![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Information theory
This book is devoted to the problem of sampled-data control of finite-dimensional linear continuous periodic (FDLCP) objects. It fills a deficit in coverage of this important subject. The methods presented here are based on the parametric transfer matrix, which has proven successful in the study of sampled-data systems with linear time-invariant objects. The book shows that this concept can be successfully transferred to sampled-data systems with FDLCP objects. It is set out in five parts: * * an introduction to the frequency approach for the mathematical description of FDLCP objects including the determination of their structure and their representation as a serial connection of periodic modulators and a linear time-invariant object; * construction of parametric transfer matrix for different types of open and closed sampled-data systems with FDLCP objects; * the solution of problems of causal modal control of FDLCP objects based on the mathematical apparatus of determinant polynomial equations; * consideration of the problem of constructing a quadratic quality functional for the H2-optimization problem of a single-loop synchronous sampled-data system with control delay; * description of the general H2-optimization procedure. Necessary mathematical reference material is included at relevant points in the book. Sampled-Data Control for Periodic Objects is of use to: scientists and engineers involved in research and design of systems of systems with FDLCP objects; graduate students wishing to broaden their scope of competence; their instructors; and mathematicians working in the field of control theory.
This book is a compilation of scientific articles written by recognized researchers, and select students, participating in the Second Conference on the Study of Complex Systems and their Applications (EDIESCA 2021). EDIESCA 2021 arose from the need for academic and research groups that carry out this scientific research to disseminate their results internationally. The study and characterization of systems with non-linear and/or chaotic behavior has been of great interest to researchers around the world, for which many important results have been obtained with various applications. The dynamic study of chaotic oscillators of different models, such as Roessler, Lorenz, and Chua, has generated important advances in understanding of chemical reactions, meteorological behavior, design of electronic devices, and other applications. Topics at the event included applications for communications systems by masking techniques, financial behavior, networks analysis, nonlinear lasers, numerical modeling, electronic design, and other interesting topics in the area of complex systems. Additionally, there are results on numerical simulation and electronic designs to generate complex dynamic behaviors.
Decomposition methods aim to reduce large-scale problems to simpler problems. This monograph presents selected aspects of the dimension-reduction problem. Exact and approximate aggregations of multidimensional systems are developed and from a known model of input-output balance, aggregation methods are categorized. The issues of loss of accuracy, recovery of original variables (disaggregation), and compatibility conditions are analyzed in detail. The method of iterative aggregation in large-scale problems is studied. For fixed weights, successively simpler aggregated problems are solved and the convergence of their solution to that of the original problem is analyzed. An introduction to block integer programming is considered. Duality theory, which is widely used in continuous block programming, does not work for the integer problem. A survey of alternative methods is presented and special attention is given to combined methods of decomposition. Block problems in which the coupling variables do not enter the binding constraints are studied. These models are worthwhile because they permit a decomposition with respect to primal and dual variables by two-level algorithms instead of three-level algorithms. Audience: This book is addressed to specialists in operations research, optimization, and optimal control.
Summary Explains in easy-to-understand terms what executives and senior managers need to know and do about the ever-changing cyber threat landscape. Gives strategic, business-focused guidance and advice relevant to C-suite executives. Provides an effective and efficient framework for managing cyber governance, risk and compliance. Explains what is required to implement an effective cyber security strategy. Description With high-profile cyber attacks, data breaches and fines for GDPR (General Data Protection Regulation) non-compliance hitting the headlines daily, businesses must protect themselves and their reputations, while reassuring stakeholders they take cyber security seriously. Cyber attacks are becoming more sophisticated and prevalent, and the cost of data breaches is soaring. In addition, new regulations and reporting requirements make cyber security a critical business issue. Board members and senior management must understand the threat landscape and the strategies they can employ to establish, implement and maintain effective cyber resilience throughout their organisation. How Cyber Security Can Protect your Business - A guide for all stakeholders provides an effective and efficient framework for managing cyber governance, risk and compliance, which organisations can adapt to meet their own risk appetite and synchronise with their people, processes and technology. It explains what is meant by governance, risk and compliance, how it applies to cyber security and what is required to implement an effective cyber security strategy. The pocket guide: Gives readers a greater understanding of cyber governance, risk and compliance; Explains what executives, senior managers and their advisors need to know and do about the ever-changing cyber threat landscape; Provides context as to why stakeholders need to be aware of and in control of their organisation's cyber risk management and cyber incident response; Gives guidance on building an appropriate and efficient governance framework that enables organisations to demonstrate their cyber approach in a non-technical, strategic, business-focused way; Details an overview process to enable risk assessment, assess existing defence mitigations and provide a framework for developing suitable controls; and Includes a checklist to help readers focus on their higher-priority cyber areas. Suitable for all managers and executives, this pocket guide will be of interest to non-cyber specialists, including non-executive directors, who may be required to review cyber arrangements. For cyber specialists, it provides an approach for explaining cyber issues in non-jargonistic, business-based language. Kick-start your journey to becoming cyber secure - buy this pocket guide today!
