![]() |
![]() |
Your cart is empty |
||
Books > Reference & Interdisciplinary > Communication studies > Information theory
The aim of this book is to furnish the reader with a rigorous and detailed exposition of the concept of control parametrization and time scaling transformation. It presents computational solution techniques for a special class of constrained optimal control problems as well as applications to some practical examples. The book may be considered an extension of the 1991 monograph A Unified Computational Approach Optimal Control Problems, by K.L. Teo, C.J. Goh, and K.H. Wong. This publication discusses the development of new theory and computational methods for solving various optimal control problems numerically and in a unified fashion. To keep the book accessible and uniform, it includes those results developed by the authors, their students, and their past and present collaborators. A brief review of methods that are not covered in this exposition, is also included. Knowledge gained from this book may inspire advancement of new techniques to solve complex problems that arise in the future. This book is intended as reference for researchers in mathematics, engineering, and other sciences, graduate students and practitioners who apply optimal control methods in their work. It may be appropriate reading material for a graduate level seminar or as a text for a course in optimal control.
Understanding the latest capabilities in the cyber threat landscape as well as the cyber forensic challenges and approaches is the best way users and organizations can prepare for potential negative events. Adopting an experiential learning approach, this book describes how cyber forensics researchers, educators and practitioners can keep pace with technological advances, and acquire the essential knowledge and skills, ranging from IoT forensics, malware analysis, and CCTV and cloud forensics to network forensics and financial investigations. Given the growing importance of incident response and cyber forensics in our digitalized society, this book will be of interest and relevance to researchers, educators and practitioners in the field, as well as students wanting to learn about cyber forensics.
This book provides a coherent framework for understanding the essence of complex systems and the nature of digital transformations, analyzes challenges of and patterns in innovative development, and shares a wealth of insights and best practices, resulting in the most extensive coverage of the topic available. In particular, the book's cutting-edge contributions, prepared by scientists, engineers, and field experts,focus on the design, implementation, and evaluation of practical interventions that promote the innovative and sustainable development of complex systems. In addition to sharing a rich collection of cases from around the world, they provide a broad interdisciplinary analysis of collaboration mechanisms, theories and approaches to support and accelerate the development of complex systems.
This book discusses important recent advances in automated negotiations. It introduces a number of state-of-the-art autonomous agents for large-scale and complex negotiations, and demonstrates that automated negotiation is one of the most important areas in the field of autonomous agents and multi-agent systems. Further, it presents automated negotiation scenarios involving negotiation encounters that may have, for instance, a large number of agents or a large number of issues with interdependencies and/or real-time constraints. This book includes carefully selected and reviewed outcomes of the 11th International Workshop on Automated Negotiations (ACAN) held in Stockholm, Sweden, 2018, in conjunction with IJCAI-ECAI-2018. Written by leading academic and industrial researchers, it is a valuable resource for professionals and scholars working on complex automated negotiations. Furthermore, the in-depth descriptions of automated negotiating agent programs help readers who are involved in writing codes for automated agents.
This book presents few novel Discrete-time Sliding Mode (DSM) protocols for leader-following consensus of Discrete Multi-Agent Systems (DMASs). The protocols intend to achieve the consensus in finite time steps and also tackle the corresponding uncertainties. Based on the communication graph topology of multi-agent systems, the protocols are divided into two groups, namely (i) Fixed graph topology and (ii) Switching graph topology. The coverage begins with the design of Discrete-time Sliding Mode (DSM) protocols using Gao's reaching law and power rate reaching law for the synchronization of linear DMASs by using the exchange of information between the agents and the leader to achieve a common goal. Then, in a subsequent chapter, analysis for no. of fixed-time steps required for the leader-following consensus is presented. The book also includes chapters on the design of Discrete-time Higher-order Sliding Mode (DHSM) protocols, Event-triggered DSM protocols for the leader-following consensus of DMASs. A chapter is also included on the design of DHSM protocols for leader-following consensus of heterogeneous DMASs. Special emphasis is given to the practical implementation of each proposed DSM protocol for achieving leader-following consensus of helicopter systems, flexible joint robotic arms, and rigid joint robotic arms. This book offers a ready reference guide for graduate students and researchers working in the areas of control, automation, and communication engineering, and in particular the cooperative control of multi-agent systems. It will also benefit professional engineers working to design and implement robust controllers for power systems, autonomous vehicles, military surveillance, smartgrids/microgrids, vehicle traffic management, robotic teams, and aerial robots.
