities. This book is for anyone at the beginner to intermediate level that wants to learn about the core concepts related to Blockchain technology.
Computer-Controlled Systems with Delay is a systematic study of the problems of analysis and synthesis for multidimensional sampled-data (SD) systems with delay. It is based on the frequency polynomial method, in which the concept of a parametric transfer matrix (PTM) plays a key role. Until now, no alternative general methods have been available to solve the above problems. The text is divided into three parts: background information from the theory of polynomial and rational matrices, helps the reader to acquire the basic understanding necessary to use the main content of the book without addressing additional sources; methods for the mathematical description of multidimensional SD systems with delay, based on the concept of the PTM; and optimization methods for multidimensional SD systems with delay, including H2 and L2 optimization as well as H2 optimization for colored input signals. The monograph is completed by three appendices. An algorithm for constructing the set of pathological sampling periods for a continuous SISO object with delay is provided first. MATLAB (R)-toolbox algorithms representing methods described in the book and application examples for selected optimization problems are given in the second. A solution to the problem of guaranteeing the required performance in a class of stochastic disturbances for SD systems with delay is considered in the third. Computer-Controlled Systems with Delay is intended for engineers, scientists and teachers working in modern control theory. It will also benefit post-graduate students taking courses in related disciplines. The book continues the description of the authors' research results on developing methods for SD systems theory which are based on the PTM concept and published in the monographs Computer Controlled Systems and Multivariable Computer-controlled Systems.
Provides a comprehensive review on new swarm intelligence Offers practical implementation of PSO with MATLAB code Presents statistical analysis techniques so that researchers can analyze their own experiment design Discusses swarm intelligence algorithms in social sector and oil and gas industries Covers recent findings and the implementation techniques to Machine Learning
- Ties together the three (now) competing modern disciplines in Program and Project Management - Tells you how to do it, not just some theory based on a one of a kind project - Provides clear and concise definitions for the three disciplines helping with career choices, separation of duties and when to use - Perfect desktop reference usable for many years to come
Viability theory designs and develops mathematical and algorithmic methods for investigating the adaptation to viability constraints of evolutions governed by complex systems under uncertainty that are found in many domains involving living beings, from biological evolution to economics, from environmental sciences to financial markets, from control theory and robotics to cognitive sciences. It involves interdisciplinary investigations spanning fields that have traditionally developed in isolation. The purpose of this book is to present an initiation to applications of viability theory, explaining and motivating the main concepts and illustrating them with numerous numerical examples taken from various fields.
This book, published in honor of Professor Laurent Praly on the occasion of his 65th birthday, explores the responses of some leading international authorities to new challenges in nonlinear and adaptive control. The mitigation of the effects of uncertainty and nonlinearity - ubiquitous features of real-world engineering and natural systems - on closed-loop stability and robustness being of crucial importance, the contributions report the latest research into overcoming these difficulties in: autonomous systems; reset control systems; multiple-input-multiple-output nonlinear systems; input delays; partial differential equations; population games; and data-driven control. Trends in Nonlinear and Adaptive Control presents research inspired by and related to Professor Praly's lifetime of contributions to control theory and is a valuable addition to the literature of advanced control.
Co-location pattern mining detects sets of features frequently located in close proximity to each other. This book focuses on data mining for co-location pattern, a valid method for identifying patterns from all types of data and applying them in business intelligence and analytics. It explains the fundamentals of co-location pattern mining, co-location decision tree, and maximal instance co-location pattern mining along with an in-depth overview of data mining, machine learning, and statistics. This arrangement of chapters helps readers understand the methods of co-location pattern mining step-by-step and their applications in pavement management, image classification, geospatial buffer analysis, etc.
The insertion of communication networks in feedback control loops complicates analysis and synthesis of cyber-physical systems (CPSs), and network-induced uncertainties may degrade system control performance. Thus, this book researches networked delay compensation and event-triggered control approaches for a series of CPSs subject to network-induced uncertainties. The authors begin with an introduction to the concepts and challenges of CPSs, followed by an overview of networked control approaches and event-triggered control strategies in CPSs. Then, networked delay compensation and event-triggered control approaches are proposed for CPSs with network communication delay, data dropout, signal quantization, and event-triggered communication. More specifically, networked delay compensation approaches are proposed for linear/nonlinear networked controlled plants with time-varying and random network communication delays and data dropouts. To reduce computational burden and network communication loads in CPSs, event-triggered control, self-triggered control, co-design of event-triggered control and quantized control techniques, and event-triggered disturbance rejection control approaches are also presented. This book is an essential text for researchers and engineers interested in cybersecurity, networked control, and CPSs. It would also prove useful for graduate students in the fields of science, engineering, and computer science.