From the reviews: "This book [...] gives a comprehensive overview of the
implementation of OFDM systems. [ ] For those who study or work on
broadband communication in a wireless multipath environment, this
book is a useful and easy-to-read reference. [...]"
This book systematically presents the most recent progress in stability and control of impulsive systems with delays. Impulsive systems have recently attracted continued high research interests because they provide a natural framework for mathematical modeling of many real-world processes. It focuses not only on impulsive delayed systems, but also impulsive systems with delayed impulses and impulsive systems with event-triggered mechanism, including their Lyapunov stability, finite-time stability and input-to-state stability synthesis. Special attention is paid to the bilateral effects of the delayed impulses, where comprehensive stability properties are discussed in the framework of time-dependent and state-dependent delays. New original work with event-triggered impulsive control and its applications in multi-agent systems and collective dynamics are also provided. This book will be of use to specialists who are interested in the theory of impulsive differential equations and impulsive control theory, as well as high technology specialists who work in the fields of complex networks and applied mathematics. Also, instructors teaching graduate courses and graduate students will find this book a valuable source of nonlinear system theory.
This book covers the work of Erik W. Aslaksen who continues to develop the view of society and its evolution published in earlier work - The Social Bond (Springer 2018), The Stability of Society (Springer 2020), and Measures of Social Evolution (Springer 2021), bringing together core material of that work with the results of recent investigations in order to present the evolution of society as an integrated and continuous story leading right up to the present time. A story of human action driven by our beliefs, desires, and an ideology arising out of our ability to transform and exploit our environment through the development and application of technology. The distinguishing feature of the work is the treatment of society as an information-processing system and applying the system methodology for handling complexity, as it is applied, e.g., in engineering. This focus on information is particularly pertinent in the current circumstances, where the world has arrived at a critical point in its history through the conjunction of a number of issues that appear to be spiralling out of control: Global warming and the associated climate change, the destruction of our environment through such processes as land clearing and industrialisation with associated loss of biodiversity, the rapidly increasing visibility of the inequality in the quality of life with associated tensions, and above all, the determination of the US-led Western alliance to cling to its hegemonial role, apparently at all cost. With the sophistication and proliferation of nuclear weapons, the latter has the potential to bring on the end of civilisation as we know it. The resolution of any of these issues depends on the information available to all parties involved, and hence, the availability and quality of information is seen as the crucial and overarching issue of the present time. A number of aspects of this issue, including the role of education, economic inequality, and the control of the media, are treated in some detail, and proposals for some small steps in the right direction are put forward.
System Theory: Modeling, Analysis and Control contains thirty-three scientific papers covering a wide range of topics in systems and control. These papers have been contributed to a symposium organized to celebrate Sanjoy K. Mitter's 65th birthday. The following research topics are addressed: distributed parameter systems, stochastic control, filtering and estimation, optimization and optimal control, image processing and vision, hierarchical systems and hybrid control, nonlinear systems, and linear systems. Also included are three survey papers on optimization, nonlinear filtering, and nonlinear systems. Recent advances are reported on the behavioral approach to systems, the relationship between differential games and robust control, estimation of diffusion processes, Markov processes, optimal control, hybrid control, stochastic control, spectral estimation, nonconvex quadratic programming, robust control, control algorithms and quantized linear systems. Innovative explorations are carried out on quantum systems from a control theory perspective, option valuation and hedging, three-dimensional medical visualization, computational structure biology image processing, and hierarchical approaches to complex systems, flow control, scheduling and force feedback in fluid mechanics. The contents reflect on past research accomplishments, current research activity, and future research directions in systems and control theory.
