![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Information theory
Compound renewal processes (CRPs) are among the most ubiquitous models arising in applications of probability. At the same time, they are a natural generalization of random walks, the most well-studied classical objects in probability theory. This monograph, written for researchers and graduate students, presents the general asymptotic theory and generalizes many well-known results concerning random walks. The book contains the key limit theorems for CRPs, functional limit theorems, integro-local limit theorems, large and moderately large deviation principles for CRPs in the state space and in the space of trajectories, including large deviation principles in boundary crossing problems for CRPs, with an explicit form of the rate functionals, and an extension of the invariance principle for CRPs to the domain of moderately large and small deviations. Applications establish the key limit laws for Markov additive processes, including limit theorems in the domains of normal and large deviations.
Proofs play a central role in advanced mathematics and theoretical computer science, yet many students struggle the first time they take a course in which proofs play a significant role. This bestselling text's third edition helps students transition from solving problems to proving theorems by teaching them the techniques needed to read and write proofs. Featuring over 150 new exercises and a new chapter on number theory, this new edition introduces students to the world of advanced mathematics through the mastery of proofs. The book begins with the basic concepts of logic and set theory to familiarize students with the language of mathematics and how it is interpreted. These concepts are used as the basis for an analysis of techniques that can be used to build up complex proofs step by step, using detailed 'scratch work' sections to expose the machinery of proofs about numbers, sets, relations, and functions. Assuming no background beyond standard high school mathematics, this book will be useful to anyone interested in logic and proofs: computer scientists, philosophers, linguists, and, of course, mathematicians.
The definitive guide to control system design Modern Control System Theory and Design, Second Edition offers the most comprehensive treatment of control systems available today. Its unique text/software combination integrates classical and modern control system theories, while promoting an interactive, computer-based approach to design solutions. The sheer volume of practical examples, as well as the hundreds of illustrations of control systems from all engineering fields, make this volume accessible to students and indispensable for professional engineers. This fully updated Second Edition features a new chapter on modern control system design, including state-space design techniques, Ackermann's formula for pole placement, estimation, robust control, and the H method for control system design. Other notable additions to this edition are:
Superbly organized and easy-to-use, Modern Control System Theory and Design, Second Edition is an ideal textbook for introductory courses in control systems and an excellent professional reference. Its interdisciplinary approach makes it invaluable for practicing engineers in electrical, mechanical, aeronautical, chemical, and nuclear engineering and related areas.
This is the first full-length book on the major theme of symmetry in graphs. Forming part of algebraic graph theory, this fast-growing field is concerned with the study of highly symmetric graphs, particularly vertex-transitive graphs, and other combinatorial structures, primarily by group-theoretic techniques. In practice the street goes both ways and these investigations shed new light on permutation groups and related algebraic structures. The book assumes a first course in graph theory and group theory but no specialized knowledge of the theory of permutation groups or vertex-transitive graphs. It begins with the basic material before introducing the field's major problems and most active research themes in order to motivate the detailed discussion of individual topics that follows. Featuring many examples and over 450 exercises, it is an essential introduction to the field for graduate students and a valuable addition to any algebraic graph theorist's bookshelf.
The extraordinary growth of the Internet and other information age developments in communications, particularly marketing communications, are transforming the international and national business environments. This work is designed to help people, whether with large corporations or the smallest of enterprises, to venture with confidence into cyberspace. Written in non-technical language by a businessman for other business people, the information seizes on the many opportunities emerging for enterprises and personal career development. The socio-economic impact is covered from important perspectives, such as the impact on the Third World. The book heralds an age in which information becomes an internationally marketable commodity, and gives individual entrepreneurs on miniscule budgets the tools to compete against the big corporate guns on a level playing field. The appendices include useful electronic mailing lists, a product protection and order delivery system on the Web, and details on getting connected in the UK.