The effectiveness of proportional-integral-derivative (PID) controllers for a large class of process systems has ensured their continued and widespread use in industry. Similarly there has been a continued interest from academia in devising new ways of approaching the PID tuning problem. To the industrial engineer and many control academics this work has previously appeared fragmented but a key determinant of this literature is the type of process model information used in the PID tuning methods. PID Control presents a set of coordinated contributions illustrating methods, old and new, that cover the range of process model assumptions systematically. After a review of PID technology, these contributions begin with model-free methods, progress through non-parametric model methods (relay experiment and phase-locked-loop procedures), visit fuzzy-logic- and genetic-algorithm-based methods; introduce a novel subspace identification method before closing with an interesting set of parametric model techniques including a chapter on predictive PID controllers. Highlights of PID Control include:
PID Control will be useful to industry-based engineers wanting a better understanding of what is involved in the steps to a new generation of PID controller techniques. Academics wishing to have a broader perspective of PID control research and development will find useful pedagogical material and research ideas in this text.
Human computer interaction (HCI) plays a vital role in bridging the 'Digital Divide', bringing people closer to consumer electronics control in the 'lounge'. Keyboards and mouse or remotes do alienate old and new generations alike from control interfaces. Hand Gesture Recognition systems bring hope of connecting people with machines in a natural way. This will lead to consumers being able to use their hands naturally to communicate with any electronic equipment in their 'lounge.' This monograph will include the state of the art hand gesture recognition approaches and how they evolved from their inception. The author would also detail his research in this area for the past 8 years and how the future might turn out to be using HCI. This monograph will serve as a valuable guide for researchers (who would endeavour into) in the world of HCI.
This book shows some secure control methods of networked control systems related to linear control system, nonlinear control system, multi-agent system and its applications in power systems. The proposed secure control methods provide some useful results about modeling of network attacks, resilient analysis and synthesis methods, active defense control method.The contents of this book are lists as followings. (1) Modeling of DoS attacks, deception attacks and replay attacks; (2)Secure control methods are proposed by combing delay system method, switched system method and event-based control method. (3) Active control methods are proposed by using model-predictive control and redundant control. (4) The proposed control methods are applied to the security problem of power system.The methods of this book include DoS attacks modeling such as, periodic jamming attack model,model-based average dwell time model, deception attack modeling and relay attack modeling; piece-wise Lyapunov-Krasoviskiifunctional method, stochastic control method; the results including resilient conditions of networked control system and related resilient control design method with linear matrix inequalities(LMIs).From this book, readers can learn about the general network attack modeling methods, resilient analysis and synthesis methods, active control methods from viewpoint of redundancy control, and secure conditions of power systems.Some fundamental knowledge prepared to read this book includes delay system theory, event triggered mechanism, T-S fuzzy system theory and frequency/voltage control of power system.
Discusses wide range of magnetic field assisted finishing processes in a comprehensive manner. Covers different process parameters by considering their effects on the finishing output. Provides process limitations to achieve optimal yield. Covers numerical explanations for better selection of process parameters. Discusses automation of processes with state-of-the-art technologies.
This is a comprehensive book on how to make complex decisions on energy systems problems involving different technologies, environmental effects, costs, benefits, risks, and safety issues. Using Industrial and Systems Engineering techniques for decision-making in Energy Systems, the book provides the background knowledge and methods to incorporate multiple criteria involved in solving energy system problems. It offers methods, examples, and case studies illustrating applications. Decision-Making in Energy Systems discusses subjective as well as objective methods, approaches, and techniques taken from the systems and industrial engineering domain and puts them to use in solving energy systems problems. It uses an integrated approach by including effects of all technical, economic, environmental, and safety considerations as well as costs and risks. The book is specially designed for practicing engineers from industrial/systems engineering who work in energy systems engineering industries. Aimed at graduate students, researchers, and managers involved in various energy generating, distributing, and consuming companies, the book helps the reader to understand, evaluate, and decide on solutions to their energy-related problems.
Provides the details of state-of-the-art machine learning methods used in VLSI Design. Discusses hardware implementation and device modeling pertaining to machine learning algorithms. Explores machine learning for various VLSI architectures and reconfigurable computing. Illustrate latest techniques for device size and feature optimization. Highlight latest case studies and reviews of the methods used for hardware implementation.
This book, along with its companion volume, Nonlinear Dynamics New Directions: Theoretical Aspects, covers topics ranging from fractal analysis to very specific applications of the theory of dynamical systems to biology. This second volume contains mostly new applications of the theory of dynamical systems to both engineering and biology. The first volume is devoted to fundamental aspects and includes a number of important new contributions as well as some review articles that emphasize new development prospects. The topics addressed in the two volumes include a rigorous treatment of fluctuations in dynamical systems, topics in fractal analysis, studies of the transient dynamics in biological networks, synchronization in lasers, and control of chaotic systems, among others. This book also: * Develops applications of nonlinear dynamics on a diversity of topics such as patterns of synchrony in neuronal networks, laser synchronization, control of chaotic systems, and the study of transient dynamics in biological * Includes a study of self-organized regularity in long-range systems * Explains use of Levenstein's distance for measuring lexical evolution rates
A field bus is a two-way link between a programmable controller or operations monitor and an industrial device like a sensor, an electric motor, or a switch. It is a critical part of any automated industrial process - whether for factory automation (discrete processes like an assembly line) or process automation (continuous flow of materials being mixed, treated, or processed). PROFIBUS is a widely established program that allows for communication among and between controllers, fieldbuses, and actuator devices. This very concise introduction for industrial engineers, controls engineers, and manufacturing technicians covers the basics of field bus architecture and communication and the fundamentals of the PROFIBUS language protocol.