Maximizing reader insights into the roles of intelligent agents in networks, air traffic and emergency departments, this volume focuses on congestion in systems where safety and security are at stake, devoting special attention to applying game theoretic analysis of congestion to: protocols in wired and wireless networks; power generation, air transportation and emergency department overcrowding. Reviewing exhaustively the key recent research into the interactions between game theory, excessive crowding, and safety and security elements, this book establishes a new research angle by illustrating linkages between the different research approaches and serves to lay the foundations for subsequent analysis. Congestion (excessive crowding) is defined in this work as all kinds of flows; e.g., road/sea/air traffic, people, data, information, water, electricity, and organisms. Analysing systems where congestion occurs - which may be in parallel, series, interlinked, or interdependent, with flows one way or both ways - this book puts forward new congestion models, breaking new ground by introducing game theory and safety/security into proceedings. Addressing the multiple actors who may hold different concerns regarding system reliability; e.g. one or several terrorists, a government, various local or regional government agencies, or others with stakes for or against system reliability, this book describes how governments and authorities may have the tools to handle congestion, but that these tools need to be improved whilst additionally ensuring safety and security against various threats. This game-theoretic analysis sets this two volume book apart from the current congestion literature and ensures that the work will be of use to postgraduates, researchers, 3rd/4th-year undergraduates, policy makers, and practitioners.
This handbook presents state-of-the-art research in reinforcement learning, focusing on its applications in the control and game theory of dynamic systems and future directions for related research and technology. The contributions gathered in this book deal with challenges faced when using learning and adaptation methods to solve academic and industrial problems, such as optimization in dynamic environments with single and multiple agents, convergence and performance analysis, and online implementation. They explore means by which these difficulties can be solved, and cover a wide range of related topics including: deep learning; artificial intelligence; applications of game theory; mixed modality learning; and multi-agent reinforcement learning. Practicing engineers and scholars in the field of machine learning, game theory, and autonomous control will find the Handbook of Reinforcement Learning and Control to be thought-provoking, instructive and informative.
This book is a useful tool for researchers in both academia and industry who are interested in improving the performances of magnetic recording systems using new coding schemes. Coding and Iterative Detection for Magnetic Recording Channels proposes several new approaches for enhancing the performance of magnetic recording systems by coding and interpolated timing recovery. It provides a tutorial introduction to turbo codes, LDPC codes and their iterative detection schemes. The main emphasis, however, is placed on the simplification of the detector structures for the implementation of various codes. Chapter 1 introduces the model for magnetic recording channels and the challenges to the read channel detector designs. Chapter 2 discusses the turbo codes and the turbo equalization structure for ISI channels. Chapter 3 summarizes the major concepts of LDPC codes and their iterative detection algorithms based on belief propagation. Chapter 4 introduces the Decision Aid Equalization (DAE) structure to simplify iterative detection for ISI channels. Chapter 6 proposes an interpolated timing recovery scheme that facilitates symbol timing recovery by its re-sampling' capability. The combination of the above-mentioned chapters leads to a new structure for implementing iterative detection on recording channels. Chapter 5 deviates from iterative detection to propose a simple code, the Interleaved Parity Check (IPC) code, and its reduced-complexity decoder, which is considered practical for implementation with currently available integrated circuit technology. Chapter 7 summarizes the book with a discussion on future research topics in this field. Coding and Iterative Detection for MagneticRecording Channels is a valuable reference for researchers and design engineers working on signal processing and coding for magnetic recording channels. It may also be used as a graduate text for courses on turbo codes.
