![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Reference & Interdisciplinary > Communication studies > Information theory
This book presents a time-delay approach to the analysis and synthesis of networked control systems (NCSs) under communication constraints. Differently from other approaches, the time-delay approach to NCSs allows communication delays to be larger than the sampling intervals in the presence of scheduling protocols. The book starts from a comprehensive introduction to three main approaches to sampled-data and networked control. It then focuses on time-delay approach, and the modelling of the closed-loop systems in the form of time-delay system. It presents discontinuous (in time) Lyapunov functional constructions that are efficient for NCSs in the presence of communications delays. Further, it highlights time-delay approaches developed to model and analyze NCSs under communication constraints, with a particular focus on dynamic quantization, round-robin, try-once-discard and stochastic protocols. The results are first presented for the continuous-time NCSs and then extended to discrete-time NCSs. Discussing recent developments in Lyapunov-based analysis of NCSs under communication constraints, the book is a valuable resource for researchers interested in sampled-data and networked control, and time-delay systems, as well as for graduate students in automatic control and systems theory.
The nucleus of this volume consists of a number of papers presented at the Advanced Research Workshop on liThe Impact of New Information Technologies on Library Management, Resources and Cooperation" , held in Luxembourg fran 19-23 November 1984. The oorkshop was a joint effort of four international organisations. The Scientific Affairs Division of the North .Atlantic Treaty Organization, through a personal canmitment and interest expressed by Dr. H. Durand, Assistant Secretary General for Scientific Affairs, was the first and major sponsor acting as a catalyst in enabling the Workshop to take place. Through its support for travel and subsistence costs of some of the North American participants, the Workshop could become a platfo~in for the exchange of ideas between parties concerned with information handling and transmission and information policy in Western Europe and North America. The Directorate General for Information Market and Innovation of the Canmission of the European Communities hosted the Vlorkshop in its facilities - the Jean l'bnnet Building in Luxembourg - also providing for simultaneous translation in the main languages of the European Community. Moreover, the Canmission generously funded the participation of key participants fran Community countries and provided participants with ample info~ination on existing Community programmes related to electronic publications, electronic transmission of documents, copyright problems, problems of standards, telecanmunication, and so on. 'I'he Council of Europe supported attendance fran Sweden, Austria and Spain. And lastly, the European Cultural Foundation organised the event on behalf of all these organisa tions.
This book provides step-by-step explanations of successful implementations and practical applications of machine learning. The book's GitHub page contains software codes to assist readers in adapting materials and methods for their own use. A wide variety of applications are discussed, including wireless mesh network and power systems optimization; computer vision; image and facial recognition; protein prediction; data mining; and data discovery. Numerous state-of-the-art machine learning techniques are employed (with detailed explanations), including biologically-inspired optimization (genetic and other evolutionary algorithms, swarm intelligence); Viola Jones face detection; Gaussian mixture modeling; support vector machines; deep convolutional neural networks with performance enhancement techniques (including network design, learning rate optimization, data augmentation, transfer learning); spiking neural networks and timing dependent plasticity; frequent itemset mining; binary classification; and dynamic programming. This book provides valuable information on effective, cutting-edge techniques, and approaches for students, researchers, practitioners, and teachers in the field of machine learning.
Engineering practice often has to deal with complex systems of multiple variable and multiple parameter models almost always with strong non-linear coupling. The conventional analytical techniques-based approaches for describing and predicting the behaviour of such systems in many cases are doomed to failure from the outset, even in the phase of the construction of a more or less appropriate mathematical model. These approaches normally are too categorical in the sense that in the name of modelling accuracy they try to describe all the structural details of the real physical system to be modelled. This can significantly increase the intricacy of the model and may result in a enormous computational burden without achieving considerable improvement of the solution. The best paradigm exemplifying this situation may be the classic perturbation theory: the less significant the achievable correction, the more work has to be invested to obtain it. A further important component of machine intelligence is a kind of structural uniformity giving room and possibility to model arbitrary particular details a priori not specified and unknown. This idea is similar to the ready-to-wear industry, which introduced products, which can be slightly modified later on in contrast to tailor-made creations aiming at maximum accuracy from the beginning. These subsequent corrections can be carried out by machines automatically. This learning ability is a key element of machine intelligence. The past decade confirmed that the view of typical components of the present soft computing as fuzzy logic, neural computing, evolutionary computation and probabilistic reasoning are of complementary nature and that the best results can be applied by their combined application. Today, the two complementary branches of Machine Intelligence, that is, Artificial Intelligence and Computational Intelligence serve as the basis of Intelligent Engineering Systems. The huge number of scientific results published in Journal and conference proceedings worldwide substantiates this statement. The present book contains several articles taking different viewpoints in the field of intelligent systems. "
This textbook teaches students techniques for the design of advanced digital systems using System-on-Chip (SoC) Field Programmable Gate Arrays (FPGAs). The author demonstrates design of custom hardware components for the FPGA fabric using VHDL, with implementation of custom hardware-software interfaces. Readers gain hands-on experience by writing programs and Linux device drivers in C to interact with custom hardware. This textbook enables laboratory experience in the design of custom digital systems using SoC FPGAs, emphasizing computational tasks such as digital signal processing, audio, or video processing.