RDF-based knowledge graphs require additional formalisms to be fully context-aware, which is presented in this book. This book also provides a collection of provenance techniques and state-of-the-art metadata-enhanced, provenance-aware, knowledge graph-based representations across multiple application domains, in order to demonstrate how to combine graph-based data models and provenance representations. This is important to make statements authoritative, verifiable, and reproducible, such as in biomedical, pharmaceutical, and cybersecurity applications, where the data source and generator can be just as important as the data itself. Capturing provenance is critical to ensure sound experimental results and rigorously designed research studies for patient and drug safety, pathology reports, and medical evidence generation. Similarly, provenance is needed for cyberthreat intelligence dashboards and attack maps that aggregate and/or fuse heterogeneous data from disparate data sources to differentiate between unimportant online events and dangerous cyberattacks, which is demonstrated in this book. Without provenance, data reliability and trustworthiness might be limited, causing data reuse, trust, reproducibility and accountability issues. This book primarily targets researchers who utilize knowledge graphs in their methods and approaches (this includes researchers from a variety of domains, such as cybersecurity, eHealth, data science, Semantic Web, etc.). This book collects core facts for the state of the art in provenance approaches and techniques, complemented by a critical review of existing approaches. New research directions are also provided that combine data science and knowledge graphs, for an increasingly important research topic.
This book contains a derivation of the subset of stabilizing controllers for analog and digital linear time-invariant multivariable feedback control systems that insure stable system errors and stable controller outputs for persistent deterministic reference inputs that are trackable and for persistent deterministic disturbance inputs that are rejectable. For this subset of stabilizing controllers, the Wiener-Hopf methodology is then employed to obtain the optimal controller for which a quadratic performance measure is minimized. This is done for the completely general standard configuration and methods that enable the trading off of optimality for an improved stability margin and/or reduced sensitivity to plant model uncertainty are described. New and novel results on the optimal design of decoupled (non-interacting) systems are also presented. The results are applied in two examples: the one- and three-degree-of-freedom configurations. These demonstrate that the standard configuration is one encompassing all possible feedback configurations. Each chapter is completed by a group of worked examples, which reveal additional insights and extensions of the theory presented in the chapter. Three of the examples illustrate the application of the theory to two physical cases: the depth and pitch control of a submarine and the control of a Rosenbrock process. In the latter case, designs with and without decoupling are compared. This book provides researchers and graduate students working in feedback control with a valuable reference for Wiener-Hopf theory of multivariable design. Basic knowledge of linear systems and matrix theory is required.
This book presents a selection of cutting-edge methods that allow readers to obtain novel models for nonlinear solid mechanics. Today, engineers need more accurate techniques for modeling solid body mechanics, chiefly due to innovative methods like additive manufacturing-for example, 3D printing-but also due to miniaturization. This book focuses on the formulation of continuum and discrete models for complex materials and systems, and especially the design of metamaterials. It gathers outstanding papers from the international conference IcONSOM 2019
This book highlights research and survey articles dedicated to big data techniques for cyber-physical system (CPS), which addresses the close interactions and feedback controls between cyber components and physical components. The book first discusses some fundamental big data problems and solutions in large scale distributed CPSs. The book then addresses the design and control challenges in multiple CPS domains such as vehicular system, smart city, smart building, and digital microfluidic biochips. This book also presents the recent advances and trends in the maritime simulation system and the flood defence system.
The proliferation of Internet of Things (IoT) has enabled rapid enhancements for applications, not only in home and environment scenarios, but also in factory automation. Now, Industrial Internet of Things (IIoT) offers all the advantages of IoT to industry, with applications ranging from remote sensing and actuating, to de-centralization and autonomy. In this book, the editor presents the IIoT and its place during the new industrial revolution (Industry 4.0) as it takes us to a better, sustainable, automated, and safer world. The book covers the cross relations and implications of IIoT with existing wired/wireless communication/networking and safety technologies of the Industrial Networks. Moreover, the book includes practical use-case scenarios from the industry for the application of IIoT on smart factories, smart cities, and smart grids. IoT-driven advances in commercial and industrial building lighting and in street lighting are presented as an example to shed light on the application domain of IIoT. The state of the art in Industrial Automation is also presented to give a better understanding of the enabling technologies, potential advantages, and challenges of the Industry 4.0 and IIoT. Finally, yet importantly, the security section of the book covers the cyber-security related needs of the IIoT users and the services that might address these needs. User privacy, data ownership, and proprietary information handling related to IIoT networks are all investigated. Intrusion prevention, detection, and mitigation are all covered at the conclusion of the book.
This book explores the latest research trends in intelligent systems and smart applications. It presents high-quality empirical and review studies focusing on various topics, including information systems and software engineering, knowledge management, technology in education, emerging technologies, and social networks. It provides insights into the theoretical and practical aspects of intelligent systems and smart applications.