This book deals with several types of multi-dimensional control problems in the face of data uncertainty for vector cases-multi-dimensional multi-objective control problem with uncertain objective functionals, uncertain constraint functionals, and uncertain objective as well as constraint functionals, uncertain multi-dimensional multi-objective control problem with semi-infinite constraints, uncertain dual multi-dimensional multi-objective variational control problem, and second-order PDE&PDI constrained robust optimization problem. The book provides the solution approaches-an exact l1 penalty function approach, modified objective approach, robust approach-in the simplest way to solve the recent developing optimization problems in the sense of uncertainty.
This monograph explores applications of Carleman estimates in the study of stabilization and controllability properties of partial differential equations, including the stabilization property of the damped wave equation and the null-controllability of the heat equation. All analysis is performed in the case of open sets in the Euclidean space; a second volume will extend this treatment to Riemannian manifolds. The first three chapters illustrate the derivation of Carleman estimates using pseudo-differential calculus with a large parameter. Continuation issues are then addressed, followed by a proof of the logarithmic stabilization of the damped wave equation by means of two alternative proofs of the resolvent estimate for the generator of a damped wave semigroup. The authors then discuss null-controllability of the heat equation, its equivalence with observability, and how the spectral inequality allows one to either construct a control function or prove the observability inequality. The final part of the book is devoted to the exposition of some necessary background material: the theory of distributions, invariance under change of variables, elliptic operators with Dirichlet data and associated semigroup, and some elements from functional analysis and semigroup theory.
The presence of uncertainty in a system description has always been a critical issue in control. The main objective of "Randomized Algorithms for Analysis and Control of Uncertain Systems, with Applications "(Second Edition) is to introduce the reader to the fundamentals of probabilistic methods in the analysis and design of systems subject to deterministic and stochastic uncertainty. The approach propounded by this text guarantees a reduction in the computational complexity of classical control algorithms and in the conservativeness of standard robust control techniques. The second edition has been thoroughly updated to reflect recent research and new applications with chapters on statistical learning theory, sequential methods for control and the scenario approach being completely rewritten. Features: . self-contained treatment explaining Monte Carlo and Las Vegas randomized algorithms from their genesis in the principles of probability theory to their use for system analysis; . development of a novel paradigm for (convex and nonconvex) controller synthesis in the presence of uncertainty and in the context of randomized algorithms; . comprehensive treatment of multivariate sample generation techniques, including consideration of the difficulties involved in obtaining identically and independently distributed samples; . applications of randomized algorithms in various endeavours, such as PageRank computation for the Google Web search engine, unmanned aerial vehicle design (both new in the second edition), congestion control of high-speed communications networks and stability of quantized sampled-data systems. "" "Randomized Algorithms for Analysis and Control of Uncertain Systems" (second edition) is certain to interest academic researchers and graduate control students working in probabilistic, robust or optimal control methods and control engineers dealing with system uncertainties. The present book is a very timely contribution to the literature. I have no hesitation in asserting that it will remain a widely cited reference work for many years. M. Vidyasagar "
This book presents a new understanding on how control systems truly operate, and explains how to recognize, simulate, and improve control systems in all fields of activity. It also reveals the pervasive, ubiquitous and indispensable role of control processes in our life and the need to develop a "control-oriented thinking"-based on uncomplicated but effective models derived from systems thinking-that is, a true "discipline of control." Over the book's thirteen chapters, Piero Mella shows that there are simple control systems (rather than complex ones) that can easily help us to manage complexity without drawing upon more sophisticated control systems. It begins by reviewing the basic language of systems thinking and the models it allows users to create. It then introduces the control process, presenting the theoretical structure of three simple control systems we all can observe in order to gain fundamental knowledge from them about the basic structure of a control system. Then, it presents the anatomy of the simplest "magic ring" and the general theoretical model of any control system. This is followed by an introduction to a general typology of control systems and a broader view of control systems by investigating multi-lever control systems and multi-objective systems. The book undertakes the concepts through various environments, increasingly broader in scope to suggest to readers how to recognize therein control systems manifestations in everyday life and in natural phenomena. Updated for the 2nd edition, new chapters explore control systems regulating the biological environment and the organizations, with an in-depth study of the control of quality, productivity, production, stocks and costs. Finally, it concludes by dealing with the learning process, problem-solving, and designing the logical structure of control systems.