This unique reference represents a cross-section of forefront robotics research, ranging from robotics and systems to learning, autonomy and failure detection, from vision and navigation to localization and mapping, which are based on the papers presented at the 1st European Robotics Symposium (EUROS-06) held in Palermo, Italy from 16-18 March, 2006. The European Robotics Symposium (EUROS) is a brand-new International scientific event promoted by EURON, the European Robotics Network.
This book is an updated version of the information theory classic, first published in 1990. About one-third of the book is devoted to Shannon source and channel coding theorems; the remainder addresses sources, channels, and codes and on information and distortion measures and their properties. New in this edition: Expanded treatment of stationary or sliding-block codes and their relations to traditional block codesExpanded discussion of results from ergodic theory relevant to information theoryExpanded treatment of B-processes -- processes formed by stationary coding memoryless sourcesNew material on trading off information and distortion, including the Marton inequalityNew material on the properties of optimal and asymptotically optimal source codesNew material on the relationships of source coding and rate-constrained simulation or modeling of random processes Significant material not covered in other information theory texts includes stationary/sliding-block codes, a geometric view of information theory provided by process distance measures, and general Shannon coding theorems for asymptotic mean stationary sources, which may be neither ergodic nor stationary, and d-bar continuous channels.
This book introduces to blockchain and deep learning and explores and illustrates the current and new trends that integrate them. The pace and speeds for connectivity are certain on the ascend. Blockchain and deep learning are twin technologies that are integral to integrity and relevance of network contents. Since they are data-driven technologies, rapidly growing interests exist to incorporate them in efficient and secure data sharing and analysis applications. Blockchain and deep learning are sentinel contemporary research technologies. This book provides a comprehensive reference for blockchain and deep learning by covering all important topics. It identifies the bedrock principles and forward projecting methodologies that illuminate the trajectory of developments for the decades ahead.
Originally published in 1995, Large Deviations for Performance Analysis consists of two synergistic parts. The first half develops the theory of large deviations from the beginning, through recent results on the theory for processes with boundaries, keeping to a very narrow path: continuous-time, discrete-state processes. By developing only what is needed for the applications, the theory is kept to a manageable level, both in terms of length and in terms of difficulty. Within its scope, the treatment is detailed, comprehensive and self-contained. As the book shows, there are sufficiently many interesting applications of jump Markov processes to warrant a special treatment. The second half is a collection of applications developed at Bell Laboratories. The applications cover large areas of the theory of communication networks: circuit switched transmission, packet transmission, multiple access channels, and the M/M/1 queue. Aspects of parallel computation are covered as well including, basics of job allocation, rollback-based parallel simulation, assorted priority queueing models that might be used in performance models of various computer architectures, and asymptotic coupling of processors. These applications are thoroughly analysed using the tools developed in the first half of the book.
Filtering and system identification are powerful techniques for building models of complex systems. This 2007 book discusses the design of reliable numerical methods to retrieve missing information in models derived using these techniques. Emphasis is on the least squares approach as applied to the linear state-space model, and problems of increasing complexity are analyzed and solved within this framework, starting with the Kalman filter and concluding with the estimation of a full model, noise statistics and state estimator directly from the data. Key background topics, including linear matrix algebra and linear system theory, are covered, followed by different estimation and identification methods in the state-space model. With end-of-chapter exercises, MATLAB simulations and numerous illustrations, this book will appeal to graduate students and researchers in electrical, mechanical and aerospace engineering. It is also useful for practitioners. Additional resources for this title, including solutions for instructors, are available online at www.cambridge.org/9780521875127.
This book gathers together much of the author's work - both old and new - to explore a number of the key increases in complexity seen in the natural world, seeking to explain each of them purely in terms of the features of fitness landscapes. In a very straightforward manner, the book introduces basic concepts to help readers follow the main ideas. By using variations of the NK model and including the concept of the Baldwin effect, the author presents new abstract models that are able to explain why sources of evolutionary innovation (genomes, symbiosis, sex, chromosomes, multicellularity) have been selected for and hence how complexity has increased over time in some lineages.