This book includes the proceedings of the 15th International Conference on Complex, Intelligent, and Software Intensive Systems, which took place in Asan, Korea, on July 1-3, 2021. Software intensive systems are systems, which heavily interact with other systems, sensors, actuators, devices, and other software systems and users. More and more domains are involved with software intensive systems, e.g., automotive, telecommunication systems, embedded systems in general, industrial automation systems, and business applications. Moreover, the outcome of web services delivers a new platform for enabling software intensive systems. Complex systems research is focused on the overall understanding of systems rather than its components. Complex systems are very much characterized by the changing environments in which they act by their multiple internal and external interactions. They evolve and adapt through internal and external dynamic interactions. The development of intelligent systems and agents, which is each time more characterized by the use of ontologies and their logical foundations build a fruitful impulse for both software intensive systems and complex systems. Recent research in the field of intelligent systems, robotics, neuroscience, artificial intelligence, and cognitive sciences is very important factor for the future development and innovation of software intensive and complex systems. The aim of the book is to deliver a platform of scientific interaction between the three interwoven challenging areas of research and development of future ICT-enabled applications: Software intensive systems, complex systems, and intelligent systems.
This book features extended versions of selected papers from the International Conference on Computer Communication and Internet of Things (ICCCIoT 2020). Presenting recent research addressing new trends and challenges, and promising technologies and developments, it covers various topics related to IoT (Internet of Things) and communications, and machine learning for applications such as energy management systems, smart asthma alerts, smart irrigation systems, cloud healthcare systems, preventing side channel attacks, and cooperative spectrum sensing in cognitive radio networks.
This book includes selected papers from the International Conference on Next Generation of Internet of Things (ICNGIoT 2021), organized by the Department of Computer Science and Engineering, School of Engineering, GIET University, Gunupur, Odisha, India, during 5-6 February 2021. The book covers topics such as IoT network design and architecture, IoT network virtualization, IoT sensors, privacy and security for IoT, SMART environment, social networks, data science and data analytics, cognitive intelligence and augmented intelligence, and case studies and applications.
The research presented in this book shows how combining deep neural networks with a special class of fuzzy logical rules and multi-criteria decision tools can make deep neural networks more interpretable - and even, in many cases, more efficient. Fuzzy logic together with multi-criteria decision-making tools provides very powerful tools for modeling human thinking. Based on their common theoretical basis, we propose a consistent framework for modeling human thinking by using the tools of all three fields: fuzzy logic, multi-criteria decision-making, and deep learning to help reduce the black-box nature of neural models; a challenge that is of vital importance to the whole research community.
This unique introduction to the foundational concepts of cyber-physical systems (CPS) describes key design principles and emerging research trends in detail. Several interdisciplinary applications are covered, with a focus on the wide-area management of infrastructures including electric power systems, air transportation networks, and health care systems. Design, control and optimization of cyber-physical infrastructures are discussed, addressing security and privacy issues of networked CPS, presenting graph-theoretic and numerical approaches to CPS evaluation and monitoring, and providing readers with the knowledge needed to operate CPS in a reliable, efficient, and secure manner. Exercises are included. This is an ideal resource for researchers and graduate students in electrical engineering and computer science, as well as for practitioners using cyber-physical systems in aerospace and automotive engineering, medical technology, and large-scale infrastructure operations.
Available for the first time in English, this two-volume course on theoretical and applied mechanics has been honed over decades by leading scientists and teachers, and is a primary teaching resource for engineering and maths students at St. Petersburg University. The course addresses classical branches of theoretical mechanics (Vol. 1), along with a wide range of advanced topics, special problems and applications (Vol. 2). This first volume of the textbook contains the parts "Kinematics" and "Dynamics". The part "Kinematics" presents in detail the theory of curvilinear coordinates which is actively used in the part "Dynamics", in particular, in the theory of constrained motion and variational principles in mechanics. For describing the motion of a system of particles, the notion of a Hertz representative point is used, and the notion of a tangent space is applied to investigate the motion of arbitrary mechanical systems. In the final chapters Hamilton-Jacobi theory is applied for the integration of equations of motion, and the elements of special relativity theory are presented.This textbook is aimed at students in mathematics and mechanics and at post-graduates and researchers in analytical mechanics.
The book presents the methodology applicable to the modeling and analysis of a variety of dynamic systems, regardless of their physical origin. It includes detailed modeling of mechanical, electrical, electro-mechanical, thermal, and fluid systems. Models are developed in the form of state-variable equations, input-output differential equations, transfer functions, and block diagrams. The Laplace-transform is used for analytical solutions. Computer solutions are based on MATLAB and Simulink.
This book highlights new trends and challenges in intelligent systems, which play an important part in the digital transformation of many areas of science and practice. It includes papers offering a deeper understanding of the human-centred perspective on artificial intelligence, of intelligent value co-creation, ethics, value-oriented digital models, transparency, and intelligent digital architectures and engineering to support digital services and intelligent systems, the transformation of structures in digital businesses and intelligent systems based on human practices, as well as the study of interaction and the co-adaptation of humans and systems. All papers were originally presented at the International KES Conference on Human Centred Intelligent Systems 2020 (KES HCIS 2020), held on June 17-19, 2020, in Split, Croatia.