This first book focuses on uncertain graph and network optimization. It covers three different main contents: uncertain graph, uncertain programming and uncertain network optimization. It also presents applications of uncertain network optimization in a lot of real problems such as transportation problems, dispatching medical supplies problems and location problems. The book is suitable for researchers, engineers, teachers and students in the field of mathematics, information science, computer science, decision science, management science and engineering, artificial intelligence, industrial engineering, economics and operations research.
This book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature, and digital watermarking. This book is organized into fifteen chapters; topics include foundations of functional encryption, impact of group theory in cryptosystems, elliptic curve cryptography, XTR algorithm, pairing based cryptography, NTRU algorithms, ring units, cocks IBE schemes, Boneh-Franklin IBE, Sakai-Kasahara IBE, hierarchical identity based encryption, attribute based Encryption, extensions of IBE and related primitives, and digital signatures. Explains the latest functional encryption algorithms in a simple way with examples; Includes applications of functional encryption in information security, application security, and network security; Relevant to academics, research scholars, software developers, etc.
This book contains all refereed papers that were accepted to the sixth edition of the " Complex Systems Design & Management Paris " (CSD&M Paris 2015) international conference which took place in Paris (France) on November 23-25, 2015.These proceedings cover the most recent trends in the emerging field of complex systems sciences & practices from an industrial and academic perspective, including the main industrial domains (aeronautics & aerospace, defense & security, electronics & robotics, energy & environment, health & welfare, software & e-services, transportation), scientific & technical topics (systems fundamentals, systems architecture & engineering, systems metrics & quality, systems modeling tools) and systems types (artificial ecosystems, embedded systems, software & information systems, systems of systems, transportation systems).The CSD&M Paris 2015 conference is organized under the guidance of the CESAMES non-profit organization, address: CESAMES, 8 rue de Hanovre, 75002 Paris, France.
Cybernetic pioneer Warren McCullough asked: "What is a man, that he may know a number; and what is a number, that a man may know it?" Thinking along much the same lines, my question here is: "What is a creative mind, that it might emerge from a complex system; and what is a complex system, that it might give rise to a creative mind?" Complexity science is a fashionable topic these days. My perspective on complexity, however, is a somewhat unusual one: I am interested in complex systems science principally as it reflects on abstract mathematical, computational models of mind. In my three previous books, The Structure of Intelligence, Evolving Mind, and Chaotic Logic, I have outlined a comprehensive complex-systems-theoretic theory of mind that I now call the psynet model. This book is a continuation of the research program presented in my previous books (and those books will be frequently referred to here, by the nicknames EM and CL). One might summarize the trajectory of thought spanning these four books as follows. SI formulated a philosophy and mathem- ics of mind, based on theoretical computer science and the concept of "pattern. " EM analyzed the theory of evolution by natural selection in similar terms, and used this computational theory of evolution to establish the evolutionary nature of thought.
This text addresses systems with persistent memory that are common mathematical models used in the study of viscoelasticity and thermodynamics with memory. In particular, this class of systems is used to model non-Fickian diffusion in the presence of complex molecular structures. Hence, it has wide applications in biology. The book focuses on the properties and controllability of the archetypal heat and wave equations with memory and introduces the dynamic approach to identification problems and the basic techniques used in the study of stability. The book presents several approaches currently used to study systems with persistent memory: Volterra equation in Hilbert spaces, Laplace transform techniques and semigroup methods. The text is intended for a diverse audience in applied mathematics and engineering and it can be used in PhD courses. Readers are recommended to have a background in the elements of functional analysis. Topics of functional analysis which younger readers may need to familiarize with are presented in the book.