This book aims to provide the latest research developments and results in the domain of AI techniques for smart cyber ecosystems. It presents a holistic insight into AI-enabled theoretic approaches and methodology in IoT networking, security analytics using AI tools and network automation, which ultimately enable intelligent cyber space. This book will be a valuable resource for students, researchers, engineers and policy makers working in various areas related to cybersecurity and privacy for Smart Cities. This book includes chapters titled "An Overview of the Artificial Intelligence Evolution and Its Fundamental Concepts, and Their Relationship with IoT Security", "Smart City: Evolution and Fundamental Concepts", "Advances in AI-Based Security for Internet of Things in Wireless Virtualization Environment", "A Conceptual Model for Optimal Resource Sharing of Networked Microgrids Focusing Uncertainty: Paving Path to Eco-friendly Smart Cities", "A Novel Framework for a Cyber Secure Smart City", "Contemplating Security Challenges and Threats for Smart Cities", "Self-Monitoring Obfuscated IoT Network", "Introduction to Side Channel Attacks and Investigation of Power Analysis and Fault Injection Attack Techniques", "Collaborative Digital Forensic Investigations Model for Law Enforcement: Oman as a Case Study", "Understanding Security Requirements and Challenges in the Industrial Internet of Things: A Review", "5G Security and the Internet of Things", "The Problem of Deepfake Videos and How to Counteract Them in Smart Cities", "The Rise of Ransomware Aided by Vulnerable IoT Devices", "Security Issues in Self-Driving Cars within Smart Cities", and "Trust-Aware Crowd Associated Network-Based Approach for Optimal Waste Management in Smart Cities". This book provides state-of-the-art research results and discusses current issues, challenges, solutions and recent trends related to security and organization within IoT and Smart Cities. We expect this book to be of significant importance not only to researchers and practitioners in academia, government agencies and industries, but also for policy makers and system managers. We anticipate this book to be a valuable resource for all those working in this new and exciting area, and a "must have" for all university libraries.
This book provides a coherent framework for understanding the essence of complex systems and the nature of digital transformations, analyzes challenges of and patterns in innovative development, and shares a wealth of insights and best practices, resulting in the most extensive coverage of the topic available. In particular, the book's cutting-edge contributions, prepared by scientists, engineers, and field experts,focus on the design, implementation, and evaluation of practical interventions that promote the innovative and sustainable development of complex systems. In addition to sharing a rich collection of cases from around the world, they provide a broad interdisciplinary analysis of collaboration mechanisms, theories and approaches to support and accelerate the development of complex systems.
This volume provides an introduction to and overview of the emerging field of interconnected networks which include multilayer or multiplex networks, as well as networks of networks. Such networks present structural and dynamical features quite different from those observed in isolated networks. The presence of links between different networks or layers of a network typically alters the way such interconnected networks behave - understanding the role of interconnecting links is therefore a crucial step towards a more accurate description of real-world systems. While examples of such dissimilar properties are becoming more abundant - for example regarding diffusion, robustness and competition - the root of such differences remains to be elucidated. Each chapter in this topical collection is self-contained and can be read on its own, thus making it also suitable as reference for experienced researchers wishing to focus on a particular topic.
This book presents a treatise on the theory and modeling of second-order stationary processes, including an exposition on selected application areas that are important in the engineering and applied sciences. The foundational issues regarding stationary processes dealt with in the beginning of the book have a long history, starting in the 1940s with the work of Kolmogorov, Wiener, Cramer and his students, in particular Wold, and have since been refined and complemented by many others. Problems concerning the filtering and modeling of stationary random signals and systems have also been addressed and studied, fostered by the advent of modern digital computers, since the fundamental work of R.E. Kalman in the early 1960s. The book offers a unified and logically consistent view of the subject based on simple ideas from Hilbert space geometry and coordinate-free thinking. In this framework, the concepts of stochastic state space and state space modeling, based on the notion of the conditional independence of past and future flows of the relevant signals, are revealed to be fundamentally unifying ideas. The book, based on over 30 years of original research, represents a valuable contribution that will inform the fields of stochastic modeling, estimation, system identification, and time series analysis for decades to come. It also provides the mathematical tools needed to grasp and analyze the structures of algorithms in stochastic systems theory.