This basic book has been used at the middle schools in Shanghai, China for more than 10 years. The book presents carefully-selected contents in order to achieve the roles of enlightenment and popularization. It mainly includes: Chapter 1: Human Brains, Computers and Fuzzy Mathematics; Chapter 2: Matrix, Fuzzy Relations and Fuzzy Matrix; Chapter 3: Fuzzy Control; Chapter 4: Fuzzy Statistics and Fuzzy Probability and Chapter 5: Fuzzy Linear Programming. It includes at the end of each chapter concise, interesting and profound reading and thinking materials, and a certain amount of exercises so as to make it an informative and interesting textbook. This book can be used not only as a textbook in senior middle schools, and in vocational colleges, but also as a primer for individually learning fuzzy mathematics.
1 uniquely integrates essentials from vehicle dynamics and control theory for controller design with NI LabVIEW at the level of practical applications 2 Provides new features in the modelling of drivetrain configuration, regenerative braking, rollover dynamics for model-based control 3 Shares advanced controller designs that have yet to be published 4 Provides mathematical models of vehicle behavior of vehicles that move dynamically in the presence of disturbances to the motion 5 Demonstrates what a control design engineer can do to practically achieve the desired vehicle behavior based on mathematical models
Convergence of Blockchain, AI, and IoT: Concepts and Challenges discusses the convergence of three powerful technologies that play into the digital revolution and blur the lines between biological, digital, and physical objects. This book covers novel algorithms, solutions for addressing issues in applications, security, authentication, and privacy. The book provides an overview of the clinical scientific research enabling smart diagnosis equipment through AI. It presents the role these technologies play in augmented reality and blockchain, covers digital currency managed with bitcoin, and discusses deep learning and how it can enhance human thoughts and behaviors. Targeted audiences range from those interested in the technical revolution of blockchain, big data and the Internet of Things, to research scholars and the professional market.
Examines how digital media and the creation of digital immortals may affect religious understandings of death and the afterlife; Understands the impact of digital media on those living and those working with the bereaved; Explores the impact of digital memorialisation post death; Looks at the ways in which digital media may be changing conceptions and theologies of death
Examines how digital media and the creation of digital immortals may affect religious understandings of death and the afterlife; Understands the impact of digital media on those living and those working with the bereaved; Explores the impact of digital memorialisation post death; Looks at the ways in which digital media may be changing conceptions and theologies of death
Examines the recent research trends and the future of Cyber-Physical systems, IoT, and Autonomous Systems as it relates to Industry 4.0 Investigates various challenges across multiple sectors and different industries Offers a discussion on the recent advancements in Industry 4.0 technological developments for operations and supply chain management Explores the potential for the IoT, Autonomous and Cyber-Physical Systems to replace the current mechanical, people-based systems in various sectors Discusses additional topics such as Machine Learning and Cloud Computing
The book intends to cover various problematic aspects of emerging smart computing and self-adapting technologies comprising of machine learning, artificial intelligence, deep learning, robotics, cloud computing, fog computing, data mining algorithms, including emerging intelligent and smart applications related to these research areas. Further coverage includes implementation of self-adaptation architecture for smart devices, self-adaptive models for smart cities and self-driven cars, decentralized self-adaptive computing at the edge networks, energy-aware AI-based systems, M2M networks, sensors, data analytics, algorithms and tools for engineering self-adaptive systems, and so forth. Acts as guide to Self-healing and Self-adaptation based fully automatic future technologies Discusses about Smart Computational abilities and self-adaptive systems Illustrates tools and techniques for data management and explains the need to apply, and data integration for improving efficiency of big data Exclusive chapter on the future of self-stabilizing and self-adaptive systems of systems Covers fields such as automation, robotics, medical sciences, biomedical and agricultural sciences, healthcare and so forth This book is aimed researchers and graduate students in machine learning, information technology, and artificial intelligence. |
You may like...
Binary Bullets - The Ethics of…
Fritz Allhoff, Adam Henschke, …
Hardcover
R3,569
Discovery Miles 35 690
Advances in Algebraic Quantum Field…
Romeo Brunetti, Claudio Dappiaggi, …
Hardcover
R3,905
Discovery Miles 39 050
Measurements and their Uncertainties - A…
Ifan Hughes, Thomas Hase
Hardcover
R2,694
Discovery Miles 26 940
Fragile Freedoms - The Global Struggle…
Steven Lecce, Neil McArthur, …
Hardcover
R3,264
Discovery Miles 32 640
Manipulation - Theory and Practice
Christian Coons, Michael Weber
Hardcover
R3,837
Discovery Miles 38 370
Jerry Bruckheimer: 8-Movie Collection…
Sean Connery, Nicolas Cage, …
Blu-ray disc
(1)R845 Discovery Miles 8 450
|