Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Reference & Interdisciplinary > Communication studies > Information theory
Explains multi-level models of enterprise systems and covers modeling methodology This book addresses the essential phenomena underlying the overall behaviors of complex systems and enterprises. Understanding these phenomena can enable improving these systems. These phenomena range from physical, behavioral, and organizational, to economic and social, all of which involve significant human components. Specific phenomena of interest and how they are represented depend on the questions of interest and the relevant domains or contexts. Modeling and Visualization of Complex Systems and Enterprises examines visualization of phenomena and how understanding the relationships among phenomena can provide the basis for understanding where deeper exploration is warranted. The author also reviews mathematical and computational models, defined very broadly across disciplines, which can enable deeper understanding. Presents a 10 step methodology for addressing questions associated with the design or operation of complex systems and enterprises Examines six archetypal enterprise problems including two from healthcare, two from urban systems, and one each from financial systems and defense systems Provides an introduction to the nature of complex systems, historical perspectives on complexity and complex adaptive systems, and the evolution of systems practice Modeling and Visualization of Complex Systems and Enterprises is written for graduate students studying systems science and engineering and professionals involved in systems science and engineering, those involved in complex systems such as healthcare delivery, urban systems, sustainable energy, financial systems, and national security.
This book discusses the latest progresses and developments on complex systems research and intends to give an exposure to prospective readers about the theoretical and practical aspects of mathematical modelling, numerical simulation and agent-based modelling frameworks. The main purpose of this book is to emphasize a unified approach to complex systems analysis, which goes beyond to examine complicated phenomena of numerous real-life systems; this is done by investigating a huge number of components that interact with each other at different (microscopic and macroscopic) scales; new insights and emergent collective behaviours can evolve from the interactions between individual components and also with their environments. These tools and concepts permit us to better understand the patterns of various real-life systems and help us to comprehend the mechanisms behind which distinct factors shaping some complex systems phenomena being influenced. This book is published in conjunction with the International Workshop on Complex Systems Modelling & Simulation 2019 (CoSMoS 2019): IoT & Big Data Integration. This international event was held at the Universiti Sains Malaysia Main Campus, Penang, Malaysia, from 8 to 11 April 2019. This book appeals to readers interested in complex systems research and other related areas such as mathematical modelling, numerical simulation and agent-based modelling frameworks.
This book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature, and digital watermarking. This book is organized into fifteen chapters; topics include foundations of functional encryption, impact of group theory in cryptosystems, elliptic curve cryptography, XTR algorithm, pairing based cryptography, NTRU algorithms, ring units, cocks IBE schemes, Boneh-Franklin IBE, Sakai-Kasahara IBE, hierarchical identity based encryption, attribute based Encryption, extensions of IBE and related primitives, and digital signatures. Explains the latest functional encryption algorithms in a simple way with examples; Includes applications of functional encryption in information security, application security, and network security; Relevant to academics, research scholars, software developers, etc.
Understand the fundamentals of wireless and MIMO communication with this accessible and comprehensive text. Viewing the subject through an information theory lens, but also drawing on other perspectives, it provides a sound treatment of the key concepts underpinning contemporary wireless communication and MIMO, all the way to massive MIMO. Authoritative and insightful, it includes over 330 worked examples and 450 homework problems, with solutions and MATLAB code and data available online. Altogether, this is an excellent resource for instructors and graduate students, as well as an outstanding reference for researchers and practicing engineers.
This book presents state-of-the-art solution methods and applications of stochastic optimal control. It is a collection of extended papers discussed at the traditional Liverpool workshop on controlled stochastic processes with participants from both the east and the west. New problems are formulated, and progresses of ongoing research are reported. Topics covered in this book include theoretical results and numerical methods for Markov and semi-Markov decision processes, optimal stopping of Markov processes, stochastic games, problems with partial information, optimal filtering, robust control, Q-learning, and self-organizing algorithms. Real-life case studies and applications, e.g., queueing systems, forest management, control of water resources, marketing science, and healthcare, are presented. Scientific researchers and postgraduate students interested in stochastic optimal control,- as well as practitioners will find this book appealing and a valuable reference.