This reference identifies information resources concerning virtual reality and provides detailed instruction on how to use these resources in an effective research strategy. Most of the chapters overview particular types of information sources, such as periodical and citation indexes, conference proceedings, technical reports, dissertations, and monographs. The chapters explain how to use these tools to gather information about virtual reality, and discussions of key resources are always placed in the larger context of information-gathering strategies specific to the field. Most of the resources are available in large public and academic libraries. The volume does not presuppose sophisticated technical knowledge of libraries, and it is written for the student and general researcher. The volume concludes with a set of algorithms that can be used to locate resources in the most typical searches, and a list of producers and publishers of related material.
This book is a revision and extension of the author's 1995 Sourcebook of Control Systems Engineering. Because of the extensions and other modifications, it has been re-titled Handbook of Control Systems Engineering, which it is intended to be for its prime audience: advanced undergraduate students, beginning graduate students, and practicing engineers needing an understandable review of the field or recent developments which may prove useful. New in This Edition. Two new chapters on aspects of nonlinear systems have been incorporated. In the first of these, selected material for nonlinear systems is concentrated on four aspects: showing the value of certain linear controllers, arguing the suitability of algebraic linearization, reviewing the semi-classical methods of harmonic balance, and introducing the nonlinear change of variable technique known as feedback linearization. In the second new chapter, the topic of variable structure control, often with sliding mode, is introduced. A third chapter introduces discrete event systems, including several approaches to their analysis. The chapters on robust control and intelligent control have been extensively revised. Modest revisions and extensions have also been made to other chapters, often to incorporate extensions to nonlinear systems. Many references have been updated to more recent books, although old standards are still cited. Also, some of the advances in computer and communications technology are reflected. The index has been revised and expanded. The structure of the book is as in the first edition. Briefly, the aim is to present the topics in a fairly modular manner with certain main groupings. The first several chapters areconcerned with the hardware and software of the control task as well as systems engineering associated with the selection of appropriate components. The next chapters look at the sources and representations of the mathematical models used in the theory. A number of chapters then are concerned with standard classical or transform domain material as is usually presented in a first level university course, including stability theory, root locus diagrams, and Bode plots. The next group of chapters concerns the standard modern or state space material usually met in a second level course. Included here are observers, pole placement, and optimal control. Overlapping into usual graduate level courses are the next several chapters on more advanced optimal control, Kalman filtering, system identification, and standard adaptive control. The final chapters introduce more advanced, research level subjects. Here are selected topics in nonlinear control, intelligent control, robust control, and discrete event systems. The topics covered are intended to represent the mainstream of control systems teaching. Examples are presented to illustrate the computability of the theory presented. Handbook of Controls Systems Engineering, Second Edition is suitable as a secondary text for upper level undergraduate students, beginning graduate students, and as a reference for researchers and practitioners in industry.
Focusses on filtering for linear processes, and helps design linear stable unbiased filters that yield an estimation error with the lowest root-mean-square (RMS) norm. This book defines various hierarchical classes of filtering problems based on the availability of statistical knowledge regarding noise, disturbances, and other uncertainties.
This book provides a valuable reference for digital forensics practitioners and cyber security experts operating in various fields of law enforcement, incident response and commerce. It is also aimed at researchers seeking to obtain a more profound knowledge of Digital Forensics and Cybercrime. Furthermore, the book is an exceptional advanced text for PhD and Master degree programmes in Digital Forensics and Cyber Security. Each chapter of this book is written by an internationally-renowned expert who has extensive experience in law enforcement, industry and academia. The increasing popularity in the use of IoT devices for criminal activities means that there is a maturing discipline and industry around IoT forensics. As technology becomes cheaper and easier to deploy in an increased number of discrete, everyday objects, scope for the automated creation of personalised digital footprints becomes greater. Devices which are presently included within the Internet of Things (IoT) umbrella have a massive potential to enable and shape the way that humans interact and achieve objectives. These also forge a trail of data that can be used to triangulate and identify individuals and their actions. As such, interest and developments in autonomous vehicles, unmanned drones and 'smart' home appliances are creating unprecedented opportunities for the research communities to investigate the production and evaluation of evidence through the discipline of digital forensics.