Searching for Trust explores the intersection of trust, disinformation, and blockchain technology in an age of heightened institutional and epistemic mistrust. It adopts a unique archival theoretic lens to delve into how computational information processing has gradually supplanted traditional record keeping, putting at risk a centuries-old tradition of the 'moral defense of the record' and replacing it with a dominant ethos of information-processing efficiency. The author argues that focusing on information-processing efficiency over the defense of records against manipulation and corruption (the ancient task of the recordkeeper) has contributed to a diminution of the trustworthiness of information and a rise of disinformation, with attendant destabilization of the epistemic trust fabric of societies. Readers are asked to consider the potential and limitations of blockchains as the technological embodiment of the moral defense of the record and as means to restoring societal trust in an age of disinformation.
Searching for Trust explores the intersection of trust, disinformation, and blockchain technology in an age of heightened institutional and epistemic mistrust. It adopts a unique archival theoretic lens to delve into how computational information processing has gradually supplanted traditional record keeping, putting at risk a centuries-old tradition of the 'moral defense of the record' and replacing it with a dominant ethos of information-processing efficiency. The author argues that focusing on information-processing efficiency over the defense of records against manipulation and corruption (the ancient task of the recordkeeper) has contributed to a diminution of the trustworthiness of information and a rise of disinformation, with attendant destabilization of the epistemic trust fabric of societies. Readers are asked to consider the potential and limitations of blockchains as the technological embodiment of the moral defense of the record and as means to restoring societal trust in an age of disinformation.
There is a need for general theoretical principles
describing/explaining effective design -- those which demonstrate
"unity" and enhance comprehension and usability. Theories of
cohesion from linguistics and of comprehension in psychology are
likely sources of such general principles. Unfortunately,
linguistic approaches to discourse unity have focused exclusively
on semantic elements such as synonymy or anaphora, and have ignored
other linguistic elements such as syntactic parallelism and
phonological alliteration. They have also overlooked the
non-linguistic elements -- visual factors such as typography or
color, and auditory components such as pitch or duration. In
addition, linguistic approaches have met with criticism because
they have failed to explain the relationship between semantic
cohesive elements and coherence. On the other hand, psychological
approaches to discourse comprehension have considered the impact of
a wider range of discourse elements -- typographical cuing of key
terms to enhance comprehension -- but have failed to provide
general theoretical explanations for such observations.
This book provides a comprehensive explanation of forward error correction, which is a vital part of communication systems. The book is written in such a way to make the subject easy and understandable for the reader. The book starts with a review of linear algebra to provide a basis for the text. The author then goes on to cover linear block codes, syndrome error correction, cyclic codes, Galois fields, BCH codes, Reed Solomon codes, and convolutional codes. Examples are provided throughout the text.
Strongly regular graphs lie at the intersection of statistical design, group theory, finite geometry, information and coding theory, and extremal combinatorics. This monograph collects all the major known results together for the first time in book form, creating an invaluable text that researchers in algebraic combinatorics and related areas will refer to for years to come. The book covers the theory of strongly regular graphs, polar graphs, rank 3 graphs associated to buildings and Fischer groups, cyclotomic graphs, two-weight codes and graphs related to combinatorial configurations such as Latin squares, quasi-symmetric designs and spherical designs. It gives the complete classification of rank 3 graphs, including some new constructions. More than 100 graphs are treated individually. Some unified and streamlined proofs are featured, along with original material including a new approach to the (affine) half spin graphs of rank 5 hyperbolic polar spaces.
This book develops a mathematical framework for modeling and
optimizing interference-coupled multiuser systems. At the core of
this framework is the concept of general interference functions,
which provides a simple means of characterizing interdependencies
between users. The entire analysis builds on the two core axioms
scale-invariance and monotonicity.
For 80 years, mathematics has driven fundamental innovation in computing and communications. This timely book provides a panorama of some recent ideas in mathematics and how they will drive continued innovation in computing, communications and AI in the coming years. It provides a unique insight into how the new techniques that are being developed can be used to provide theoretical foundations for technological progress, just as mathematics was used in earlier times by Turing, von Neumann, Shannon and others. Edited by leading researchers in the field, chapters cover the application of new mathematics in computer architecture, software verification, quantum computing, compressed sensing, networking, Bayesian inference, machine learning, reinforcement learning and many other areas.