In the present book, the starting line is defined by a morphogenetic perspective on human communication and culture. The focus is on visual communication, music, religion (myth), and language, i.e., on the "symbolic forms" at the heart of human cultures (Ernst Cassirer). The term "morphogenesis" has more precisely the meaning given by Rene Thom (1923-2002) in his book "Morphogenesis and Structural Stability" (1972) and the notions of "self-organization" and cooperation of subsystems in the "Synergetics" of Hermann Haken (1927- ). The naturalization of communication and cultural phenomena is the favored strategy, but the major results of the involved disciplines (art history, music theory, religious science, and linguistics) are respected. Visual art from the Paleolithic to modernity stands for visual communication. The present book focuses on studies of classical painting and sculpture (e.g., Leonardo da Vinci, William Turner, and Henry Moore) and modern art (e.g., Jackson Pollock and Joseph Beuys). Musical morphogenesis embraces classical music (from J. S. Bach to Arnold Schoenberg) and political songwriting (Bob Dylan, Leonhard Cohen). The myths of pre-literary societies show the effects of self-organization in the re-assembly (bricolage) of traditions. Classical polytheistic and monotheistic religions demonstrate the unfolding of basic germs (religious attractors) and their reduction in periods of crisis, the self-organization of complex religious networks, and rationalized macro-structures (in theologies). Significant tendencies are analyzed in the case of Buddhism and Christianism. Eventually, a holistic view of symbolic communication and human culture emerges based on state- of- the- art in evolutionary biology, cognitive science, linguistics, and semiotics (philosophy of symbolic forms).
This book is mainly focused on the global impulsive synchronization of complex dynamical networks with different types of couplings, such as general state coupling, nonlinear state coupling, time-varying delay coupling, derivative state coupling, proportional delay coupling and distributed delay coupling. Studies on impulsive synchronization of complex dynamical networks have attracted engineers and scientists from various disciplines, such as electrical engineering, mechanical engineering, mathematics, network science, system engineering. Pursuing a holistic approach, the book establishes a fundamental framework for this topic, while emphasizing the importance of network synchronization and the significant influence of impulsive control in the design and optimization of complex networks. The primary audience for the book would be the scholars and graduate students whose research topics including the network science, control theory, applied mathematics, system science and so on.
This book discusses machine learning and artificial intelligence (AI) for agricultural economics. It is written with a view towards bringing the benefits of advanced analytics and prognostics capabilities to small scale farmers worldwide. This volume provides data science and software engineering teams with the skills and tools to fully utilize economic models to develop the software capabilities necessary for creating lifesaving applications. The book introduces essential agricultural economic concepts from the perspective of full-scale software development with the emphasis on creating niche blue ocean products. Chapters detail several agricultural economic and AI reference architectures with a focus on data integration, algorithm development, regression, prognostics model development and mathematical optimization. Upgrading traditional AI software development paradigms to function in dynamic agricultural and economic markets, this volume will be of great use to researchers and students in agricultural economics, data science, engineering, and machine learning as well as engineers and industry professionals in the public and private sectors.
This monograph explores applications of Carleman estimates in the study of stabilization and controllability properties of partial differential equations, including quantified unique continuation, logarithmic stabilization of the wave equation, and null-controllability of the heat equation. Where the first volume derived these estimates in regular open sets in Euclidean space and Dirichlet boundary conditions, here they are extended to Riemannian manifolds and more general boundary conditions. The book begins with the study of Lopatinskii-Sapiro boundary conditions for the Laplace-Beltrami operator, followed by derivation of Carleman estimates for this operator on Riemannian manifolds. Applications of Carleman estimates are explored next: quantified unique continuation issues, a proof of the logarithmic stabilization of the boundary-damped wave equation, and a spectral inequality with general boundary conditions to derive the null-controllability result for the heat equation. Two additional chapters consider some more advanced results on Carleman estimates. The final part of the book is devoted to exposition of some necessary background material: elements of differential and Riemannian geometry, and Sobolev spaces and Laplace problems on Riemannian manifolds. |
You may like...
Computer Aided Verification
Hana Chockler, Georg Weissenbacher
Hardcover
R2,035
Discovery Miles 20 350
Machine Learning for Cyber Physical…
Oliver Niggemann, Christian Kuhnert, …
Hardcover
R1,244
Discovery Miles 12 440
Encyclopedia of Information Science and…
Mehdi Khosrow-Pour, D.B.A.
Hardcover
R20,967
Discovery Miles 209 670
Encyclopedia of Information Science and…
Mehdi Khosrow-Pour, D.B.A.
Hardcover
R20,961
Discovery Miles 209 610
Analysis and Design of Hybrid Systems…
Christos Cassandras, Alessandro Giua, …
Paperback
|