This book is useful to engineers, researchers, entrepreneurs, and students in different branches of production, engineering, and systems sciences. The polytopic roadmaps are the guidelines inspired by the development stages of cognitive-intelligent systems, and expected to become powerful instruments releasing an abundance of new capabilities and structures for complex engineering systems implementation. The 4D approach developed in previous monographs and correlated with industry 4.0and Fourth Industrial Revolution is continued here toward higher dimensions approaches correlated with polytopic operations, equipment, technologies, industries, and societies. Methodology emphasizes the role of doubling, iteration, dimensionality, and cyclicality around the center, of periodic tables and of conservative and exploratory strategies. Partitions, permutations, classifications, and complexification, as polytopic chemistry, are the elementary operations analyzed. Multi-scale transfer, cyclic operations, conveyors, and assembly lines are the practical examples of operations and equipment. Polytopic flow sheets, online analytical processing, polytopic engineering designs, and reality-inspired engineering are presented. Innovative concepts such as Industry 5.0, polytopic industry, Society 5.0, polytopic society, cyber physical social systems, industrial Internet, and digital twins have been discussed. The general polytopic roadmaps, (GPTR), are proposed as universal guidelines and as common methodologies to synthesize the systemic thinking and capabilities for growing complexity projects implementation.
The aim of this book is to furnish the reader with a rigorous and detailed exposition of the concept of control parametrization and time scaling transformation. It presents computational solution techniques for a special class of constrained optimal control problems as well as applications to some practical examples. The book may be considered an extension of the 1991 monograph A Unified Computational Approach Optimal Control Problems, by K.L. Teo, C.J. Goh, and K.H. Wong. This publication discusses the development of new theory and computational methods for solving various optimal control problems numerically and in a unified fashion. To keep the book accessible and uniform, it includes those results developed by the authors, their students, and their past and present collaborators. A brief review of methods that are not covered in this exposition, is also included. Knowledge gained from this book may inspire advancement of new techniques to solve complex problems that arise in the future. This book is intended as reference for researchers in mathematics, engineering, and other sciences, graduate students and practitioners who apply optimal control methods in their work. It may be appropriate reading material for a graduate level seminar or as a text for a course in optimal control.
This book introduces the reader to Serres' unique manner of 'doing philosophy' that can be traced throughout his entire oeuvre: namely as a novel manner of bearing witness. It explores how Serres takes note of a range of epistemologically unsettling situations, which he understands as arising from the short-circuit of a proprietary notion of capital with a praxis of science that commits itself to a form of reasoning which privileges the most direct path (simple method) in order to expend minimal efforts while pursuing maximal efficiency. In Serres' universal economy, value is considered as a function of rarity, not as a stock of resources. This book demonstrates how Michel Serres has developed an architectonics that is coefficient with nature. Mathematic and Information in the Philosophy of Michel Serres acquaints the reader with Serres' monist manner of addressing the universality and the power of knowledge - that is at once also the anonymous and empty faculty of incandescent, inventive thought. The chapters of the book demarcate, problematize and contextualize some of the epistemologically unsettling situations Serres addresses, whilst also examining the particular manner in which he responds to and converses with these situations.
This monograph serves as an introduction and detailed overview of some important topics in distribution testing, an area of theoretical computer science which falls under the general umbrella of property testing, and sits at the intersection of computational learning, statistical learning and hypothesis testing, information theory, and the theory of machine learning. Written in a tutorial style, the author provides the reader with a thorough overview, including a historical perspective on work to date. After introducing the reader to distribution testing, the author proceeds to cover uniformity testing in-depth, and then builds on this to include techniques and "ready-to-use" theorems that establish sample complexity lower bounds. Finally the author discusses the most appropriate techniques to adopt in various settings, including: Quantization, Privacy, Noisy channels, Streaming and memory-limited devices, and Communication constraints. Throughout the tutorial the reader is guided through the basic concepts and mathematical complexities of the topics under review. The inclusion of Exercises and a separately available Solutions manual make this book ideal to be used as part of a graduate course.
This book covers some selected problems of the descriptor integer and fractional order positive continuous-time and discrete-time systems. The book consists of 3 chapters, 4 appendices and the list of references. Chapter 1 is devoted to descriptor integer order continuous-time and discrete-time linear systems. In Chapter 2, descriptor fractional order continuous-time and discrete-time linear systems are considered. Chapter 3 is devoted to the stability of descriptor continuous-time and discrete-time systems of integer and fractional orders. In Appendix A, extensions of the Cayley-Hamilton theorem for descriptor linear systems are given. Some methods for computation of the Drazin inverse are presented in Appendix B. In Appendix C, some basic definitions and theorems on Laplace transforms and Z-transforms are given. Some properties of the nilpotent matrices are given in Appendix D.