This lucid, accessible introduction to supervised machine learning presents core concepts in a focused and logical way that is easy for beginners to follow. The author assumes basic calculus, linear algebra, probability and statistics but no prior exposure to machine learning. Coverage includes widely used traditional methods such as SVMs, boosted trees, HMMs, and LDAs, plus popular deep learning methods such as convolution neural nets, attention, transformers, and GANs. Organized in a coherent presentation framework that emphasizes the big picture, the text introduces each method clearly and concisely "from scratch" based on the fundamentals. All methods and algorithms are described by a clean and consistent style, with a minimum of unnecessary detail. Numerous case studies and concrete examples demonstrate how the methods can be applied in a variety of contexts.
Aspect '94 is the most up-to-date and comprehensive assessment of the present and future of the pipeline systems industry. It comprises papers from leading experts in all areas of pipeline engineering and technology. As this book shows, the last few years have seen great strides forward in the field of subsea pipelines. Deepwater pipelines, long distance pipelines and complex systems transporting hydrocarbons and fluids to and from marginal field subsea wellheads and templates are all being implemented without significant problems. The pace of progress continues to accelerate in the subsea industry, and the scope to make further improvements is constantly being explored. Operators, consultants, suppliers and contractors are all researching, developing and testing new techniques and ideas.
A. K. TURNER Department of Geology and Geological Engineering Colorado School of Mines Golden, Colorado 80401 USA Geology deals with three-dimensional data. Geoscientists are concerned with three dimensional spatial observations, measurements, and explanations of a great variety of phenomena. The representation of three-dimensional data has always been a problem. Prior to computers, graphical displays involved specialized maps, cross-sections, fence diagrams, and geometrical constructions such as stereonets. All were designed to portray three-dimensional relationships on two-dimensional paper products, and all were time consuming to develop. Until recently, computers were of little assistance to three-dimensional data handling and representation problems. Memory was too expensive to handle the huge amounts of data required by three-dimensional assessments; computational speeds were too slow to perform the necessary calculations within a reasonable time; and graphical displays had too Iowa resolution or were much too expensive to produce useful visualizations. Much experience was gained with two-dimensional geographic information systems (GIS), which were applied to many land-use management and resource assessment problems. The two-dimensional GIS field matured rapidly in the late 1980's and became widely accepted. The advent of the modern computer workstation, with its enhanced memory and graphical capabilities at ever more affordable prices, has largely overcome these earlier constraints.
The Eurotherm Committee has chosen Thermal Management of Electronic Systems as the subject of its 29th Seminar, at Delft University of Technology, the Netherlands, 14-16 June 1993. This volume constitutes the proceedings of the Seminar. Thermal Management is but one of the several critical topics in the design of electronic systems. However, as a result of the combined effects of increasing heat fluxes, miniaturisation and the striving for zero defects, preferably in less time and at a lower cost than before, thermal management has become an increasingly tough challenge. Therefore, it is being increasingly recognised that cooling requirements could eventually hamper the technical progress in miniaturisation. It might be argued that we are on the verge of a revolution in thermal management techniques. Previously, a packaging engineer had no way of predicting the tempera tures of critical electronic parts with the required accuracy. He or she* had to rely on full-scale experiments, doubtful design rules, or worst-case estimates. This situation is going to be changed in the foreseeable future. User-friendly software tools, the acquisition and integrity of input and output data, the badly needed training mea sures, the introduction into a concurrent engineering environment: all these items will exert a heavy toll on the flexibility of the electronics industries. Fortunately, this situation is being realised at the appropriate management levels, and the interest in this seminar and the pre-conference tutorials testifies to this assertion.