It has been widely recognized nowadays the importance of introducing mathematical models that take into account possible sudden changes in the dynamical behavior of a high-integrity systems or a safety-critical system. Such systems can be found in aircraft control, nuclear power stations, robotic manipulator systems, integrated communication networks and large-scale flexible structures for space stations, and are inherently vulnerable to abrupt changes in their structures caused by component or interconnection failures. In this regard, a particularly interesting class of models is the so-called Markov jump linear systems (MJLS), which have been used in numerous applications including robotics, economics and wireless communication. Combining probability and operator theory, the present volume provides a unified and rigorous treatment of recent results in control theory of continuous-time MJLS. This unique approach is of great interest to experts working in the field of linear systems with Markovian jump parameters or in stochastic control. The volume focuses on one of the few cases of stochastic control problems with an actual explicit solution and offers material well-suited to coursework, introducing students to an interesting and active research area. The book is addressed to researchers working in control and signal processing engineering. Prerequisites include a solid background in classical linear control theory, basic familiarity with continuous-time Markov chains and probability theory, and some elementary knowledge of operator theory.
This book presents several aspects of research on mathematics that have significant applications in engineering, modelling and social matters, discussing a number of current and future social issues and problems in which mathematical tools can be beneficial. Each chapter enhances our understanding of the research problems in a particular an area of study and highlights the latest advances made in that area. The self-contained contributions make the results and problems discussed accessible to readers, and provides references to enable those interested to follow subsequent studies in still developing fields. Presenting real-world applications, the book is a valuable resource for graduate students, researchers and educators. It appeals to general readers curious about the practical applications of mathematics in diverse scientific areas and social problems.
At the start of the new millennium, mankind is challenged by a paradox: the greater the apparent knowledge becomes, the greater the uncertainty in understanding and predicting how the world works appears. This book presents the outline of a new basis of Systems Science and a methodology for its applications in complex environmental, economic, social, and technological systems.
Because of the rapid growth of cybercrime, cryptography and system security may be the fastest growing technologies in our culture today. This book describes various aspects of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices in the design of networks and systems. The first portion of the book presents the overall system security concepts and provides a general overview of its features, such as object model and inter-object communications. The objective is to provide an understanding of the cryptography underpinnings on which the rest of the book is based. The book is designed to meet the needs of beginners as well as more advanced readers. Features: Covers the major components of cryptography and system security, with a particular emphasis on the use of rigorous security models and practices used in the design of networks and systems Includes a discussion of emerging technologies such as Big Data Analytics, cloud computing, Internet of Things (IoT), Smart Grid, SCADA, control systems, and Wireless Sensor Networks (WSN)
This book provides an introduction to the analysis and control of Linear Parameter-Varying Systems and Time-Delay Systems and their interactions. The purpose is to give the readers some fundamental theoretical background on these topics and to give more insights on the possible applications of these theories. This self-contained monograph is written in an accessible way for readers ranging from undergraduate/PhD students to engineers and researchers willing to know more about the fields of time-delay systems, parameter-varying systems, robust analysis, robust control, gain-scheduling techniques in the LPV fashion and LMI based approaches. The only prerequisites are basic knowledge in linear algebra, ordinary differential equations and (linear) dynamical systems. Most of the results are proved unless the proof is too complex or not necessary for a good understanding of the results. In the latter cases, suitable references are systematically provided. The first part pertains on the representation, analysis and control of LPV systems along with a reminder on robust analysis and control techniques. The second part is concerned with the representation and analysis of time-delay systems using various time-domain techniques. The third and last part is devoted to the representation, analysis, observation, filtering and control of LPV time-delay systems. The book also presents many important basic and advanced results on the manipulation of LMIs.
As digital transformations continue to accelerate in the world, discourses of big data have come to dominate in a number of fields, from politics and economics, to media and education. But how can we really understand the digital world when so much of the writing through which we grapple with it remains deeply problematic? In a compelling new work of feminist critical theory, Bassett, Kember and O'Riordan scrutinise many of the assumptions of a masculinist digital world, highlighting the tendency of digital humanities scholarship to venerate and essentialise technical forms, and to adopt gendered writing and citation practices. Contesting these writings, practices and politics, the authors foreground feminist traditions and contributions to the field, offering alternative modes of knowledge production, and a radically different, poetic writing style. Through this prism, Furious brings into focus themes including the automation of home and domestic work, the Anthropocene, and intersectional feminist technofutures. |
You may like...
Computer Aided Verification
Hana Chockler, Georg Weissenbacher
Hardcover
R2,035
Discovery Miles 20 350
Binary Bullets - The Ethics of…
Fritz Allhoff, Adam Henschke, …
Hardcover
R3,569
Discovery Miles 35 690
Machine Learning for Cyber Physical…
Oliver Niggemann, Christian Kuhnert, …
Hardcover
R1,244
Discovery Miles 12 440
Encyclopedia of Information Science and…
Mehdi Khosrow-Pour, D.B.A.
Hardcover
R20,961
Discovery Miles 209 610
|