This book presents a snapshot of the state-of-art in the field of turbulence modeling, with an emphasis on numerical methods. Topics include direct numerical simulations, large eddy simulations, compressible turbulence, coherent structures, two-phase flow simulation and many more. It includes both theoretical contributions and experimental works, as well as chapters derived from keynote lectures, presented at the fifth Turbulence and Interactions Conference (TI 2018), which was held on June 25-29 in Martinique, France. This multifaceted collection, which reflects the conferences emphasis on the interplay of theory, experiments and computing in the process of understanding and predicting the physics of complex flows and solving related engineering problems, offers a timely guide for students, researchers and professionals in the field of applied computational fluid dynamics, turbulence modeling and related areas.
This monograph provides a comprehensive analysis of the control of singularly perturbed time delay systems. Expanding on the author's previous work on controllability of linear systems with delays in the state and control variables, this volume's comprehensive coverage makes it a valuable addition to the field. Each chapter is self-contained, allowing readers to study them independently or in succession. After a brief introduction, the book systematically examines properties of different classes of singularly perturbed time delay systems, including linear time-dependent systems with multiple point-wise and distributed state delays. The author then considers more general singularly perturbed systems with state and control delays. Euclidean space controllability for all of these systems is also discussed, using numerous examples from real-life models throughout the text to illustrate the results presented. More technically complicated proofs are presented in separate subsections. The final chapter includes a section dedicated to non-linear time delay systems. This book is ideal for researchers, engineers, and graduate students in systems science and control theory. Other applied mathematicians and researchers working in biology and medicine will also find this volume to be a valuable resource.
This book includes two objectives. The first goal is to present advances and developments which have proved to be effective in their application to several complex problems. The second objective is to present the performance comparison of various metaheuristic techniques when they face complex optimization problems. The material has been compiled from a teaching perspective. Most of the problems in science, engineering, economics, and other areas can be translated as an optimization or a search problem. According to their characteristics, some problems can be simple that can be solved by traditional optimization methods based on mathematical analysis. However, most of the problems of practical importance in engineering represent complex scenarios so that they are very hard to be solved by using traditional approaches. Under such circumstances, metaheuristic has emerged as the best alternative to solve this kind of complex formulations. This book is primarily intended for undergraduate and postgraduate students. Engineers and application developers can also benefit from the book contents since it has been structured so that each chapter can be read independently from the others, and therefore, only potential interesting information can be quickly available for solving an industrial problem at hand.
This book constitutes the refereed post-conference proceedings of the 4th International Conference on Intelligence Science, ICIS 2020, held in Durgapur, India, in February 2021 (originally November 2020). The 23 full papers and 4 short papers presented were carefully reviewed and selected from 42 submissions. One extended abstract is also included. They deal with key issues in brain cognition; uncertain theory; machine learning; data intelligence; language cognition; vision cognition; perceptual intelligence; intelligent robot; and medical artificial intelligence.
This book reflects the outcome of contribution by the plural community and of the interactions between disciplines. With the mass of data available through Information and Communication Technologies (ICT) in an unprecedented quantity since the Human History, it is now possible to access dimensions of knowledge that, though not hidden, could not be grasped in the same way in the past. The question of how this information can be used for the benefit of institutional and economic actors to foster the development of a territory. Tackling the issue from a resolutely interdisciplinary perspective, the authors explore the theories and methods of complex systems in order to discuss how they can contribute in these new circumstances to territorial intelligence and to the development practices in which it is embodied. This book illustrates how today's research explores the multiple facets of territorial systems in order to reproduce their richness. It invites readers to learn about the challenges, ideas, results and advances present in this domain. |
You may like...
Security and Organization within IoT and…
Kayhan Ghafoor, Kevin Curran, …
Paperback
R1,390
Discovery Miles 13 900
The Black Swan - The Impact of the…
Nassim Nicholas Taleb
Paperback
(5)
Navigating Information Literacy
Theo Bothma, Erica Cosijn, …
Paperback
Resilience - Why Things Bounce Back
Andrew Zolli, Ann Marie Healy
Paperback
|