The Background to the Institute The NATO Advanced Study Institute (ASI) 'People and Computers - Applying an Anthropocentric Approach to Integrated Production Systems and Organisations' came about after the distribution of a NATO fact sheet to BruneI University, which described the funding of ASls. The 'embryonic' director of the ASI brought this opportunity to the attention of the group of people, (some at BruneI and some from outside), who were together responsible for the teaching and management of the course in Computer Integrated Manufacturing (CIM) in BruneI's Department of Manufacturing and Engineering Systems. This course had been conceived in 1986 and was envisaged as a vehicle for teaching manufacturing engineering students the technology of information integration through project work. While the original idea of the course had also included the organisational aspects of CIM, the human factors questions were not considered. This shortcoming was recognised and the trial run of the course in 1988 contained some lectures on 'people' issues. The course team were therefore well prepared and keen to explore the People, Organisation and Technology (POT) aspects of computer integration, as applied to industrial production. A context was proposed which would allow the inclusion of people from many different backgrounds and which would open up time and space for reflection. The proposal to organise a NATO ASI was therefore welcomed by all concerned.
Handbook of MARINE CRAFT HYDRODYNAMICS AND MOTION CONTROL The latest tools for analysis and design of advanced GNC systems Handbook of Marine Craft Hydrodynamics and Motion Control is an extensive study of the latest research in hydrodynamics, guidance, navigation, and control systems for marine craft. The text establishes how the implementation of mathematical models and modern control theory can be used for simulation and verification of control systems, decision-support systems, and situational awareness systems. Coverage includes hydrodynamic models for marine craft, models for wind, waves and ocean currents, dynamics and stability of marine craft, advanced guidance principles, sensor fusion, and inertial navigation. This important book includes the latest tools for analysis and design of advanced GNC systems and presents new material on unmanned underwater vehicles, surface craft, and autonomous vehicles. References and examples are included to enable engineers to analyze existing projects before making their own designs, as well as MATLAB scripts for hands-on software development and testing. Highlights of this Second Edition include: Topical case studies and worked examples demonstrating how you can apply modeling and control design techniques to your own designs A Github repository with MATLAB scripts (MSS toolbox) compatible with the latest software releases from Mathworks New content on mathematical modeling, including models for ships and underwater vehicles, hydrostatics, and control forces and moments New methods for guidance and navigation, including line-of-sight (LOS) guidance laws for path following, sensory systems, model-based navigation systems, and inertial navigation systems This fully revised Second Edition includes innovative research in hydrodynamics and GNC systems for marine craft, from ships to autonomous vehicles operating on the surface and under water. Handbook of Marine Craft Hydrodynamics and Motion Control is a must-have for students and engineers working with unmanned systems, field robots, autonomous vehicles, and ships. MSS toolbox: https: //github.com/cybergalactic/mss Lecture notes: https: //www.fossen.biz/wiley Author's home page: https: //www.fossen.biz
Over the past 25 years, there has been an explosion of interest in the area of random tilings. The first book devoted to the topic, this timely text describes the mathematical theory of tilings. It starts from the most basic questions (which planar domains are tileable?), before discussing advanced topics about the local structure of very large random tessellations. The author explains each feature of random tilings of large domains, discussing several different points of view and leading on to open problems in the field. The book is based on upper-division courses taught to a variety of students but it also serves as a self-contained introduction to the subject. Test your understanding with the exercises provided and discover connections to a wide variety of research areas in mathematics, theoretical physics, and computer science, such as conformal invariance, determinantal point processes, Gibbs measures, high-dimensional random sampling, symmetric functions, and variational problems.
This book considers two popular topics: fault detection and isolation (FDI) and flight data estimation using flush air data sensing (FADS) systems. Literature surveys, comparison tests, simulations and wind tunnel tests are performed. In both cases, a UAV platform is considered for demonstration purposes. In the first part of the book, FDI is considered for sensor faults where a neural network approach is implemented. FDI is applied both in academia and industry resulting in many publications over the past 50 years or so. However few publications consider neural networks in comparison to traditional techniques such as observer based, parameter estimations and parity space approaches. The second part of this book focuses on how to estimate flight data (angle of attack, airspeed) using a matrix of pressure sensors and a neural network model. In conclusion this book can serve as an introduction to FDI and FADS systems, a literature survey, and a case study for UAV applications.