This book contains papers on selected aspects of dependability analysis in computer systems and networks, which were chosen for discussion during the 16th DepCoS-RELCOMEX conference held in Wroclaw, Poland, from June 28 to July 2, 2021. Their collection will be a valuable source material for scientists, researchers, practitioners and students who are dealing with design, analysis and engineering of computer systems and networks and must ensure their dependable operation. Being probably the most complex technical systems ever engineered by man (and also-the most dynamically evolving ones), organization of contemporary computer systems cannot be interpreted only as structures built on the basis of (unreliable) technical resources. Their evaluation must take into account a specific blend of interacting people (their needs and behaviours), networks (together with mobile properties, cloud organization, Internet of Everything, etc.) and a large number of users dispersed geographically and constantly producing an unconceivable number of applications. Ever-growing number of research methods being continuously developed for dependability analyses apply the newest techniques of artificial and computational intelligence. Selection of papers in these proceedings illustrates diversity of multi-disciplinary topics which are considered in present-day dependability explorations.
The definitive guide to control system design Modern Control System Theory and Design, Second Edition offers the most comprehensive treatment of control systems available today. Its unique text/software combination integrates classical and modern control system theories, while promoting an interactive, computer-based approach to design solutions. The sheer volume of practical examples, as well as the hundreds of illustrations of control systems from all engineering fields, make this volume accessible to students and indispensable for professional engineers. This fully updated Second Edition features a new chapter on modern control system design, including state-space design techniques, Ackermann's formula for pole placement, estimation, robust control, and the H method for control system design. Other notable additions to this edition are:
Superbly organized and easy-to-use, Modern Control System Theory and Design, Second Edition is an ideal textbook for introductory courses in control systems and an excellent professional reference. Its interdisciplinary approach makes it invaluable for practicing engineers in electrical, mechanical, aeronautical, chemical, and nuclear engineering and related areas.
This text provides one of the first book-length studies on the innovative and sustainable development of complex systems in the era of digital transformations, combining quantitative data from several countries with detailed qualitative accounts at the national level. In particular, the book covers the basic concepts, methods, and cutting-edge research on innovation and sustainability in complex systems. Given its scope, the book will be of great interest and value to researchers and practitioners working across the social sciences and in a diverse range of areas in complexity science. Pursuing a multidisciplinary approach, the book is also an ideal resource for advanced undergraduate and graduate level courses in complexity science, sustainability research, economics, and development studies.
This book reports on the development and assessment of a novel framework for studying neural interactions (the connectome) and their dynamics (the chronnectome). Using EEG recordings taken during an auditory oddball task performed by 48 patients with schizophrenia and 87 healthy controls, and applying local and network measures, changes in brain activation from pre-stimulus to cognitive response were assessed, and significant differences were observed between the patients and controls. This book investigates the source of the network abnormalities and presents new evidence for the disconnection hypothesis and the aberrant salience hypothesis with regard to schizophrenia. Moreover, it puts forward a novel approach to combining local regularity measures and graph measures in order to characterize schizophrenia brain dynamics, and presents interesting findings on the regularity of brain patterns in healthy control subjects versus patients with schizophrenia. Besides providing new evidence for the disconnection hypothesis, it offers a source of inspiration for future research directions in the field.
The extraordinary growth of the Internet and other information age developments in communications, particularly marketing communications, are transforming the international and national business environments. This work is designed to help people, whether with large corporations or the smallest of enterprises, to venture with confidence into cyberspace. Written in non-technical language by a businessman for other business people, the information seizes on the many opportunities emerging for enterprises and personal career development. The socio-economic impact is covered from important perspectives, such as the impact on the Third World. The book heralds an age in which information becomes an internationally marketable commodity, and gives individual entrepreneurs on miniscule budgets the tools to compete against the big corporate guns on a level playing field. The appendices include useful electronic mailing lists, a product protection and order delivery system on the Web, and details on getting connected in the UK.
This book is intended for specialists in systems engineering interested in new, general techniques and for students and practitioners interested in using these techniques for solving specific practical problems. For many real-world, complex systems, it is possible to create easy-to-compute explicit analytical models instead of time-consuming computer simulations. Usually, however, analytical models are designed on a case-by-case basis, and there is a scarcity of general techniques for designing such easy-to-compute models. This book fills this gap by providing general recommendations for using analytical techniques in all stages of system design, implementation, testing, and monitoring. It also illustrates these recommendations using applications in various domains, such as more traditional engineering systems, biological systems (e.g., systems for cattle management), and medical and social-related systems (e.g., recommender systems). |
![]() ![]() You may like...
Progress in Communication Sciences…
Franklin J. Bostner, George Barnett
Hardcover
R2,981
Discovery Miles 29 810
|