Malicious hackers utilize the World Wide Web to share knowledge. Analyzing the online communication of these threat actors can help reduce the risk of attacks. This book shifts attention from the defender environment to the attacker environment, offering a new security paradigm of 'proactive cyber threat intelligence' that allows defenders of computer networks to gain a better understanding of their adversaries by analyzing assets, capabilities, and interest of malicious hackers. The authors propose models, techniques, and frameworks based on threat intelligence mined from the heart of the underground cyber world: the malicious hacker communities. They provide insights into the hackers themselves and the groups they form dynamically in the act of exchanging ideas and techniques, buying or selling malware, and exploits. The book covers both methodology - a hybridization of machine learning, artificial intelligence, and social network analysis methods - and the resulting conclusions, detailing how a deep understanding of malicious hacker communities can be the key to designing better attack prediction systems.
The global biodiversity crisis is one of humanity's most urgent problems, but even quantifying biological diversity is a difficult mathematical and conceptual challenge. This book brings new mathematical rigour to the ongoing debate. It was born of research in category theory, is given strength by information theory, and is fed by the ancient field of functional equations. It applies the power of the axiomatic method to a biological problem of pressing concern, but it also presents new theorems that stand up as mathematics in their own right, independently of any application. The question 'what is diversity?' has surprising mathematical depth, and this book covers a wide breadth of mathematics, from functional equations to geometric measure theory, from probability theory to number theory. Despite this range, the mathematical prerequisites are few: the main narrative thread of this book requires no more than an undergraduate course in analysis.
The chapters of this book summarize the lectures delivered du ring the NATO Advanced Study Institute (ASI) on Computational Methods in Mechanisms, that took place in the Sts. Constantin and Elena Resort, near Varna, on the Bulgarian Coast of the Black Sea, June 16-28, 1997. The purpose of the ASI was to bring together leading researchers in the area of mechanical systems at large, with special emphasis in the computational issues around their analysis, synthesis, and optimization, during two weeks of lectures and discussion. A total of 89 participants from 23 count ries played an active role during the lectures and sessions of contributed papers. Many of the latter are being currently reviewed for publication in specialized journals. The subject of the book is mechanical systems, Le., systems composed of rigid and flexible bodies, coupled by mechanical means so as to constrain their various bodies in a goal-oriented manner, usually driven under computer con trol. Applications of the discipline are thus of the most varied nature, ranging from transportation systems to biomedical devices. U nder normal operation conditions, the constitutive bodies of a mechanical system can be consid ered to be rigid, the rigidity property then easing dramatically the analysis of the kinematics and dynamics of the system at hand. Examples of these systems are the suspension of a terrestrial vehicle negotiating a curve at speeds within the allowed or recommended limits and the links of multiaxis industrial robots performing conventional pick-and-place operations."
The book is a concise, self-contained and fully updated introduction to automata theory - a fundamental topic of computer sciences and engineering. The material is presented in a rigorous yet convincing way and is supplied with a wealth of examples, exercises and down-to-the earth convincing explanatory notes. An ideal text to a spectrum of one-term courses in computer sciences, both at the senior undergraduate and graduate students.
Model checking is one of the most successful verification techniques and has been widely adopted in traditional computing and communication hardware and software industries. This book provides the first systematic introduction to model checking techniques applicable to quantum systems, with broad potential applications in the emerging industry of quantum computing and quantum communication as well as quantum physics. Suitable for use as a course textbook and for self-study, graduate and senior undergraduate students will appreciate the step-by-step explanations and the exercises included. Researchers and engineers in the related fields can further develop these techniques in their own work, with the final chapter outlining potential future applications. |
You may like...
Machine Learning for Cyber Physical…
Oliver Niggemann, Christian Kuhnert, …
Hardcover
R1,244
Discovery Miles 12 440
Binary Bullets - The Ethics of…
Fritz Allhoff, Adam Henschke, …
Hardcover
R3,569
Discovery Miles 35 690
Encyclopedia of Information Science and…
Mehdi Khosrow-Pour, D.B.A.
Hardcover
R20,954
Discovery Miles 209 540
Computer Aided Verification
Hana Chockler, Georg Weissenbacher
Hardcover
R2,035
Discovery Miles 20 350
Biologically Inspired Networking and…
Pietro Lio, Dinesh Verma
Hardcover
R6,119
Discovery Miles 61 190
|